Högskolan i Skövde

his.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (5 of 5) Show all publications
Birath, M., Ingemarsson, J. & Kävrestad, J. (2025). How Digital Evidence Seizure Times Affect Swedish Citizens’ Willingness to Report Crimes. In: Steven Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings. Paper presented at 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025 (pp. 155-170). Cham: Springer
Open this publication in new window or tab >>How Digital Evidence Seizure Times Affect Swedish Citizens’ Willingness to Report Crimes
2025 (English)In: Human Aspects of Information Security and Assurance: 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings / [ed] Steven Furnell; Nathan Clarke, Cham: Springer, 2025, p. 155-170Conference paper, Published paper (Refereed)
Abstract [en]

While the prevalent use of digital devices has many benefits in a modern society, it has also increased the complexity of evidence acquisition in crime investigations. With a digital device being seized in almost all criminal cases, creating investigation backlogs, a need for investigating how this challenge affects victims’ willingness to report crimes is rising. Previous research show that victims are less inclined to report crimes when having to hand in a mobile phone for evidence acquisition. However, why that is remains unclear. Taking a quantitative approach, we investigate the assumed relation between the willingness to report crimes and the time a mobile phone is seized for evidence collection. A survey was sent out to 500 Swedish citizens inquiring how likely they are to report various crimes in relation to the time their mobile phone would be seized by the police. The results show a significantly reduced willingness to report crimes as the seizure times increase, consequently resulting in unreported crimes. The findings also indicate a variation in reporting willingness among various crimes, suggesting a reluctance to report crimes of less monetary consequence, ultimately accepting victimization and enabling unlawful behavior.

Place, publisher, year, edition, pages
Cham: Springer, 2025
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 761
Keywords
Digital Evidence, Willingness to Report, Evidence Acquisition, Digital Forensics
National Category
Information Systems, Social aspects Computer Sciences Information Systems Other Computer and Information Science
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-25978 (URN)10.1007/978-3-032-02504-3_11 (DOI)2-s2.0-105021826048 (Scopus ID)978-3-032-02503-6 (ISBN)978-3-032-02506-7 (ISBN)978-3-032-02504-3 (ISBN)
Conference
19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025
Note

Correspondence to Marcus Birath. marcus.birath@his.se

Available from: 2025-10-30 Created: 2025-10-30 Last updated: 2025-11-27Bibliographically approved
Kävrestad, J., Fernow, R., Lööf, D. & Birath, M. (2025). Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I. Paper presented at 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024 (pp. 323-338). Cham: Springer
Open this publication in new window or tab >>Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden
2025 (English)In: Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I / [ed] Nathan Clarke; Steven Furnell, Cham: Springer, 2025, p. 323-338Conference paper, Published paper (Refereed)
Abstract [en]

Multi-Factor Authentication (MFA) is commonly suggested as a good mechanism to overcome inherent security problems with the use of passwords. However, research suggests that MFA has so far failed to attract enough interest from users. Additionally, older users seem to be even more reluctant to use MFA. In Sweden, users are more or less required to use MFA to use services such as online banking, book doctors appointments online, and complete tax reports online. As such, Sweden is an interesting case for studying MFA adoption. This paper reports on mixed-methods research investigating how Swedish users in different age groups compare with respect to the adoption of MFA. The results suggest that users of different age are willing to adopt MFA when it is required for services they want or need to use. However, younger users appear to be more prone to voluntarily adopt MFA.

Place, publisher, year, edition, pages
Cham: Springer, 2025
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 721
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-24788 (URN)10.1007/978-3-031-72559-3_22 (DOI)2-s2.0-85211339529 (Scopus ID)978-3-031-72558-6 (ISBN)978-3-031-72561-6 (ISBN)978-3-031-72559-3 (ISBN)
Conference
18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024
Note

First Online: 28 November 2024

Available from: 2024-12-17 Created: 2024-12-17 Last updated: 2025-09-29Bibliographically approved
Ingemarsson, J., Birath, M. & Kävrestad, J. (2024). Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination. International Journal of Information Security, 24(1), Article ID 42.
Open this publication in new window or tab >>Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination
2024 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 24, no 1, article id 42Article in journal (Refereed) Published
Abstract [en]

The willingness of victims to report crimes is declining, which leads to an increase in the dark figure of crime and undermines effective crime control. One possible reason is that victims are reluctant to report crimes if they are required to submit their digital devices for forensic examination. Today, a mobile phone holds vast amounts of information that may be valuable for police forensics experts, showing that victims’ phones could be critical in crime investigations. This interview study has investigated the factors that influence Swedish citizens’ willingness to report crimes when reporting involves surrendering their own mobile phones for forensic analysis. The study also uncovered factors that increase their willingness to report crimes under the same circumstances. The gathered data was subjected to a qualitative analysis with thematic coding, resulting in four distinct themes with 12 categories distributed among them. The analysis reveals that the primary factors affecting Swedish citizens’ willingness to report crimes are privacy concerns, with participants feeling uneasy about others accessing their private data, and anxiety over being separated from their mobile phones. Furthermore, the study yields that the most significant factors for increasing the willingness to report crimes are enhanced information and transparency from the police. Participants suggested that better understanding of the process, and increased openness would increase their willingness to report.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Digital forensics, Willingness to report, Evidence, Evidence acquisition, Crime investigations
National Category
Computer Sciences Information Systems Other Computer and Information Science
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-24787 (URN)10.1007/s10207-024-00955-4 (DOI)001377057200001 ()2-s2.0-85212133288 (Scopus ID)
Funder
University of Skövde
Note

CC BY 4.0

jonas.ingemarsson@his.se

Open access funding provided by University of Skövde.

