Högskolan i Skövde

his.sePublications
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 28) Show all publications
Kävrestad, J., Bergström, E., Stavrou, E. & Nohlberg, M. (2025). Useful but for Someone Else - An Explorative Study on Cybersecurity Training Acceptance. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II. Paper presented at 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024 (pp. 47-60). Cham: Springer
Open this publication in new window or tab >>Useful but for Someone Else - An Explorative Study on Cybersecurity Training Acceptance
2025 (English)In: Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II / [ed] Nathan Clarke; Steven Furnell, Cham: Springer, 2025, p. 47-60Conference paper, Published paper (Refereed)
Abstract [en]

Insecure user behavior is the most common cause of cybersecurity incidents. Insecure behavior includes failing to detect phishing, insecure password management, and more. The problem has been known for decades, and state-of-the-art mitigation methods include security education, training, and awareness (SETA). A common problem with SETA is, however, that users do not seem to adopt it to a high enough extent. When users are not adopting SETA, its intended benefit is lost. Previous research argues for personalized SETA and suggests that different user groups have different SETA needs and preferences. The characteristics of those groups are, however, unknown. To that end, this research draws on an existing dataset to identify how different populations perceive different SETA methods. A quantitative analysis shows that users in different demographic groups have different SETA preferences, with age being the most impactful demographic. A qualitative analysis reveals further factors that impact user adoption of SETA, with cost and ease of use being important factors for further research. 

Place, publisher, year, edition, pages
Cham: Springer, 2025
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 722
Keywords
Awareness, Cybersecurity, Education, Human Factor, SETA, Training, User, Phishing, Cyber security, Education training, Password management, Security awareness, Security education, Security training, User behaviors
National Category
Information Systems Information Systems, Social aspects Human Computer Interaction
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-24794 (URN)10.1007/978-3-031-72563-0_4 (DOI)2-s2.0-85211347407 (Scopus ID)978-3-031-72562-3 (ISBN)978-3-031-72565-4 (ISBN)978-3-031-72563-0 (ISBN)
Conference
18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024
Projects
VISKAICANP
Funder
Swedish Civil Contingencies Agency, MSB 2021-14650Swedish Civil Contingencies Agency, MSB 2023-10887
Note

© IFIP International Federation for Information Processing 2025

Correspondence Address: J. Kävrestad; School of Engineering, Jönköping University, Jönköping, Sweden; email: joakim.kavrestad@ju.se

We gratefully acknowledge the grants from the Swedish Civil Contingencies Agency (MSB), projects VISKA (MSB 2021-14650) and ICANP (MSB 2023-10887).

Available from: 2024-12-19 Created: 2024-12-19 Last updated: 2025-01-14Bibliographically approved
Bergström, E., Lundgren, M., Bernsmed, K. & Bour, G. (2023). “Check, Check, Check, We Got Those” – Catalogue Use in Information Security Risk Management. In: Steve Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings. Paper presented at 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, Kent, United Kingdom, July 4–6, 2023 (pp. 181-191). Cham: Springer, 1
Open this publication in new window or tab >>“Check, Check, Check, We Got Those” – Catalogue Use in Information Security Risk Management
2023 (English)In: Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings / [ed] Steve Furnell; Nathan Clarke, Cham: Springer, 2023, Vol. 1, p. 181-191Conference paper, Published paper (Refereed)
Abstract [en]

Information Security Risk Management (ISRM) is fundamental in most organisations today. The literature describes ISRM as a complex activity, and one way of addressing this is to enable knowledge reuse in the shape of catalogues. Catalogues in the ISRM domain can contain lists of, e.g. assets, threats and security controls. In this paper, we focus on three aspects of catalogue use. Why we need catalogues, how catalogue granularity is perceived, and how catalogues help novices in practice. As catalogue use is not yet a widespread practice in the ISRM, we have selected a domain where catalogues are a part of the ISRM work. In this case, the Air Traffic Management (ATM) domain uses a methodology that includes catalogues and is built on ISO/IEC 27005. The results are based on data collected from 19 interviews with ATM professionals that are either experts or novices in ISRM. With this paper, we nuance the view on what catalogues can contribute with. For example, consistency, coherency, a starting point and new viewpoints. At the same time, we identify the need to inform about the aim of the catalogues and the limitations that come with catalogue use in order to leverage the use – especially from a novice perspective. © 2023, IFIP International Federation for Information Processing.

Place, publisher, year, edition, pages
Cham: Springer, 2023
Series
IFIP Advances in Information and Communication Technology (IFIPAICT), ISSN 1868-4238, E-ISSN 1868-422X ; 674
Keywords
Catalogues, Information Security Risk Management, Risk management practice
National Category
Information Systems, Social aspects Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-23312 (URN)10.1007/978-3-031-38530-8_15 (DOI)2-s2.0-85172661821 (Scopus ID)978-3-031-38529-2 (ISBN)978-3-031-38532-2 (ISBN)978-3-031-38530-8 (ISBN)
Conference
17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, Kent, United Kingdom, July 4–6, 2023
Available from: 2023-10-16 Created: 2023-10-16 Last updated: 2024-04-15Bibliographically approved
Bernsmed, K., Bour, G., Lundgren, M. & Bergström, E. (2022). An evaluation of practitioners’ perceptions of a security risk assessment methodology in air traffic management projects. Journal of Air Transport Management, 102, 102223-102223, Article ID 102223.
Open this publication in new window or tab >>An evaluation of practitioners’ perceptions of a security risk assessment methodology in air traffic management projects
2022 (English)In: Journal of Air Transport Management, ISSN 0969-6997, E-ISSN 1873-2089, Vol. 102, p. 102223-102223, article id 102223Article in journal (Refereed) Published
Abstract [en]

Cyber security is a key enabler for safe Air Traffic Management (ATM). This paper presents results from an empirical study, in which we have investigated and evaluated the use of the Security Risk Assessment Methodology for SESAR (SecRAM) in European ATM research and development projects. The study was performed with the intention to find and document common issues and aspects that could be improved in the methodology. The results from the study reveal that while most of the practitioners had a positive perception of the methodology itself, they were less satisfied with the process of applying it in their projects. Based on the results, we provide a number of recommendations, which aim to improve the security risk assessment process in the ATM domain.

Place, publisher, year, edition, pages
Elsevier, 2022
Keywords
Information security, Cyber security, Security risk assessment, Air Traffic Management, SESAR, SecRAM
National Category
Information Systems Information Systems, Social aspects
Identifiers
urn:nbn:se:his:diva-22987 (URN)10.1016/j.jairtraman.2022.102223 (DOI)000806790900003 ()2-s2.0-85130773545 (Scopus ID)
Funder
EU, Horizon 2020, 731765The Research Council of Norway, 247678
Note

CC BY 4.0

This project has received funding from the SESAR JU under the EU H2020 research and innovation programme under grant agreement 731765. The work has also been supported by the Science of Security in Agile Software Development (SoS-Agile) project, funded by the Research Council of Norway (grant number 247678).

Available from: 2023-07-06 Created: 2023-07-06 Last updated: 2023-07-06Bibliographically approved
Bergström, E., Karlsson, F. & Åhlfeldt, R.-M. (2021). Developing an information classification method. Information and Computer Security, 29(2), 209-239
Open this publication in new window or tab >>Developing an information classification method
2021 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 29, no 2, p. 209-239Article in journal (Refereed) Published
Abstract [en]

Purpose: The purpose of this paper is to develop a method for information classification. The proposed method draws on established standards, such as the ISO/IEC 27002 and information classification practices. The long-term goal of the method is to decrease the subjective judgement in the implementation of information classification in organisations, which can lead to information security breaches because the information is under- or over-classified. Design/methodology/approach: The results are based on a design science research approach, implemented as five iterations spanning the years 2013 to 2019. Findings: The paper presents a method for information classification and the design principles underpinning the method. The empirical demonstration shows that senior and novice information security managers perceive the method as a useful tool for classifying information assets in an organisation. Research limitations/implications: Existing research has, to a limited extent, provided extensive advice on how to approach information classification in organisations systematically. The method presented in this paper can act as a starting point for further research in this area, aiming at decreasing subjectivity in the information classification process. Additional research is needed to fully validate the proposed method for information classification and its potential to reduce the subjective judgement. Practical implications: The research contributes to practice by offering a method for information classification. It provides a hands-on-tool for how to implement an information classification process. Besides, this research proves that it is possible to devise a method to support information classification. This is important, because, even if an organisation chooses not to adopt the proposed method, the very fact that this method has proved useful should encourage any similar endeavour. Originality/value: The proposed method offers a detailed and well-elaborated tool for information classification. The method is generic and adaptable, depending on organisational needs.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2021
Keywords
Information classification, Information classification method, Information security management, Information security management systems, ISO Standards, Security of data, Design Principles, Design-science researches, Design/methodology/approach, Information assets, Long-term goals, Organisational, Subjective judgement, Classification (of information)
National Category
Information Systems Information Systems, Social aspects Computer Sciences
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-19309 (URN)10.1108/ICS-07-2020-0110 (DOI)000595848200001 ()2-s2.0-85097088962 (Scopus ID)
Note

Article publication date: 3 December 2020.

