Högskolan i Skövde

his.sePublikasjoner
Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (10 av 68) Visa alla publikasjoner
Nohlberg, M. & Schrefel, P. (2026). Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study. In: Steven Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings. Paper presented at 19th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2025, Mytilene, Greece, July 7–9, 2025 (pp. 62-74). Cham: Springer
Åpne denne publikasjonen i ny fane eller vindu >>Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study
2026 (engelsk)Inngår i: Human Aspects of Information Security and Assurance: 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings / [ed] Steven Furnell; Nathan Clarke, Cham: Springer, 2026, s. 62-74Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Social engineering continues to pose a serious threat to information security, not because of its technical complexity, but because it exploits ordinary human behavior. While research has thoroughly examined user susceptibility and awareness training, we know far less about how attackers actually develop their skills in real-world settings. This study follows the learning process of a beginner conducting vishing calls in the Austrian healthcare system. Using a predefined script and some anticipated responses, the attacker, with no prior experience, made 20 phone-based attempts to deceive staff. A successful attempt meant persuading the target to visit a fake internal webpage and read a short code aloud, simulating a harmless but realistic breach. Over time, the attacker quickly moved from hesitant reading to confident improvisation, responding to feedback in real time. Many targets were friendly and helpful, often offering little resistance, which created a reinforcing loop. The attacker gained confidence and refined their approach with each call. These findings show how easily someone can become effective at social engineering through practice alone, and how everyday workplace interactions can unintentionally serve as training ground. For organizations, especially in high-trust environments like healthcare, this points to the need to rethink not just training but also the way communication and challenge behavior are structured.

sted, utgiver, år, opplag, sider
Cham: Springer, 2026
Serie
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 761
Emneord
security awareness, Social engineering, vishing, Artificial intelligence, Engineering education, Human computer interaction, Industrial management, Information systems, Information use, Network security, Personnel training, Healthcare systems, Human behaviors, Learning process, Real world setting, Simulation studies, Skills acquisition, Technical complexity, Behavioral research
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-26013 (URN)10.1007/978-3-032-02504-3_5 (DOI)2-s2.0-105021820230 (Scopus ID)978-3-032-02503-6 (ISBN)978-3-032-02506-7 (ISBN)978-3-032-02504-3 (ISBN)
Konferanse
19th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2025, Mytilene, Greece, July 7–9, 2025
Merknad

© IFIP International Federation for Information Processing 2026.

Correspondence Address: M. Nohlberg; School of Informatics, University of Skövde, Skövde, Sweden; email: marcus.nohlberg@his.se

Tilgjengelig fra: 2025-11-27 Laget: 2025-11-27 Sist oppdatert: 2025-12-01bibliografisk kontrollert
Kävrestad, J., Burvall, F. & Nohlberg, M. (2025). A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA). Information and Computer Security, 33(2), 141-160
Åpne denne publikasjonen i ny fane eller vindu >>A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)
2025 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, nr 2, s. 141-160Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Purpose

Developing cybersecurity awareness (CSA) is becoming a more and more important goal for modern organizations. CSA is a complex sociotechnical system where social, technical and organizational aspects affect each other in an intertwined way. With the goal of providing a holistic representation of CSA, this paper aims to develop a taxonomy of factors that contribute to organizational CSA.

Design/methodology/approach

The research used a design science approach including a literature review and practitioner interviews. A taxonomy was drafted based on 71 previous research publications. It was then updated and refined in two iterations of interviews with domain experts.

Findings

The result of this research is a taxonomy which outline six domains for importance for organization CSA. Each domain includes several activities which can be undertaken to increase CSA within an organization. As such, it provides a holistic overview of the CSA field.

Practical implications

Organizations can adopt the taxonomy to create a roadmap for internal CSA practices. For example, an organization could assess how well it performs in the six main themes and use the subthemes as inspiration when deciding on CSA activities.

