Institutional theory: A new perspective for research into IS/IT security in organisations F Bjorck 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 218 | 2004 |
Cyber resilience–fundamentals for a definition F Björck, M Henkel, J Stirna, J Zdravkovic New Contributions in Information Systems and Technologies: Volume 1, 311-316, 2015 | 188 | 2015 |
Discovering information security management F Björck Department of Computer and Systems Sciences, Stockholm University, 2005 | 36 | 2005 |
The value and assessment of information security education and training L Yngström, F Björck Proceedings of the IFIP TC11 WG11 8, 17-19, 1999 | 26 | 1999 |
Security scandinavian style F Björck PhD diss., Stockholm University, 2001 | 19 | 2001 |
Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR A Altorbaq, F Blix, S Sörman 2017 12th International Conference for Internet Technology and Secured …, 2017 | 13 | 2017 |
Data protection by design in systems development: From legal requirements to technical solutions F Blix, SA Elshekeil, S Laoyookhong 2017 12th International Conference for Internet Technology and Secured …, 2017 | 13 | 2017 |
Iot architecture enabling dynamic security policies Y Li, F Björck, H Xue Proceedings of the 4th International Conference on Information and Network …, 2016 | 13 | 2016 |
IFIP world computer congress/sec 2000 revisited F Björck, L Yngström WISE 2, Proceedings of the IFIP TC11 WG 11.8 Second World Conference on …, 2001 | 9 | 2001 |
Implementing Information Security Management Systems: An Empirical Study of Critical Success Factors F Björck Advances in Information Security Management & Small Systems Security, 197-211, 2001 | 8 | 2001 |
Designing gdpr data protection principles in systems development F Blix, SA Elshekeil, S Laoyookhong Journal of Internet Technology and Secured Transactions (JITST) 6 (1), 2018 | 5 | 2018 |
Terminologi för informationssäkerhet ITS Rapport Informationstekniska standardiseringen, utgåva 1, 1994 | 5 | 1994 |
Verksamhetsanalys, dec 2011 H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... URL http://www. informationssakerhet. se, 0 | 5 | |
Riskanalys, dec 2011 H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... URL http://www. informationssakerhet. se, 0 | 4 | |
" Special Commando Move"-When Informal, Formal and Technical Cybersecurity Components Fail. A Andreasson, F Blix STPIS@ ECIS, 26-33, 2019 | 3 | 2019 |
Utveckla LIS och skyddet H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... Dec, 2011 | 3 | 2011 |
Kommunicera förbättringar H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... Dec, 2011 | 3 | 2011 |
Verksamhetsanalys, 12 2011 H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... URL http://www. informationssakerhet. se, 0 | 3 | |
Gapanalys. Dec. 2011 H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... URl: http://www. informationssakerhet. se, 0 | 3 | |
Gapanalys–Checklistan. Dec. 2011 H Andersson, JO Andersson, F Björck, M Eriksson, R Eriksson, ... URl: http://www. informationssakerhet. se, 0 | 3 | |