To Örebro University

oru.seÖrebro universitets publikasjoner
Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (10 av 115) Visa alla publikasjoner
Dinić, B. M., Bodro, B., Jovanovic, T., Hinić, D., Puharic, Z., Puharic, F., . . . Pyzalski, J. (2025). A cross-national perspective of prejudice-based cyberbullying and cybervictimisation. In: Hildegunn Fandrem; James O’Higgins Norman (Ed.), International Perspectives on Migration, Bullying, and School: Implications for Schools, Refugees, and Migrants (pp. 148-165). Routledge
Åpne denne publikasjonen i ny fane eller vindu >>A cross-national perspective of prejudice-based cyberbullying and cybervictimisation
Vise andre…
2025 (engelsk)Inngår i: International Perspectives on Migration, Bullying, and School: Implications for Schools, Refugees, and Migrants / [ed] Hildegunn Fandrem; James O’Higgins Norman, Routledge, 2025, s. 148-165Kapittel i bok, del av antologi (Fagfellevurdert)
Abstract [en]

Although much literature has focused on prejudice-based traditional bullying, there are not a lot of studies about prejudice-based cyberbullying. This kind of cyberbullying reflects any form of cyberbullying based on a group affiliation or identity characteristics of the victim, often including historically marginalised and other "protected characteristics" (race, religion, disability, etc.). In this chapter, we focus on seven characteristics that were highlighted in previous research - family origin, skin colour, religion/belief, nationality/ethnicity, disability, poverty, and sexual orientation. We begin by reviewing research into prejudice-based cyberbullying and emphasise the main gaps in the existing knowledge. We then present our empirical findings based on an online study that contributes to filling these gaps: (a) the prevalence of prejudice-based cyberbullying and cybervictimisation at the cross-national level, across 17 countries and including culturally diverse samples (N = 5,215 high school students); and (b) the relationships of belonging to some of the marginalised groups (based on sex, nationality/ethnicity, religion, asylum status, and disability) with both prejudice-based cyberbullying and cybervictimisation. Finally, we refer to some suggestions for future research and conclude with the implications for prevention programmes based on the obtained results.

sted, utgiver, år, opplag, sider
Routledge, 2025
Serie
Routledge Research in Crises Education
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-117823 (URN)10.4324/9781003439202-9 (DOI)2-s2.0-85209852631 (Scopus ID)9781003439202 (ISBN)9781032571331 (ISBN)9781032574035 (ISBN)
Tilgjengelig fra: 2024-12-16 Laget: 2024-12-16 Sist oppdatert: 2025-01-07bibliografisk kontrollert
Havstorm, T. E., Karlsson, F. & Gao, S. (2025). Agile Software Development Method Cargo Cult - Devising an Analytical Tool. Information and Software Technology, 187, 1-13, Article ID 107851.
Åpne denne publikasjonen i ny fane eller vindu >>Agile Software Development Method Cargo Cult - Devising an Analytical Tool
2025 (engelsk)Inngår i: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 187, s. 1-13, artikkel-id 107851Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Context: Despite the widespread adoption of agile software development methods (ASDMs) today, many organizations struggle with effective implementation. One reason for this is that some organizations claim to use an ASDM without fully understanding its core principles, or they adhere to old practices while professing to follow a contemporary software development method. This phenomenon is sometimes referred to by practitioners as “cargo cult” (CC) behavior. However, simply labeling something as CC lacks analytical depth.

Objective: This paper aims to conceptualize and validate an analytical tool for diagnosing CC and non-CC behavior in software development teams’ use of ASDMs.

Method: This study uses a longitudinal ethnographic approach to conceptualize and validate the analytical tool by analyzing four agile practices used by a global industrial manufacturing company.

Results: The analytical tool features eight stereotypes—three representing non-CC behaviors and five representing CC behaviors—designed to aid in the analysis of ASDM usage. The tool draws on Social Action Theory and Work Motivation Theory to capture and interpret the CC phenomenon in ASDM use. Using the stereotypes, 36 actions were categorized as CC behavior deviating from documented ASDM practices, and 23 actions as non-CC behavior because they aligned with the documented ASDM and reflected agile goals and values. The tool thus can help both researchers and practitioners gain a deeper understanding of ASDM use in organizations.

