Gaute Wangen
Cited by
Cited by
A framework for estimating information security risk assessment method completeness
G Wangen, C Hallstensen, E Snekkenes
International Journal of Information Security 17 (6), 681-699, 2018
The role of malware in reported cyber espionage: a review of the impact and mechanism
G Wangen
Information 6 (2), 183-211, 2015
Information security risk assessment: a method comparison
G Wangen
Computer 50 (4), 52-61, 2017
Security awareness of the digital natives
V Gkioulos, G Wangen, SK Katsikas, G Kavallieratos, P Kotzanikolaou
Information 8 (2), 42, 2017
A Taxonomy of Challenges in Information Security Risk Management
G Wangen, E Snekkenes
Norwegian Information Security Conference / Norsk …, 2013
A comparison between business process management and information security management
G Wangen, EA Snekkenes
2014 Federated Conference on Computer Science and Information Systems, 901-910, 2014
Conflicting incentives risk analysis: A case study of the normative peer review process
G Wangen
Administrative Sciences 5 (3), 125-147, 2015
Cyber security risk assessment of a ddos attack
G Wangen, A Shalaginov, C Hallstensen
International Conference on Information Security, 183-202, 2016
User modelling validation over the security awareness of digital natives
V Gkioulos, G Wangen, SK Katsikas
Future Internet 9 (3), 32, 2017
An initial insight into information security risk assessment practices
G Wangen
2016 Federated Conference on Computer Science and Information Systems …, 2016
An Empirical Study of Root-Cause Analysis in Information Security Management
Gaute Wangen, Niclas Hellesen, Henrik Torres, Erlend Brækken
SECURWARE 2017 2017, 26-33, 2017
Risk Perceptions on Social Media Use in Norway
P Nyblom, G Wangen, V Gkioulos
Future Internet 12 (12), 211, 2020
Quantifying and analyzing information security risk from incident data
G Wangen
International Workshop on Graphical Models for Security, 129-154, 2019
A Systematic Review of Cybersecurity Risks in Higher Education
JB Ulven, G Wangen
Future Internet 13 (2), 39, 2021
The Root Causes of Compromised Accounts at the University.
P Nyblom, G Wangen, M Kianpour, G Østby
ICISSP, 540-551, 2020
Empirical Case Studies of the Root Cause Analysis Method in Information Security
N Hellesen, HMN Torres, G Wangen
International Journal on Advances in Security 11 (1 & 2), 60-79, 2018
Cybersecurity Awareness and Culture in Rural Norway
H Gunleifsen, V Gkioulos, G Wangen, A Shalaginov, M Kianpour, ...
Thirteenth International Symposium on Human Aspects of Information Security …, 2019
Quantitative risk, statistical methods and the four quadrants for information security
G Wangen, A Shalaginov
International Conference on Risks and Security of Internet and Systems, 127-143, 2015
Hendelseshåndtering i små og mellomstore bedrifter
LA Sand, GB Wangen, AS Frogner
Mørketallsundersøkelsen ved NTNU 2018
G Wangen, EØ Brodin, BH Skari, C Berglind
NTNU Gjøvik, 2019
The system can't perform the operation now. Try again later.
Articles 1–20