Marcus Nohlberg

Orcid: 0000-0001-5962-9995

According to our database1, Marcus Nohlberg authored at least 39 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
User perception of Context-Based Micro-Training - a method for cybersecurity training.
Inf. Secur. J. A Glob. Perspect., March, 2024

Design principles for cognitively accessible cybersecurity training.
Comput. Secur., February, 2024

Cybersecurity in modern cars: awareness and readiness of auto workshops.
Inf. Comput. Secur., 2024

Useful but for Someone Else - An Explorative Study on Cybersecurity Training Acceptance.
Proceedings of the Human Aspects of Information Security and Assurance, 2024

2023
The impact of short-term memory on phishing detection ability and password behaviour.
Proceedings of the 9th International Conference on Socio-Technical Perspective in Information Systems Development (STPIS 2023), 2023

Combating Digital Exclusion with Cybersecurity Training - An Interview Study with Swedish Seniors.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Evaluation of Contextual and Game-Based Training for Phishing Detection.
Future Internet, 2022

Survey of Users' Willingness to Adopt and Pay for Cybersecurity Training.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
Exploring the meaning of usable security - a literature review.
Inf. Comput. Secur., 2021

Success factors and challenges in digital forensics for law enforcement in Sweden.
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021

Usable Privacy and Security from the Perspective of Cognitive Abilities.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021

What Parts of Usable Security Are Most Important to Users?
Proceedings of the Information Security Education for Cyber Resilience, 2021

Exploring Experiences of Using SETA in Nordic Municipalities.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Evaluation Strategies for Cybersecurity Training Methods: A Literature Review.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2020
Analyzing the usage of character groups and keyboard patterns in password creation.
Inf. Comput. Secur., 2020

Constructing secure and memorable passwords.
Inf. Comput. Secur., 2020

Automatic Detection of Fake News.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020

The Language Effect in Phishing Susceptibility.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020

Can Johnny Actually Like Security Training?
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020

Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Exploring Information Security and Domestic Equality.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Exploring the Meaning of "Usable Security".
Proceedings of the Human Aspects of Information Security and Assurance, 2020

ContextBased MicroTraining: A Framework for Information Security Training.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
Understanding passwords - a taxonomy of password creation strategies.
Inf. Comput. Secur., 2019

Using context based micro training to develop OER for the benefit of all.
Proceedings of the 15th International Symposium on Open Collaboration, 2019

Analysing the Usage of Character Groups and Keyboard Patterns in Password.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Users perception of using CBMT for information security training.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Spiraling out in control: A Video Cartesian Dialectic on a Socio-technical Approach to Teaching Privacy, Information- and Cyber Security (PICS).
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019

2018
Defining and Modelling the Online Fraud Process.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2015
Investigating personal determinants of phishing and the effect of national culture.
Inf. Comput. Secur., 2015

Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Online Fraud Defence by Context Based Micro Training.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, 2014

2009
Towards Automating Social Engineering Using Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Securing Information Assets: Understanding, Measuring and Protecting against Social Engineering Attacks.
PhD thesis, 2008

The cycle of deception - a model of social engineering attacks, defenses and victims.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

2007
User-centred security applied to the development of a management information system.
Inf. Manag. Comput. Secur., 2007


  Loading...