• Can Blockchain Spark off the Reincarnation of India’s Living Dead? 

      Pandey, Pankaj (Chapter, 2018)
      A large number of studies have found a negative correlation between economic growth and corruption. Therefore, governments implement various anti-corruption measures particularly technology-based mechanisms. The government ...
    • Towards automated threat-based risk assessment for cyber security in smarthomes 

      Pandey, Pankaj; Collen, Anastasija; Nijdam, Niels Alexander; Anagnostopoulos, Marios; Katsikas, Sokratis; Konstantas, Dimitri (Journal article; Peer reviewed, 2019)
      Cyber security is a concern of each citizen, especially when it comes to novel technologies surrounding us in our daily lives. Fighting a cyber battle while enjoying your cup of coffee and observing gentle lights dimming ...
    • Using Blockchains to strengthen the security of Internet of Things 

      Kouzinopoulos, Charalampos S.; Spathoulas, Georgios; Giannoutakis, Konstantinos M.; Votis, Konstantinos; Pandey, Pankaj; Tzovaras, Dimitrios; Katsikas, Sokratis; Collen, Anastasija; Nijdam, Niels Alexander (Chapter, 2018)
      Blockchain is a distributed ledger technology that became popular as the foundational block of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in terms of research and commercial usage. ...
    • Using Financial Instruments to Transfer the Information Security Risks 

      Pandey, Pankaj; Snekkenes, Einar (Journal article; Peer reviewed, 2016)
      For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem ...
    • Using Theories from Economics and Finance for Information Security Risk Management 

      Pandey, Pankaj (Doctoral theses at NTNU;2016:187, Doctoral thesis, 2016)
      Risk management in information security has traditionally been approached from a technical perspective, and a variety of technical controls are deployed to prevent any future information security event. However, recent ...