Change search
Link to record
Permanent link

Direct link
Publications (10 of 31) Show all publications
Kävrestad, J., Furnell, S. & Nohlberg, M. (2024). User perception of Context-Based Micro-Training – a method for cybersecurity training. Information Security Journal, 33(2), 121-137
Open this publication in new window or tab >>User perception of Context-Based Micro-Training – a method for cybersecurity training
2024 (English)In: Information Security Journal, ISSN 1939-3555, E-ISSN 1939-3547, Vol. 33, no 2, p. 121-137Article in journal (Refereed) Published
Abstract [en]

User behavior is one of the biggest challenges to cybersecurity in modern organizations. Users are continuously targeted by attackers and required to have sufficient knowledge to spot and avoid such attacks. Different training methods are suggested and used in the industry to support users to behave securely. The challenge remains, and improved methods for end-user cybersecurity training are needed. This paper introduces and evaluates user perception of a method called Context-Based Micro-Training (CBMT). This approach suggests that training should be delivered in short sequences when the information is of direct relevance. The intention is to provide training directly related to the user’s current situation while also providing an awareness-increasing effect. This notion is tested in a survey-based evaluation involving 1,452 respondents from Sweden, Italy, and the UK, comparing the perception of CBMT against the experience of traditional approaches. The results emphasize that current methods are not effective enough and show that CBMT is perceived positively by respondents in all sample groups. The study further evaluated how demographic aspects impact the perception of CBMT and found that a diverse group of users can appreciate it.

Place, publisher, year, edition, pages
Taylor & Francis, 2024
Keywords
cybersecurity, end-user, perception, training
National Category
Computer and Information Sciences Human Computer Interaction Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:hj:diva-62711 (URN)10.1080/19393555.2023.2222713 (DOI)001004357200001 ()2-s2.0-85161683304 (Scopus ID)
Funder
Vinnova, 2019-05021
Note

CC BY 4.0

Published online: 09 Jun 2023

CONTACT Joakim Kävrestad

The work was supported by VINNOVA under the grant [2019-05021].

Available from: 2023-10-24 Created: 2023-10-24 Last updated: 2024-01-18Bibliographically approved
Kävrestad, J., Nohlberg, M. & Furnell, S. (2023). A taxonomy of SETA methods and linkage to delivery preferences. Data Base for Advances in Information Systems, 54(4), 107-133
Open this publication in new window or tab >>A taxonomy of SETA methods and linkage to delivery preferences
2023 (English)In: Data Base for Advances in Information Systems, ISSN 0095-0033, Vol. 54, no 4, p. 107-133Article in journal (Refereed) Published
Abstract [en]

Cybersecurity threats targeting users are common in today’s information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data. The common suggestion for addressing this problem is to train users to behave better using SETA programs. The notion of training users is old, and several SETA methods are described in scientific literature. Yet, incidents stemming from insecure user behavior continue to happen and are reported as one of the most common types of incidents. Researchers argue that empirically proven SETA programs are needed and point out focus on knowledge rather than behavior, and poor user adoption, as problems with existing programs. The present study aims to research user preferences regarding SETA methods, with the motivation that a user is more likely to adopt a program perceived positively. A qualitative approach is used to identify existing SETA methods, and a quantitative approach is used to measure user preferences regarding SETA delivery. We show that users prefer SETA methods to be effortless and flexible and outline how existing methods meet that preference. The results outline how SETA methods respond to user preferences and how different SETA methods can be implemented to maximize user perception, thereby supporting user adoption.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
Cybersecurity, Security Training, Security Behavior, Security Awareness, ; User Training
National Category
Information Systems, Social aspects
Research subject
INF303 Information Security; Information Systems
Identifiers
urn:nbn:se:hj:diva-62752 (URN)10.1145/3631341.3631348 (DOI)001098050000006 ()2-s2.0-85176937421 (Scopus ID)
Available from: 2023-10-24 Created: 2023-10-24 Last updated: 2024-01-24Bibliographically approved
Kävrestad, J., Lindvall, D. & Nohlberg, M. (2023). Combating digital exclusion with cybersecurity training – an interview study with Swedish seniors. In: Steve Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings. Paper presented at 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, Kent, United Kingdom, July 4–6, 2023 (pp. 3-12). Cham: Springer
Open this publication in new window or tab >>Combating digital exclusion with cybersecurity training – an interview study with Swedish seniors
2023 (English)In: Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings / [ed] Steve Furnell; Nathan Clarke, Cham: Springer , 2023, p. 3-12Conference paper, Published paper (Refereed)
Abstract [en]

While rapid digitalization is beneficial for a majority of all people, some people struggle to adopt digital technology. Not only do these persons miss the potential benefits of digitalization, but they are also suffering from the fact that many services are no longer provided in a non-digital way. Previous research suggests that a lack of security literacy and awareness is one driving factor behind the digital exclusion for senior citizens. To that end, this research focuses on cybersecurity training for seniors. Seniors are here defined as those aged above 65. Using interviews with eight seniors, this research evaluates the use of contextual training in this user group. The rationale is that contextual training has been found to have positive results in other user groups. The results suggest that contextual cybersecurity training can increase cybersecurity awareness for senior citizens and be appreciated by the users. The participants also confirm previous research describing that cybersecurity concerns are a driving factor behind digital exclusion and that contextual cybersecurity training can make seniors more comfortable adopting digital services.

Place, publisher, year, edition, pages
Cham: Springer, 2023
Series
IFIP Advances in Information and Communication Technology (IFIPAICT), ISSN 1868-4238, E-ISSN 1868-422X ; 674
Keywords
cybersecurity awareness, senior digital exclusion, contextual training
National Category
Human Computer Interaction Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:hj:diva-62707 (URN)10.1007/978-3-031-38530-8_1 (DOI)2-s2.0-85172691419 (Scopus ID)978-3-031-38529-2 (ISBN)978-3-031-38532-2 (ISBN)978-3-031-38530-8 (ISBN)
Conference
17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, Kent, United Kingdom, July 4–6, 2023
Available from: 2023-07-13 Created: 2023-10-24Bibliographically approved
Kävrestad, J. & Nohlberg, M. (2022). Context-Based Micro-training. In: Sushil Jajodia; Pierangela Samarati; Moti Yung (Ed.), Encyclopedia of Cryptography, Security and Privacy: . Springer
Open this publication in new window or tab >>Context-Based Micro-training
2022 (English)In: Encyclopedia of Cryptography, Security and Privacy / [ed] Sushil Jajodia; Pierangela Samarati; Moti Yung, Springer , 2022Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer, 2022
National Category
Computer Sciences
Research subject
INF303 Information Security; Information Systems
Identifiers
urn:nbn:se:hj:diva-62713 (URN)10.1007/978-3-642-27739-9_1781-1 (DOI)978-3-642-27739-9 (ISBN)
Note

© Springer Science+Business Media LLC 2022

Springer, Berlin, Heidelberg

Living reference work entry

First Online 16 March 2022

Available from: 2022-03-21 Created: 2023-10-24Bibliographically approved
Kävrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R. & Furnell, S. (2022). Evaluation of Contextual and Game-Based Training for Phishing Detection. Future Internet, 14(4)
Open this publication in new window or tab >>Evaluation of Contextual and Game-Based Training for Phishing Detection
Show others...
2022 (English)In: Future Internet, E-ISSN 1999-5903, Vol. 14, no 4Article in journal (Refereed) Published
Abstract [en]

Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical support for users comes from Information Security Awareness Training (ISAT), which makes the effectiveness of ISAT a key cybersecurity issue. This paper presents an evaluation of how two promising methods for ISAT support users in acheiving secure behavior using a simulated experiment with 41 participants. The methods were game-based training, where users learn by playing a game, and Context-Based Micro-Training (CBMT), where users are presented with short information in a situation where the information is of direct relevance. Participants were asked to identify phishing emails while their behavior was monitored using eye-tracking technique. The research shows that both training methods can support users towards secure behavior and that CBMT does so to a higher degree than game-based training. The research further shows that most participants were susceptible to phishing, even after training, which suggests that training alone is insufficient to make users behave securely. Consequently, future research ideas, where training is combined with other support systems, are proposed