Originality/value

The output of this research provides an overview of CSA based on information extracted from existing literature and then reviewed by practitioners. It also outlines how different aspects of CSA are interdependent on each other.

sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2025
Emneord
Awareness, Cybersecurity, Information security, Culture
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-24001 (URN)10.1108/ics-11-2023-0209 (DOI)001248981600001 ()2-s2.0-85196288074 (Scopus ID)
Merknad

CC BY 4.0

Article publication date: 20 June 2024. Issue publication date: 29 April 2025

Corresponding author Joakim Kävrestad can be contacted at: joakim.kavrestad@ju.se

Tilgjengelig fra: 2024-06-20 Laget: 2024-06-20 Sist oppdatert: 2025-09-29bibliografisk kontrollert
Kävrestad, J. & Nohlberg, M. (2025). Context-Based Micro-training (3ed.). In: Sushil Jajodia; Pierangela Samarati; Moti Yung (Ed.), Encyclopedia of Cryptography, Security and Privacy: (pp. 429-432). Cham: Springer
Åpne denne publikasjonen i ny fane eller vindu >>Context-Based Micro-training
2025 (engelsk)Inngår i: Encyclopedia of Cryptography, Security and Privacy / [ed] Sushil Jajodia; Pierangela Samarati; Moti Yung, Cham: Springer, 2025, 3, s. 429-432Kapittel i bok, del av antologi (Annet vitenskapelig)
Abstract [en]

Definition

Context-Based Micro-Training (CBMT) is a method for implementing cybersecurity training for end-users. CBMT includes goals that describe what such training should aim to facilitate and guidelines that outline how.

Background

Users are expected to behave in a certain way in cyberspace to ensure cybersecurity. Policies and technical controls, for instance, provide rules that regulate how passwords should be created, how users should react to email, and what information is allowed to be given away on the phone. Yet, incorrect or insecure user actions continuously lead to cybersecurity incidents (Safa and Von Solms 2016). The use of training to support users towards secure behavior has been suggested by researchers for decades and is often used in practice. Such training can be delivered to users in different ways that can be grouped as follows:

Scheduled training often takes the form of a live lecture delivered physically or online.On-demand training where the user will access ...

sted, utgiver, år, opplag, sider
Cham: Springer, 2025 Opplag: 3
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-25075 (URN)10.1007/978-3-030-71522-9_1781 (DOI)2-s2.0-105002550703 (Scopus ID)978-3-030-71522-9 (ISBN)978-3-030-71520-5 (ISBN)
Tilgjengelig fra: 2025-04-24 Laget: 2025-04-24 Sist oppdatert: 2025-09-29bibliografisk kontrollert
Kävrestad, J., Bergström, E., Stavrou, E. & Nohlberg, M. (2025). Useful but for Someone Else - An Explorative Study on Cybersecurity Training Acceptance. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II. Paper presented at 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024 (pp. 47-60). Cham: Springer
Åpne denne publikasjonen i ny fane eller vindu >>Useful but for Someone Else - An Explorative Study on Cybersecurity Training Acceptance
2025 (engelsk)Inngår i: Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II / [ed] Nathan Clarke; Steven Furnell, Cham: Springer, 2025, s. 47-60Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Insecure user behavior is the most common cause of cybersecurity incidents. Insecure behavior includes failing to detect phishing, insecure password management, and more. The problem has been known for decades, and state-of-the-art mitigation methods include security education, training, and awareness (SETA). A common problem with SETA is, however, that users do not seem to adopt it to a high enough extent. When users are not adopting SETA, its intended benefit is lost. Previous research argues for personalized SETA and suggests that different user groups have different SETA needs and preferences. The characteristics of those groups are, however, unknown. To that end, this research draws on an existing dataset to identify how different populations perceive different SETA methods. A quantitative analysis shows that users in different demographic groups have different SETA preferences, with age being the most impactful demographic. A qualitative analysis reveals further factors that impact user adoption of SETA, with cost and ease of use being important factors for further research. 

