To Örebro University

oru.seÖrebro University Publications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 115) Show all publications
Havstorm, T. E., Karlsson, F. & Gao, S. (2025). Agile Software Development Method Cargo Cult - Devising an Analytical Tool. Information and Software Technology, 187, 1-13, Article ID 107851.
Open this publication in new window or tab >>Agile Software Development Method Cargo Cult - Devising an Analytical Tool
2025 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 187, p. 1-13, article id 107851Article in journal (Refereed) Published
Abstract [en]

Context: Despite the widespread adoption of agile software development methods (ASDMs) today, many organizations struggle with effective implementation. One reason for this is that some organizations claim to use an ASDM without fully understanding its core principles, or they adhere to old practices while professing to follow a contemporary software development method. This phenomenon is sometimes referred to by practitioners as “cargo cult” (CC) behavior. However, simply labeling something as CC lacks analytical depth.

Objective: This paper aims to conceptualize and validate an analytical tool for diagnosing CC and non-CC behavior in software development teams’ use of ASDMs.

Method: This study uses a longitudinal ethnographic approach to conceptualize and validate the analytical tool by analyzing four agile practices used by a global industrial manufacturing company.

Results: The analytical tool features eight stereotypes—three representing non-CC behaviors and five representing CC behaviors—designed to aid in the analysis of ASDM usage. The tool draws on Social Action Theory and Work Motivation Theory to capture and interpret the CC phenomenon in ASDM use. Using the stereotypes, 36 actions were categorized as CC behavior deviating from documented ASDM practices, and 23 actions as non-CC behavior because they aligned with the documented ASDM and reflected agile goals and values. The tool thus can help both researchers and practitioners gain a deeper understanding of ASDM use in organizations.

Conclusion: This study advances understanding of ASDM use by moving beyond the simplistic use of the term “cargo cult”. The developed tool enables structured identification and classification of CC behaviors. The stereotypes provide a way of classifying recurring software development actions against the intended ASDM, allowing the identification of specific types of CC behaviors. The analytical tool enables managers to gain deeper insights into the underlying reasons for deviations, thereby supporting more grounded and effective agile practices within organizations.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Agile, Cargo cult, Deviations, Software development, Social action theory, Work motivation theory, Empirical study
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-122454 (URN)10.1016/j.infsof.2025.107851 (DOI)001543133000002 ()
Available from: 2025-08-10 Created: 2025-08-10 Last updated: 2025-08-14Bibliographically approved
Rostami, E., Hanif, M., Karlsson, F. & Gao, S. (2025). Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations. Procedia Computer Science, 254, 30-38
Open this publication in new window or tab >>Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations
2025 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 254, p. 30-38Article in journal (Refereed) Published
Abstract [en]

In today's digital age, protecting information assets is critical to maintain organizations’ digital sovereignty. Yet existing research offers limited guidance on creating effective, actionable advice in information security policies (ISPs) that instructs employees on how to carry out their tasks and contribute to protecting information assets. Addressing this gap, the aim of this paper is to propose a definition of actionable advice. A clear definition can aid in designing ISPs and enhance communication with employees, guiding them in the expected behavior to protect the organization’s information assets. The research question guiding this work is: how can actionable advice be defined in information security policies? To achieve this aim, the definition is informed by a literature review and analysis of 47 ISPs from public agencies in Sweden. The proposed definition of actionable advice is: a demarcated part of an ISP, that instructs someone on a task to execute or not to execute regarding information security, and, in case of execution, how to carry out the task. The definition of actionable advice provides researchers with a starting point to understand this term, helping advancing future studies on ISPs. This work also has practical implications for ISP developers, offering guidance on writing pieces of actionable advice that are concrete and directly applicable in employees' daily tasks to protect their organizations.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Actionable advice, information security policy, operational policy, compliance, cyber security policy
National Category
Security, Privacy and Cryptography
Identifiers
urn:nbn:se:oru:diva-122091 (URN)10.1016/j.procs.2025.02.061 (DOI)
Funder
Swedish Civil Contingencies Agency
Available from: 2025-06-29 Created: 2025-06-29 Last updated: 2025-07-23Bibliographically approved
Karlsson, F., Chatzipetrou, P., Gao, S. & Havstorm, T. E. (2025). Exploring Classification Consistency of Natural Language Requirements Using GPT-4o. In: Efi Papatheocharous; Siamak Farshidi; Slinger Jansen; Sonja Hyrynsalmi (Ed.), Software Business: 15th International Conference, ICSOB 2024, Utrecht, The Netherlands, November 18–20, 2024, Proceedings. Paper presented at 15th International Conference (ICSOB 2024), Utrecht, The Netherlands, November 18–20, 2024 (pp. 44-50). Springer, 539
Open this publication in new window or tab >>Exploring Classification Consistency of Natural Language Requirements Using GPT-4o
2025 (English)In: Software Business: 15th International Conference, ICSOB 2024, Utrecht, The Netherlands, November 18–20, 2024, Proceedings / [ed] Efi Papatheocharous; Siamak Farshidi; Slinger Jansen; Sonja Hyrynsalmi, Springer, 2025, Vol. 539, p. 44-50Conference paper, Published paper (Refereed)
Abstract [en]

