To Örebro University

oru.seÖrebro University Publications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 115) Show all publications
Dinić, B. M., Bodro, B., Jovanovic, T., Hinić, D., Puharic, Z., Puharic, F., . . . Pyzalski, J. (2025). A cross-national perspective of prejudice-based cyberbullying and cybervictimisation. In: Hildegunn Fandrem; James O’Higgins Norman (Ed.), International Perspectives on Migration, Bullying, and School: Implications for Schools, Refugees, and Migrants (pp. 148-165). Routledge
Open this publication in new window or tab >>A cross-national perspective of prejudice-based cyberbullying and cybervictimisation
Show others...
2025 (English)In: International Perspectives on Migration, Bullying, and School: Implications for Schools, Refugees, and Migrants / [ed] Hildegunn Fandrem; James O’Higgins Norman, Routledge, 2025, p. 148-165Chapter in book (Refereed)
Abstract [en]

Although much literature has focused on prejudice-based traditional bullying, there are not a lot of studies about prejudice-based cyberbullying. This kind of cyberbullying reflects any form of cyberbullying based on a group affiliation or identity characteristics of the victim, often including historically marginalised and other "protected characteristics" (race, religion, disability, etc.). In this chapter, we focus on seven characteristics that were highlighted in previous research - family origin, skin colour, religion/belief, nationality/ethnicity, disability, poverty, and sexual orientation. We begin by reviewing research into prejudice-based cyberbullying and emphasise the main gaps in the existing knowledge. We then present our empirical findings based on an online study that contributes to filling these gaps: (a) the prevalence of prejudice-based cyberbullying and cybervictimisation at the cross-national level, across 17 countries and including culturally diverse samples (N = 5,215 high school students); and (b) the relationships of belonging to some of the marginalised groups (based on sex, nationality/ethnicity, religion, asylum status, and disability) with both prejudice-based cyberbullying and cybervictimisation. Finally, we refer to some suggestions for future research and conclude with the implications for prevention programmes based on the obtained results.

Place, publisher, year, edition, pages
Routledge, 2025
Series
Routledge Research in Crises Education
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-117823 (URN)10.4324/9781003439202-9 (DOI)2-s2.0-85209852631 (Scopus ID)9781003439202 (ISBN)9781032571331 (ISBN)9781032574035 (ISBN)
Available from: 2024-12-16 Created: 2024-12-16 Last updated: 2025-01-07Bibliographically approved
Havstorm, T. E., Karlsson, F. & Gao, S. (2025). Agile Software Development Method Cargo Cult - Devising an Analytical Tool. Information and Software Technology, 187, 1-13, Article ID 107851.
Open this publication in new window or tab >>Agile Software Development Method Cargo Cult - Devising an Analytical Tool
2025 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 187, p. 1-13, article id 107851Article in journal (Refereed) Published
Abstract [en]

Context: Despite the widespread adoption of agile software development methods (ASDMs) today, many organizations struggle with effective implementation. One reason for this is that some organizations claim to use an ASDM without fully understanding its core principles, or they adhere to old practices while professing to follow a contemporary software development method. This phenomenon is sometimes referred to by practitioners as “cargo cult” (CC) behavior. However, simply labeling something as CC lacks analytical depth.

Objective: This paper aims to conceptualize and validate an analytical tool for diagnosing CC and non-CC behavior in software development teams’ use of ASDMs.

Method: This study uses a longitudinal ethnographic approach to conceptualize and validate the analytical tool by analyzing four agile practices used by a global industrial manufacturing company.

Results: The analytical tool features eight stereotypes—three representing non-CC behaviors and five representing CC behaviors—designed to aid in the analysis of ASDM usage. The tool draws on Social Action Theory and Work Motivation Theory to capture and interpret the CC phenomenon in ASDM use. Using the stereotypes, 36 actions were categorized as CC behavior deviating from documented ASDM practices, and 23 actions as non-CC behavior because they aligned with the documented ASDM and reflected agile goals and values. The tool thus can help both researchers and practitioners gain a deeper understanding of ASDM use in organizations.

Conclusion: This study advances understanding of ASDM use by moving beyond the simplistic use of the term “cargo cult”. The developed tool enables structured identification and classification of CC behaviors. The stereotypes provide a way of classifying recurring software development actions against the intended ASDM, allowing the identification of specific types of CC behaviors. The analytical tool enables managers to gain deeper insights into the underlying reasons for deviations, thereby supporting more grounded and effective agile practices within organizations.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Agile, Cargo cult, Deviations, Software development, Social action theory, Work motivation theory, Empirical study
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-122454 (URN)10.1016/j.infsof.2025.107851 (DOI)001543133000002 ()
Available from: 2025-08-10 Created: 2025-08-10 Last updated: 2025-08-14Bibliographically approved
Rostami, E., Hanif, M., Karlsson, F. & Gao, S. (2025). Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations. Procedia Computer Science, 254, 30-38
Open this publication in new window or tab >>Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations
2025 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 254, p. 30-38Article in journal (Refereed) Published
Abstract [en]

In today's digital age, protecting information assets is critical to maintain organizations’ digital sovereignty. Yet existing research offers limited guidance on creating effective, actionable advice in information security policies (ISPs) that instructs employees on how to carry out their tasks and contribute to protecting information assets. Addressing this gap, the aim of this paper is to propose a definition of actionable advice. A clear definition can aid in designing ISPs and enhance communication with employees, guiding them in the expected behavior to protect the organization’s information assets. The research question guiding this work is: how can actionable advice be defined in information security policies? To achieve this aim, the definition is informed by a literature review and analysis of 47 ISPs from public agencies in Sweden. The proposed definition of actionable advice is: a demarcated part of an ISP, that instructs someone on a task to execute or not to execute regarding information security, and, in case of execution, how to carry out the task. The definition of actionable advice provides researchers with a starting point to understand this term, helping advancing future studies on ISPs. This work also has practical implications for ISP developers, offering guidance on writing pieces of actionable advice that are concrete and directly applicable in employees' daily tasks to protect their organizations.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Actionable advice, information security policy, operational policy, compliance, cyber security policy
National Category
Security, Privacy and Cryptography
Identifiers
urn:nbn:se:oru:diva-122091 (URN)10.1016/j.procs.2025.02.061 (DOI)
Funder
Swedish Civil Contingencies Agency
Available from: 2025-06-29 Created: 2025-06-29 Last updated: 2025-07-23Bibliographically approved
Björn, S., Jashari, V., Kolkowska, E. & Gao, S. (2025). Developing and testing a framework for matching distinct personality types with information security awareness methods. Information and Computer Security
Open this publication in new window or tab >>Developing and testing a framework for matching distinct personality types with information security awareness methods
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961Article in journal (Refereed) Epub ahead of print
Abstract [en]

Purpose: This study aims to develop and test a framework to associate learning styles and social influencing vulnerabilities with different personality types in the context of tailoring information security awareness (ISA) methods for people with different personality types.

Design/methodology/approach: The framework was developed following directed content analysis and applied to match distinct personality types with ISA methods identified through a systematic literature search. The directed content analysis was conducted in two parts: a) Describe and identify keywords for the DISC (dominance [D], inducement [I], submission [S] and compliance [C]) personality types, Kolb's learning styles and Cialdini's social influencing principles; b) Identify the relationships between personality types, learning styles and social influencing vulnerabilities and create the PLS (i.e. personality types, learning styles and social influencing vulnerabilities) framework. As a result, four relationships are identified for each distinct personality type in the PLS framework.

Findings: The study has theoretically demonstrated the framework's feasibility of finding best-matched ISA methods for distinct personality types, considering their linked learning style and social influencing vulnerabilities.

Research limitations/implications: The study provides two main theoretical contributions: 1) PLS framework: presenting the relationship of personality types with their linked learning style and their social influencing vulnerabilities; 2) Examples of matching distinct personality types with ISA methods, including suggestions for a theoretically best matched ISA method. Therefore, this study contributes to building a sound theoretical ground for tailoring ISA methods for people with different personality types. In addition, the derived keywords are helpful to capture a good understanding of the different dimensions of the selected theories. Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to use ISA methods for people with different personality types in organizations.

Practical implications: Furthermore, following the examples provided in this paper, the developed PLS framework can be used as a base for managers to employ ISA methods for people with different personality types in organizations.

Originality/value: To the best of the authors' knowledge, this study is the first of its kind in developing and testing a framework for matching distinct personality types with information security awareness methods.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
Keywords
Information security awareness methods, Personality types, Learning styles, Social influencing vulnerabilities, Information security awareness (ISA)
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-122463 (URN)10.1108/ICS-03-2025-0091 (DOI)001513863400001 ()
Available from: 2025-07-25 Created: 2025-07-25 Last updated: 2025-07-25Bibliographically approved
Han, H., Sammour, A., Gao, S. & Yamoah, F. A. A. (2025). Digital transformation impacts organisational change in the role of accountants and auditors: an exploratory study. Journal of Organizational Change Management
Open this publication in new window or tab >>Digital transformation impacts organisational change in the role of accountants and auditors: an exploratory study
2025 (English)In: Journal of Organizational Change Management, ISSN 0953-4814, E-ISSN 1758-7816Article in journal (Refereed) Epub ahead of print
Abstract [en]

Purpose: This study explores the impact of artificial intelligence (AI) on accounting and auditing professionals as businesses navigate digital transformation.

Design/methodology/approach: A qualitative research approach was adopted, analysing data from 10 podcasts and 17 semi-structured interviews using NVivo software. Key themes were identified to provide insights into AI's influence on organisational change in accounting practices.

Findings: The research constructs a thematic framework comprising three aggregate dimensions: triggers of digital transformation in accounting practices, opportunities and challenges in transforming accounting practices, and changing routines for accounting professionals. The results are further interpreted using Lewin's 3-Step Model of Organisational Change to comprehend the impact of AI and understand how accountants can adapt to these technological changes to sustain their practices.

Originality/value: This study provides a good understanding of the social shifts towards utilising AI in increasingly automating accounting tasks, reshaping professional roles and creating both opportunities and challenges. AI enhances efficiency in bookkeeping, reporting, auditing and risk analysis but also raises concerns about data integrity and trust. Blockchain technology emerges as a potential solution, enhancing transparency, security and reliability in AI-enabled accounting systems. To remain relevant, accounting professionals must bridge digital skill gaps and adopt interdisciplinary collaboration. As AI continues to evolve, blockchain integration could reinforce trust and accountability, shaping the future of accounting and auditing.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
Keywords
Artificial intelligence, Accounting professionals, Digital transformation, Blockchain technology, Future work
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-124097 (URN)10.1108/JOCM-03-2025-0288 (DOI)001576354400001 ()
Available from: 2025-10-02 Created: 2025-10-02 Last updated: 2025-10-02Bibliographically approved
Karlsson, F., Chatzipetrou, P., Gao, S. & Havstorm, T. E. (2025). Exploring Classification Consistency of Natural Language Requirements Using GPT-4o. In: Efi Papatheocharous; Siamak Farshidi; Slinger Jansen; Sonja Hyrynsalmi (Ed.), Software Business: 15th International Conference, ICSOB 2024, Utrecht, The Netherlands, November 18–20, 2024, Proceedings. Paper presented at 15th International Conference (ICSOB 2024), Utrecht, The Netherlands, November 18–20, 2024 (pp. 44-50). Springer, 539
Open this publication in new window or tab >>Exploring Classification Consistency of Natural Language Requirements Using GPT-4o
2025 (English)In: Software Business: 15th International Conference, ICSOB 2024, Utrecht, The Netherlands, November 18–20, 2024, Proceedings / [ed] Efi Papatheocharous; Siamak Farshidi; Slinger Jansen; Sonja Hyrynsalmi, Springer, 2025, Vol. 539, p. 44-50Conference paper, Published paper (Refereed)
Abstract [en]

Classifying natural language requirements (NLRs) is challenging, especially with large volumes. Research shows that Large Language Models can assist by categorizing NLRs into functional requirements (FR) and non-functional requirements (NFRs). However, Generative Pretrained Transformer (GPT) models are not typically favored for this task due to concerns about consistency. This paper investigates the consistency when a GPT model classifies NLRs into FRs and NFRs using a zero-shot learning approach. Results show that ChatGPT-4o performs better for FRs, a temperature parameter set to 1 yields the highest consistency, while NFR classification improves with higher temperatures.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356
Keywords
Requirements, Classification, Large Language Model, Zero-Shot Learning
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-121182 (URN)10.1007/978-3-031-85849-9_4 (DOI)001476891400004 ()2-s2.0-105001270180 (Scopus ID)9783031858482 (ISBN)9783031858499 (ISBN)
Conference
15th International Conference (ICSOB 2024), Utrecht, The Netherlands, November 18–20, 2024
Available from: 2025-05-21 Created: 2025-05-21 Last updated: 2025-05-21Bibliographically approved
Karlsson, F. & Gao, S. (2025). Guest editorial: New frontiers in information security management. Information and Computer Security, 33(1), 1-4
Open this publication in new window or tab >>Guest editorial: New frontiers in information security management
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, no 1, p. 1-4Article in journal, Editorial material (Other academic) Published
Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-118853 (URN)10.1108/ICS-03-2025-265 (DOI)001398399300002 ()2-s2.0-85216242094 (Scopus ID)
Available from: 2025-01-28 Created: 2025-01-28 Last updated: 2025-02-11Bibliographically approved
Karlsson, F. & Gao, S. (2025). Guidelines for Longitudinal Information Security Policy Compliance Research. In: AMCIS 2025 Proceedings: . Paper presented at Americas Conference on Information Systems (AMCIS 2025), Montreal, Canada, August 14-16, 2025. Association for Information Systems, Article ID 1585.
Open this publication in new window or tab >>Guidelines for Longitudinal Information Security Policy Compliance Research
2025 (English)In: AMCIS 2025 Proceedings, Association for Information Systems, 2025, article id 1585Conference paper, Published paper (Refereed)
Abstract [en]

Over the years, numerous studies on employee compliance with information security policies (ISPs) have been conducted, contributing valuable insights to enhance information security in organisations. However, our literature review reveals that few ISP compliance studies adopt a longitudinal approach. It is well known that cross-sectional research often provides limited insight into how constructs such as ISP compliance evolve over time. While researchers have called for more longitudinal ISP compliance studies, there is little guidance on how to conduct them. To address this gap, we propose a set of seven guidelines to support both quantitative and qualitative longitudinal ISP compliance research.

Place, publisher, year, edition, pages
Association for Information Systems, 2025
Series
Proceedings of the Americas Conference on Information Systems, ISSN 3066-8743, E-ISSN 3066-876X
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-124466 (URN)
Conference
Americas Conference on Information Systems (AMCIS 2025), Montreal, Canada, August 14-16, 2025
Available from: 2025-10-17 Created: 2025-10-17 Last updated: 2025-10-17Bibliographically approved
Karlsson, F., Chatzipetrou, P., Gao, S. & Havstorm, T. E. (2025). How Reliable Are GPT-4o and LLAMA3.3-70B in Classifying Natural Language Requirements?. IEEE Software
Open this publication in new window or tab >>How Reliable Are GPT-4o and LLAMA3.3-70B in Classifying Natural Language Requirements?
2025 (English)In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194Article in journal (Refereed) Published
Abstract [en]

Classifying natural language requirements (NLRs) plays a crucial role in software engineering, helping us distinguish between functional and non-functional requirements. While large language models offer automation potential, we should address concerns about their consistency, meaning their ability to produce the same results over time. In this work, we share experiences from experimenting with how well GPT-4o and LLAMA3.3-70B classify NLRs using a zero-shot learning approach. Moreover, we explore how the temperature parameter influences classification performance and consistency for these models. Our results show that large language models like GPT-4o and LLAMA3.3- 70B can support automated NLRs classification. GPT-4o performs well in identifying functional requirements, with the highest consistency occurring at a temperature setting of one. Additionally, non-functional requirements classification improves at higher temperatures, indicating a trade-off between determinism and adaptability. LLAMA3.3-70B is more consistent than GPT-4o, and its classification accuracy varies less depending on temperature adjustments.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Software, Predictive models, Accuracy, Transformers, Training, Software engineering, Natural languages, Temperature measurement, Temperature, Software reliability
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-122267 (URN)10.1109/MS.2025.3572561 (DOI)
Available from: 2025-07-03 Created: 2025-07-03 Last updated: 2025-07-03Bibliographically approved
Karlsson, F., Gao, S., Krogstie, J. & Aro-Sati, L. (2025). Towards a Speech Act-Based Model to Enable Future Quality Improvements of Information Security Policies Using Large Language Models. In: Rébecca Deneckère; Marite Kirikova; Janis Grabis (Ed.), Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings. Paper presented at 24th International Conference on Perspectives in Business Informatics Research (BIR 2025), Riga, Latvia, September 17–19, 2025 (pp. 349-364). Springer, 562
Open this publication in new window or tab >>Towards a Speech Act-Based Model to Enable Future Quality Improvements of Information Security Policies Using Large Language Models
2025 (English)In: Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings / [ed] Rébecca Deneckère; Marite Kirikova; Janis Grabis, Springer, 2025, Vol. 562, p. 349-364Conference paper, Published paper (Refereed)
Abstract [en]

Employees compliance with information security policies (ISPs) depends on communicating clear and comprehensible content. However, existing research has shown that many ISPs are of poor communicative quality. Large language models (LLMs) could enhance ISPs if finetuned on high-quality data, but to do such fine-tuning requires a conceptual model for classifying the data and evaluating the resulting text. Therefore, as a step in this direction, the aim of this paper is to develop a conceptual model of ISPs using speech act theory as a theoretical lens. We use conceptual modelling and document analysis to develop the model and use selected parts from the SEQUAL framework to evaluate the model. Analysing 600 ISP statements from ten British National Health Service ISPs, we present a class diagram containing 19 classes, six of which address ISP statement quality as speech acts. The SEQUAL evaluation points to potential areas for improving the model’s semantic, empirical, physical and deontic qualities before using it to fine-tune LLMs to improve ISP content.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356 ; Vol. 562
Keywords
Information Security Policy, Speech Act, Large Language Model
National Category
Information Systems
Identifiers
urn:nbn:se:oru:diva-124321 (URN)10.1007/978-3-032-04375-7_22 (DOI)9783032043740 (ISBN)9783032043757 (ISBN)
Conference
24th International Conference on Perspectives in Business Informatics Research (BIR 2025), Riga, Latvia, September 17–19, 2025
Available from: 2025-10-09 Created: 2025-10-09 Last updated: 2025-10-13Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3722-6797

Search in DiVA

Show all publications