Mathias Ekstedt
Nimike
Viittaukset
Viittaukset
Vuosi
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
WR Flores, E Antonsen, M Ekstedt
Computers & security 43, 90-110, 2014
1782014
Enterprise architecture: models and analyses for information systems decision making
P Johnson, M Ekstedt
Studentlitteratur, 2007
1652007
A survey on CIO concerns-do enterprise architecture frameworks support them?
Å Lindström, P Johnson, E Johansson, M Ekstedt, M Simonsson
Information Systems Frontiers 8 (2), 81-90, 2006
1592006
The effect of IT governance maturity on IT governance performance
M Simonsson, P Johnson, M Ekstedt
Information systems management 27 (1), 10-24, 2010
1582010
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
T Sommestad, M Ekstedt, H Holm
IEEE Systems Journal 7 (3), 363-373, 2012
1482012
Where's the theory for software engineering?
P Johnson, M Ekstedt, I Jacobson
IEEE software 29 (5), 96-96, 2012
1252012
Using enterprise architecture for cio decision-making: On the importance of theory
P Johnson, M Ekstedt, E Silva, L Plazaola
Second Annual Conference on Systems Engineering Research, 2004
1202004
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
WR Flores, M Ekstedt
computers & security 59, 26-44, 2016
1092016
A probabilistic relational model for security risk analysis
T Sommestad, M Ekstedt, P Johnson
Computers & security 29 (6), 659-679, 2010
1092010
Enterprise architecture meta models for IT/business alignment situations
J Saat, U Franke, R Lagerström, M Ekstedt
2010 14th IEEE International Enterprise Distributed Object Computing …, 2010
972010
Cyber security risks assessment with bayesian defense graphs and architectural models
T Sommestad, M Ekstedt, P Johnson
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
872009
Empirical analysis of system-level vulnerability metrics through actual attacks
H Holm, M Ekstedt, D Andersson
IEEE Transactions on dependable and secure computing 9 (6), 825-837, 2012
842012
PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language
H Holm, K Shahzad, M Buschle, M Ekstedt
IEEE Transactions on Dependable and Secure Computing 12 (6), 626-639, 2014
812014
EAF2-A framework for categorizing enterprise architecture frameworks
U Franke, D Hook, J Konig, R Lagerstrom, P Narman, J Ullberg, ...
2009 10th ACIS International Conference on Software Engineering, Artificial …, 2009
752009
Automatic data collection for enterprise architecture models
H Holm, M Buschle, R Lagerström, M Ekstedt
Software & Systems Modeling 13 (2), 825-841, 2014
692014
Enterprise architecture management's impact on information technology success
R Lagerström, T Sommestad, M Buschle, M Ekstedt
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
642011
Automating enterprise architecture documentation using an enterprise service bus
M Buschle, M Ekstedt, S Grunow, M Hauder, F Matthes, S Roth
632012
Enterprise architecture availability analysis using fault trees and stakeholder interviews
P Närman, U Franke, J König, M Buschle, M Ekstedt
Enterprise Information Systems 8 (1), 1-25, 2014
512014
A Tool for automatic Enterprise Architecture modeling
M Buschle, H Holm, T Sommestad, M Ekstedt, K Shahzad
International Conference on Advanced Information Systems Engineering, 1-15, 2011
512011
Data accuracy assessment using enterprise architecture
P Närman, H Holm, P Johnson, J König, M Chenine, M Ekstedt
Enterprise Information Systems 5 (1), 37-58, 2011
482011
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20