Classifying natural language requirements (NLRs) is challenging, especially with large volumes. Research shows that Large Language Models can assist by categorizing NLRs into functional requirements (FR) and non-functional requirements (NFRs). However, Generative Pretrained Transformer (GPT) models are not typically favored for this task due to concerns about consistency. This paper investigates the consistency when a GPT model classifies NLRs into FRs and NFRs using a zero-shot learning approach. Results show that ChatGPT-4o performs better for FRs, a temperature parameter set to 1 yields the highest consistency, while NFR classification improves with higher temperatures.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356
Keywords
Requirements, Classification, Large Language Model, Zero-Shot Learning
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-121182 (URN)10.1007/978-3-031-85849-9_4 (DOI)001476891400004 ()2-s2.0-105001270180 (Scopus ID)9783031858482 (ISBN)9783031858499 (ISBN)
Conference
15th International Conference (ICSOB 2024), Utrecht, The Netherlands, November 18–20, 2024
Available from: 2025-05-21 Created: 2025-05-21 Last updated: 2025-05-21Bibliographically approved
Karlsson, F. & Gao, S. (2025). Guest editorial: New frontiers in information security management. Information and Computer Security, 33(1), 1-4
Open this publication in new window or tab >>Guest editorial: New frontiers in information security management
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, no 1, p. 1-4Article in journal, Editorial material (Other academic) Published
Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-118853 (URN)10.1108/ICS-03-2025-265 (DOI)001398399300002 ()2-s2.0-85216242094 (Scopus ID)
Available from: 2025-01-28 Created: 2025-01-28 Last updated: 2025-02-11Bibliographically approved
Karlsson, F. & Gao, S. (2025). Guidelines for Longitudinal Information Security Policy Compliance Research. In: AMCIS 2025 Proceedings: . Paper presented at Americas Conference on Information Systems (AMCIS 2025), Montreal, Canada, August 14-16, 2025. Association for Information Systems, Article ID 1585.
Open this publication in new window or tab >>Guidelines for Longitudinal Information Security Policy Compliance Research
2025 (English)In: AMCIS 2025 Proceedings, Association for Information Systems, 2025, article id 1585Conference paper, Published paper (Refereed)
Abstract [en]

Over the years, numerous studies on employee compliance with information security policies (ISPs) have been conducted, contributing valuable insights to enhance information security in organisations. However, our literature review reveals that few ISP compliance studies adopt a longitudinal approach. It is well known that cross-sectional research often provides limited insight into how constructs such as ISP compliance evolve over time. While researchers have called for more longitudinal ISP compliance studies, there is little guidance on how to conduct them. To address this gap, we propose a set of seven guidelines to support both quantitative and qualitative longitudinal ISP compliance research.

Place, publisher, year, edition, pages
Association for Information Systems, 2025
Series
Proceedings of the Americas Conference on Information Systems, ISSN 3066-8743, E-ISSN 3066-876X
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-124466 (URN)
Conference
Americas Conference on Information Systems (AMCIS 2025), Montreal, Canada, August 14-16, 2025
Available from: 2025-10-17 Created: 2025-10-17 Last updated: 2025-10-17Bibliographically approved
Karlsson, F., Chatzipetrou, P., Gao, S. & Havstorm, T. E. (2025). How Reliable Are GPT-4o and LLAMA3.3-70B in Classifying Natural Language Requirements? The Impact of the Temperature Setting. IEEE Software, 42(6), 97-104
Open this publication in new window or tab >>How Reliable Are GPT-4o and LLAMA3.3-70B in Classifying Natural Language Requirements? The Impact of the Temperature Setting
2025 (English)In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 42, no 6, p. 97-104Article in journal (Refereed) Published
Abstract [en]

Classifying natural language requirements (NLRs) plays a crucial role in software engineering, helping us distinguish between functional and non-functional requirements. While large language models offer automation potential, we should address concerns about their consistency, meaning their ability to produce the same results over time. In this work, we share experiences from experimenting with how well GPT-4o and LLAMA3.3-70B classify NLRs using a zero-shot learning approach. Moreover, we explore how the temperature parameter influences classification performance and consistency for these models. Our results show that large language models like GPT-4o and LLAMA3.3- 70B can support automated NLRs classification. GPT-4o performs well in identifying functional requirements, with the highest consistency occurring at a temperature setting of one. Additionally, non-functional requirements classification improves at higher temperatures, indicating a trade-off between determinism and adaptability. LLAMA3.3-70B is more consistent than GPT-4o, and its classification accuracy varies less depending on temperature adjustments.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Software engineering, Predictive models, Accuracy, Transformers, Training, Natural languages, Temperature measurement, Software reliability, Natural language processing
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-122267 (URN)10.1109/MS.2025.3572561 (DOI)001600046500002 ()
Available from: 2025-07-03 Created: 2025-07-03 Last updated: 2025-11-12Bibliographically approved
Karlsson, F., Gao, S., Krogstie, J. & Aro-Sati, L. (2025). Towards a Speech Act-Based Model to Enable Future Quality Improvements of Information Security Policies Using Large Language Models. In: Rébecca Deneckère; Marite Kirikova; Janis Grabis (Ed.), Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings. Paper presented at 24th International Conference on Perspectives in Business Informatics Research (BIR 2025), Riga, Latvia, September 17–19, 2025 (pp. 349-364). Springer, 562
Open this publication in new window or tab >>Towards a Speech Act-Based Model to Enable Future Quality Improvements of Information Security Policies Using Large Language Models
2025 (English)In: Perspectives in Business Informatics Research: 24th International Conference, BIR 2025, Riga, Latvia, September 17–19, 2025, Proceedings / [ed] Rébecca Deneckère; Marite Kirikova; Janis Grabis, Springer, 2025, Vol. 562, p. 349-364Conference paper, Published paper (Refereed)
Abstract [en]

Employees compliance with information security policies (ISPs) depends on communicating clear and comprehensible content. However, existing research has shown that many ISPs are of poor communicative quality. Large language models (LLMs) could enhance ISPs if finetuned on high-quality data, but to do such fine-tuning requires a conceptual model for classifying the data and evaluating the resulting text. Therefore, as a step in this direction, the aim of this paper is to develop a conceptual model of ISPs using speech act theory as a theoretical lens. We use conceptual modelling and document analysis to develop the model and use selected parts from the SEQUAL framework to evaluate the model. Analysing 600 ISP statements from ten British National Health Service ISPs, we present a class diagram containing 19 classes, six of which address ISP statement quality as speech acts. The SEQUAL evaluation points to potential areas for improving the model’s semantic, empirical, physical and deontic qualities before using it to fine-tune LLMs to improve ISP content.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Business Information Processing, ISSN 1865-1348, E-ISSN 1865-1356 ; Vol. 562
Keywords
Information Security Policy, Speech Act, Large Language Model
National Category
Information Systems
Identifiers
urn:nbn:se:oru:diva-124321 (URN)10.1007/978-3-032-04375-7_22 (DOI)9783032043740 (ISBN)9783032043757 (ISBN)
Conference
24th International Conference on Perspectives in Business Informatics Research (BIR 2025), Riga, Latvia, September 17–19, 2025
Available from: 2025-10-09 Created: 2025-10-09 Last updated: 2025-10-13Bibliographically approved
Rostami, E., Karlsson, F., Kolkowska, E. & Gao, S. (2025). Towards software for tailoring information security policies to organisations’ different target groups. Computers & Security, 159, Article ID 104687.
Open this publication in new window or tab >>Towards software for tailoring information security policies to organisations’ different target groups
2025 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 159, article id 104687Article in journal (Refereed) Published
Abstract [en]

Designing accessible and relevant information security policies (ISPs) that support employees is crucial for improving organisations' information security. When employees are required to deal with cumbersome ISPs, there is a risk of reduced motivation towards information security, and employees' not following the rules in ISPs has been reported as a persistent issue. Existing research has suggested adopting a tailored approach to ISPs in order to enhance their relevance to employees. Tailoring is difficult and time consuming and information security managers lack information security management systems software (ISMSS) that can assist with this tailoring task. In this paper, we develop a design theory for ISMSS to support information security managers in tailoring ISPs to different employees. To achieve this, we employ design science research, drawing on prior studies concerning the tailoring of systems development methods. We evaluate the design theory through an expository instantiation, POLCO, and with information security managers, demonstrating both proof-of-concept and proof-of-value.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Tailored information security policy, Policy component, Software for tailoring policy, Design science research
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-124465 (URN)10.1016/j.cose.2025.104687 (DOI)001587718900001 ()
Projects
Computerized tool-support for designing modular information security policies
Funder
Swedish Civil Contingencies Agency
Note

This work was supported by the Swedish Research School of Management and IT (MIT) and the Swedish Civil Contingencies Agency (MSB).

Available from: 2025-10-17 Created: 2025-10-17 Last updated: 2025-10-17Bibliographically approved
Karlsson, F. & Hedström, K. (2025). Value-Based Compliance Theory. In: Sushil Jajodia; Pierangela Samarati; Moti Yung (Ed.), Encyclopedia of Cryptography, Security and Privacy: (pp. 2717-2721). Switzerland: Springer Nature
Open this publication in new window or tab >>Value-Based Compliance Theory
2025 (English)In: Encyclopedia of Cryptography, Security and Privacy / [ed] Sushil Jajodia; Pierangela Samarati; Moti Yung, Switzerland: Springer Nature, 2025, p. 2717-2721Chapter in book (Refereed)
Place, publisher, year, edition, pages
Switzerland: Springer Nature, 2025
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
urn:nbn:se:oru:diva-118445 (URN)9783030715229 (ISBN)9783030715205 (ISBN)
Available from: 2025-01-14 Created: 2025-01-14 Last updated: 2025-10-22Bibliographically approved
Rostami, E. & Karlsson, F. (2024). Qualitative content analysis of actionable advice in information security policies - introducing the keyword loss of specificity metric. Information and Computer Security
Open this publication in new window or tab >>Qualitative content analysis of actionable advice in information security policies - introducing the keyword loss of specificity metric
2024 (English)In: Information and Computer Security, E-ISSN 2056-4961Article in journal (Refereed) Published
Abstract [en]

Purpose: This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.

Design/methodology/approach: A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric - keyword loss of specificity - to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.

Findings: The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.

Research limitations/implications: The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.

Practical implications: The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.

Originality/value: The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors' knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2024
Keywords
Information security policy, Actionable advice, Policy design, Content analysis, Text analysis
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-113347 (URN)10.1108/ICS-10-2023-0187 (DOI)001202480800001 ()
Available from: 2024-04-25 Created: 2024-04-25 Last updated: 2024-04-25Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3265-7627

Search in DiVA

Show all publications