Skip to content

Selected publications

Here is a list of publications from research related to CISS.


Conference paper

Distributed ledger technologies building trust in value chains? (2020)

Wenngren. J, Lundgren. M, Ericson. Å, Lugnet. J
Part of: 2020 3rd International Symposium on Small-scale Intelligent Manufacturing Systems(SIMS), IEEE, 2020
Doctoral thesis, comprehensive summary

Making the Dead Alive (2020)

Dynamic Routines in Risk Management
Lundgren. M
Conference paper

On the design of playful training material for information security awareness (2020)

Lugnet. J, Ericson. Å, Lundgren. M, Wenngren. J
Part of: Proceedings of The Sixth International Conference on Design Creativity, 26-28 August 2020 University of Oulu, Finland, s. 239-246, The Design Society, 2020
Article in journal

Dynamic Interplay in the Information Security Risk Management Process (2019)

Lundgren. M, Bergström. E
International Journal of Risk Assessment and Management, Vol. 22, nr. 2, s. 212-230
Article in journal

Revisiting information security risk management challenges (2019)

a practice perspective
Bergström. E, Lundgren. M, Ericson. Å
Information and Computer Security, Vol. 27, nr. 3, s. 358-372
Conference paper

Security-Related Stress (2019)

A Perspective on Information Security Risk
Lundgren. M, Bergström. E
Part of: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, 2019
Conference paper

Stronger Authentication for Password Credential Internet Services (2017)

Booth. T, Andersson. K
Part of: Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV), s. 41-45, IEEE conference proceedings, 2017, 7886566
Article in journal

A Distributed Security Mechanism for Resource-Constrained IoT Devices (2016)

King. J, Awad. A
Informatica, Vol. 40, nr. 1, s. 133-143
Conference paper

Equipment-as-experience (2016)

A Heidegger-based position of information security
Harnesk. D, Thapa. D
Part of: Proceedings of the Thirty Seventh International Conference on Information Systems, 2016
Conference paper

Misunderstandings and Misjudgements about Security (2016)

A Dialogical Narrative Network Analysis of Global IT Offshoring
Dhillon. G, Harnesk. D
Paper presented at : Americas Conference on Information Systems : 11/08/2016 - 14/08/2016
Article in journal

EAP-Swift (2015)

An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs
Granlund. D, Åhlund. C, Holmlund. P
International Journal of Distributed Sensor Networks
Article in journal

Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks (2015)

Booth. T, Andersson. K
Journal of Internet Services and Information Security (JISIS), Vol. 5, nr. 3, s. 58-79