Publications

My Ph.D. Thesis

Marcus Nohlbergs thesis (small size version for screen reading)

You can read more about the thesis and the defense here.

Publications (mostly complete)

Journal publications

  1. Nohlberg, M. & Bäckström, J. (2007a) User-centred security applied to the development of a management information system. “Information Management and Computer Security” vol. 15 issue 5.
  2. Nohlberg, M., Wangler, B. & Kowalski, S. (2012) A Conceptual Model of Social Engineering. “Journal of Information System Security” vol. 7 issue 2.
  3. Rocha Flores, W., Holm, H., Nohlberg, M., Ekstedt, M (2014). Investigating personal determinants of phishing and the effect of national culture. Information Management and Computer Security. To be available.

Conference publications

  1. Nohlberg, M. (2005) Social Engineering Audits Using Anonymous Surveys – Conning the Users in Order to Know if They Can Be Conned. In Proceedings of the 4th Security Conference, Las Vegas, USA, 30 – 31 March 2005.
  2. Åhlfeldt, R-M. & Nohlberg, M. (2005) System and Network Security in a Heterogeneous Healthcare Domain: A Case Study. In Proceedings of the 4th Security Conference, Las Vegas, USA, 30 – 31 March 2005.
  3. Nohlberg, M. & Bäckström, J. (2007b) Talking Security to Managers: How to Do it. In Proceedings of the 6th International Conference on Perspectives in Business Information Research 2007. Tampere, Finland.
  4. Nohlberg, M., Kowalski, S. & Karlsson, K. (2008) Non-Invasive Social Engineering Penetration Testing in a Medical Environment. In Proceedings of the 7th Annual Security Conference. Las Vegas, USA, June 2008.
  5. Nohlberg, M., Kowalski, S. & Karlsson, K. (2008) Ask and You Shall Know: Using Interviews and the SBC Model for Social-Engineering Penetration Testing. In Proceedings of the 5th International Conference on Cybernetics and Information Technologies, Systems and Applications: CITSA 2008. Orlando, USA, June 2008.
  6. Nohlberg, M., Kowalski, S. & Huber, M. (2008) Measuring Readiness for Automated Social Engineering. In Proceedings of the 7th Annual Security Conference. Las Vegas, USA, June 2008.
  7. Nohlberg, M., Kowalski, S. (2008) The cycle of deception – a model of social engineering attacks, defenses and victims. Published in the Proceedings of HAISA 2008.
  8. Kowalski, S., Nohlberg, M., & Mwakalinga, J. (2008). A systemic model for security and risk management in telecom networks, The 12th World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2008, Jointly with The 14th International Conference on Information Systems Analysis and Synthesis. ISAS 2008, June 29 – July 2, 2008 – Orlando, Florida, USA
  9. Huber, M., Kowalski, S., Nohlberg, M., Troja, S. (2009) Towards Automating Social Engineering Using Social Networking Sites. The 2009 IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT09).
  10. Boldt, M., & Nohlberg, M. (2008) Phishing with Gifts as Bait: Measurement and Analysis of Phishing Attacks within a University Environment. In Proceedings of the 9th Annual Security Conference. Las Vegas, USA, April, 2010.
  11. Nohlberg, M., Wangler, B. & Kowalski, S. (2010) A Conceptual Model of Social Engineering. In Proceedings of the 9th Annual Security Conference. Las Vegas, USA, April, 2010.
  12. A. Abbas, M. Nohlberg (2010) Design issues related to the knowledge bases of medical decision support systems, IEEE International Conference on Intelligence and Information Technology, October, 2010.
  13. Rocha Flores, W., Holm, H., Nohlberg, M., Ekstedt, M (2014). An empirical investigation of the effect of target-related information in phishing attacks. 1st International Workshop on Compliance, Evolution and Security in Cross-Organizational Processes. Ulm, Germany, September 1-5.
  14. Rocha Flores, W., Holm, H., Nohlberg, M., Ekstedt, M (2014). Investigating the correlation between intention and action in the context of social engineering in two different national cultures. Accepted to the Hawaii International Conference on System Sciences (HICSS 48), January 5-8, 2015, Hawaii, USA.

Book chapters

  1. Nohlberg, M. (2008) Why Humans Are The Weakest Link, in Gupta, M. and Sharman, R. Social and Human Elements in Information Security: Emerging Trends and Countermeasures, Idea Group, Inc.

Advertisement

%d bloggers like this: