Author of the publication

IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study.

, , , and . HAISA, page 45-55. University of Plymouth, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models., , and . ISSA, ISSA, Pretoria, South Africa, (2011)Two Case Studies in Using Chatbots for Security Training., , and . World Conference on Information Security Education, volume 406 of IFIP Advances in Information and Communication Technology, page 265-272. Springer, (2009)Teaching Enterprise Modeling Based on Multi-media Simulation: A Pragmatic Approach., , , and . MCETECH, volume 209 of Lecture Notes in Business Information Processing, page 239-254. Springer, (2015)Cybernetic analysis of the 12th U.S. National Computer Security Conference.. Comput. Secur., 10 (3): 228-235 (1991)The SBC Model as a Conceptual Framework for Reporting IT Crimes.. Security and Control of Information Technology in Society, volume A-43 of IFIP Transactions, page 207-226. North-Holland, (1993)Beyond Training and Awareness: From Security Culture to Security Risk Management., and . STPIS@CAiSE, volume 2107 of CEUR Workshop Proceedings, page 71-86. CEUR-WS.org, (2018)Simulating apprenticeship using multimedia in higher education: A case from the information systems field., , , and . Interact. Technol. Smart Educ., 12 (2): 137-154 (2015)ST(CS)2 - Featuring socio-technical cyber security warning systems., and . CyberSec, page 312-316. IEEE, (2012)A Framework for Synchronizing Human Behavior, Processes and Support Systems Using a Socio-technical Approach., and . BMMDS/EMMSAD, volume 175 of Lecture Notes in Business Information Processing, page 109-123. Springer, (2014)A Framework for Evaluation of Information Systems Security., , and . ISSA, page 1-11. ISSA, Pretoria, South Africa, (2005)