To Örebro University

oru.seÖrebro University Publications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 87) Show all publications
Gerdin, M., Grönlund, Å. & Kolkowska, E. (2025). Conceptual inconsistencies in variable definitions and measurement items within ISP non-/compliance research: A systematic literature review. Computers & Security, 152, Article ID 104365.
Open this publication in new window or tab >>Conceptual inconsistencies in variable definitions and measurement items within ISP non-/compliance research: A systematic literature review
2025 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 152, article id 104365Article, review/survey (Refereed) Published
Abstract [en]

The rich stream of research focusing on employee non-/compliance with information security policies (ISPs) suffers from inconsistent results. Attempts to explain such inconsistencies have included investigation of possible contextual moderating factors. Another promising, yet not systematically investigated, explanation concerns conceptual inconsistencies in variable definitions and in questionnaire measurement items. Based on a systematic literature review covering 36 ISP non-/compliance articles using Protection Motivation Theory (PMT) and/or Theory of Planned Behavior (TPB), we found four major types of conceptual inconsistencies and unclarities within and across studies; (i) inconsistencies in variable definitions; (ii) inconsistencies between variable measurement items; (iii) inconsistencies between variable definitions and measurement items; and (iv) unclearly/vaguely worded measurement items. The review contributes to the field by demonstrating that the inconsistent results in the field may not only be due to unknown contextual moderators, but also to conceptual incongruences within and across studies.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Information security policy, Protection motivation theory, Theory of planned behavior, Variable properties, Non-compliance
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-119696 (URN)10.1016/j.cose.2025.104365 (DOI)001428697400001 ()2-s2.0-85217911678 (Scopus ID)
Available from: 2025-03-17 Created: 2025-03-17 Last updated: 2025-09-19Bibliographically approved
Björn, S., Jashari, V., Kolkowska, E. & Gao, S. (2025). Developing and testing a framework for matching distinct personality types with information security awareness methods. Information and Computer Security
Open this publication in new window or tab >>Developing and testing a framework for matching distinct personality types with information security awareness methods
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961Article in journal (Refereed) Epub ahead of print
Abstract [en]

Purpose: This study aims to develop and test a framework to associate learning styles and social influencing vulnerabilities with different personality types in the context of tailoring information security awareness (ISA) methods for people with different personality types.

Design/methodology/approach: The framework was developed following directed content analysis and applied to match distinct personality types with ISA methods identified through a systematic literature search. The directed content analysis was conducted in two parts: a) Describe and identify keywords for the DISC (dominance [D], inducement [I], submission [S] and compliance [C]) personality types, Kolb's learning styles and Cialdini's social influencing principles; b) Identify the relationships between personality types, learning styles and social influencing vulnerabilities and create the PLS (i.e. personality types, learning styles and social influencing vulnerabilities) framework. As a result, four relationships are identified for each distinct personality type in the PLS framework.

Findings: The study has theoretically demonstrated the framework's feasibility of finding best-matched ISA methods for distinct personality types, considering their linked learning style and social influencing vulnerabilities.

Research limitations/implications: The study provides two main theoretical contributions: 1) PLS framework: presenting the relationship of personality types with their linked learning style and their social influencing vulnerabilities; 2) Examples of matching distinct personality types with ISA methods, including suggestions for a theoretically best matched ISA method. Therefore, this study contributes to building a sound theoretical ground for tailoring ISA methods for people with different personality types. In addition, the derived keywords are helpful to capture a good understanding of the different dimensions of the selected theories. Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to use ISA methods for people with different personality types in organizations.

Practical implications: Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to employ ISA methods for people with different personality types in organizations.

Originality/value: To the best of the authors' knowledge, this study is the first of its kind in developing and testing a framework for matching distinct personality types with information security awareness methods.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
Keywords
Information security awareness methods, Personality types, Learning styles, Social influencing vulnerabilities, Information security awareness (ISA)
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-122463 (URN)10.1108/ICS-03-2025-0091 (DOI)001513863400001 ()
Available from: 2025-07-25 Created: 2025-07-25 Last updated: 2025-07-25Bibliographically approved
Rostami, E., Karlsson, F., Kolkowska, E. & Gao, S. (2025). Towards software for tailoring information security policies to organisations’ different target groups. Computers & Security, 159, Article ID 104687.
Open this publication in new window or tab >>Towards software for tailoring information security policies to organisations’ different target groups
2025 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 159, article id 104687Article in journal (Refereed) Published
Abstract [en]

