Hoppa till innehållet

Utvalda publikationer

Här ser du en lista av publikationer från forskning som relaterar till CISS.



Distributed ledger technologies building trust in value chains? (2020)

Wenngren. J, Lundgren. M, Ericson. Å, Lugnet. J
Ingår i: 2020 3rd International Symposium on Small-scale Intelligent Manufacturing Systems(SIMS), IEEE, 2020

On the design of playful training material for information security awareness (2020)

Lugnet. J, Ericson. Å, Lundgren. M, Wenngren. J
Ingår i: Proceedings of The Sixth International Conference on Design Creativity, 26-28 August 2020 University of Oulu, Finland, s. 239-246, The Design Society, 2020
Artikel i tidskrift

Dynamic Interplay in the Information Security Risk Management Process (2019)

Lundgren. M, Bergström. E
International Journal of Risk Assessment and Management, Vol. 22, nr. 2, s. 212-230
Artikel i tidskrift

Revisiting information security risk management challenges (2019)

a practice perspective
Bergström. E, Lundgren. M, Ericson. Å
Information and Computer Security, Vol. 27, nr. 3, s. 358-372

Security-Related Stress (2019)

A Perspective on Information Security Risk
Lundgren. M, Bergström. E
Ingår i: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, 2019

Stronger Authentication for Password Credential Internet Services (2017)

Booth. T, Andersson. K
Ingår i: Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV), s. 41-45, IEEE conference proceedings, 2017, 7886566
Artikel i tidskrift

A Distributed Security Mechanism for Resource-Constrained IoT Devices (2016)

King. J, Awad. A
Informatica, Vol. 40, nr. 1, s. 133-143

Equipment-as-experience (2016)

A Heidegger-based position of information security
Harnesk. D, Thapa. D
Ingår i: Proceedings of the Thirty Seventh International Conference on Information Systems, 2016

Misunderstandings and Misjudgements about Security (2016)

A Dialogical Narrative Network Analysis of Global IT Offshoring
Dhillon. G, Harnesk. D
Paper presented at : Americas Conference on Information Systems : 11/08/2016 - 14/08/2016
Artikel i tidskrift

EAP-Swift (2015)

An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs
Granlund. D, Åhlund. C, Holmlund. P
International Journal of Distributed Sensor Networks
Artikel i tidskrift

Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks (2015)

Booth. T, Andersson. K
Journal of Internet Services and Information Security (JISIS), Vol. 5, nr. 3, s. 58-79