Selected publications

Lundgren, M. & Bergström, E. (2019). Dynamic Interplay in the Information Security Risk Management Process. International Journal of Risk Assessment and Management, 22(2), 212-230.

Bergström, E., Lundgren, M. & Ericson, Å. (2019). Revisiting information security risk management challenges: a practice perspective. Information and Computer Security, 27(3), 358-372.

Lundgren, M., & Bergström, E. (2019). Security-Related Stress: A Perspective on Information Security Risk Management. in Cyber Situational Awareness for Predictive Insight and Deep Learning (pp. 273–280).

Booth, T. & Andersson, K. 2017. Stronger Authentication for Password Credential Internet Services. In: Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV) / [ed] Pascal Urien, Selwyn Piramuthu, Piscataway, NJ: IEEE conference proceedings, 2017, 41-45 p.

Harnesk, D. & Thapa, D. 2016. Equipment-as-experience: A Heidegger based Position of Information Security. In Proceedings of the International Conference on Information systems (ICIS), Dublin, Ireland

Dhillon, G. & Harnesk, D. 2016. Misunderstandings and Misjudgements about Security: A Dialogical Narrative Network Analysis of Global IT Offshoring. In Proceedings of the 22rd American Conference on Information Systems (AMCIS), San Diego, USA.

Padyab, A. M., Päivärinta, T. & Harnesk, D. 2014. Genre-Based Approach to Assessing Information and Knowledge Security Risks. International Journal of Knowledge Management (IJKM), 10, pp. 13-27.

Thapa, D. & Harnesk, D. 2014. Rethinking the Information Security Risk Practices: A Critical Social Theory Perspective.  System Sciences (HICSS), 47th Hawaii International Conference on Systems Science, pp. 3207-3214.

Granlund, D., Holmlund, P., Åhlund, C. 2015 Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities Sensors, Vol. 15, nr 3, 5112-5135 s.

Granlund, D., Åhlund, C., Holmlund, P. 2015. EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs. International Journal of Distributed Sensor Networks.

Granlund, D.,  Åhlund, C. 2011.A scalability study of AAA support in heterogeneous TrustCom 2011: 2011 international joint conference of IEEE TrustCom-11, IEEE ICESS-11 / FCST-11 : 16-19 November 2011, Changsha, Hunan, P. R. China / [ed] Guojun Wang, Los Alamitos, Calif: IEEE Computer Society Press , 2011, 488-493 s.

King, J., Awad, A.I. 2016. A Distributed Security Mechanism for Resource-Constrained IoT Devices, Informatica, Vol. 40, no 1, 133-143 p.

Booth, T., Andersson, K. 2015. Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks. Journal of Internet Services and Information Security (JISIS), Vol. 5, no 3, 58-79.

Päivärinta, T., Smolander, K. 2015. Theorizing about Software Development Practices. Science of Computer Programming, Vol. 101, 124–135.