A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF G Wangen, C Hallstensen, E Snekkenes International Journal of Information Security 17, 681-699, 2018 | 168 | 2018 |
A systematic review of cybersecurity risks in higher education JB Ulven, G Wangen Future Internet 13 (2), 39, 2021 | 159 | 2021 |
Information security risk assessment: a method comparison G Wangen Computer 50 (4), 52-61, 2017 | 75 | 2017 |
The role of malware in reported cyber espionage: a review of the impact and mechanism G Wangen Information 6 (2), 183-211, 2015 | 75 | 2015 |
Security awareness of the digital natives V Gkioulos, G Wangen, SK Katsikas, G Kavallieratos, P Kotzanikolaou Information 8 (2), 42, 2017 | 57 | 2017 |
Risk perceptions on social media use in Norway P Nyblom, G Wangen, V Gkioulos Future Internet 12 (12), 211, 2020 | 24 | 2020 |
A Taxonomy of Challenges in Information Security Risk Management G Wangen, E Snekkenes Norwegian Information Security Conference / Norsk …, 2013 | 24 | 2013 |
A comparison between business process management and information security management G Wangen, EA Snekkenes 2014 Federated Conference on Computer Science and Information Systems, 901-910, 2014 | 21 | 2014 |
An Empirical Study of Root-Cause Analysis in Information Security Management Gaute Wangen, Niclas Hellesen, Henrik Torres, Erlend Brækken SECURWARE 2017 2017, 26-33, 2017 | 19 | 2017 |
A systematic review of cybersecurity risks in higher education. Future Internet, 13 (2), 39 JB Ulven, G Wangen | 18 | 2021 |
Quantifying and analyzing information security risk from incident data G Wangen Graphical Models for Security: 6th International Workshop, GraMSec 2019 …, 2019 | 15 | 2019 |
Cyber security risk assessment of a ddos attack G Wangen, A Shalaginov, C Hallstensen Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 14 | 2016 |
The Root Causes of Compromised Accounts at the University. P Nyblom, G Wangen, M Kianpour, G Østby ICISSP, 540-551, 2020 | 13 | 2020 |
Conflicting incentives risk analysis: A case study of the normative peer review process G Wangen Administrative Sciences 5 (3), 125-147, 2015 | 13 | 2015 |
User modelling validation over the security awareness of digital natives V Gkioulos, G Wangen, SK Katsikas Future Internet 9 (3), 32, 2017 | 12 | 2017 |
An initial insight into information security risk assessment practices G Wangen 2016 Federated Conference on Computer Science and Information Systems …, 2016 | 11 | 2016 |
Empirical Case Studies of the Root Cause Analysis Method in Information Security N Hellesen, HMN Torres, G Wangen International Journal on Advances in Security 11 (1 & 2), 60-79, 2018 | 8 | 2018 |
A survey on cyber security research in the field of agriculture technology K Kjønås, G Wangen 2023 IEEE International Symposium on Technology and Society (ISTAS), 1-8, 2023 | 7 | 2023 |
Unrecorded security incidents at NTNU 2018 (Mørketallsundersøkelsen ved NTNU 2018) G Wangen, EØ Brodin, BH Skari, C Berglind NTNU Open Gjøvik 17, 2019 | 7 | 2019 |
Cybersecurity Awareness and Culture in Rural Norway H Gunleifsen, V Gkioulos, G Wangen, A Shalaginov, M Kianpour, ... Thirteenth International Symposium on Human Aspects of Information Security …, 2019 | 6 | 2019 |