Place, publisher, year, edition, pages
MDPI, 2022
Keywords
usable security, cybersecurity training, ISAT, SETA, phishing, user awareness, security behavior
National Category
Computer Sciences
Research subject
Information Systems; Interaction Lab (ILAB); INF303 Information Security
Identifiers
urn:nbn:se:hj:diva-62715 (URN)10.3390/fi14040104 (DOI)000786358900001 ()2-s2.0-85128214429 (Scopus ID)
Projects
Utveckling av beslutsstöd för användare i riskfyllda situationer online
Funder
The Swedish Post and Telecom Authority (PTS), 19-10617
Note

CC BY 4.0

Published: 25 March 2022

Correspondence: joakim.kavrestad@his.se

Available from: 2023-10-24 Created: 2023-10-24 Last updated: 2023-11-03Bibliographically approved
Kävrestad, J., Gellerstedt, M., Nohlberg, M. & Rambusch, J. (2022). Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Training. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings. Paper presented at 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022 (pp. 14-23). Cham: Springer Nature Switzerland AG
Open this publication in new window or tab >>Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Training
2022 (English)In: Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings / [ed] Nathan Clarke; Steven Furnell, Cham: Springer Nature Switzerland AG , 2022, p. 14-23Conference paper, Published paper (Refereed)
Abstract [en]

The importance of user behaviour in the cybersecurity domain is widely acknowledged. Users face cyberthreats such as phishing and fraud daily, both at work and in their private use of technology. Using training interventions to improve users’ knowledge, awareness, and behaviour is a widely accepted approach to improving the security posture of users. Research into cybersecurity training has traditionally assumed that users are provided such training as members of an organization. However, users in their private capacity are expected to cater for their own security. This research addresses this gap with a survey where 1437 Swedish adults participated. Willingness to adopt and pay for different cybersecurity training types was measured. The included types were; training delivered to users in a context where the training is of direct relevance, eLearning and game-based training. The participants were most willing to adopt and pay for contextual training, while eLearning was the second most favoured training type. We also measured if willingness to pay and adopt cybersecurity training was impacted by the participant’s worry about various cyber threats. Surprisingly, no meaningful correlation was found, suggesting that something else than worry mediates willingness to adopt and pay for cybersecurity training. 

Place, publisher, year, edition, pages
Cham: Springer Nature Switzerland AG, 2022
Series
IFIP Advances in Information and Communication Technology (IFIPAICT), ISSN 1868-4238, E-ISSN 1868-422X ; 658
Keywords
Behavioral research, E-learning, Personnel training, Surveys, Adoption, Cyber security, Cyberthreats, Pay, Phishing, Training intervention, User, User behaviors, User knowledge, Willingness, Cybersecurity, Training
National Category
Human Computer Interaction Information Systems, Social aspects
Research subject
Information Systems; Research on Citizen Centered Health, University of Skövde (Reacch US); Interaction Lab (ILAB)
Identifiers
urn:nbn:se:hj:diva-62718 (URN)10.1007/978-3-031-12172-2_2 (DOI)000885946500002 ()2-s2.0-85135010260 (Scopus ID)978-3-031-12171-5 (ISBN)978-3-031-12172-2 (ISBN)
Conference
16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022
Note

© 2022, IFIP International Federation for Information Processing.

© 2022 Springer Nature Switzerland AG. Part of Springer Nature.

Available from: 2022-08-16 Created: 2023-10-24Bibliographically approved
Kävrestad, J., Hagberg, A., Roos, R., Rambusch, J. & Nohlberg, M. (2022). Usable Privacy and Security from the Perspective of Cognitive Abilities (1ed.). In: Michael Friedewald; Stephan Krenn; Ina Schiering; Stefan Schiffner (Ed.), Privacy and Identity Management. Between Data Protection and Security: 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16–20, 2021, Revised Selected Papers. Paper presented at IFIP International Summer School on Privacy and Identity Management (pp. 105-121). Paper presented at IFIP International Summer School on Privacy and Identity Management. Springer
Open this publication in new window or tab >>Usable Privacy and Security from the Perspective of Cognitive Abilities
Show others...
2022 (English)In: Privacy and Identity Management. Between Data Protection and Security: 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16–20, 2021, Revised Selected Papers / [ed] Michael Friedewald; Stephan Krenn; Ina Schiering; Stefan Schiffner, Springer , 2022, 1, p. 105-121Chapter in book (Refereed)
Abstract [en]