sted, utgiver, år, opplag, sider
Cham: Springer, 2025
Serie
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 722
Emneord
Awareness, Cybersecurity, Education, Human Factor, SETA, Training, User, Phishing, Cyber security, Education training, Password management, Security awareness, Security education, Security training, User behaviors
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-24794 (URN)10.1007/978-3-031-72563-0_4 (DOI)001561043300004 ()2-s2.0-85211347407 (Scopus ID)978-3-031-72562-3 (ISBN)978-3-031-72565-4 (ISBN)978-3-031-72563-0 (ISBN)
Konferanse
18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024
Prosjekter
VISKAICANP
Forskningsfinansiär
Swedish Civil Contingencies Agency, MSB 2021-14650Swedish Civil Contingencies Agency, MSB 2023-10887
Merknad

© IFIP International Federation for Information Processing 2025

Correspondence Address: J. Kävrestad; School of Engineering, Jönköping University, Jönköping, Sweden; email: joakim.kavrestad@ju.se

We gratefully acknowledge the grants from the Swedish Civil Contingencies Agency (MSB), projects VISKA (MSB 2021-14650) and ICANP (MSB 2023-10887).

Tilgjengelig fra: 2024-12-19 Laget: 2024-12-19 Sist oppdatert: 2025-10-17bibliografisk kontrollert
Dansarie, M. & Nohlberg, M. (2025). User adoption of TETRA mobile radio communication networks: an information security perspective. Information and Computer Security, 33(5), 766-784
Åpne denne publikasjonen i ny fane eller vindu >>User adoption of TETRA mobile radio communication networks: an information security perspective
2025 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, nr 5, s. 766-784Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Purpose – Digital mobile radio communication networks are used for coordinating operations in manyimportant sectors, including critical infrastructures and large industries. Despite this, there is a dearth ofknowledge about how their information security is managed. The most commonly used standard for suchnetworks is TETRA. Given the critical role of TETRA networks, this study aims to clarify how they are used,how their users manage information security and the implications of vulnerabilities in the standard.

Design/methodology/approach – The study is based on semi-structured interviews with representativesfrom 11 organizations in Sweden that own and operate TETRA networks, representing 32% of registered usersin the country and a wide range of users and applications. Thematic analysis was used to analyze the data.

Findings – Management of TETRA networks is generally outsourced, leaving TETRA network owners withscant knowledge of the state of security in their networks. Although organizations have high demands onavailability and integrity, the use of encryption and authentication is rare. Instead, users generally rely on theprotocol’s complexity and obscurity for security. Because organizations’ core operations are often dependenton functioning TETRA networks, attacks can have severe consequences.

Originality/value – Previous research on security in digital mobile radio communication networks hasfocused on technical vulnerabilities in standards. This study is the first, to the best of the authors’ knowledge,to investigate users’ approaches to information security, the potential consequences of attacks and theimplications of known security issues in this context.

sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2025
Emneord
Digital mobile radio communication networks, TETRA, Information security
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-25198 (URN)10.1108/ics-12-2024-0318 (DOI)001500100900001 ()2-s2.0-105007982813 (Scopus ID)
Merknad

CC BY 4.0

Received: December 03 2024 | Revision Received: March 21 2025 | Accepted: April 30 2025

Corresponding author: Marcus Dansarie can be contacted at: marcus.dansarie@fhs.se

Tilgjengelig fra: 2025-06-12 Laget: 2025-06-12 Sist oppdatert: 2025-10-27bibliografisk kontrollert
Hedberg, D., Lundgren, M. & Nohlberg, M. (2024). Cybersecurity in modern cars: awareness and readiness of auto workshops. Information and Computer Security, 32(4), 407-419
Åpne denne publikasjonen i ny fane eller vindu >>Cybersecurity in modern cars: awareness and readiness of auto workshops
2024 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961, Vol. 32, nr 4, s. 407-419Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Purpose: This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice. Design/methodology/approach: This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness. Findings: Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues. Research limitations/implications: Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges. Practical implications: The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues. Originality/value: As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era. 

sted, utgiver, år, opplag, sider
Emerald Publishing, 2024
Emneord
Auto workshop security, Connected car, Vehicle cybersecurity, Cybersecurity, Current practices, Cyber security, Design/methodology/approach, Empirical studies, On currents, On-currents, Repair and maintenance, Roads and streets
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-23599 (URN)10.1108/ICS-11-2023-0211 (DOI)001153515300001 ()2-s2.0-85183841672 (Scopus ID)
Merknad

CC BY 4.0 LEGAL CODE

© 2024, Emerald Publishing Limited.

Article publication date: 1 February 2024

Correspondence Address: D. Hedberg; School of Informatics, University of Skövde, Skövde, Sweden; email: davidhedberg@hotmail.com

Tilgjengelig fra: 2024-02-15 Laget: 2024-02-15 Sist oppdatert: 2025-09-29bibliografisk kontrollert
Kävrestad, J., Rambusch, J. & Nohlberg, M. (2024). Design principles for cognitively accessible cybersecurity training. Computers & Security, 137, Article ID 103630.
Åpne denne publikasjonen i ny fane eller vindu >>Design principles for cognitively accessible cybersecurity training
2024 (engelsk)Inngår i: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 137, artikkel-id 103630Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Exploiting human behavior to gain unauthorized access to computer systems has become common practice for modern cybercriminals. Users are expected to adopt secure behavior to avoid those attackers. This secure behavior requires cognitive processing and is often seen as a nuisance which could explain why attacks exploiting user behavior continues to be a fruitful approach for attackers. While adopting secure behavior can be difficult for any user, it can be even more difficult for users with cognitive disabilities. This research focuses on users with cognitive disabilities with the intent of developing design principles for the development of cognitively accessible cybersecurity training. The target group is estimated to include almost 10 % of all users but is previously understudied. The results show that the target group experience cybersecurity as cognitively demanding, sometimes to a degree that becomes incapacitating. Participating in cybersecurity training requires cognitive energy which is a finite resource. Cognitively accessible cybersecurity training requires a minimalist design approach and inclusion of accessibility functions. A minimalist design approach, in this case, means that both informative and design elements should be kept to a minimum. The rationale is that all such elements require cognitive processing which should be kept to a minimum. 

sted, utgiver, år, opplag, sider
Elsevier, 2024
Emneord
Accessible security, Cognitive accessibility, Cybersecurity training, Cybersecurity training design, Usable security, Behavioral research, Network security, Cognitive processing, Cyber security, Design Principles, Training design, Cybersecurity
HSV kategori
Forskningsprogram
Informationssystem (IS); GAME Research Group
Identifikatorer
urn:nbn:se:his:diva-23469 (URN)10.1016/j.cose.2023.103630 (DOI)001134538700001 ()2-s2.0-85178635646 (Scopus ID)
Forskningsfinansiär
The Swedish Post and Telecom Authority (PTS), 19-10617
Merknad

CC BY 4.0 DEED

© 2023 The Author(s)

Correspondence Address: J. Kävrestad; Jönköping School of Engineering, Jönköping, Gjuterigatan 5, 551 11, Sweden; email: joakim.kavrestad@ju.se; CODEN: CPSED

This research was funded by the Swedish Post and Telecom Authority under grant number 19-10617.

Tilgjengelig fra: 2023-12-14 Laget: 2023-12-14 Sist oppdatert: 2025-09-29bibliografisk kontrollert
Kävrestad, J. & Nohlberg, M. (2024). Ett fundament i den svenska högre utbildningsmodellen är att kombinera forskning och undervisning. Aktuell säkerhet (2024-01-08)
Åpne denne publikasjonen i ny fane eller vindu >>Ett fundament i den svenska högre utbildningsmodellen är att kombinera forskning och undervisning
2024 (svensk)Inngår i: Aktuell säkerhet, nr 2024-01-08Artikkel i tidsskrift (Annet (populærvitenskap, debatt, mm)) Published
Abstract [sv]

Joakim Kävrestad, lektor i datavetenskap, Tekniska Högskolan i Jönköping och Marcus Nohlberg, docent i informationsteknologi, Högskolan i Skövde, håller inte med Jan Kallberg om att svensk cybersäkerhetsforskning borde kraftsamlas till några få platser.

HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-23515 (URN)
Merknad

Replik

Tilgjengelig fra: 2024-01-08 Laget: 2024-01-08 Sist oppdatert: 2025-09-29bibliografisk kontrollert
Nohlberg, M. (2024). Låt inte din partner ta över din digitala värld: Cyberforskare: Kraschar relationen kan det bli stora problem. Aftonbladet (2024-10-02), pp. 6-6
Åpne denne publikasjonen i ny fane eller vindu >>Låt inte din partner ta över din digitala värld: Cyberforskare: Kraschar relationen kan det bli stora problem
2024 (svensk)Inngår i: Aftonbladet, ISSN 1103-9000, nr 2024-10-02, s. 6-6Artikkel i tidsskrift, News item (Annet (populærvitenskap, debatt, mm)) Published
Abstract [sv]

DEBATT. Jämställdhet handlar inte bara om lika löner och delat ansvar i hemmet. I dagens digitala samhälle är cybersäkerhet en grundläggande förutsättning för verklig jämställdhet.

Över 30 000 människor i Sverige lever i dag med skyddad identitet, ofta på grund av våld i nära relationer. För dem blir bristande cyberkompetens en barriär som försvårar möjligheten att lämna destruktiva relationer och återfå sin frihet.

sted, utgiver, år, opplag, sider
Schibsted Media, 2024
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-24598 (URN)
Merknad

Publicerad 2024-10-02 06.00

Tilgjengelig fra: 2024-10-08 Laget: 2024-10-08 Sist oppdatert: 2025-09-29bibliografisk kontrollert
Kävrestad, J., Furnell, S. & Nohlberg, M. (2024). User perception of Context-Based Micro-Training – a method for cybersecurity training. Information Security Journal, 33(2), 121-137
Åpne denne publikasjonen i ny fane eller vindu >>User perception of Context-Based Micro-Training – a method for cybersecurity training
2024 (engelsk)Inngår i: Information Security Journal, ISSN 1939-3555, E-ISSN 1939-3547, Vol. 33, nr 2, s. 121-137Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

User behavior is one of the biggest challenges to cybersecurity in modern organizations. Users are continuously targeted by attackers and required to have sufficient knowledge to spot and avoid such attacks. Different training methods are suggested and used in the industry to support users to behave securely. The challenge remains, and improved methods for end-user cybersecurity training are needed. This paper introduces and evaluates user perception of a method called Context-Based Micro-Training (CBMT). This approach suggests that training should be delivered in short sequences when the information is of direct relevance. The intention is to provide training directly related to the user’s current situation while also providing an awareness-increasing effect. This notion is tested in a survey-based evaluation involving 1,452 respondents from Sweden, Italy, and the UK, comparing the perception of CBMT against the experience of traditional approaches. The results emphasize that current methods are not effective enough and show that CBMT is perceived positively by respondents in all sample groups. The study further evaluated how demographic aspects impact the perception of CBMT and found that a diverse group of users can appreciate it.

sted, utgiver, år, opplag, sider
Taylor & Francis, 2024
Emneord
cybersecurity, end-user, perception, training
HSV kategori
Forskningsprogram
Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-22660 (URN)10.1080/19393555.2023.2222713 (DOI)001004357200001 ()2-s2.0-85161683304 (Scopus ID)
Forskningsfinansiär
Vinnova, 2019-05021
Merknad

CC BY 4.0

Published online: 09 Jun 2023

CONTACT Joakim Kävrestad, joakim.kavrestad@his.se

The work was supported by VINNOVA under the grant [2019-05021].

Tilgjengelig fra: 2023-06-09 Laget: 2023-06-09 Sist oppdatert: 2025-10-06bibliografisk kontrollert
Prosjekter
Supporting secure behavior using ContextBased MicroTraining [2019-05021_Vinnova]; Högskolan i Skövde; Publikasjoner
Kävrestad, J., Furnell, S. & Nohlberg, M. (2024). User perception of Context-Based Micro-Training – a method for cybersecurity training. Information Security Journal, 33(2), 121-137
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-5962-9995