Conclusion: This study advances understanding of ASDM use by moving beyond the simplistic use of the term “cargo cult”. The developed tool enables structured identification and classification of CC behaviors. The stereotypes provide a way of classifying recurring software development actions against the intended ASDM, allowing the identification of specific types of CC behaviors. The analytical tool enables managers to gain deeper insights into the underlying reasons for deviations, thereby supporting more grounded and effective agile practices within organizations.

sted, utgiver, år, opplag, sider
Elsevier, 2025
Emneord
Agile, Cargo cult, Deviations, Software development, Social action theory, Work motivation theory, Empirical study
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-122454 (URN)10.1016/j.infsof.2025.107851 (DOI)001543133000002 ()
Tilgjengelig fra: 2025-08-10 Laget: 2025-08-10 Sist oppdatert: 2025-08-14bibliografisk kontrollert
Rostami, E., Hanif, M., Karlsson, F. & Gao, S. (2025). Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations. Procedia Computer Science, 254, 30-38
Åpne denne publikasjonen i ny fane eller vindu >>Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations
2025 (engelsk)Inngår i: Procedia Computer Science, E-ISSN 1877-0509, Vol. 254, s. 30-38Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In today's digital age, protecting information assets is critical to maintain organizations’ digital sovereignty. Yet existing research offers limited guidance on creating effective, actionable advice in information security policies (ISPs) that instructs employees on how to carry out their tasks and contribute to protecting information assets. Addressing this gap, the aim of this paper is to propose a definition of actionable advice. A clear definition can aid in designing ISPs and enhance communication with employees, guiding them in the expected behavior to protect the organization’s information assets. The research question guiding this work is: how can actionable advice be defined in information security policies? To achieve this aim, the definition is informed by a literature review and analysis of 47 ISPs from public agencies in Sweden. The proposed definition of actionable advice is: a demarcated part of an ISP, that instructs someone on a task to execute or not to execute regarding information security, and, in case of execution, how to carry out the task. The definition of actionable advice provides researchers with a starting point to understand this term, helping advancing future studies on ISPs. This work also has practical implications for ISP developers, offering guidance on writing pieces of actionable advice that are concrete and directly applicable in employees' daily tasks to protect their organizations.

sted, utgiver, år, opplag, sider
Elsevier, 2025
Emneord
Actionable advice, information security policy, operational policy, compliance, cyber security policy
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-122091 (URN)10.1016/j.procs.2025.02.061 (DOI)
Forskningsfinansiär
Swedish Civil Contingencies Agency
Tilgjengelig fra: 2025-06-29 Laget: 2025-06-29 Sist oppdatert: 2025-07-23bibliografisk kontrollert
Björn, S., Jashari, V., Kolkowska, E. & Gao, S. (2025). Developing and testing a framework for matching distinct personality types with information security awareness methods. Information and Computer Security
Åpne denne publikasjonen i ny fane eller vindu >>Developing and testing a framework for matching distinct personality types with information security awareness methods
2025 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961Artikkel i tidsskrift (Fagfellevurdert) Epub ahead of print
Abstract [en]

Purpose: This study aims to develop and test a framework to associate learning styles and social influencing vulnerabilities with different personality types in the context of tailoring information security awareness (ISA) methods for people with different personality types.

Design/methodology/approach: The framework was developed following directed content analysis and applied to match distinct personality types with ISA methods identified through a systematic literature search. The directed content analysis was conducted in two parts: a) Describe and identify keywords for the DISC (dominance [D], inducement [I], submission [S] and compliance [C]) personality types, Kolb's learning styles and Cialdini's social influencing principles; b) Identify the relationships between personality types, learning styles and social influencing vulnerabilities and create the PLS (i.e. personality types, learning styles and social influencing vulnerabilities) framework. As a result, four relationships are identified for each distinct personality type in the PLS framework.

Findings: The study has theoretically demonstrated the framework's feasibility of finding best-matched ISA methods for distinct personality types, considering their linked learning style and social influencing vulnerabilities.

Research limitations/implications: The study provides two main theoretical contributions: 1) PLS framework: presenting the relationship of personality types with their linked learning style and their social influencing vulnerabilities; 2) Examples of matching distinct personality types with ISA methods, including suggestions for a theoretically best matched ISA method. Therefore, this study contributes to building a sound theoretical ground for tailoring ISA methods for people with different personality types. In addition, the derived keywords are helpful to capture a good understanding of the different dimensions of the selected theories. Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to use ISA methods for people with different personality types in organizations.

Practical implications: Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to employ ISA methods for people with different personality types in organizations.

Originality/value: To the best of the authors' knowledge, this study is the first of its kind in developing and testing a framework for matching distinct personality types with information security awareness methods.

sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2025
Emneord
Information security awareness methods, Personality types, Learning styles, Social influencing vulnerabilities, Information security awareness (ISA)
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-122463 (URN)10.1108/ICS-03-2025-0091 (DOI)001513863400001 ()
Tilgjengelig fra: 2025-07-25 Laget: 2025-07-25 Sist oppdatert: 2025-07-25bibliografisk kontrollert
Han, H., Sammour, A., Gao, S. & Yamoah, F. A. A. (2025). Digital transformation impacts organisational change in the role of accountants and auditors: an exploratory study. Journal of Organizational Change Management
Åpne denne publikasjonen i ny fane eller vindu >>Digital transformation impacts organisational change in the role of accountants and auditors: an exploratory study
2025 (engelsk)Inngår i: Journal of Organizational Change Management, ISSN 0953-4814, E-ISSN 1758-7816Artikkel i tidsskrift (Fagfellevurdert) Epub ahead of print
Abstract [en]

Purpose: This study explores the impact of artificial intelligence (AI) on accounting and auditing professionals as businesses navigate digital transformation.

Design/methodology/approach: A qualitative research approach was adopted, analysing data from 10 podcasts and 17 semi-structured interviews using NVivo software. Key themes were identified to provide insights into AI's influence on organisational change in accounting practices.

Findings: The research constructs a thematic framework comprising three aggregate dimensions: triggers of digital transformation in accounting practices, opportunities and challenges in transforming accounting practices, and changing routines for accounting professionals. The results are further interpreted using Lewin's 3-Step Model of Organisational Change to comprehend the impact of AI and understand how accountants can adapt to these technological changes to sustain their practices.

Originality/value: This study provides a good understanding of the social shifts towards utilising AI in increasingly automating accounting tasks, reshaping professional roles and creating both opportunities and challenges. AI enhances efficiency in bookkeeping, reporting, auditing and risk analysis but also raises concerns about data integrity and trust. Blockchain technology emerges as a potential solution, enhancing transparency, security and reliability in AI-enabled accounting systems. To remain relevant, accounting professionals must bridge digital skill gaps and adopt interdisciplinary collaboration. As AI continues to evolve, blockchain integration could reinforce trust and accountability, shaping the future of accounting and auditing.

sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2025
Emneord
Artificial intelligence, Accounting professionals, Digital transformation, Blockchain technology, Future work
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-124097 (URN)10.1108/JOCM-03-2025-0288 (DOI)001576354400001 ()
Tilgjengelig fra: 2025-10-02 Laget: 2025-10-02 Sist oppdatert: 2025-10-02bibliografisk kontrollert
Karlsson, F., Chatzipetrou, P., Gao, S. & Havstorm, T. E. (2025). Exploring Classification Consistency of Natural Language Requirements Using GPT-4o. In: Efi Papatheocharous; Siamak Farshidi; Slinger Jansen; Sonja Hyrynsalmi (Ed.), Software Business: 15th International Conference, ICSOB 2024, Utrecht, The Netherlands, November 18–20, 2024, Proceedings. Paper presented at 15th International Conference (ICSOB 2024), Utrecht, The Netherlands, November 18–20, 2024 (pp. 44-50). Springer, 539
Åpne denne publikasjonen i ny fane eller vindu >>Exploring Classification Consistency of Natural Language Requirements Using GPT-4o
2025 (engelsk)Inngår i: Software Business: 15th International Conference, ICSOB 2024, Utrecht, The Netherlands, November 18–20, 2024, Proceedings / [ed] Efi Papatheocharous; Siamak Farshidi; Slinger Jansen; Sonja Hyrynsalmi, Springer, 2025, Vol. 539, s. 44-50Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Classifying natural language requirements (NLRs) is challenging, especially with large volumes. Research shows that Large Language Models can assist by categorizing NLRs into functional requirements (FR) and non-functional requirements (NFRs). However, Generative Pretrained Transformer (GPT) models are not typically favored for this task due to concerns about consistency. This paper investigates the consistency when a GPT model classifies NLRs into FRs and NFRs using a zero-shot learning approach. Results show that ChatGPT-4o performs better for FRs, a temperature parameter set to 1 yields the highest consistency, while NFR classification improves with higher temperatures.

sted, utgiver, år, opplag, sider
Springer, 2025
Serie
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356
Emneord
Requirements, Classification, Large Language Model, Zero-Shot Learning
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-121182 (URN)10.1007/978-3-031-85849-9_4 (DOI)001476891400004 ()2-s2.0-105001270180 (Scopus ID)9783031858482 (ISBN)9783031858499 (ISBN)
Konferanse
15th International Conference (ICSOB 2024), Utrecht, The Netherlands, November 18–20, 2024
Tilgjengelig fra: 2025-05-21 Laget: 2025-05-21 Sist oppdatert: 2025-05-21bibliografisk kontrollert
Karlsson, F. & Gao, S. (2025). Guest editorial: New frontiers in information security management. Information and Computer Security, 33(1), 1-4
Åpne denne publikasjonen i ny fane eller vindu >>Guest editorial: New frontiers in information security management
2025 (engelsk)Inngår i: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, nr 1, s. 1-4Artikkel i tidsskrift, Editorial material (Annet vitenskapelig) Published
sted, utgiver, år, opplag, sider
Emerald Group Publishing Limited, 2025
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-118853 (URN)10.1108/ICS-03-2025-265 (DOI)001398399300002 ()2-s2.0-85216242094 (Scopus ID)
Tilgjengelig fra: 2025-01-28 Laget: 2025-01-28 Sist oppdatert: 2025-02-11bibliografisk kontrollert
Karlsson, F. & Gao, S. (2025). Guidelines for Longitudinal Information Security Policy Compliance Research. In: AMCIS 2025 Proceedings: . Paper presented at Americas Conference on Information Systems (AMCIS 2025), Montreal, Canada, August 14-16, 2025. Association for Information Systems, Article ID 1585.
Åpne denne publikasjonen i ny fane eller vindu >>Guidelines for Longitudinal Information Security Policy Compliance Research
2025 (engelsk)Inngår i: AMCIS 2025 Proceedings, Association for Information Systems, 2025, artikkel-id 1585Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Over the years, numerous studies on employee compliance with information security policies (ISPs) have been conducted, contributing valuable insights to enhance information security in organisations. However, our literature review reveals that few ISP compliance studies adopt a longitudinal approach. It is well known that cross-sectional research often provides limited insight into how constructs such as ISP compliance evolve over time. While researchers have called for more longitudinal ISP compliance studies, there is little guidance on how to conduct them. To address this gap, we propose a set of seven guidelines to support both quantitative and qualitative longitudinal ISP compliance research.

sted, utgiver, år, opplag, sider
Association for Information Systems, 2025
Serie
Proceedings of the Americas Conference on Information Systems, ISSN 3066-8743, E-ISSN 3066-876X
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-124466 (URN)
Konferanse
Americas Conference on Information Systems (AMCIS 2025), Montreal, Canada, August 14-16, 2025
Tilgjengelig fra: 2025-10-17 Laget: 2025-10-17 Sist oppdatert: 2025-10-17bibliografisk kontrollert
Karlsson, F., Chatzipetrou, P., Gao, S. & Havstorm, T. E. (2025). How Reliable Are GPT-4o and LLAMA3.3-70B in Classifying Natural Language Requirements? The Impact of the Temperature Setting. IEEE Software, 42(6), 97-104
Åpne denne publikasjonen i ny fane eller vindu >>How Reliable Are GPT-4o and LLAMA3.3-70B in Classifying Natural Language Requirements? The Impact of the Temperature Setting
2025 (engelsk)Inngår i: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 42, nr 6, s. 97-104Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Classifying natural language requirements (NLRs) plays a crucial role in software engineering, helping us distinguish between functional and non-functional requirements. While large language models offer automation potential, we should address concerns about their consistency, meaning their ability to produce the same results over time. In this work, we share experiences from experimenting with how well GPT-4o and LLAMA3.3-70B classify NLRs using a zero-shot learning approach. Moreover, we explore how the temperature parameter influences classification performance and consistency for these models. Our results show that large language models like GPT-4o and LLAMA3.3- 70B can support automated NLRs classification. GPT-4o performs well in identifying functional requirements, with the highest consistency occurring at a temperature setting of one. Additionally, non-functional requirements classification improves at higher temperatures, indicating a trade-off between determinism and adaptability. LLAMA3.3-70B is more consistent than GPT-4o, and its classification accuracy varies less depending on temperature adjustments.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2025
Emneord
Software engineering, Predictive models, Accuracy, Transformers, Training, Natural languages, Temperature measurement, Software reliability, Natural language processing
HSV kategori
Forskningsprogram
Informatik
Identifikatorer
urn:nbn:se:oru:diva-122267 (URN)10.1109/MS.2025.3572561 (DOI)001600046500002 ()
Tilgjengelig fra: 2025-07-03 Laget: 2025-07-03 Sist oppdatert: 2025-11-12bibliografisk kontrollert
Karlsson, F., Gao, S., Krogstie, J. & Aro-Sati, L. (2025). Towards a Speech Act-Based Model to Enable Future Quality Improvements of Information Security Policies Using Large Language Models. In: Rébecca Deneckère; Marite Kirikova; Janis Grabis (Ed.), Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings. Paper presented at 24th International Conference on Perspectives in Business Informatics Research (BIR 2025), Riga, Latvia, September 17–19, 2025 (pp. 349-364). Springer, 562
Åpne denne publikasjonen i ny fane eller vindu >>Towards a Speech Act-Based Model to Enable Future Quality Improvements of Information Security Policies Using Large Language Models
2025 (engelsk)Inngår i: Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings / [ed] Rébecca Deneckère; Marite Kirikova; Janis Grabis, Springer, 2025, Vol. 562, s. 349-364Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Employees compliance with information security policies (ISPs) depends on communicating clear and comprehensible content. However, existing research has shown that many ISPs are of poor communicative quality. Large language models (LLMs) could enhance ISPs if finetuned on high-quality data, but to do such fine-tuning requires a conceptual model for classifying the data and evaluating the resulting text. Therefore, as a step in this direction, the aim of this paper is to develop a conceptual model of ISPs using speech act theory as a theoretical lens. We use conceptual modelling and document analysis to develop the model and use selected parts from the SEQUAL framework to evaluate the model. Analysing 600 ISP statements from ten British National Health Service ISPs, we present a class diagram containing 19 classes, six of which address ISP statement quality as speech acts. The SEQUAL evaluation points to potential areas for improving the model’s semantic, empirical, physical and deontic qualities before using it to fine-tune LLMs to improve ISP content.

sted, utgiver, år, opplag, sider
Springer, 2025
Serie
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356 ; Vol. 562
Emneord
Information Security Policy, Speech Act, Large Language Model
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-124321 (URN)10.1007/978-3-032-04375-7_22 (DOI)9783032043740 (ISBN)9783032043757 (ISBN)
Konferanse
24th International Conference on Perspectives in Business Informatics Research (BIR 2025), Riga, Latvia, September 17–19, 2025
Tilgjengelig fra: 2025-10-09 Laget: 2025-10-09 Sist oppdatert: 2025-10-13bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-3722-6797