Available from: 2024-12-16 Created: 2024-12-16 Last updated: 2025-09-29Bibliographically approved
Birath, M., Ginman, J. & Kävrestad, J. (2022). A Model for the Creation of Biographical Dictionaries. In: Peter Bednar; Anna Sigridur Islind; Helena Vallo Hult; Alexander Nolte; Mikko Rajanen; Fatema Zaghloul; Aurelio Ravarini; Alessio Maria Braccini (Ed.), Proceedings of the 8th International Workshop on Socio-Technical Perspective in Information Systems Development (STPIS 2022): Hybrid conference in Reykjavik, Iceland, August 19-20, 2022. Paper presented at 8th International Workshop on Socio-Technical Perspective in Information Systems Development (STPIS 2022) Hybrid conference in Reykjavik, Iceland, August 19-20, 2022 (pp. 165-172). CEUR-WS
Open this publication in new window or tab >>A Model for the Creation of Biographical Dictionaries
2022 (English)In: Proceedings of the 8th International Workshop on Socio-Technical Perspective in Information Systems Development (STPIS 2022): Hybrid conference in Reykjavik, Iceland, August 19-20, 2022 / [ed] Peter Bednar; Anna Sigridur Islind; Helena Vallo Hult; Alexander Nolte; Mikko Rajanen; Fatema Zaghloul; Aurelio Ravarini; Alessio Maria Braccini, CEUR-WS , 2022, p. 165-172Conference paper, Published paper (Refereed)
Abstract [en]

The use of encryption is increasing, and while that is good for cybersecurity it is a core challenge for digital forensics. Encrypted information cannot be analyzed unless it is first decrypted, which is a complex and time-consuming process. Using a brute force attack to guess the password used for encryption is deemed impractical as even a simple password, being long enough, could take weeks, months, or even years to find. A more feasible approach is to use a dictionary attack where each word in a list is tested. However, a dictionary attack is only successful if the password is in the list, making the process of creating that list a crucial part of decrypting passwords. This research builds on existing literature showing that users commonly use strategies to create passwords, and the aim is to propose a method for creating dictionaries that are grounded in theories of password construction. An initial model was developed using a selective literature review with the purpose of identifying common elements included in biographical passwords, and in what order the elements are used. To improve the model, the study utilized semi-structured interviews with forensic experts from the Swedish police and the Swedish National Forensic Center (NFC). The main contribution of this research is a readily available model for creating dictionaries that can be used by practitioners. The model can also serve as a theoretical contribution that describes how users commonly construct biographical passwords.

Place, publisher, year, edition, pages
CEUR-WS, 2022
Series
CEUR Workshop Proceedings, ISSN 1613-0073 ; 3239
Keywords
passwords, biographical dictionary, password cracking, digital forensics
National Category
Other Computer and Information Science
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-21949 (URN)2-s2.0-85139846312 (Scopus ID)
Conference
8th International Workshop on Socio-Technical Perspective in Information Systems Development (STPIS 2022) Hybrid conference in Reykjavik, Iceland, August 19-20, 2022
Note

CC BY 4.0

Available from: 2022-10-14 Created: 2022-10-14 Last updated: 2025-09-29Bibliographically approved
Kävrestad, J., Lennartsson, M., Birath, M. & Nohlberg, M. (2020). Constructing secure and memorable passwords. Information and Computer Security, 28(5), 701-717
Open this publication in new window or tab >>Constructing secure and memorable passwords
2020 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 28, no 5, p. 701-717Article in journal (Refereed) Published
Abstract [en]

Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex passwords are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable them to remember their passwords. This paper aims to find strategies that allow for the generation of passwords that are both memorable and computationally secure. Design/methodology/approach The study began with a literature review that was used to identify cognitive password creation strategies that facilitate the creation of passwords that are easy to remember. Using an action-based approach, attack models were created for the resulting creation strategies. The attack models were then used to calculate the entropy for passwords created with different strategies and related to a theoretical cracking time. Findings The result of this study suggests that using phrases with four or more words as passwords will generate passwords that are easy to remember and hard to attack. Originality/value This paper considers passwords from a socio-technical approach and provides insight into how passwords that are easy to remember and hard to crack can be generated. The results can be directly used to create password guidelines and training material that enables users to create usable and secure passwords.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2020
Keywords
Passwords, Security, Usability, Computer users, Memorability, Strategies, Computer security
National Category
Computer Sciences
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-18852 (URN)10.1108/ICS-07-2019-0077 (DOI)000544364100001 ()2-s2.0-85086738920 (Scopus ID)
Available from: 2020-07-20 Created: 2020-07-20 Last updated: 2025-09-29Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5692-4008

Search in DiVA

Show all publications