Designing accessible and relevant information security policies (ISPs) that support employees is crucial for improving organisations' information security. When employees are required to deal with cumbersome ISPs, there is a risk of reduced motivation towards information security, and employees' not following the rules in ISPs has been reported as a persistent issue. Existing research has suggested adopting a tailored approach to ISPs in order to enhance their relevance to employees. Tailoring is difficult and time consuming and information security managers lack information security management systems software (ISMSS) that can assist with this tailoring task. In this paper, we develop a design theory for ISMSS to support information security managers in tailoring ISPs to different employees. To achieve this, we employ design science research, drawing on prior studies concerning the tailoring of systems development methods. We evaluate the design theory through an expository instantiation, POLCO, and with information security managers, demonstrating both proof-of-concept and proof-of-value.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Tailored information security policy, Policy component, Software for tailoring policy, Design science research
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-124465 (URN)10.1016/j.cose.2025.104687 (DOI)001587718900001 ()
Projects
Computerized tool-support for designing modular information security policies
Funder
Swedish Civil Contingencies Agency
Note

This work was supported by the Swedish Research School of Management and IT (MIT) and the Swedish Civil Contingencies Agency (MSB).

Available from: 2025-10-17 Created: 2025-10-17 Last updated: 2025-10-17Bibliographically approved
Jashari, V., Björn, S., Kolkowska, E. & Gao, S. (2024). A Framework for Matching Distinct Personality Types with Information Security Awareness Methods. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II. Paper presented at 18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance (HAISA 2024), Skövde, Sweden, July 9-11, 2024 (pp. 88-100). Springer, 722
Open this publication in new window or tab >>A Framework for Matching Distinct Personality Types with Information Security Awareness Methods
2024 (English)In: Human Aspects of Information Security and Assurance: 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part II / [ed] Nathan Clarke; Steven Furnell, Springer, 2024, Vol. 722, p. 88-100Conference paper, Published paper (Refereed)
Abstract [en]

The objective of this study is to develop a framework to associate learning styles and social influencing vulnerabilities with different personality types in the context of tailoring Information Security Awareness (ISA) methods for people with different personality types. Directed content analysis is carried out to develop the framework. The analysis is conducted in the following two parts: a). Describe and identify keywords for the DISC (Dominance (D), Inducement (I), Submission (S) and Compliance (C)) personality types, Kolb’s learning styles and Cialdini’s social influencing principles; b). Identify the relationships between Personality types, Learning styles, and Social influencing vulnerabilities and create the PLS (i.e., Personality types, Learning styles, and Social influencing vulnerabilities) framework. As a result, four relationships are identified for each distinct personality type in the PLS framework. This study contributes to building a sound theoretical ground for tailoring ISA methods for people with different personality types . In addition, the derived keywords are helpful to capture a good understanding of the different dimensions of the selected theories. Furthermore, the developed PLS framework can be used as a base for managers to employ ISA methods for people with different personality types in organizations.

Place, publisher, year, edition, pages
Springer, 2024
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 722
Keywords
Information security awareness methods; Learning styles; Personality types; Social influencing vulnerabilities
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-118695 (URN)10.1007/978-3-031-72563-0_7 (DOI)001561043300007 ()2-s2.0-85211330730 (Scopus ID)9783031725623 (ISBN)9783031725630 (ISBN)
Conference
18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance (HAISA 2024), Skövde, Sweden, July 9-11, 2024
Available from: 2025-01-17 Created: 2025-01-17 Last updated: 2025-10-21Bibliographically approved
Gerdin, M., Kolkowska, E. & Grönlund, Å. (2024). What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. Information and Computer Security, 32(4), 459-476
Open this publication in new window or tab >>What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
2024 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 32, no 4, p. 459-476Article in journal (Refereed) Published
Abstract [en]

Purpose: Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents' interpretations of the operationalized variables). This study asks: How well do respondents' interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?

Design/methodology/approach: This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.

Findings: The authors found that respondents' interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items - referred to as property contextualization, extension, alteration and oscillation - each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.

