Publications
My Ph.D. Thesis
Marcus Nohlbergs thesis (small size version for screen reading)
You can read more about the thesis and the defense here.
Publications (mostly complete)
Journal publications
- Nohlberg, M. & Bäckström, J. (2007a) User-centred security applied to the development of a management information system. “Information Management and Computer Security” vol. 15 issue 5.
- Nohlberg, M., Wangler, B. & Kowalski, S. (2012) A Conceptual Model of Social Engineering. “Journal of Information System Security” vol. 7 issue 2.
- Rocha Flores, W., Holm, H., Nohlberg, M., Ekstedt, M (2014). Investigating personal determinants of phishing and the effect of national culture. Information Management and Computer Security. To be available.
Conference publications
- Nohlberg, M. (2005) Social Engineering Audits Using Anonymous Surveys – Conning the Users in Order to Know if They Can Be Conned. In Proceedings of the 4th Security Conference, Las Vegas, USA, 30 – 31 March 2005.
- Åhlfeldt, R-M. & Nohlberg, M. (2005) System and Network Security in a Heterogeneous Healthcare Domain: A Case Study. In Proceedings of the 4th Security Conference, Las Vegas, USA, 30 – 31 March 2005.
- Nohlberg, M. & Bäckström, J. (2007b) Talking Security to Managers: How to Do it. In Proceedings of the 6th International Conference on Perspectives in Business Information Research 2007. Tampere, Finland.
- Nohlberg, M., Kowalski, S. & Karlsson, K. (2008) Non-Invasive Social Engineering Penetration Testing in a Medical Environment. In Proceedings of the 7th Annual Security Conference. Las Vegas, USA, June 2008.
- Nohlberg, M., Kowalski, S. & Karlsson, K. (2008) Ask and You Shall Know: Using Interviews and the SBC Model for Social-Engineering Penetration Testing. In Proceedings of the 5th International Conference on Cybernetics and Information Technologies, Systems and Applications: CITSA 2008. Orlando, USA, June 2008.
- Nohlberg, M., Kowalski, S. & Huber, M. (2008) Measuring Readiness for Automated Social Engineering. In Proceedings of the 7th Annual Security Conference. Las Vegas, USA, June 2008.
- Nohlberg, M., Kowalski, S. (2008) The cycle of deception – a model of social engineering attacks, defenses and victims. Published in the Proceedings of HAISA 2008.
- Kowalski, S., Nohlberg, M., & Mwakalinga, J. (2008). A systemic model for security and risk management in telecom networks, The 12th World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2008, Jointly with The 14th International Conference on Information Systems Analysis and Synthesis. ISAS 2008, June 29 – July 2, 2008 – Orlando, Florida, USA
- Huber, M., Kowalski, S., Nohlberg, M., Troja, S. (2009) Towards Automating Social Engineering Using Social Networking Sites. The 2009 IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT09).
- Boldt, M., & Nohlberg, M. (2008) Phishing with Gifts as Bait: Measurement and Analysis of Phishing Attacks within a University Environment. In Proceedings of the 9th Annual Security Conference. Las Vegas, USA, April, 2010.
- Nohlberg, M., Wangler, B. & Kowalski, S. (2010) A Conceptual Model of Social Engineering. In Proceedings of the 9th Annual Security Conference. Las Vegas, USA, April, 2010.
- A. Abbas, M. Nohlberg (2010) Design issues related to the knowledge bases of medical decision support systems, IEEE International Conference on Intelligence and Information Technology, October, 2010.
- Rocha Flores, W., Holm, H., Nohlberg, M., Ekstedt, M (2014). An empirical investigation of the effect of target-related information in phishing attacks. 1st International Workshop on Compliance, Evolution and Security in Cross-Organizational Processes. Ulm, Germany, September 1-5.
- Rocha Flores, W., Holm, H., Nohlberg, M., Ekstedt, M (2014). Investigating the correlation between intention and action in the context of social engineering in two different national cultures. Accepted to the Hawaii International Conference on System Sciences (HICSS 48), January 5-8, 2015, Hawaii, USA.
Book chapters
- Nohlberg, M. (2008) Why Humans Are The Weakest Link, in Gupta, M. and Sharman, R. Social and Human Elements in Information Security: Emerging Trends and Countermeasures, Idea Group, Inc.
Trackback this post