Gaute Wangen
Cited by
Cited by
A framework for estimating information security risk assessment method completeness
G Wangen, C Hallstensen, E Snekkenes
International Journal of Information Security 17 (6), 681-699, 2018
The role of malware in reported cyber espionage: a review of the impact and mechanism
G Wangen
Information 6 (2), 183-211, 2015
Information security risk assessment: A method comparison
G Wangen
Computer 50 (4), 52-61, 2017
Security awareness of the digital natives
V Gkioulos, G Wangen, SK Katsikas, G Kavallieratos, P Kotzanikolaou
Information 8 (2), 42, 2017
A comparison between business process management and information security management
G Wangen, EA Snekkenes
2014 Federated Conference on Computer Science and Information Systems, 901-910, 2014
A Taxonomy of Challenges in Information Security Risk Management
G Wangen, E Snekkenes
Norwegian Information Security Conference / Norsk …, 2013
Conflicting incentives risk analysis: A case study of the normative peer review process
G Wangen
Administrative Sciences 5 (3), 125-147, 2015
User modelling validation over the security awareness of digital natives
V Gkioulos, G Wangen, SK Katsikas
Future Internet 9 (3), 32, 2017
An initial insight into information security risk assessment practices
G Wangen
2016 Federated Conference on Computer Science and Information Systems …, 2016
Cyber security risk assessment of a DDoS attack
G Wangen, A Shalaginov, C Hallstensen
International Conference on Information Security, 183-202, 2016
Quantitative risk, statistical methods and the four quadrants for information security
G Wangen, A Shalaginov
International Conference on Risks and Security of Internet and Systems, 127-143, 2015
An Empirical Study of Root-Cause Analysis in Information Security Management
Gaute Wangen, Niclas Hellesen, Henrik Torres, Erlend Brækken
SECURWARE 2017 2017, 26-33, 2017
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
G Wangen, CV Hallstensen, EA Snekkenes
Springer Verlag, 2017
Empirical Case Studies of the Root Cause Analysis Method in Information Security
N Hellesen, HMN Torres, G Wangen
International Journal on Advances in Security 11 (1 & 2), 60-79, 2018
An initial insight into infosec risk management practices
G Wangen
NISK Journal, 70-81, 2015
Hendelseshåndtering i små og mellomstore bedrifter
LA Sand, GB Wangen, AS Frogner
Cyber Security Risk Assessment Practices: Core Unified Risk Framework
GB Wangen
NTNU, 2017
The Root Causes of Compromised Accounts at the University
PJB Nyblom, G Wangen, M Kianpour, G Østby
Proceedings of the 6th International Conference on Information Systems …, 2020
Cybersecurity Awareness and Culture in Rural Norway
H Gunleifsen, V Gkioulos, G Wangen, A Shalaginov, M Kianpour, ...
Thirteenth International Symposium on Human Aspects of Information Security …, 2019
Quantifying and Analyzing Information Security Risk from Incident Data
G Wangen
International Workshop on Graphical Models for Security, 129-154, 2019
The system can't perform the operation now. Try again later.
Articles 1–20