To Örebro University

oru.seÖrebro universitets publikasjoner
Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (10 av 87) Visa alla publikasjoner
Gerdin, M., Grönlund, Å. & Kolkowska, E. (2025). Conceptual inconsistencies in variable definitions and measurement items within ISP non-/compliance research: A systematic literature review. Computers & Security, 152, Article ID 104365.
Åpne denne publikasjonen i ny fane eller vindu >>Conceptual inconsistencies in variable definitions and measurement items within ISP non-/compliance research: A systematic literature review
2025 (engelsk)Inngår i: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 152, artikkel-id 104365Artikkel, forskningsoversikt (Fagfellevurdert) Published
Abstract [en]

The rich stream of research focusing on employee non-/compliance with information security policies (ISPs) suffers from inconsistent results. Attempts to explain such inconsistencies have included investigation of possible contextual moderating factors. Another promising, yet not systematically investigated, explanation concerns conceptual inconsistencies in variable definitions and in questionnaire measurement items. Based on a systematic literature review covering 36 ISP non-/compliance articles using Protection Motivation Theory (PMT) and/or Theory of Planned Behavior (TPB), we found four major types of conceptual inconsistencies and unclarities within and across studies; (i) inconsistencies in variable definitions; (ii) inconsistencies between variable measurement items; (iii) inconsistencies between variable definitions and measurement items; and (iv) unclearly/vaguely worded measurement items. The review contributes to the field by demonstrating that the inconsistent results in the field may not only be due to unknown contextual moderators, but also to conceptual incongruences within and across studies.

sted, utgiver, år, opplag, sider
Elsevier, 2025
Emneord
Information security policy, Protection motivation theory, Theory of planned behavior, Variable properties, Non-compliance
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-119696 (URN)10.1016/j.cose.2025.104365 (DOI)001428697400001 ()2-s2.0-85217911678 (Scopus ID)
Tilgjengelig fra: 2025-03-17 Laget: 2025-03-17 Sist oppdatert: 2025-09-19bibliografisk kontrollert
Björn, S., Jashari, V., Kolkowska, E. & Gao, S. (2025). Developing and testing a framework for matching distinct personality types with information security awareness methods. Information and Computer Security
Åpne denne publikasjonen i ny fane eller vindu >>Developing and testing a framework for matching distinct personality types with information security awareness methods
2025 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961Artikkel i tidsskrift (Fagfellevurdert) Epub ahead of print
Abstract [en]

Purpose: This study aims to develop and test a framework to associate learning styles and social influencing vulnerabilities with different personality types in the context of tailoring information security awareness (ISA) methods for people with different personality types.

Design/methodology/approach: The framework was developed following directed content analysis and applied to match distinct personality types with ISA methods identified through a systematic literature search. The directed content analysis was conducted in two parts: a) Describe and identify keywords for the DISC (dominance [D], inducement [I], submission [S] and compliance [C]) personality types, Kolb's learning styles and Cialdini's social influencing principles; b) Identify the relationships between personality types, learning styles and social influencing vulnerabilities and create the PLS (i.e. personality types, learning styles and social influencing vulnerabilities) framework. As a result, four relationships are identified for each distinct personality type in the PLS framework.

Findings: The study has theoretically demonstrated the framework's feasibility of finding best-matched ISA methods for distinct personality types, considering their linked learning style and social influencing vulnerabilities.

Research limitations/implications: The study provides two main theoretical contributions: 1) PLS framework: presenting the relationship of personality types with their linked learning style and their social influencing vulnerabilities; 2) Examples of matching distinct personality types with ISA methods, including suggestions for a theoretically best matched ISA method. Therefore, this study contributes to building a sound theoretical ground for tailoring ISA methods for people with different personality types. In addition, the derived keywords are helpful to capture a good understanding of the different dimensions of the selected theories. Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to use ISA methods for people with different personality types in organizations.

Practical implications: Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to employ ISA methods for people with different personality types in organizations.

Originality/value: To the best of the authors' knowledge, this study is the first of its kind in developing and testing a framework for matching distinct personality types with information security awareness methods.

sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2025
Emneord
Information security awareness methods, Personality types, Learning styles, Social influencing vulnerabilities, Information security awareness (ISA)
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-122463 (URN)10.1108/ICS-03-2025-0091 (DOI)001513863400001 ()
Tilgjengelig fra: 2025-07-25 Laget: 2025-07-25 Sist oppdatert: 2025-07-25bibliografisk kontrollert
Rostami, E., Karlsson, F., Kolkowska, E. & Gao, S. (2025). Towards software for tailoring information security policies to organisations’ different target groups. Computers & Security, 159, Article ID 104687.
Åpne denne publikasjonen i ny fane eller vindu >>Towards software for tailoring information security policies to organisations’ different target groups
2025 (engelsk)Inngår i: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 159, artikkel-id 104687Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Designing accessible and relevant information security policies (ISPs) that support employees is crucial for improving organisations' information security. When employees are required to deal with cumbersome ISPs, there is a risk of reduced motivation towards information security, and employees' not following the rules in ISPs has been reported as a persistent issue. Existing research has suggested adopting a tailored approach to ISPs in order to enhance their relevance to employees. Tailoring is difficult and time consuming and information security managers lack information security management systems software (ISMSS) that can assist with this tailoring task. In this paper, we develop a design theory for ISMSS to support information security managers in tailoring ISPs to different employees. To achieve this, we employ design science research, drawing on prior studies concerning the tailoring of systems development methods. We evaluate the design theory through an expository instantiation, POLCO, and with information security managers, demonstrating both proof-of-concept and proof-of-value.

sted, utgiver, år, opplag, sider
Elsevier, 2025
Emneord
Tailored information security policy, Policy component, Software for tailoring policy, Design science research
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-124465 (URN)10.1016/j.cose.2025.104687 (DOI)001587718900001 ()
Prosjekter
Computerized tool-support for designing modular information security policies
Forskningsfinansiär
Swedish Civil Contingencies Agency
Merknad

This work was supported by the Swedish Research School of Management and IT (MIT) and the Swedish Civil Contingencies Agency (MSB).

Tilgjengelig fra: 2025-10-17 Laget: 2025-10-17 Sist oppdatert: 2025-10-17bibliografisk kontrollert
Jashari, V., Björn, S., Kolkowska, E. & Gao, S. (2024). A Framework for Matching Distinct Personality Types with Information Security Awareness Methods. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II. Paper presented at 18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance (HAISA 2024), Skövde, Sweden, July 9-11, 2024 (pp. 88-100). Springer, 722
Åpne denne publikasjonen i ny fane eller vindu >>A Framework for Matching Distinct Personality Types with Information Security Awareness Methods
2024 (engelsk)Inngår i: Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II / [ed] Nathan Clarke; Steven Furnell, Springer, 2024, Vol. 722, s. 88-100Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The objective of this study is to develop a framework to associate learning styles and social influencing vulnerabilities with different personality types in the context of tailoring Information Security Awareness (ISA) methods for people with different personality types. Directed content analysis is carried out to develop the framework. The analysis is conducted in the following two parts: a). Describe and identify keywords for the DISC (Dominance (D), Inducement (I), Submission (S) and Compliance (C)) personality types, Kolb’s learning styles and Cialdini’s social influencing principles; b). Identify the relationships between Personality types, Learning styles, and Social influencing vulnerabilities and create the PLS (i.e., Personality types, Learning styles, and Social influencing vulnerabilities) framework. As a result, four relationships are identified for each distinct personality type in the PLS framework. This study contributes to building a sound theoretical ground for tailoring ISA methods for people with different personality types . In addition, the derived keywords are helpful to capture a good understanding of the different dimensions of the selected theories. Furthermore, the developed PLS framework can be used as a base for managers to employ ISA methods for people with different personality types in organizations.

sted, utgiver, år, opplag, sider
Springer, 2024
Serie
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 722
Emneord
Information security awareness methods; Learning styles; Personality types; Social influencing vulnerabilities
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-118695 (URN)10.1007/978-3-031-72563-0_7 (DOI)001561043300007 ()2-s2.0-85211330730 (Scopus ID)9783031725623 (ISBN)9783031725630 (ISBN)
Konferanse
18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance (HAISA 2024), Skövde, Sweden, July 9-11, 2024
Tilgjengelig fra: 2025-01-17 Laget: 2025-01-17 Sist oppdatert: 2025-10-21bibliografisk kontrollert
Gerdin, M., Kolkowska, E. & Grönlund, Å. (2024). What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. Information and Computer Security, 32(4), 459-476
Åpne denne publikasjonen i ny fane eller vindu >>What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
2024 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961, Vol. 32, nr 4, s. 459-476Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Purpose: Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents' interpretations of the operationalized variables). This study asks: How well do respondents' interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?

Design/methodology/approach: This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.

Findings: The authors found that respondents' interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items - referred to as property contextualization, extension, alteration and oscillation - each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.

Originality/value: The qualitative method used proved vital to better understand respondents' interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors' knowledge, this study is a first step toward understanding how precise and uniform definitions of variables' theoretical properties can be operationalized into effective measurement items.

sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2024
Emneord
Information security policy, Non-/compliance research, Validation of measurement instruments, Protection motivation theory, PMT, Theory of planned behavior, TPB
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-113439 (URN)10.1108/ICS-12-2023-0240 (DOI)001207334600001 ()2-s2.0-85191325704 (Scopus ID)
Tilgjengelig fra: 2024-04-30 Laget: 2024-04-30 Sist oppdatert: 2025-09-19bibliografisk kontrollert
Kolkowska, E., Lagsten, J. & Andersson, A. (2023). Designing an infrastructure for sharing of data generated by welfare technologies. In: : . Paper presented at InfraHEALTH 2023, University of Siegen, Siegen, Germany, September 11-12, 2023.
Åpne denne publikasjonen i ny fane eller vindu >>Designing an infrastructure for sharing of data generated by welfare technologies
2023 (engelsk)Konferansepaper, Poster (with or without abstract) (Fagfellevurdert)
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-109017 (URN)
Konferanse
InfraHEALTH 2023, University of Siegen, Siegen, Germany, September 11-12, 2023
Tilgjengelig fra: 2023-10-17 Laget: 2023-10-17 Sist oppdatert: 2025-09-25bibliografisk kontrollert
Kolkowska, E., Soja, E. & Soja, P. (2023). Intergerenational tensions in ICT adoption for independent and healthy ageing: preliminary insights from a value-focused thinking study in Poland and Sweden. In: : . Paper presented at European Conference on Information Systems (ECIS 2023), Kristiansand, Norway, June 11-16, 2023.
Åpne denne publikasjonen i ny fane eller vindu >>Intergerenational tensions in ICT adoption for independent and healthy ageing: preliminary insights from a value-focused thinking study in Poland and Sweden
2023 (engelsk)Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Current literature highlights the importance of understanding intergenerational tensions that arise in the context of implementation of ICT for independent and healthy ageing. The current study aims to explore tensions between value-based objectives emphasized by seniors and younger adults in the context of ICT for independent and healthy ageing in Poland and Sweden. Value-based objectives were identified by applying the value-focused thinking approach. By comparing the identified objectives between young adults and seniors, we found several significant tensions, both in Poland and Sweden. In particular, we found that young adults might perceive seniors as a fragile and passive group, which clashes with how seniors perceive themselves. The analysis also revealed several areas of agreement, e.g. with Polish young and senior respondents unanimously emphasizing improvement of seniors’ health condition and ICT usefulness for families, and Swedes agreeing upon the importance of seniors’ autonomy, social contact, and equal access to digital solutions.

Emneord
Value-focused thinking, intergenerational tensions, ICT, independent and healthy ageing, Poland, Sweden
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-109013 (URN)
Konferanse
European Conference on Information Systems (ECIS 2023), Kristiansand, Norway, June 11-16, 2023
Tilgjengelig fra: 2023-10-17 Laget: 2023-10-17 Sist oppdatert: 2025-05-19bibliografisk kontrollert
Soja, E., Soja, P. & Kolkowska, E. (2023). Investigating the Role of Gender in Active and Healthy Ageing Supported by ICT: Preliminary Insights from Polish and Swedish Older Adults. In: Annual Americas Conference on Information Systems (AMCIS 2023): Diving into Uncharted Waters. Paper presented at 29th Annual American Conference on Information Systems (AMCIS 2023), Panama City, Panama, August 10-12, 2023. Association for Information Systems (AIS)
Åpne denne publikasjonen i ny fane eller vindu >>Investigating the Role of Gender in Active and Healthy Ageing Supported by ICT: Preliminary Insights from Polish and Swedish Older Adults
2023 (engelsk)Inngår i: Annual Americas Conference on Information Systems (AMCIS 2023): Diving into Uncharted Waters, Association for Information Systems (AIS) , 2023Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The current paper aims to investigate the role of gender in the adoption and use of ICT for an active and healthy ageing in the context of diverse socioeconomic considerations. The investigation has been conducted among seniors in Poland and Sweden, countries experiencing significant socioeconomic differences. The adopted research approach is based on Value-Focused Thinking (VFT). The preliminary findings suggest that the most significant gender-related differences in the perception of values refer to minimizing loneliness and maximizing ICT solution alignment with seniors’ needs. The proposed avenues for future research include an investigation into the role of technology ambassadors played by women.

sted, utgiver, år, opplag, sider
Association for Information Systems (AIS), 2023
Emneord
ageing, elderly, gender, ICT, Poland, Sweden, Value-focused thinking
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-109014 (URN)2-s2.0-85192911021 (Scopus ID)9781713893592 (ISBN)
Konferanse
29th Annual American Conference on Information Systems (AMCIS 2023), Panama City, Panama, August 10-12, 2023
Tilgjengelig fra: 2023-10-17 Laget: 2023-10-17 Sist oppdatert: 2025-05-19bibliografisk kontrollert
Soja, E., Soja, P. & Kolkowska, E. (2023). Understanding Drivers for Acceptance and Use of Digital Care Services for Seniors: Learning from a Value-Focused Thinking Study in Poland and Sweden. In: Tung X. Bui (Ed.), Proceedings of the 56th Annual Hawaii International Conference on System Sciences: . Paper presented at 56th Annual Hawaii International Conference on System Sciences (HICSS 2023), Maui, Hawaii, USA, January 3-6, 2023 (pp. 991-1000). University of Hawai'i at Manoa
Åpne denne publikasjonen i ny fane eller vindu >>Understanding Drivers for Acceptance and Use of Digital Care Services for Seniors: Learning from a Value-Focused Thinking Study in Poland and Sweden
2023 (engelsk)Inngår i: Proceedings of the 56th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui, University of Hawai'i at Manoa , 2023, s. 991-1000Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In order to maximize sustainability of digital services for seniors, the opinions of the main stakeholders and the broader context of independent and healthy ageing should be taken into consideration. Therefore, we applied a Value-focused thinking (VFT) approach to understand values held by seniors in the context of implementation of ICT for independent and healthy ageing. To this end, we conducted interviews with seniors in Poland and Sweden, which are countries with very diverse approaches to digital care services (DCS). Based on the interviews with seniors, we discovered 7 common fundamental objectives and 11 means objectives supporting the fundamental goals with varying understanding depending on a country, which allowed us to discuss the drivers for acceptance and use of DCS for seniors.

sted, utgiver, år, opplag, sider
University of Hawai'i at Manoa, 2023
Serie
Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS), ISSN 1530-1605, E-ISSN 2572-6862
Emneord
Digital Mobile Services for Everyday Life, digital care service, elderly, Poland, Sweden, value-focused thinking
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-109015 (URN)2-s2.0-85161648745 (Scopus ID)9780998133164 (ISBN)
Konferanse
56th Annual Hawaii International Conference on System Sciences (HICSS 2023), Maui, Hawaii, USA, January 3-6, 2023
Merknad

The publication has been co-financed by the subsidy granted to the Cracow University of Economics - Project no. 060/ZZI/2022/POT.

Tilgjengelig fra: 2023-10-17 Laget: 2023-10-17 Sist oppdatert: 2025-05-19bibliografisk kontrollert
Karlsson, F., Hedström, K. & Kolkowska, E. (2023). Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management. In: Leslie F. Sikos; Paul Haskell-Dowland (Ed.), Cybersecruity Teaching in Higher Education: (pp. 37-57). Cham: Springer
Åpne denne publikasjonen i ny fane eller vindu >>Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management
2023 (engelsk)Inngår i: Cybersecruity Teaching in Higher Education / [ed] Leslie F. Sikos; Paul Haskell-Dowland, Cham: Springer , 2023, s. 37-57Kapittel i bok, del av antologi (Fagfellevurdert)
Abstract [en]

In today's complex environments, safeguarding organizations’ information assets is difficult and requires more than solely technical skills. In order to meet the need for future information security specialists, in 2018 the Informatics department at Örebro University launched an International Master’s Program in Information Security Management. The program content was developed in collaboration with industry and governmental partners. One of the challenges with this co-design effort was to elicit the requirements of the courses in the program from a diverse set of actors. Also, an educational program has a finite number of teaching hours, which means that a limited number of requirements, or topics on information security, can be covered. Consequently, there was a need to prioritize between the elicited requirements and make the partners prioritize. To both these ends, we employed the Delphi method. In this chapter, we give an account of the process of eliciting and prioritizing course requirements using an adapted Delphi method. The adopted process included three iterations, for which workshops and surveys were used to collect the necessary data. The implementation has been far from instrumental, and in this chapter we discuss the details related to design choices made and the rationale behind these choices.

sted, utgiver, år, opplag, sider
Cham: Springer, 2023
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-109018 (URN)10.1007/978-3-031-24216-8_2 (DOI)9783031242151 (ISBN)9783031242168 (ISBN)
Forskningsfinansiär
Knowledge Foundation
Tilgjengelig fra: 2023-10-17 Laget: 2023-10-17 Sist oppdatert: 2025-05-19bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-5270-1517