Towards automating social engineering using social networking sites M Huber, S Kowalski, M Nohlberg, S Tjoa 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 201 | 2009 |
Investigating personal determinants of phishing and the effect of national culture W Rocha Flores, H Holm, M Nohlberg, M Ekstedt Information & Computer Security 23 (2), 178-199, 2015 | 103 | 2015 |
Securing information assets: understanding, measuring and protecting against social engineering attacks M Nohlberg Institutionen för data-och systemvetenskap (tills m KTH), 2008 | 60 | 2008 |
The cycle of deception: a model of social engineering attacks, defenses and victims M Nohlberg, S Kowalski | 38 | 2008 |
Why humans are the weakest link M Nohlberg Social and human elements of information security: Emerging trends and …, 2009 | 31 | 2009 |
Exploring the meaning of usable security–a literature review M Lennartsson, J Kävrestad, M Nohlberg Information & Computer Security 29 (4), 647-663, 2021 | 29 | 2021 |
Evaluation of contextual and game-based training for phishing detection J Kävrestad, A Hagberg, M Nohlberg, J Rambusch, R Roos, S Furnell Future Internet 14 (4), 104, 2022 | 26 | 2022 |
Constructing secure and memorable passwords J Kävrestad, M Lennartsson, M Birath, M Nohlberg Information & Computer Security 28 (5), 701-717, 2020 | 25 | 2020 |
Automatic detection of fake news P Nordberg, J Kävrestad, M Nohlberg 6th International Workshop on Socio-Technical Perspective in IS Development …, 2020 | 21 | 2020 |
An empirical investigation of the effect of target-related information in phishing attacks WR Flores, H Holm, M Nohlberg, M Ekstedt 2014 IEEE 18th International Enterprise Distributed Object Computing …, 2014 | 21 | 2014 |
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? J Holgersson, J Kävrestad, M Nohlberg International Symposium on Human Aspects of Information Security and …, 2021 | 17 | 2021 |
ContextBased MicroTraining: A framework for information security training J Kävrestad, M Nohlberg Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 …, 2020 | 17 | 2020 |
Evaluation strategies for cybersecurity training methods: a literature review J Kävrestad, M Nohlberg Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021 | 14 | 2021 |
Using context based micro training to develop OER for the benefit of all J Kävrestad, M Nohlberg Proceedings of the 15th International Symposium on Open Collaboration, 1-10, 2019 | 14 | 2019 |
Understanding passwords–a taxonomy of password creation strategies J Kävrestad, F Eriksson, M Nohlberg Information & Computer Security 27 (3), 453-467, 2019 | 14 | 2019 |
Social engineering audits using anonymous surveys: Conning the users in order to know if they can be conned M Nohlberg | 14 | 2005 |
User‐centred security applied to the development of a management information system M Nohlberg, J Bäckström Information Management & Computer Security 15 (5), 372-381, 2007 | 13 | 2007 |
User perception of Context-Based Micro-Training–a method for cybersecurity training J Kävrestad, S Furnell, M Nohlberg Information Security Journal: A Global Perspective 33 (2), 121-137, 2024 | 12 | 2024 |
Usable privacy and security from the perspective of cognitive abilities J Kävrestad, A Hagberg, R Roos, J Rambusch, M Nohlberg Ifip international summer school on privacy and identity management, 105-121, 2021 | 10 | 2021 |
Exploring the meaning of “usable security” M Lennartsson, J Kävrestad, M Nohlberg Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 …, 2020 | 9 | 2020 |