Jonas Hallberg

According to our database1, Jonas Hallberg authored at least 20 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
The Theory of Planned Behavior and Information Security Policy Compliance.
J. Comput. Inf. Syst., 2019

2018
A Test of Structured Threat Descriptions for Information Security Risk Assessments.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper).
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Assessing Information Security Risks using Pairwise Weighting.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
An empirical test of the perceived relationship between risk and the constituents severity and probability.
Inf. Comput. Secur., 2016

2015
The sufficiency of the theory of planned behavior for explaining information security policy compliance.
Inf. Comput. Secur., 2015

A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour.
Int. J. Inf. Secur. Priv., 2015

Perceived Information Security Risk as a Function of Probability and Severity.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
Variables influencing information security policy compliance: A systematic review of quantitative studies.
Inf. Manag. Comput. Secur., 2014

Exploring the Rationale for Emergency Management Information Systems for Local Communities.
Int. J. Inf. Syst. Crisis Response Manag., 2014

Overview of Enterprise Information Needs in Information Security Risk Assessment.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference, 2014

2013
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Rationale for emergency management systems for local communities: A needs assessment.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

2011
The 14 Layered Framework for Including Social and Organisational Aspects in Security Management.
Inf. Manag. Comput. Secur., 2011

2008
Modeling and Assessment of Systems Security.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

2003
Identification of IT Security-Relevant System Characteristics.
Proceedings of the IEEE Systems, 2003

2002
Ethical issues in public health informatics: implications for system design when sharing geographic information.
J. Biomed. Informatics, 2002

2001
Towards Second-generation Smart Card-Based Authentication in Health Information Systems: The Secure Server Model.
Proceedings of the MEDINFO 2001, 2001

1998
Estimation and Consideration of Interconnection Delays during High-Level Synthesis.
Proceedings of the 24th EUROMICRO '98 Conference, 1998


  Loading...