Results and Dissemination
The research within the SECURIT project has resulted in the following results.
Publications
2018
Security culture and information technology
MSB
Publikationsnummer: MSB1222
Accepted
Defining Information Security
Lundgren B, Möller N.
Science and Engineering Ethics
Accepted
The Concept of Anonymity: What is really at Stake?
Lundgren B.
Macnish and Galliot, Big Data and the Democratic Process
Accepted
Need Semantic Information be Truthful?
Lundgren B.
Synthese
Accepted
Inter-organisational information sharing in the public sector: a longitudinal case study on the reshaping of success factors
Karlsson F, Frostenson M, Prenkert F, Kolkowska E, Helin S.
Government Information Quarterly
2017
Informationssäkerhet och organisationskultur
Hallberg J, Johansson P, Karlsson F, Lundberg F, Lundgren B, & Törner M. (Red.).
Studentlitteratur
The Significance of Information Security Risk Assessments Exploring the Consensus of Raters’ Perceptions of Probability and Severity External link, opens in new window.
Hallberg J, Bengtsson J, Hallberg N, Karlzén H, Sommestad T.
International conference on Security and Management, pp. 131–137.
The Theory of Planned Behavior and Information Security Policy Compliance
Sommestad, T. , Karlzén, H., Hallberg, J.
Journal of Computer Information Systems. Taylor & Francis, pp. 1–10.
Workarounds and Trade-offs in Information Security – an Exploratory Study
Woltjer, R.
Information and Computer Security 25(4), pp. 402–420. Emerald
Conceptualising the Values of Anonymity in the 21st Century and Beyond
Lundgren B. IACAP (International Association of Computing and Philosophy),
Stanford University, June 26-28, Stanford, USA
Measuring employees’ compliance – the importance of value pluralism
Karlsson F, Karlsson M, Åström J.
Information & Computer Security
eHealth strategies and platforms - the issue of health equity in Sweden
Hellberg, S. & Johansson, P
Health Policy and Technology
Practice-Based Discourse Analysis of Information Security Policies
Karlsson F, Hedström K, Goldkuhl G
Computers & Security
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method
Kolkowska, E, Karlsson F, Hedström K
Journal of Strategic Information Systems
2016
Inter-organisational information security: a systematic literature review.
Karlsson F, Kolkowska E, Prenkert F.
Information and Computer Security
Leveraging Bystander Reports in Emergency Response Work: Framing Emergency Managers Social Media Use
Bergstrand, F.
Information systems conference, HICCS
Once upon a time in Västmanland - the power of narratives or how the "truth" unfolds
Uhr, Johansson, Landgren J, Holmberg, Bynander, Koelega and Trnka
In proceedings of ISCRAM16, Rio de Janerio, Brazil
2015
Information Security and Resilience: The Right Definition
Lundgren B.
Poster Session, Third Deans Forum Workshop on Resilience Engineering, Tokyo University, Tokyo, Japan
The Information Liar Paradox: A Problem for Floridi's RSDI Definition
Lundgren B.
Philosophy and Technology 28(2): 323-327
An empirical test of the perceived relationship between risk and the constituents severity and probability
T.Sommestad, H.Karlzén, P.Nilsson and J.Hallberg
Special issue of Information and Computer Security, Vol. 24 Iss: 2
Att åstadkomma inriktning och samordning – 7 analyser utifrån hanteringen av skogsbranden i Västmanland 2014
Uhr, C., Frykmer, T., Koelega, S., Cedergårdh , E., Ekman, O., Fredholm, L., & Landgren J.
Centrum för samhällets resiliens, Lunds universitet
Exploring integrated management systems – challenges and potentials in relation to IT governance
Löfstedt, T.
38th Information Systems Research Seminar in Scandinavia, IRIS38
Inter-organisational information sharing – between a rock and a hard place. External link, opens in new window.
Karlsson, F., Kolkowska, K., Hedström, K., & Frostenson, M.
9th International Symposium on Human Aspects of Information Security & Assurance (HAISA)
Practice-based Discourse Analysis of InfoSec Policies.
Karlsson, F., Goldkuhl, G., & Hedström, K.
30th International Information Security and Privacy Conference (IFIP SEC)
Perceived information security risk as a function of probability and severity. External link, opens in new window.
Sommestad, T., Karlzén, H., Nilsson, P., & Hallberg, J.
International Symposium on Human Aspects of Information Security & Assurance (HAISA)
Health, Privacy and (Information) Security: Competing Discourses in eHealth Programmes and Genome Data Regulations.
Johansson, P. & Hellberg, S.
The International Studies Association Annual Convention
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour.
Sommestad, T., Karlzén, H. and Hallberg, J.
International Journal of Information Security and Privacy (IJISP), Vol. 9, Iss. 1.
Definition of information security culture
Jonas Hallberg1, Tom Andersson2, Joakim Berndtsson3, Magnus Frostenson4, Sven Ove Hansson5, Karin Hedström4, Sofie Hellberg3, Björn Johansson1, Peter Johansson3, Fredrik Karlsson4, Martin Karlsson4, Henrik Karlzén1, Ella Kolkowska4, Björn Lundgren5, Niklas Möller5, Tomas Olovsson6, Anders Pousette3, Frans Prenkert4, Kalle Räisänen4, Maria Skyvell Nilsson3, Teodor Sommestad1, Patrik Thunholm7, Marianne Törner3, Rogier Woltjer1, Joachim Åström4, Svante Ödman2
1Swedish Defence Research Agency (FOI), 2Swedish Civil Contingencies Agency (MSB), 3University of Gothenburg, 4Örebro University, 5Royal Institute of Technology (KTH), 6Chalmers University of Technology, 7Linköping University
FOI Memo 5253
Social groupings and information security obedience subcultures within organizations
Sommestad T.
30th International Information Security and Privacy Conference (IFIP SEC)
Information security culture – state-of-the-art review between 2000 and 2013 External link, opens in new window.
Karlsson, F., Åström, J., & Karlsson, M.
Information Management & Computer Security, Vol. 23, Iss. 3, pp. 246-285
2014
Vårdanställdas efterlevnad av informationssäkerhetspolicys – faktorer som påverkar efterlevnaden External link, opens in new window.
Franc K.
MsC LiU
Safety or Security? Formation of Information Security Culture in Health Care
Skyvell-Nilsson et al.
3rd Nordic Conference on Research in Patient Safety and Quality in Healthcare
A Meta-Analysis of Studies on PMT and Information Security Behavior
Sommestad et al.
Dewald Roode Information Security Workshop
The Sufficiency of the TPB for Information Security Policy Compliance
Sommestad et al.
Information Management and Computer Security
Practice-Based Discourse Analysis of Information Security Policy in Health Care External link, opens in new window.
Karlsson et al.
11th Scandinavian Workshop on E-government (SWEG 2014)
2013
Standard-making in Information Security – A Literature Review
Räisänen K.
7th Workshop on Information Security and Privacy. AIS Electronic Library (AISeL), Paper 31
SECURIT poster
Hallberg et al.
5th Resilience Engineering Association Symposium (REA5)
User Acceptance of Information Security Policies
Hallberg et al.
Poster and abstract at the National Symposium on Technology and Methodology for Security and Crisis Management (TAMSEC).
A review of the theory of planned behaviour in the context of information security policy compliance
Sommestad et al.
Proc. of the 28th IFIP TC-11 SEC. Auckland, New Zealand
Variables influencing information security policy compliance: a systematic review of quantitative studies Sommestad et al.
Information Management & Computer Security