Variables influencing information security policy compliance: A systematic review of quantitative studies T Sommestad, J Hallberg, K Lundholm, J Bengtsson Information Management & Computer Security 22 (1), 42-75, 2014 | 346 | 2014 |
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures T Sommestad, M Ekstedt, H Holm IEEE Systems Journal 7 (3), 363-373, 2012 | 201 | 2012 |
The Sufficiency of the Theory of Planned Behavior for Explaining Information Security Policy Compliance T Sommestad, H Karlzen, J Hallberg Information and computer security 23 (2), 2015 | 194 | 2015 |
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour T Sommestad, H Karlzén, J Hallberg International Journal of Information Security and Privacy (IJISP) 9 (1), 26-46, 2015 | 173 | 2015 |
A probabilistic relational model for security risk analysis T Sommestad, M Ekstedt, P Johnson Computers & Security 29 (6), 659-679, 2010 | 134 | 2010 |
A tool for enterprise architecture analysis P Johnson, E Johansson, T Sommestad, J Ullberg Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th …, 2007 | 125 | 2007 |
A quantitative evaluation of vulnerability scanning H Holm, T Sommestad, J Almroth, M Persson Information Management & Computer Security 19 (4), 231-247, 2011 | 118 | 2011 |
Cyber security risks assessment with bayesian defense graphs and architectural models T Sommestad, M Ekstedt, P Johnson System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 1-10, 2009 | 101 | 2009 |
The theory of planned behavior and information security policy compliance T Sommestad, H Karlzén, J Hallberg Journal of Computer Information Systems 59 (4), 344-353, 2019 | 97 | 2019 |
A tool for enterprise architecture analysis using the PRM formalism M Buschle, J Ullberg, U Franke, R Lagerström, T Sommestad Information Systems Evolution, 108-121, 2010 | 81 | 2010 |
SCADA system cyber security—A comparison of standards T Sommestad, GN Ericsson, J Nordlander Power and Energy Society General Meeting, 2010 IEEE, 1-8, 2010 | 79 | 2010 |
Enterprise architecture management's impact on information technology success R Lagerström, T Sommestad, M Buschle, M Ekstedt System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-10, 2011 | 76 | 2011 |
A review of the theory of planned behaviour in the context of information security policy compliance T Sommestad, J Hallberg Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 64 | 2013 |
Cyber security exercises and competitions as a platform for cyber security experiments T Sommestad, J Hallberg Nordic Conference on Secure IT Systems, 47-60, 2012 | 64 | 2012 |
A Tool for Automatic Enterprise Architecture Modeling M Buschle, H Holm, T Sommestad, M Ekstedt, K Shahzad Caise workshops, 2011 | 60 | 2011 |
Enterprise architecture models for cyber security analysis M Ekstedt, T Sommestad 2009 IEEE/PES Power Systems Conference and Exposition, 1-6, 2009 | 60 | 2009 |
Modeling security of power communication systems using defense graphs and influence diagrams T Sommestad, M Ekstedt, L Nordström Power Delivery, IEEE Transactions on 24 (4), 1801-1808, 2009 | 56 | 2009 |
CySeMoL: A tool for cyber security analysis of enterprises H Holm, T Sommestad, M Ekstedt, L NordströM Electricity Distribution (CIRED 2013), 22nd International Conference and …, 2013 | 42 | 2013 |
SVED: Scanning, Vulnerabilities, Exploits and Detection H Holm, T Sommestad Military Communications Conference, MILCOM 2016-2016 IEEE, 976-981, 2016 | 39 | 2016 |
A meta-analysis of field experiments on phishing susceptibility T Sommestad, H Karlzén 2019 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2019 | 34 | 2019 |