Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture WR Flores, E Antonsen, M Ekstedt Computers & security 43, 90-110, 2014 | 274 | 2014 |
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness WR Flores, M Ekstedt Computers & security 59, 26-44, 2016 | 221 | 2016 |
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures T Sommestad, M Ekstedt, H Holm IEEE Systems Journal 7 (3), 363-373, 2012 | 201 | 2012 |
The effect of IT governance maturity on IT governance performance M Simonsson, P Johnson, M Ekstedt Information systems management 27 (1), 10-24, 2010 | 201 | 2010 |
Enterprise architecture: models and analyses for information systems decision making P Johnson, M Ekstedt Studentlitteratur, 2007 | 176 | 2007 |
A survey on CIO concerns-do enterprise architecture frameworks support them? Å Lindström, P Johnson, E Johansson, M Ekstedt, M Simonsson Information Systems Frontiers 8, 81-90, 2006 | 174 | 2006 |
Where's the theory for software engineering? P Johnson, M Ekstedt, I Jacobson IEEE software 29 (5), 96-96, 2012 | 156 | 2012 |
A meta language for threat modeling and attack simulations P Johnson, R Lagerström, M Ekstedt Proceedings of the 13th international conference on availability …, 2018 | 150 | 2018 |
A probabilistic relational model for security risk analysis T Sommestad, M Ekstedt, P Johnson Computers & security 29 (6), 659-679, 2010 | 134 | 2010 |
Using enterprise architecture for cio decision-making: On the importance of theory P Johnson, M Ekstedt, E Silva, L Plazaola Second Annual Conference on Systems Engineering Research, 2004 | 134 | 2004 |
PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language H Holm, K Shahzad, M Buschle, M Ekstedt IEEE Transactions on Dependable and Secure Computing 12 (6), 626-639, 2014 | 124 | 2014 |
Enterprise architecture meta models for IT/business alignment situations J Saat, U Franke, R Lagerström, M Ekstedt 2010 14th IEEE International Enterprise Distributed Object Computing …, 2010 | 119 | 2010 |
Can the common vulnerability scoring system be trusted? a bayesian analysis P Johnson, R Lagerström, M Ekstedt, U Franke IEEE Transactions on Dependable and Secure Computing 15 (6), 1002-1015, 2016 | 116 | 2016 |
Empirical analysis of system-level vulnerability metrics through actual attacks H Holm, M Ekstedt, D Andersson IEEE Transactions on dependable and secure computing 9 (6), 825-837, 2012 | 114 | 2012 |
Cyber security risks assessment with bayesian defense graphs and architectural models T Sommestad, M Ekstedt, P Johnson 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 101 | 2009 |
Automatic data collection for enterprise architecture models H Holm, M Buschle, R Lagerström, M Ekstedt Software & Systems Modeling 13, 825-841, 2014 | 98 | 2014 |
Investigating personal determinants of phishing and the effect of national culture W Rocha Flores, H Holm, M Nohlberg, M Ekstedt Information & Computer Security 23 (2), 178-199, 2015 | 93 | 2015 |
EAF2-A framework for categorizing enterprise architecture frameworks U Franke, D Hook, J Konig, R Lagerstrom, P Narman, J Ullberg, ... 2009 10th ACIS International Conference on Software Engineering, Artificial …, 2009 | 87 | 2009 |
Securi cad by foreseeti: A cad tool for enterprise cyber security management M Ekstedt, P Johnson, R Lagerström, D Gorton, J Nydrén, K Shahzad 2015 IEEE 19th international enterprise distributed object computing …, 2015 | 82 | 2015 |
Automating enterprise architecture documentation using an enterprise service bus M Buschle, M Ekstedt, S Grunow, M Hauder, F Matthes, S Roth | 76 | 2012 |