Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marcus Nohlberg is active.

Publication


Featured researches published by Marcus Nohlberg.


Information Management & Computer Security | 2015

Investigating personal determinants of phishing and the effect of national culture

Waldo Rocha Flores; Hannes Holm; Marcus Nohlberg; Mathias Ekstedt

Purpose – The purpose of the study was twofold: to investigate the correlation between a sample of personal psychological and demographic factors and resistance to phishing; and to investigate if national culture moderates the strength of these correlations. Design/methodology/approach – To measure potential determinants, a survey was distributed to 2,099 employees of nine organizations in Sweden, USA and India. Then, the authors conducted unannounced phishing exercises, in which a phishing attack targeted the same sample. Findings – Intention to resist social engineering, general information security awareness, formal IS training and computer experience were identified to have a positive significant correlation to phishing resilience. Furthermore, the results showed that the correlation between phishing determinants and employees’ observed that phishing behavior differs between Swedish, US and Indian employees in 6 out of 15 cases. Research limitations/implications – The identified determinants had, even...


Information Management & Computer Security | 2007

User‐centred security applied to the development of a management information system

Marcus Nohlberg; Johannes Bäckström

Purpose - This paper aims to use user-centred security development of a prototype graphical interface for a management information system dealing with information security with upper-level management as the intended users. Design/methodology/approach - The intended users were studied in order to understand their needs. An iterative design process was used where the designs were first made on paper, then as a prototype interface and later as a final interface design. All was tested by subjects within the target user group. Findings - The interface was perceived as being successful by the test subjects and the sponsoring organization, Siguru. The major conclusion of the study is that managers use knowledge of information security mainly for financial and strategic matters which focus more on risk issues than security issues. To facilitate the need of managers the study presents three heuristics for the design of management information security system interfaces. Research limitations/implications - This interface was tested on a limited set of users and further tests could be done, especially of users with other cultural/professional backgrounds. Practical implications - This paper presents a useful set of heuristics that can be used in development of management information systems as well as other practical tips for similar projects. Originality/value - This paper gives an example of a successful user-centred security development process. The lessons learned could be beneficial in software development in general and security products in particular.


computational science and engineering | 2009

Towards Automating Social Engineering Using Social Networking Sites

Markus Huber; Stewart Kowalski; Marcus Nohlberg; Simon Tjoa


information security and assurance | 2008

The Cycle of Deception - A Model of Social Engineering Attacks, Defenses and Victims

Marcus Nohlberg; Stewart Kowalski


Archive | 2008

Why Humans are the Weakest Link

Marcus Nohlberg


hawaii international conference on system sciences | 2015

Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures

Waldo Rocha Flores; Hannes Holm; Mathias Ekstedt; Marcus Nohlberg


4th Security Conference, Las Vegas, USA, March 30–31, 2005 | 2005

System and Network Security in a Heterogeneous Healthcare Domain : A Case Study

Rose-Mharie Åhlfeldt; Marcus Nohlberg


enterprise distributed object computing | 2014

An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks

Hannes Holm; Waldo Rocha Flores; Marcus Nohlberg; Mathias Ekstedt


international conference on information systems | 2008

A SYSTEMIC MODEL FOR SECURITY AND RISK MANAGEMENT IN TELECOM NETWORKS

Stewart Kowalski; Marcus Nohlberg; Jeffy Mwakalinga


Proceedings of the 7th Annual Security Conference, Las Vegas, USA, June 2-3, 2008 [CD-ROM] | 2008

Measuring Readiness for Automated Social Engineering

Marcus Nohlberg; Stewart Kowalski; Markus Huber

Collaboration


Dive into the Marcus Nohlberg's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hannes Holm

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mathias Ekstedt

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Waldo Rocha Flores

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Markus Huber

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge