default search action
Fredrik Karlsson 0001
Person information
- affiliation: Örebru University, Sweden
Other persons with the same name
- Fredrik Karlsson 0002 — Umel University, Umel, Sweden
- Fredrik Karlsson 0003 — Sony Mobile Communications, Lund, Sweden (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Elham Rostami, Fredrik Karlsson:
Qualitative content analysis of actionable advice in information security policies - introducing the keyword loss of specificity metric. Inf. Comput. Secur. 32(4): 492-508 (2024) - 2023
- [j30]Elham Rostami, Fredrik Karlsson, Shang Gao:
Policy components - a conceptual model for modularizing and tailoring of information security policies. Inf. Comput. Secur. 31(3): 331-352 (2023) - [c25]Elham Rostami, Fredrik Karlsson:
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security Policies. HAISA 2023: 157-168 - [c24]Tanja Elina Havstorm, Fredrik Karlsson, Karin Hedström:
Uncovering Situations of Cargo Cult Behavior in Agile Software Development Method Use. HICSS 2023: 6486-6495 - 2022
- [j29]Fredrik Karlsson, Ella Kolkowska, Johan Petersson:
Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis. Comput. Secur. 114: 102578 (2022) - [j28]Annika Andersson, Karin Hedström, Fredrik Karlsson:
"Standardizing information security - a structurational analysis". Inf. Manag. 59(3): 103623 (2022) - [j27]Martin Karlsson, Fredrik Karlsson, Joachim Åström, Thomas Denk:
The effect of perceived organizational culture on employees' information security compliance. Inf. Comput. Secur. 30(3): 382-401 (2022) - [j26]Thomas Denk, Karin Hedström, Fredrik Karlsson:
Citizens' attitudes towards automated decision-making. Inf. Polity 27(3): 391-408 (2022) - [c23]Elham Rostami, Fredrik Karlsson, Shang Gao:
Policy Components - A Conceptual Model for Tailoring Information Security Policies. HAISA 2022: 265-274 - 2021
- [j25]Erik Bergström, Fredrik Karlsson, Rose-Mharie Åhlfeldt:
Developing an information classification method. Inf. Comput. Secur. 29(2): 209-239 (2021) - [j24]Fredrik Karlsson, Karin Hedström, Magnus Frostenson, Frans Prenkert, Ella Kolkowska, Sven Helin:
Attempts to share information between public sector organisations over time: A case-based exploration of value conflicts. Inf. Polity 26(3): 289-310 (2021) - 2020
- [j23]Annika Andersson, Fredrik Karlsson, Karin Hedström:
Consensus versus warfare - unveiling discourses in de jure information security standard development. Comput. Secur. 99: 102035 (2020) - [j22]Elham Rostami, Fredrik Karlsson, Shang Gao:
Requirements for computerized tools to design information security policies. Comput. Secur. 99: 102063 (2020) - [j21]Pär J. Ågerfalk, Fredrik J. Karlsson:
Artefactual and empirical contributions in information systems research. Eur. J. Inf. Syst. 29(2): 109-113 (2020) - [j20]Elham Rostami, Fredrik Karlsson, Ella Kolkowska:
The hunt for computerized support in information security policy management. Inf. Comput. Secur. 28(2): 215-259 (2020) - [j19]Göran Goldkuhl, Fredrik Karlsson:
Method Engineering as Design Science. J. Assoc. Inf. Syst. 21(5): 4 (2020)
2010 – 2019
- 2019
- [e1]Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 562, Springer 2019, ISBN 978-3-030-22311-3 [contents] - 2018
- [j18]Fredrik Karlsson, Ella Kolkowska, Marianne Törner:
Guest editorial. Inf. Comput. Secur. 26(2): 146-149 (2018) - [c22]Tanja Elina Mäki-Runsas, Kai Wistrand, Fredrik Karlsson:
Cargo Cults in Information Systems Development: A Definition and an Analytical Framework. ISD (Selected Papers) 2018: 35-53 - [c21]Tanja Elina Mäki-Runsas, Kai Wistrand, Fredrik Karlsson:
Cargo Cults in Information Systems Development: a Definition and an Analytical Framework. ISD 2018 - 2017
- [j17]Fredrik Karlsson, Karin Hedström, Göran Goldkuhl:
Practice-based discourse analysis of information security policies. Comput. Secur. 67: 267-279 (2017) - [j16]Fredrik Karlsson, Magnus Frostenson, Frans Prenkert, Ella Kolkowska, Sven Helin:
Inter-organisational information sharing in the public sector: A longitudinal case study on the reshaping of success factors. Gov. Inf. Q. 34(4): 567-577 (2017) - [j15]Fredrik Karlsson, Martin Karlsson, Joachim Åström:
Measuring employees' compliance - the importance of value pluralism. Inf. Comput. Secur. 25(3): 279-299 (2017) - [j14]Ella Kolkowska, Fredrik Karlsson, Karin Hedström:
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. J. Strateg. Inf. Syst. 26(1): 39-57 (2017) - 2016
- [j13]Fredrik Karlsson, Ella Kolkowska, Frans Prenkert:
Inter-organisational information security: a systematic literature review. Inf. Comput. Secur. 24(5): 418-451 (2016) - [c20]Fredrik Linander, Kai Wistrand, Fredrik Karlsson:
Measuring and Visualising Projects' Collective Method Rationale. PoEM 2016: 344-352 - 2015
- [j12]Fredrik Karlsson, Joachim Åström, Martin Karlsson:
Information security culture - state-of-the-art review between 2000 and 2013. Inf. Comput. Secur. 23(3): 246-285 (2015) - [c19]Fredrik Karlsson, Ella Kolkowska, Karin Hedström, Magnus Frostenson:
Inter-Organisational Information Sharing - Between a Rock and a Hard Place. HAISA 2015: 71-81 - [c18]Fredrik Karlsson, Göran Goldkuhl, Karin Hedström:
Practice-Based Discourse Analysis of InfoSec Policies. SEC 2015: 297-310 - 2014
- [j11]Jesper Holgersson, Fredrik Karlsson:
Public e-service development: Understanding citizens' conditions for participation. Gov. Inf. Q. 31(3): 396-410 (2014) - [c17]Fredrik Karlsson, Fredrik Linander, Fabian von Schéele:
A Conceptual Framework for Time Distortion Analysis in Method Components. BMMDS/EMMSAD 2014: 454-463 - [c16]Fredrik Karlsson, Karin Hedström:
End User Development and Information Security Culture. HCI (24) 2014: 246-257 - 2013
- [j10]Fredrik Karlsson:
Longitudinal use of method rationale in method configuration: an exploratory study. Eur. J. Inf. Syst. 22(6): 690-710 (2013) - [j9]Karin Hedström, Fredrik Karlsson, Ella Kolkowska:
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Inf. Manag. Comput. Secur. 21(4): 266-287 (2013) - [j8]Fredrik Karlsson, Karin Hedström:
Evaluating End User Development as a Requirements Engineering Technique for Communicating Across Social Worlds During Systems Development. Scand. J. Inf. Syst. 25(2): 3 (2013) - 2012
- [j7]Fredrik Karlsson, Jesper Holgersson, Eva Söderström, Karin Hedström:
Exploring user participation approaches in public e-service development. Gov. Inf. Q. 29(2): 158-168 (2012) - [j6]Fredrik Karlsson, Pär J. Ågerfalk:
MC Sandbox: Devising a tool for method-user-centered method configuration. Inf. Softw. Technol. 54(5): 501-516 (2012) - [c15]Jesper Holgersson, Fredrik Karlsson:
Understanding Business Employees' conditions for participating in Public E-Service Development. ECIS 2012: 24 - 2011
- [j5]Karin Hedström, Ella Kolkowska, Fredrik Karlsson, Jonathan P. Allen:
Value conflicts for information security management. J. Strateg. Inf. Syst. 20(4): 373-384 (2011) - 2010
- [c14]Jesper Holgersson, Eva Söderström, Fredrik Karlsson, Karin Hedström:
Towards a Roadmap for User Involvement in E-Government Service Development. EGOV 2010: 251-262 - [c13]Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson:
Using Actor Network Theory to Understand Information Security Management. SEC 2010: 43-54
2000 – 2009
- 2009
- [j4]Fredrik J. Karlsson, Pär J. Ågerfalk:
Exploring agile values in method configuration. Eur. J. Inf. Syst. 18(4): 300-316 (2009) - [j3]Fredrik Karlsson, Pär J. Ågerfalk:
Towards Structured Flexibility in Information Systems Development: Devising a Method for Method Configuration. J. Database Manag. 20(3): 51-75 (2009) - 2008
- [c12]Fredrik Karlsson:
Method Tailoring as Negotiation. CAiSE Forum 2008: 1-4 - [c11]Fredrik Karlsson:
A wiki-based approach to method tailoring. ICPW 2008: 13-22 - [c10]Fredrik Karlsson:
Using two heads in practice. WEUSE@ICSE 2008: 43-47 - [c9]Fredrik Karlsson, Karin Hedström:
Negotiating a Systems Development Method. ISD 2008: 491-499 - [c8]Kai Wistrand, Fredrik Karlsson, Pär J. Ågerfalk:
Exploring the Role of Method Rationale in the Context of Teaching Information Systems Development Methods. ISD 2008: 801-809 - [c7]Fredrik Karlsson, Pär J. Ågerfalk:
Method Configuration: The eXtreme Programming Case. XP 2008: 32-41 - 2007
- [c6]Fredrik Karlsson, Pär J. Ågerfalk:
Multi-Grounded Action Research in Method Engineering: The MMC Case. Situational Method Engineering 2007: 19-32 - [c5]Pär J. Ågerfalk, Sjaak Brinkkemper, Cesar Gonzalez-Perez, Brian Henderson-Sellers, Fredrik Karlsson, Steven Kelly, Jolita Ralyté:
Modularization Constructs in Method Engineering: Towards Common Ground? Situational Method Engineering 2007: 359-368 - 2006
- [j2]Fredrik Karlsson, Kai Wistrand:
Combining method engineering with activity theory: theoretical grounding of the method component concept. Eur. J. Inf. Syst. 15(1): 82-90 (2006) - 2004
- [j1]Fredrik Karlsson, Pär J. Ågerfalk:
Method configuration: adapting to situational characteristics while creating reusable assets. Inf. Softw. Technol. 46(9): 619-633 (2004) - [c4]Kai Wistrand, Fredrik Karlsson:
Method Components - Rationale Revealed. CAiSE 2004: 189-201 - [c3]Fredrik Karlsson, Kai Wistrand:
MC Sandbox - Tool Support for Method Configuration. CAiSE Workshops (1) 2004: 199-210 - 2003
- [c2]Pär J. Ågerfalk, Kai Wistrand, Fredrik Karlsson, Gregor Börjesson, Martin Elmberg, Kjell Möller:
Flexibile Processes and Method Configuration: Outline of a Joint Industry-Academia Research Project. ICEIS (3) 2003: 519-522 - 2001
- [c1]Pär J. Ågerfalk, Fredrik Karlsson, Anders Hjalmarsson:
Exploring the Explanatory Power of Actability. Organizational Semiotics 2001: 1-20
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint