Towards automating social engineering using social networking sites M Huber, S Kowalski, M Nohlberg, S Tjoa 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 190 | 2009 |
IT insecurity: A multi-disciplinary inquiry. S Kowalski | 114 | 1996 |
A socio-technical framework for threat modeling a software supply chain B Al Sabbagh, S Kowalski IEEE Security & Privacy 13 (4), 30-39, 2015 | 59 | 2015 |
Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View. G Karokola, S Kowalski, L Yngström HAISA, 58-73, 2011 | 59 | 2011 |
Two case studies in using chatbots for security training S Kowalski, K Pavlovska, M Goldstein Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013 | 43 | 2013 |
Secure e-government services: a comparative analysis of e-government maturity models for the developing regions–the need for security services G Karokola, L Yngström, S Kowalski International Journal of Electronic Government Research (IJEGR) 8 (1), 1-25, 2012 | 40 | 2012 |
The cycle of deception: a model of social engineering attacks, defenses and victims M Nohlberg, S Kowalski | 37 | 2008 |
Information security metrics: state of the art R Barabanov, S Kowalski, L Yngström DSV Report series 2011, 11-007, 2011 | 36 | 2011 |
Secure e-government services: Towards a framework for integrating it security services into e-government maturity models G Karokola, S Kowalski, L Yngström 2011 Information Security for South Africa, 1-9, 2011 | 30 | 2011 |
Consumers’ awareness of, attitudes towards and adoption of mobile phone security S Kowalski, M Goldstein 20th International Symposium on Human Factors in Telecommunication, 20-23, 2006 | 30 | 2006 |
Simulating apprenticeship using multimedia in Higher Education: a case from the information systems field I Bider, M Henkel, S Kowalski, E Perjons Interactive Technology and Smart Education 12 (2), 137-154, 2015 | 25 | 2015 |
Developing social metrics for security modeling the security culture of it workers individuals (case study) B Al Sabbagh, S Kowalski The 5th international conference on communications, computers and …, 2012 | 24 | 2012 |
Universities services in the new social ecosystems: Using conversational agents to help teach information security risk analysis S Kowalski, R Hoffmann, R Jain, M Mumtaz SOTICS 2011, The First International Conference on Social Eco-Informatics, 91-94, 2011 | 24 | 2011 |
A prototype For HI2Ping information security culture and awareness training B Al Sabbagh, M Ameen, T Wätterstam, S Kowalski 2012 international conference on E-learning and E-technologies in education …, 2012 | 23 | 2012 |
Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students S Kowalski, H Kowalski Information Age 12 (4), 206-212, 1990 | 23 | 1990 |
Systematically understanding cybersecurity economics: A survey M Kianpour, SJ Kowalski, H Øverby Sustainability 13 (24), 13677, 2021 | 22 | 2021 |
Generating features for named entity recognition by learning prototypes in semantic space: The case of de-identifying health records A Henriksson, H Dalianis, S Kowalski 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2014 | 22 | 2014 |
HIP–A technology-rich and interactive multimedia pedagogical platform AS Imran, SJ Kowalski Learning and Collaboration Technologies. Designing and Developing Novel …, 2014 | 22 | 2014 |
Bridging the gap between general management and technicians–A case study on ICT security in a developing country JK Bakari, CN Tarimo, L Yngström, C Magnusson, S Kowalski Computers & Security 26 (1), 44-55, 2007 | 22 | 2007 |
Computer ethics and computer abuse: A longitudinal study of Swedish university students S Kowalski IFIP TC11 6th international conference on information systems security, 1990 | 22 | 1990 |