Privacy, Information, and Cybersecurity (PICS) are related properties that have become a concern for more or less everyone. A large portion of the responsibility for PICS is put on the end-user, who is expected to adopt PICS tools, guidelines, and features to stay secure and maintain organizational security. However, the literature describes that many users do not adopt PICS tools and a key reason seems to be usability. This study acknowledges that the usability of PICS tools is a crucial concern and seeks to problematize further by adding cognitive ability as a key usability aspect. We argue that a user’s cognitive abilities determine how the user perceives the usability of PICS tools and that usability guidelines should account for varying cognitive abilities held by different user groups. This paper presents a case study with focus on how cognitive disabilities can affect the usability of PICS tools. Interviews with users with cognitive disabilities as well as usability experts, and experts on cognitive disabilities were conducted. The results suggest that many of the usability factors are shared by all users, cognitive challenges or not. However, cognitive challenges often cause usability issues to be more severe. Based on the results, several design guidelines for the usability of PICS tools are suggested.

Place, publisher, year, edition, pages
Springer, 2022 Edition: 1
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 644
Keywords
Privacy, Security, Usability, User, Cognitive Ability, Disability
National Category
Computer Sciences
Research subject
INF303 Information Security; Information Systems; Interaction Lab (ILAB)
Identifiers
urn:nbn:se:hj:diva-62719 (URN)10.1007/978-3-030-99100-5_9 (DOI)2-s2.0-85128608802 (Scopus ID)978-3-030-99099-2 (ISBN)978-3-030-99102-9 (ISBN)978-3-030-99100-5 (ISBN)
Conference
IFIP International Summer School on Privacy and Identity Management
Projects
Utveckling av beslutsstöd för användare i riskfyllda situationer online
Funder
The Swedish Post and Telecom Authority (PTS)
Note

Supported by the Swedish Post and Telecom Authority, and Begripsam.

Available from: 2022-04-05 Created: 2023-10-24Bibliographically approved
Holgersson, J., Kävrestad, J. & Nohlberg, M. (2021). Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?. In: Steven Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Paper presented at 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, Virtual Event, July 7–9, 2021 (pp. 12-21). Cham: Springer
Open this publication in new window or tab >>Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?
2021 (English)In: Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings / [ed] Steven Furnell; Nathan Clarke, Cham: Springer , 2021, p. 12-21Conference paper, Published paper (Refereed)
Abstract [en]

The rapid development of digitalization has led to a more or less endless variety of ways for individuals to communicate and interact with the outside world. However, in order to take advantage of all the benefits of digitalization, individuals need to have the necessary skills. Seniors represent a group that, compared to other groups, lives in a digital exclusion to an excessive extent, mainly due to the fact that they lack the necessary knowledge to use digital technology and digital services. Based on empirical data collected from seniors partaking in digital training, we have analyzed their perceptions of why they and other seniors are digitally excluded. Our findings point out that a major barrier for seniors to be more digitally included is different variants of fear of using digital technology and digital services. The common denominator can be traced down the possibilities to be exposed to frauds, scams, viruses, and faulty handling, which in turn cause undesired consequences. Consequently, we propose a research agenda where digital training and digital inclusion measurements should be studied side by side with cybersecurity behavior. Thus, making cybersecurity a fundamental part of digital inclusion has the potential to minimize the fears identified in this research as inhibitors to technology adoption.

Place, publisher, year, edition, pages
Cham: Springer, 2021
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 613
Keywords
Digital exclusion, Cybersecurity, Digital divide, Fear
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:hj:diva-62720 (URN)10.1007/978-3-030-81111-2_2 (DOI)000763607200002 ()2-s2.0-85112248784 (Scopus ID)978-3-030-81111-2 (ISBN)978-3-030-81110-5 (ISBN)978-3-030-81113-6 (ISBN)
Conference
15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, Virtual Event, July 7–9, 2021
Available from: 2021-08-17 Created: 2023-10-24Bibliographically approved
Kävrestad, J. & Nohlberg, M. (2021). Evaluation Strategies for Cybersecurity Training Methods: A Literature Review. In: Steven Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Paper presented at 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, Virtual Event, July 7–9, 2021 (pp. 102-112). Cham: Springer
Open this publication in new window or tab >>Evaluation Strategies for Cybersecurity Training Methods: A Literature Review
2021 (English)In: Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings / [ed] Steven Furnell; Nathan Clarke, Cham: Springer , 2021, p. 102-112Conference paper, Published paper (Refereed)
Abstract [en]

The human aspect of cybersecurity continues to present challenges to researchers and practitioners worldwide. While measures are being taken to improve the situation, a vast majority of security incidents can be attributed to user behavior. Security and Awareness Training (SAT) has been available for several decades and is commonly given as a suggestion for improving the cybersecurity behavior of end-users. However, attackers continue to exploit the human factor suggesting that current SAT methods are not enough. Researchers argue that providing knowledge alone is not enough, and some researchers suggest that many currently used SAT methods are, in fact, not empirically evaluated. This paper aims to examine how SAT has been evaluated in recent research using a structured literature review. The result is an overview of evaluation methods which describes what results that can be obtained using them. The study further suggests that SAT methods should be evaluated using a variety of methods since different methods will inevitably provide different results. The presented results can be used as a guide for future research projects seeking to develop or evaluate methods for SAT.

Place, publisher, year, edition, pages
Cham: Springer, 2021
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 613
Keywords
Security, Evaluation, Methods, Awareness, Training, User
National Category
Information Systems
Research subject
INF303 Information Security; Information Systems
Identifiers
urn:nbn:se:hj:diva-62721 (URN)10.1007/978-3-030-81111-2_9 (DOI)000763607200009 ()2-s2.0-85112344609 (Scopus ID)978-3-030-81111-2 (ISBN)978-3-030-81110-5 (ISBN)978-3-030-81113-6 (ISBN)
Conference
15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, Virtual Event, July 7–9, 2021
Available from: 2021-08-17 Created: 2023-10-24 Last updated: 2023-11-03Bibliographically approved
Salek, A. A., Kävrestad, J. & Nohlberg, M. (2021). Exploring Experiences of Using SETA in Nordic Municipalities. In: Steven Furnell; Nathan Clarke (Ed.), Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Paper presented at 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, Virtual Event, July 7–9, 2021 (pp. 22-31). Cham: Springer
Open this publication in new window or tab >>Exploring Experiences of Using SETA in Nordic Municipalities
2021 (English)In: Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings / [ed] Steven Furnell; Nathan Clarke, Cham: Springer , 2021, p. 22-31Conference paper, Published paper (Refereed)
Abstract [en]

User behavior is a key aspect of cybersecurity and it is well documented that insecure user behavior is the root cause of the majority of all cybersecurity incidents. Security Education, Training, and Awareness (SETA) is described by practitioners and researchers as the most important tool for improving cybersecurity behavior and has been for several decades. Further, there are several ways to work with SETA found in academic literature and a lot of research into various aspects of SETA effectiveness. However, the problem of insecure user behavior remains revealing a need for further research in the domain. While previous research have looked at the users’ experience of SETA, this study looks at SETA adoption from the perspective of the adopting organization. For this purpose, a survey was sent out to all Nordic municipalities with the intent of measuring if and how SETA is conducted, and how the respondents would ideally like to conduct SETA. The results show that a majority of the participating organizations use SETA and that e-learning is the most common delivery method. However, the results also show that gamification and embedded training is seldom used in practice nor a part of the participants’ picture of ideal SETA.

Place, publisher, year, edition, pages
Cham: Springer, 2021
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 613
National Category
Information Systems
Research subject
INF303 Information Security; Information Systems
Identifiers
urn:nbn:se:hj:diva-62722 (URN)10.1007/978-3-030-81111-2_3 (DOI)000763607200003 ()2-s2.0-85112297686 (Scopus ID)978-3-030-81111-2 (ISBN)978-3-030-81110-5 (ISBN)978-3-030-81113-6 (ISBN)
Conference
15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, Virtual Event, July 7–9, 2021
Available from: 2021-08-17 Created: 2023-10-24Bibliographically approved
Projects
Supporting secure behavior using ContextBased MicroTraining [2019-05021_Vinnova]; University of Skövde
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5962-9995

Search in DiVA

Show all publications