Originality/value: The qualitative method used proved vital to better understand respondents' interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors' knowledge, this study is a first step toward understanding how precise and uniform definitions of variables' theoretical properties can be operationalized into effective measurement items.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2024
Keywords
Information security policy, Non-/compliance research, Validation of measurement instruments, Protection motivation theory, PMT, Theory of planned behavior, TPB
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-113439 (URN)10.1108/ICS-12-2023-0240 (DOI)001207334600001 ()2-s2.0-85191325704 (Scopus ID)
Available from: 2024-04-30 Created: 2024-04-30 Last updated: 2025-09-19Bibliographically approved
Kolkowska, E., Lagsten, J. & Andersson, A. (2023). Designing an infrastructure for sharing of data generated by welfare technologies. In: : . Paper presented at InfraHEALTH 2023, University of Siegen, Siegen, Germany, September 11-12, 2023.
Open this publication in new window or tab >>Designing an infrastructure for sharing of data generated by welfare technologies
2023 (English)Conference paper, Poster (with or without abstract) (Refereed)
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-109017 (URN)
Conference
InfraHEALTH 2023, University of Siegen, Siegen, Germany, September 11-12, 2023
Available from: 2023-10-17 Created: 2023-10-17 Last updated: 2025-09-25Bibliographically approved
Kolkowska, E., Soja, E. & Soja, P. (2023). Intergerenational tensions in ICT adoption for independent and healthy ageing: preliminary insights from a value-focused thinking study in Poland and Sweden. In: : . Paper presented at European Conference on Information Systems (ECIS 2023), Kristiansand, Norway, June 11-16, 2023.
Open this publication in new window or tab >>Intergerenational tensions in ICT adoption for independent and healthy ageing: preliminary insights from a value-focused thinking study in Poland and Sweden
2023 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Current literature highlights the importance of understanding intergenerational tensions that arise in the context of implementation of ICT for independent and healthy ageing. The current study aims to explore tensions between value-based objectives emphasized by seniors and younger adults in the context of ICT for independent and healthy ageing in Poland and Sweden. Value-based objectives were identified by applying the value-focused thinking approach. By comparing the identified objectives between young adults and seniors, we found several significant tensions, both in Poland and Sweden. In particular, we found that young adults might perceive seniors as a fragile and passive group, which clashes with how seniors perceive themselves. The analysis also revealed several areas of agreement, e.g. with Polish young and senior respondents unanimously emphasizing improvement of seniors’ health condition and ICT usefulness for families, and Swedes agreeing upon the importance of seniors’ autonomy, social contact, and equal access to digital solutions.

Keywords
Value-focused thinking, intergenerational tensions, ICT, independent and healthy ageing, Poland, Sweden
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-109013 (URN)
Conference
European Conference on Information Systems (ECIS 2023), Kristiansand, Norway, June 11-16, 2023
Available from: 2023-10-17 Created: 2023-10-17 Last updated: 2025-05-19Bibliographically approved
Soja, E., Soja, P. & Kolkowska, E. (2023). Investigating the Role of Gender in Active and Healthy Ageing Supported by ICT: Preliminary Insights from Polish and Swedish Older Adults. In: Annual Americas Conference on Information Systems (AMCIS 2023): Diving into Uncharted Waters. Paper presented at 29th Annual American Conference on Information Systems (AMCIS 2023), Panama City, Panama, August 10-12, 2023. Association for Information Systems (AIS)
Open this publication in new window or tab >>Investigating the Role of Gender in Active and Healthy Ageing Supported by ICT: Preliminary Insights from Polish and Swedish Older Adults
2023 (English)In: Annual Americas Conference on Information Systems (AMCIS 2023): Diving into Uncharted Waters, Association for Information Systems (AIS) , 2023Conference paper, Published paper (Refereed)
Abstract [en]

The current paper aims to investigate the role of gender in the adoption and use of ICT for an active and healthy ageing in the context of diverse socioeconomic considerations. The investigation has been conducted among seniors in Poland and Sweden, countries experiencing significant socioeconomic differences. The adopted research approach is based on Value-Focused Thinking (VFT). The preliminary findings suggest that the most significant gender-related differences in the perception of values refer to minimizing loneliness and maximizing ICT solution alignment with seniors’ needs. The proposed avenues for future research include an investigation into the role of technology ambassadors played by women.

Place, publisher, year, edition, pages
Association for Information Systems (AIS), 2023
Keywords
ageing, elderly, gender, ICT, Poland, Sweden, Value-focused thinking
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-109014 (URN)2-s2.0-85192911021 (Scopus ID)9781713893592 (ISBN)
Conference
29th Annual American Conference on Information Systems (AMCIS 2023), Panama City, Panama, August 10-12, 2023
Available from: 2023-10-17 Created: 2023-10-17 Last updated: 2025-05-19Bibliographically approved
Soja, E., Soja, P. & Kolkowska, E. (2023). Understanding Drivers for Acceptance and Use of Digital Care Services for Seniors: Learning from a Value-Focused Thinking Study in Poland and Sweden. In: Tung X. Bui (Ed.), Proceedings of the 56th Annual Hawaii International Conference on System Sciences: . Paper presented at 56th Annual Hawaii International Conference on System Sciences (HICSS 2023), Maui, Hawaii, USA, January 3-6, 2023 (pp. 991-1000). University of Hawai'i at Manoa
Open this publication in new window or tab >>Understanding Drivers for Acceptance and Use of Digital Care Services for Seniors: Learning from a Value-Focused Thinking Study in Poland and Sweden
2023 (English)In: Proceedings of the 56th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui, University of Hawai'i at Manoa , 2023, p. 991-1000Conference paper, Published paper (Refereed)
Abstract [en]

In order to maximize sustainability of digital services for seniors, the opinions of the main stakeholders and the broader context of independent and healthy ageing should be taken into consideration. Therefore, we applied a Value-focused thinking (VFT) approach to understand values held by seniors in the context of implementation of ICT for independent and healthy ageing. To this end, we conducted interviews with seniors in Poland and Sweden, which are countries with very diverse approaches to digital care services (DCS). Based on the interviews with seniors, we discovered 7 common fundamental objectives and 11 means objectives supporting the fundamental goals with varying understanding depending on a country, which allowed us to discuss the drivers for acceptance and use of DCS for seniors.

Place, publisher, year, edition, pages
University of Hawai'i at Manoa, 2023
Series
Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS), ISSN 1530-1605, E-ISSN 2572-6862
Keywords
Digital Mobile Services for Everyday Life, digital care service, elderly, Poland, Sweden, value-focused thinking
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-109015 (URN)2-s2.0-85161648745 (Scopus ID)9780998133164 (ISBN)
Conference
56th Annual Hawaii International Conference on System Sciences (HICSS 2023), Maui, Hawaii, USA, January 3-6, 2023
Note

The publication has been co-financed by the subsidy granted to the Cracow University of Economics - Project no. 060/ZZI/2022/POT.

Available from: 2023-10-17 Created: 2023-10-17 Last updated: 2025-05-19Bibliographically approved
Karlsson, F., Hedström, K. & Kolkowska, E. (2023). Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management. In: Leslie F. Sikos; Paul Haskell-Dowland (Ed.), Cybersecruity Teaching in Higher Education: (pp. 37-57). Cham: Springer
Open this publication in new window or tab >>Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management
2023 (English)In: Cybersecruity Teaching in Higher Education / [ed] Leslie F. Sikos; Paul Haskell-Dowland, Cham: Springer , 2023, p. 37-57Chapter in book (Refereed)
Abstract [en]

In today's complex environments, safeguarding organizations’ information assets is difficult and requires more than solely technical skills. In order to meet the need for future information security specialists, in 2018 the Informatics department at Örebro University launched an International Master’s Program in Information Security Management. The program content was developed in collaboration with industry and governmental partners. One of the challenges with this co-design effort was to elicit the requirements of the courses in the program from a diverse set of actors. Also, an educational program has a finite number of teaching hours, which means that a limited number of requirements, or topics on information security, can be covered. Consequently, there was a need to prioritize between the elicited requirements and make the partners prioritize. To both these ends, we employed the Delphi method. In this chapter, we give an account of the process of eliciting and prioritizing course requirements using an adapted Delphi method. The adopted process included three iterations, for which workshops and surveys were used to collect the necessary data. The implementation has been far from instrumental, and in this chapter we discuss the details related to design choices made and the rationale behind these choices.

Place, publisher, year, edition, pages
Cham: Springer, 2023
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-109018 (URN)10.1007/978-3-031-24216-8_2 (DOI)9783031242151 (ISBN)9783031242168 (ISBN)
Funder
Knowledge Foundation
Available from: 2023-10-17 Created: 2023-10-17 Last updated: 2025-05-19Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-5270-1517

Search in DiVA

Show all publications