Towards automating social engineering using social networking sites M Huber, S Kowalski, M Nohlberg, S Tjoa 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 203 | 2009 |
Investigating personal determinants of phishing and the effect of national culture W Rocha Flores, H Holm, M Nohlberg, M Ekstedt Information & Computer Security 23 (2), 178-199, 2015 | 102 | 2015 |
Securing information assets: understanding, measuring and protecting against social engineering attacks M Nohlberg Institutionen för data-och systemvetenskap (tills m KTH), 2008 | 61 | 2008 |
The cycle of deception: a model of social engineering attacks, defenses and victims M Nohlberg, S Kowalski | 40 | 2008 |
Why humans are the weakest link M Nohlberg Social and human elements of information security: Emerging trends and …, 2009 | 30 | 2009 |
Exploring the meaning of usable security–a literature review M Lennartsson, J Kävrestad, M Nohlberg Information & Computer Security 29 (4), 647-663, 2021 | 24 | 2021 |
Constructing secure and memorable passwords J Kävrestad, M Lennartsson, M Birath, M Nohlberg Information & Computer Security 28 (5), 701-717, 2020 | 23 | 2020 |
Evaluation of contextual and game-based training for phishing detection J Kävrestad, A Hagberg, M Nohlberg, J Rambusch, R Roos, S Furnell Future Internet 14 (4), 104, 2022 | 22 | 2022 |
Automatic detection of fake news P Nordberg, J Kävrestad, M Nohlberg 6th International Workshop on Socio-Technical Perspective in IS Development …, 2020 | 20 | 2020 |
An empirical investigation of the effect of target-related information in phishing attacks WR Flores, H Holm, M Nohlberg, M Ekstedt 2014 IEEE 18th International Enterprise Distributed Object Computing …, 2014 | 19 | 2014 |
ContextBased MicroTraining: A framework for information security training J Kävrestad, M Nohlberg Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 …, 2020 | 17 | 2020 |
Using context based micro training to develop OER for the benefit of all J Kävrestad, M Nohlberg Proceedings of the 15th International Symposium on Open Collaboration, 1-10, 2019 | 15 | 2019 |
Social engineering audits using anonymous surveys: Conning the users in order to know if they can be conned M Nohlberg | 14 | 2005 |
Understanding passwords–a taxonomy of password creation strategies J Kävrestad, F Eriksson, M Nohlberg Information & Computer Security 27 (3), 453-467, 2019 | 13 | 2019 |
User‐centred security applied to the development of a management information system M Nohlberg, J Bäckström Information Management & Computer Security 15 (5), 372-381, 2007 | 13 | 2007 |
Evaluation strategies for cybersecurity training methods: a literature review J Kävrestad, M Nohlberg Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021 | 12 | 2021 |
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? J Holgersson, J Kävrestad, M Nohlberg International Symposium on Human Aspects of Information Security and …, 2021 | 11 | 2021 |
Exploring the meaning of “usable security” M Lennartsson, J Kävrestad, M Nohlberg Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 …, 2020 | 9 | 2020 |
Users perception of using CBMT for informationsecurity training J Kävrestad, M Skärgård, M Nohlberg Human Aspects of Information Security & Assurance (HAISA 2019) International …, 2019 | 9 | 2019 |
System and Network Security in a Heterogeneous Healthcare Domain: A Case Study RM Åhlfeldt, M Nohlberg 4th Security Conference, Las Vegas, USA, March 30–31, 2005, 2005 | 9 | 2005 |