default search action
Stewart Kowalski
Person information
- affiliation: Norwegian University for Science and Technology, Gjøvik, Norway
- affiliation (former): Royal Institute of Technology, Kista, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Mazaher Kianpour, Stewart James Kowalski, Harald Øverby:
Advancing the concept of cybersecurity as a public good. Simul. Model. Pract. Theory 116: 102493 (2022) - [c46]Stewart James Kowalski, Grethe Østby:
A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus. pHealth 2022: 20-29 - 2021
- [c45]Richard McEvoy, Stewart Kowalski:
Consulting the Oracle at Delphi - Combining Risk I and Risk in cyber security. STPIS 2021: 22-31 - [c44]Grethe Østby, Stewart James Kowalski:
A case study of a municipality phishing attack measures - towards a socio-technical incident management framework. STPIS 2021: 32-45 - [c43]Mazaher Kianpour, Stewart James Kowalski, Harald Øverby:
Multi-paradigmatic approaches in cybersecurity economics. STPIS 2021: 46-65 - 2020
- [c42]Mazaher Kianpour, Stewart James Kowalski, Harald Øverby, Erjon Zoto:
From Cyber Incidents to Training Cognitive Situation Management: *Work in Progress. CogSIMA 2020: 163-166 - [c41]Grethe Østby, Stewart James Kowalski:
Preparing for Cyber Crisis Management Exercises. HCI (17) 2020: 279-290 - [c40]Grethe Østby, Stewart James Kowalski, Basel Katt:
Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap. STPIS 2020: 195-205
2010 – 2019
- 2019
- [j10]Thomas Richard McEvoy, Stewart James Kowalski:
Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach. Complex Syst. Informatics Model. Q. 18: 47-64 (2019) - [j9]Erjon Zoto, Mazaher Kianpour, Stewart James Kowalski, Edgar Alonso Lopez-Rojas:
A Socio-technical Systems Approach to Design and Support Systems Thinking in Cybersecurity and Risk Management Education. Complex Syst. Informatics Model. Q. 18: 65-75 (2019) - [c39]Shao-Fang Wen, Mazaher Kianpour, Stewart Kowalski:
An empirical study of security culture in open source software communities. ASONAM 2019: 863-870 - [c38]Gunnar Wahlgren, Stewart Kowalski:
A Maturity Model for IT-Related Security Incident Management. BIS (1) 2019: 203-217 - [c37]Richard McEvoy, Stewart Kowalski:
Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems. STPIS@ECIS 2019: 65-80 - [c36]Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart Kowalski:
A Socio-Technical Framework to Improve Cyber Security Training: A Work in Progress. STPIS@ECIS 2019: 81-96 - [c35]Joakim Kävrestad, Rose-Mharie Åhlfeldt, Marcus Nohlberg, Johani Karonen, Stewart Kowalski:
Spiraling out in control: A Video Cartesian Dialectic on a Socio-technical Approach to Teaching Privacy, Information- and Cyber Security (PICS). STPIS@ECIS 2019: 153-155 - [c34]Mazaher Kianpour, Stewart Kowalski, Erjon Zoto, Christopher Frantz, Harald Øverby:
Designing Serious Games for Cyber Ranges: A Socio-technical Approach. EuroS&P Workshops 2019: 85-93 - [c33]Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, Christopher Frantz:
Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties. HCI (29) 2019: 149-163 - [e5]Stewart Kowalski, Peter M. Bednar, Alexander Nolte, Ilia Bider:
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), Stockholm, Sweden, June 10, 2019. CEUR Workshop Proceedings 2398, CEUR-WS.org 2019 [contents] - 2018
- [c32]Richard McEvoy, Stewart Kowalski:
Beyond Training and Awareness: From Security Culture to Security Risk Management. STPIS@CAiSE 2018: 71-86 - [c31]Erjon Zoto, Stewart Kowalski, Edgar Alonso Lopez-Rojas, Mazaher Kianpour:
Using a Socio-technical Systems Approach to Design and Support Systems Thinking in Cyber Security Education. STPIS@CAiSE 2018: 123-128 - [c30]Erjon Zoto, Stewart Kowalski, Christopher Frantz, Edgar A. Lopez-Rojas, Basel Katt:
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment. World Conference on Information Security Education 2018: 40-54 - [e4]Stewart Kowalski, Peter M. Bednar, Ilia Bider:
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), Tallinn, Estonia, June 12, 2018. CEUR Workshop Proceedings 2107, CEUR-WS.org 2018 [contents] - 2017
- [c29]Stewart Kowalski:
Summary of the Interactive Workshop Sessions at STPIS'16. STPIS@CAiSE 2017: 110-111 - [c28]Shao-Fang Wen, Stewart Kowalski:
A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities. HCI (22) 2017: 414-431 - [c27]Stewart Kowalski, Tina Andersson, Sabina Windahl:
I Am Ok, the Material's Not: A Transactional Analysis of Information Security Education Material for Swedish Elementary School Students. HCI (30) 2017: 628-631 - [e3]Stewart Kowalski, Peter M. Bednar, Ilia Bider:
Proceedings of the 3rd International Workshop on Socio-Technical Perspective in IS development (STPIS'17) co-located with 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), Essen, Germany, June 13, 2017. CEUR Workshop Proceedings 1854, CEUR-WS.org 2017 [contents] - 2016
- [c26]Bilal Al Sabbagh, Stewart Kowalski:
A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM). EISIC 2016: 192-195 - [c25]Gunnar Wahlgren, Anna Fedotova, Alexandra Musaeva, Stewart Kowalski:
IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study. HAISA 2016: 45-55 - [e2]Stewart Kowalski, Peter M. Bednar, Ilia Bider:
Proceedings of the 2nd International Workshop on Socio-Technical Perspective in IS Development co-located with 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016), Ljubljana, Slovenia, June 14, 2016. CEUR Workshop Proceedings 1604, CEUR-WS.org 2016 [contents] - 2015
- [j8]Bilal Al Sabbagh, Stewart Kowalski:
A Socio-technical Framework for Threat Modeling a Software Supply Chain. IEEE Secur. Priv. 13(4): 30-39 (2015) - [j7]Ilia Bider, Martin Henkel, Stewart Kowalski, Erik Perjons:
Simulating apprenticeship using multimedia in higher education: A case from the information systems field. Interact. Technol. Smart Educ. 12(2): 137-154 (2015) - [c24]Mariusz Nowostawski, Stewart Kowalski, Jeffy Mwakalinga:
HIPing Innovation Education in University. Introducing Socio-Technical Concepts for Cross-Disciplinary Teams in Applied Computer Sciences. STPIS@CAiSE 2015: 125-128 - [c23]Ilia Bider, Martin Henkel, Stewart Kowalski, Erik Perjons:
Reuse of Simulated Cases in Teaching Enterprise Modelling. ER Workshops 2015: 337-346 - [c22]Alaeddin M. H. Alawawdeh, Stewart James Kowalski:
Facebook as a Learning Tool in Formal Learning Process. HCI (28) 2015: 212-217 - [c21]Ilia Bider, Martin Henkel, Stewart Kowalski, Erik Perjons:
Teaching Enterprise Modeling Based on Multi-media Simulation: A Pragmatic Approach. MCETECH 2015: 239-254 - [e1]Stewart Kowalski, Peter M. Bednar, Ilia Bider, Jeffy Mwakalinga:
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), Stockholm, Sweden, June 9, 2015. CEUR Workshop Proceedings 1374, CEUR-WS.org 2015 [contents] - 2014
- [c20]Aron Henriksson, Hercules Dalianis, Stewart Kowalski:
Generating features for named entity recognition by learning prototypes in semantic space: The case of de-identifying health records. BIBM 2014: 450-457 - [c19]Ilia Bider, Stewart Kowalski:
A Framework for Synchronizing Human Behavior, Processes and Support Systems Using a Socio-technical Approach. BMMDS/EMMSAD 2014: 109-123 - [c18]Mohamed El Mekawy, Bilal Al Sabbagh, Stewart Kowalski:
The Impact of Business-IT Alignment on Information Security Process. HCI (18) 2014: 25-36 - [c17]Ali Shariq Imran, Stewart James Kowalski:
HIP - A Technology-Rich and Interactive Multimedia Pedagogical Platform. HCI (14) 2014: 151-160 - 2013
- [j6]Gunnar Wahlgren, Stewart Kowalski:
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Int. J. E Entrepreneurship Innov. 4(4): 1-19 (2013) - [c16]Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Evaluating a Framework for Securing E-Government Services - A Case of Tanzania. HICSS 2013: 1792-1801 - 2012
- [j5]Geoffrey Karokola, Louise Yngström, Stewart Kowalski:
Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services. Int. J. Electron. Gov. Res. 8(1): 1-25 (2012) - [c15]Bilal Al Sabbagh, Stewart Kowalski:
ST(CS)2 - Featuring socio-technical cyber security warning systems. CyberSec 2012: 312-316 - 2011
- [c14]Stewart Kowalski, Rostyslav Barabanov, Robert Hoffmann:
Cyber Security Alert Warning System: A Socio-techinal Coordinate System Proposal. Metrisec@ESEM 2011: 21-24 - [c13]Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View. HAISA 2011: 58-73 - [c12]Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models. ISSA 2011 - 2010
- [c11]Rostyslav Barabanov, Stewart Kowalski:
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study. SEC 2010: 31-42
2000 – 2009
- 2009
- [c10]Markus Huber, Stewart Kowalski, Marcus Nohlberg, Simon Tjoa:
Towards Automating Social Engineering Using Social Networking Sites. CSE (3) 2009: 117-124 - [c9]Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:
Secure e-learning using a holistic and immune security framework. ICITST 2009: 1-6 - [c8]Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein:
Two Case Studies in Using Chatbots for Security Training. World Conference on Information Security Education 2009: 265-272 - [c7]Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:
Methodology for Considering Environments and Culture in Developing Information Security Systems. ISSA 2009: 419-436 - 2008
- [c6]Marcus Nohlberg, Stewart Kowalski:
The cycle of deception - a model of social engineering attacks, defenses and victims. HAISA 2008: 1-11 - 2007
- [j4]Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski:
Bridging the gap between general management and technicians - A case study on ICT security in a developing country. Comput. Secur. 26(1): 44-55 (2007) - 2006
- [c5]Charles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski:
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania. ISSA 2006: 1-12 - 2005
- [c4]Job Asheri Chaula, Louise Yngström, Stewart Kowalski:
A Framework for Evaluation of Information Systems Security. ISSA 2005: 1-11 - [c3]Charles N. Tarimo, Louise Yngström, Stewart Kowalski:
An approach to enhance the security of ICT infrastructure through legal, regulatory influences. ISSA 2005: 1-12
1990 – 1999
- 1993
- [c2]Stewart Kowalski:
The SBC Model as a Conceptual Framework for Reporting IT Crimes. Security and Control of Information Technology in Society 1993: 207-226 - [c1]Stewart Kowalski:
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. SEC 1993: 207-226 - 1991
- [j3]Stewart Kowalski:
The ABCs and Es of national computer security policies. Comput. Secur. 10(3): 213-216 (1991) - [j2]Stewart Kowalski:
Cybernetic analysis of national computer security. Comput. Secur. 10(3): 217-227 (1991) - [j1]Stewart Kowalski:
Cybernetic analysis of the 12th U.S. National Computer Security Conference. Comput. Secur. 10(3): 228-235 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint