Fredrik Karlsson

Affiliations:
  • Örebru University, Sweden


According to our database1, Fredrik Karlsson authored at least 54 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Policy components - a conceptual model for modularizing and tailoring of information security policies.
Inf. Comput. Secur., 2023

Uncovering Situations of Cargo Cult Behavior in Agile Software Development Method Use.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security Policies.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Citizens' attitudes towards automated decision-making.
Inf. Polity, 2022

The effect of perceived organizational culture on employees' information security compliance.
Inf. Comput. Secur., 2022

"Standardizing information security - a structurational analysis".
Inf. Manag., 2022

Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis.
Comput. Secur., 2022

Policy Components - A Conceptual Model for Tailoring Information Security Policies.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
Attempts to share information between public sector organisations over time: A case-based exploration of value conflicts.
Inf. Polity, 2021

Developing an information classification method.
Inf. Comput. Secur., 2021

2020
Method Engineering as Design Science.
J. Assoc. Inf. Syst., 2020

The hunt for computerized support in information security policy management.
Inf. Comput. Secur., 2020

Artefactual and empirical contributions in information systems research.
Eur. J. Inf. Syst., 2020

Requirements for computerized tools to design information security policies.
Comput. Secur., 2020

Consensus versus warfare - unveiling discourses in de jure information security standard development.
Comput. Secur., 2020

2018
Guest editorial.
Inf. Comput. Secur., 2018

Cargo Cults in Information Systems Development: a Definition and an Analytical Framework.
Proceedings of the Information Systems Development: Designing Digitalization, 2018

2017
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method.
J. Strateg. Inf. Syst., 2017

Measuring employees' compliance - the importance of value pluralism.
Inf. Comput. Secur., 2017

Inter-organisational information sharing in the public sector: A longitudinal case study on the reshaping of success factors.
Gov. Inf. Q., 2017

Practice-based discourse analysis of information security policies.
Comput. Secur., 2017

2016
Inter-organisational information security: a systematic literature review.
Inf. Comput. Secur., 2016

Measuring and Visualising Projects' Collective Method Rationale.
Proceedings of the Practice of Enterprise Modeling, 2016

2015
Information security culture - state-of-the-art review between 2000 and 2013.
Inf. Comput. Secur., 2015

Practice-Based Discourse Analysis of InfoSec Policies.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Inter-Organisational Information Sharing - Between a Rock and a Hard Place.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
Public e-service development: Understanding citizens' conditions for participation.
Gov. Inf. Q., 2014

End User Development and Information Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

A Conceptual Framework for Time Distortion Analysis in Method Components.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014

2013
Evaluating End User Development as a Requirements Engineering Technique for Communicating Across Social Worlds During Systems Development.
Scand. J. Inf. Syst., 2013

Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale.
Inf. Manag. Comput. Secur., 2013

Longitudinal use of method rationale in method configuration: an exploratory study.
Eur. J. Inf. Syst., 2013

2012
MC Sandbox: Devising a tool for method-user-centered method configuration.
Inf. Softw. Technol., 2012

Exploring user participation approaches in public e-service development.
Gov. Inf. Q., 2012

Understanding Business Employees' conditions for participating in Public E-Service Development.
Proceedings of the 20th European Conference on Information Systems, 2012

2011
Value conflicts for information security management.
J. Strateg. Inf. Syst., 2011

2010
Using Actor Network Theory to Understand Information Security Management.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Towards a Roadmap for User Involvement in E-Government Service Development.
Proceedings of the Electronic Government, 9th IFIP WG 8.5 International Conference, 2010

2009
Towards Structured Flexibility in Information Systems Development: Devising a Method for Method Configuration.
J. Database Manag., 2009

Exploring agile values in method configuration.
Eur. J. Inf. Syst., 2009

2008
Method Configuration: The eXtreme Programming Case.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2008

Exploring the Role of Method Rationale in the Context of Teaching Information Systems Development Methods.
Proceedings of the Information Systems Development, 2008

Negotiating a Systems Development Method.
Proceedings of the Information Systems Development, 2008

Using two heads in practice.
Proceedings of the 4th international workshop on End-user software engineering, 2008

A wiki-based approach to method tailoring.
Proceedings of the 3rd International Conference on Pragmatic Web, 2008

Method Tailoring as Negotiation.
Proceedings of the Forum at the CAiSE'08 Conference, Montpellier, France, June 18-20, 2008, 2008

2007
Multi-Grounded Action Research in Method Engineering: The MMC Case.
Proceedings of the Situational Method Engineering: Fundamentals and Experiences, 2007

Modularization Constructs in Method Engineering: Towards Common Ground?
Proceedings of the Situational Method Engineering: Fundamentals and Experiences, 2007

2006
Combining method engineering with activity theory: theoretical grounding of the method component concept.
Eur. J. Inf. Syst., 2006

2004
Method configuration: adapting to situational characteristics while creating reusable assets.
Inf. Softw. Technol., 2004

Method Components - Rationale Revealed.
Proceedings of the Advanced Information Systems Engineering, 16th International Conference, 2004

MC Sandbox - Tool Support for Method Configuration.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004

2003
Flexibile Processes and Method Configuration: Outline of a Joint Industry-Academia Research Project.
Proceedings of the ICEIS 2003, 2003

2001
Exploring the Explanatory Power of Actability.
Proceedings of the Organizational Semiotics: Evolving a Science of Information Systems, 2001


  Loading...