Gaute Wangen
TitleCited byYear
The role of malware in reported cyber espionage: a review of the impact and mechanism
G Wangen
Information 6 (2), 183-211, 2015
142015
Security awareness of the digital natives
V Gkioulos, G Wangen, S Katsikas, G Kavallieratos, P Kotzanikolaou
Information 8 (2), 42, 2017
102017
Conflicting incentives risk analysis: A case study of the normative peer review process
G Wangen
Administrative Sciences 5 (3), 125-147, 2015
102015
A comparison between business process management and information security management
G Wangen, EA Snekkenes
2014 Federated Conference on Computer Science and Information Systems, 901-910, 2014
102014
Information security risk assessment: A method comparison
G Wangen
Computer 50 (4), 52-61, 2017
82017
A Taxonomy of Challenges in Information Security Risk Management
G Wangen, E Snekkenes
Norwegian Information Security Conference / Norsk …, 2013
82013
A framework for estimating information security risk assessment method completeness
G Wangen, C Hallstensen, E Snekkenes
International Journal of Information Security, 1-19, 2017
72017
An initial insight into information security risk assessment practices
G Wangen
2016 Federated Conference on Computer Science and Information Systems …, 2016
52016
Cyber security risk assessment of a ddos attack
G Wangen, A Shalaginov, C Hallstensen
International Conference on Information Security, 183-202, 2016
42016
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
G Wangen, CV Hallstensen, EA Snekkenes
Springer Verlag, 2017
32017
Quantitative risk, statistical methods and the four quadrants for information security
G Wangen, A Shalaginov
International Conference on Risks and Security of Internet and Systems, 127-143, 2015
22015
An initial insight into infosec risk management practices
G Wangen
NIK: Norsk Informatikkonferanse, 2015
22015
Hendelseshåndtering i små og mellomstore bedrifter
LA Sand, GB Wangen, AS Frogner
22010
Empirical Case Studies of the Root Cause Analysis Method in Information Security
N Hellesen, HMN Torres, G Wangen
International Journal on Advances in Security 11 (1 & 2), 60-79, 2018
12018
An Empirical Study of Root-Cause Analysis in Information Security Management
Gaute Wangen, Niclas Hellesen, Henrik Torres, Erlend Brækken
SECURWARE 2017 2017, 26-33, 2017
1*2017
User Modelling Validation over the Security Awareness of Digital Natives
V Gkioulos, G Wangen, S Katsikas
Future Internet 9 (3), 32, 2017
12017
Mørketallsundersøkelsen ved NTNU 2018
G Wangen, EØ Brodin, BH Skari, C Berglind
NTNU Gjøvik, 2019
2019
Lodz workshop 2016
T Lewe, R Mathisen, Ø Kopperstad, JC Skogen, B Sivertsen, GS Tell, ...
Høgskulen i Volda, 2017
2017
Cyber Security Risk Assessment Practices: Core Unified Risk Framework
GB Wangen
NTNU, 2017
2017
Risk analysis for privacy and identity management
GB Wangen
2012
The system can't perform the operation now. Try again later.
Articles 1–20