Henrik Karlzén

Orcid: 0009-0009-4394-7695

According to our database1, Henrik Karlzén authored at least 12 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Skade - A Challenge Management System for Cyber Threat Hunting.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Automatic incident response solutions: a review of proposed solutions' input and output.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2019
The Theory of Planned Behavior and Information Security Policy Compliance.
J. Comput. Inf. Syst., 2019

A meta-analysis of field experiments on phishing susceptibility.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
A Test of Structured Threat Descriptions for Information Security Risk Assessments.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Live Enrolment for Identity Documents in Europe.
Proceedings of the Electronic Government - 17th IFIP WG 8.5 International Conference, 2018

2017
Assessing Information Security Risks using Pairwise Weighting.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
An empirical test of the perceived relationship between risk and the constituents severity and probability.
Inf. Comput. Secur., 2016

2015
The sufficiency of the theory of planned behavior for explaining information security policy compliance.
Inf. Comput. Secur., 2015

A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour.
Int. J. Inf. Secur. Priv., 2015

Perceived Information Security Risk as a Function of Probability and Severity.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Future Schemes for Stronger Verification of the Access Rights of Border Control Inspection Systems.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015


  Loading...