Issue publication date: 3 August 2021.

Available from: 2020-12-10 Created: 2020-12-10 Last updated: 2023-05-02Bibliographically approved
Bergström, E. (2020). Supporting Information Security Management: Developing a Method for Information Classification. (Doctoral dissertation). Skövde: University of Skövde
Open this publication in new window or tab >>Supporting Information Security Management: Developing a Method for Information Classification
2020 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. Asset management is a central activity in ISMS that aims at identifying, assigning ownership and adding protection to information assets. One activity within asset management is information classification that has the objective to ensure that the information receives an appropriate level of protection in accordance with its importance to the organisation. Information classification is a well-known practice for all kinds of organisations, both in the private and public sector, and is included in different variants in standards such as ISO/IEC 27002, COBIT and NIST-SP800.

However, information classification has received little attention from academia, and many organisations are struggling with the implementation. The reasons behind why it is problematic, and how to address such issues, are largely unknown. Furthermore, existing approaches, described in, for example, standards and national recommendations, do not provide a coherent and systematic approach to information classification. The short descriptions in standards, and literature alike, leave out essential aspects needed for many organisations to adopt and implement information classification. There is, for instance, a lack of detailed descriptions regarding (1) procedures and concepts, (2) how to tailor the approach for different situations, (3) a framework that structures and guides the classification, (4) what roles should be involved in the classification, and (5) how information with different granularity is handled.

This thesis aims to increase the applicability of information classification by developing a method for information classification in ISMS that draws from established standards and practice. In order to address this aim, a Design Science Research (DSR) study was performed in three cycles. A wide range of data was collected, including a series of interviews with experts and novices on information classification, a survey, most of the Swedish public sector information classification policies, and observations. There are three main contributions made by this thesis (1) the identification of issues and enablers for information classification, (2) the design principles underpinning the development of a method for information classification, and (3) the method for information classification itself. Contributions have also been made to the context around information classification, such as, for example, 20 practical suggestions for how to meet documented challenges in practice.

Abstract [sv]

I den starkt digitaliserade värld vi lever i idag har information och informationssystem blivit kritiska tillgångar för organisationer och därför måste dessa följaktligen skyddas. För att implementera och arbeta med informationssäkerhet på ett strukturerat sätt kan ett ledningssystem för informationssäkerhet (LIS) implementeras. Hantering av tillgångar är en central aktivitet i LIS som syftar till att identifiera tillgångar, fastställa lämpligt ansvar och bestämma lämplig skyddsnivå för informationstillgångar. En aktivitet inom hanteringen av tillgångar är informationsklassificering som har som mål att se till att information får en lämplig skyddsnivå i enlighet med dess betydelse för organisationen. Informationsklassificering är en allmänt känd och välanvänd praxis för alla slags organisationer, både inom den privata och offentliga sektorn. Dessutom finns informationsklassificering beskrivit som en del av flera standarder exempelvis i ISO/IEC 27002, COBIT och NIST-SP800.

Informationsklassificering har emellertid fått lite uppmärksamhet inom akademin och dessutom kämpar många organisationer med införandet. De underliggande orsakerna till varför det är problematiskt att implementera och använda informationsklassificering är i mångt och mycket oklara. Vidare tillhandahåller exempelvis befintliga standarder och nationella rekommendationer inget sammanhängande och systematiskt beskrivit tillvägagångssätt för att skildra informationsklassificering. De korta beskrivningarna i standarder och vetenskaplig litteratur utelämnar väsentliga aspekter som krävs för att kunna implementera informationsklassificering i en organisation. Det finns till exempel brist på detaljerade beskrivningar avseende (1) förfaranden och begrepp, (2) hur man kan anpassa tillvägagångssättet för olika situationer, (3) ett ramverk som strukturerar och styr klassificeringen, (4) vilka roller som ska vara involverade i klassificeringen och (5) hur information med olika granularitet hanteras.

Denna avhandling syftar till att utveckla en metod för informationsklassificering som bygger på standarder och praxis och som kan användas som en del av LIS-arbetet. För att möta detta syfte genomfördes en DSR-studie (Design Science Research) i tre cykler. Ett brett spektrum av data har samlats in som en del av detta arbete, inklusive en serie intervjuer med experter och nybörjare om informationsklassificering, en enkätundersökning, ett antal observationer samt en insamling av de flesta svenska myndigheters klassificeringspolicyer. Det finns tre huvudsakliga bidrag med denna avhandling (1) identifiering av problem och möjliggörare för informationsklassificering, (2) designprinciper som ligger till grund för utvecklingen av en metod för informationsklassificering och (3) metoden för informationsklassificering. Det har också gjorts bidrag till kontexten kring informationsklassificering. Exempelvis beskrivs och ges 20 praktiska förslag för hur man bemöter väldokumenterade utmaningar inom riskanalys och vid val av skyddsåtgärder.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2020. p. 310
Series
Dissertation Series ; 33
Keywords
information classification, Information security management, Information security management systems, Information classification method
National Category
Information Systems
Research subject
INF303 Information Security; Information Systems
Identifiers
urn:nbn:se:his:diva-18920 (URN)978-91-984918-5-2 (ISBN)
Public defence
2020-09-04, G109, Högskolevägen 1, 09:00 (English)
Opponent
Supervisors
Available from: 2020-08-14 Created: 2020-08-14 Last updated: 2023-07-06Bibliographically approved
Lundgren, M. & Bergström, E. (2019). Dynamic interplay in the information security risk management process. International Journal of Risk Assessment and Management, 22(2), 212-230
Open this publication in new window or tab >>Dynamic interplay in the information security risk management process
2019 (English)In: International Journal of Risk Assessment and Management, ISSN 1466-8297, E-ISSN 1741-5241, Vol. 22, no 2, p. 212-230Article in journal (Refereed) Published
Abstract [en]

In this paper, the formal processes so often assumed in information security risk management and its activities are investigated. For instance, information classification, risk analysis, and security controls are often presented in a predominantly instrumental progression. This approach, however, has received scholarly criticism, as it omits social and organisational aspects, creating a gap between formal and actual processes. This study argues that there is an incomplete understanding of how the activities within these processes actually interplay in practice. For this study, senior information security managers from four major Swedish government agencies were interviewed. As a result, 12 characteristics are presented that reflect an interplay between activities and that have implications for research, as well as for developers of standards and guidelines. The study's conclusions suggest that the information security risk management process should be seen more as an emerging process, where each activity interplays dynamically in response to new requirements and organisational and social challenges. 

Place, publisher, year, edition, pages
InderScience Publishers, 2019
Keywords
Formal processes, Information classification, Interplay, Risk analysis, Security controls
National Category
Information Systems Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-18624 (URN)10.1504/IJRAM.2019.101287 (DOI)2-s2.0-85086419939 (Scopus ID)
Available from: 2020-06-29 Created: 2020-06-29 Last updated: 2023-07-06Bibliographically approved
Bergström, E., Lundgren, M. & Ericson, Å. M. (2019). Revisiting information security risk management challenges: a practice perspective. Information and Computer Security, 27(3), 358-372
Open this publication in new window or tab >>Revisiting information security risk management challenges: a practice perspective
2019 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 27, no 3, p. 358-372Article in journal (Refereed) Published
Abstract [en]

Purpose: The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices. Design/methodology/approach: The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel. Findings: Managerial and organisational concerns that go beyond a technical perspective have been found, which affect the ongoing social build-up of knowledge in everyday information security work. Research limitations/implications: The study has delimitation as it consists of data from four public sector organisations, i.e. statistical analyses have not been in focus, while implying a better understanding of what and why certain actions are practised in their security work. Practical implications: The new challenges that have been identified offer a refined set of actionable advice to practitioners, which, for example, can support cost-efficient decisions and avoid unnecessary security trade-offs. Originality/value: Information security is increasingly relevant for organisations, yet little is still known about how related risks are handled in practice. Recent studies have indicated a gap between the espoused and the actual actions. Insights from actual, situated enactment of practice can advise on process adaption and suggest more fit approaches. 

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2019
Keywords
Asset valuation, Information security, Practice theory, Risk management
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-17319 (URN)10.1108/ICS-09-2018-0106 (DOI)000479219900003 ()2-s2.0-85067021789 (Scopus ID)
Available from: 2019-06-27 Created: 2019-06-27 Last updated: 2023-07-06Bibliographically approved
Lundgren, M. & Bergström, E. (2019). Security-related stress: A perspective on information security risk management. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security): . Paper presented at 5th International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2019, Department of Computer Science, University of Oxford, United Kingdom, 3-4 June 2019. IEEE
Open this publication in new window or tab >>Security-related stress: A perspective on information security risk management
2019 (English)In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

In this study, the enactment of information security risk management by novice practitioners is studied by applying an analytical lens of security-related stress. Two organisations were targeted in the study using a case study approach to obtain data about their practices. The study identifies stressors and stress inhibitors in the ISRM process and the supporting ISRM tools and discusses the implications for practitioners. For example, a mismatch between security standards and how they are interpreted in practice has been identified. This mismatch was further found to be strengthened by the design of the used ISRM tools. Those design shortcomings hamper agility since they may enforce a specific workflow or may restrict documentation. The study concludes that security-related stress can provide additional insight into security-novice practitioners' ISRM challenges. 

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Compliance, Information security, Information security risk management, Management, Novices, Stress, Tools, Information services, Security of data, Stresses, Case study approach, Information security risk managements, Security standards, Risk management
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-17942 (URN)10.1109/CyberSecPODS.2019.8884877 (DOI)2-s2.0-85075007461 (Scopus ID)978-1-7281-0229-0 (ISBN)978-1-7281-0230-6 (ISBN)
Conference
5th International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2019, Department of Computer Science, University of Oxford, United Kingdom, 3-4 June 2019
Available from: 2019-11-28 Created: 2019-11-28 Last updated: 2023-06-20Bibliographically approved
Bergström, E. & Lundgren, M. (2019). Stress Amongst Novice Information Security Risk Management Practitioners. International Journal on Cyber Situational Awareness, 4(1), 128-154, Article ID 28.
Open this publication in new window or tab >>Stress Amongst Novice Information Security Risk Management Practitioners
2019 (English)In: International Journal on Cyber Situational Awareness, ISSN 2057-2182, Vol. 4, no 1, p. 128-154, article id 28Article in journal (Refereed) Published
Abstract [en]

Today, information is a key asset for many organisations. Reducing risks of information compromise is increasingly prioritised. However, there is an incomplete understanding of how organisations with limited security knowledge and experience manage information security risks in practice. Previous studies have suggested that security-novice employees faced with burdensome, complex, and ambiguous security requirements can experience security-related stress (SRS), and ultimately influence their security decisions. In this study, we further this research stream by suggesting that SRS can similarly be found with security-novice managers responsible for developing and practising information security risk management (ISRM). Two organisations were targeted in the study using a case study approach, to obtain data about their practices, using SRS as an analytical lens. The study found various examples where SRS influenced security-novice managers’ decisions, and identifies several stressors and stress inhibitors in the ISRM process and supporting ISRM tools, and discusses the implications for practitioners.

Place, publisher, year, edition, pages
Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC), 2019
Keywords
Security-novice, information security, information security risk management, stress, tools, compliance, management, Information Systems, Social aspects, Systemvetenskap, informationssystem och informatik med samhällsvetenskaplig inriktning
National Category
Information Systems Information Systems, Social aspects
Identifiers
urn:nbn:se:his:diva-18925 (URN)10.22619/IJCSA (DOI)
Note

CC BY 4.0

This paper is a revised and expanded version of Lundgren and Bergström (2019b) presented at the 2019 International Conference on Cyber Science, 3-4 June 2019 in Oxford, UK. We want to thank the anonymous reviewers for their excellent suggestions and valuable insights.

Lundgren, M., & Bergström, E. (2019b). Security-Related Stress: A Perspective on Information Security Risk Management. Paper presented at the 2019 International Conference On Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK

Available from: 2020-08-17 Created: 2020-08-17 Last updated: 2023-07-06Bibliographically approved
Holgersson, J., Bergström, E., Kävrestad, J. & Svensson, H. (2018). Analys av studenters upplevelse av hindrande faktorer för utbytesstudier. In: NU2018 - Det akademiska lärarskapet: . Paper presented at NU2018 - Det akademiska lärarskapet, Västerås, 9-11 oktober, 2018. , Article ID 684.
Open this publication in new window or tab >>Analys av studenters upplevelse av hindrande faktorer för utbytesstudier
2018 (Swedish)In: NU2018 - Det akademiska lärarskapet, 2018, article id 684Conference paper, Oral presentation with published abstract (Refereed)
Abstract [sv]

I Högskolan i Skövdes (HS) utvecklingsplan (Högskolan i Skövde, 2017) framhålls vikten av att samtliga utbildningsprogram skall erbjuda möjligheter till utbytesstudier. Historiskt sett har antalet utresande vid HS varit lågt samtidigt som fakta som belyser varför så är fallet främst har baserats på enskilda studenters upplevelser av nominerings- och antagningsprocesser. Dock saknas en mer enhetlig och generaliserbar vy av hur olika funktioner på HS rörande utbytesstudier upplevs, både av studenter som genomfört utbytesstudier samt av studenter som varit nominerade men valt att inte genomföra utbytesstudier.

Den frågeställning som adresserats är: vilka hinder finns för studenter som vill genomföra utbytesstudier? Den metod som tillämpats är en enkät som skickats ut till samtliga studenter som varit nominerade för utbytesstudier under 2017. Enkäten har baserats på en Likert-skala (Bryman och Nilsson) som kombinerats med fritextsvar.

Totalt har 20 studenter från olika utbildningsprogram besvarat enkäten. Studien visar att studenterna rent generellt är nöjda med HS administrativa funktioner vilket också är den kanal som oftast utnyttjas. Andra administrativa funktioner såsom programansvariga och ämnesföreträdare upplevs olika av studenterna beroende på vilket ämnesområde som berörs.

Studenterna redovisar ett antal huvudsakliga skäl som hindrar eller försvårar utbytesstudier. 1) Det läggs ett alltför stort ansvar på studenten i att identifiera kurser som denne är behörig till och som inte överlappar med kurser som läses vid det egna lärosätet. Detta innefattar även val av kurser som skall motsvara obligatoriska kurser på hemmaplan som i sin tur ligger som förkunskapskrav för framtida kurser inom utbildning, såsom examensarbeten. 2) Avsaknad av utbytesavtal med specifika länder samt svårighet att identifiera avtal med lärosäten som matchar studentens utbildningsprofil vid det egna lärosätet upplevs likaså som ett hinder för flertalet studenter. 3) Vidare uppger studenterna att det i många fall är svårt att ta till sig information på olika lärosätens hemsidor för att identifiera passande kurser eftersom den information som finns att tillgå upplevs som mycket heterogen och därmed både svårtolkad och svårnavigerad. Detta kan jämföras mot hur svenska lärosäten publicerar information om kurser vilket av studenterna upplevs som mer enhetligt och standardiserat vilket i sin tur gör olika kurser enklare att jämföra.

Något som efterfrågas av många studenter som varit nominerade för utbytesstudier men som i slutändan valt att inte resa är ”utbytesstudie-charter” där det finns färdiga kurspaket som är granskade och validerade av HS. Även önskemål om mer standardiserade paket för boende och andra praktiska frågor efterfrågas av studenterna.

Den information som enkätstudien har lyft fram har i första hand visat på att HS administrativa funktioner för utbytesstudier fungerar tillfredställande. Likaså verifierar enkätstudien de hypoteser som funnits rörande hindrande faktorer för utbytesstudier i de flesta fall stämmer: osäkerhet kring val av kurser och en oro för hur utbytesstudier kommer att påverka framtida studier på hemmaplan är stora orosmoment som kan få studenter av avstå från utbytesstudier trots ett initialt intresse för sådana.

Referenser

Bryman, A., & Nilsson, B. (2011). Samhällsvetenskapliga metoder. Malmö: Liber.

Högskolan i Skövde. (2017). Utvecklingsplan. Skövde.

National Category
Pedagogical Work
Research subject
Information Systems; Interaction Lab (ILAB)
Identifiers
urn:nbn:se:his:diva-16329 (URN)
Conference
NU2018 - Det akademiska lärarskapet, Västerås, 9-11 oktober, 2018
Available from: 2018-10-24 Created: 2018-10-24 Last updated: 2023-01-02Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1436-2980

Search in DiVA

Show all publications