Short CVSebastian Pape is a senior researcher working at the Chair of Mobile Business & Multilateral Security at Goethe University Frankfurt and (co-)founder of the Social Engineering Academy. He successfully completed diplomas in mathematics (Dipl.-Math.) and computer science (Dipl.-Inform.) at Darmstadt University of Technology and holds a doctoral degree (Dr. rer. nat.) from the University of Kassel. From 2005 to 2011, he worked as research and teaching assistant at the Database Group (lead by Prof. Dr. Lutz Wegner) of the Department of Electrical Engineering and Computer Science of the University of Kassel. From 2011 to 2015, he was a senior researcher and teaching assistant at the Software Engineering for Critical Systems Group (lead by Prof. Dr. Jan Jürjens) of the Department of Computer Science Department of TU Dortmund University. From October 2014 to January 2015, he also was a visiting researcher (of Prof. Dr. Fabio Massacci) at the security group of the Department of Information Engineering and Computer Science of University of Trento. From October 2018 to August 2019 he was standing in as a professor for business informatics at Regensburg University. Lists of my publications, given talks, projects I have been involved, teaching activities and further scientific activities can be found on dedicated pages.
- August 18th, 2021: I was invited to the IFIP Summerschool on Privacy & Identity Management to give a keynote on Serious Games for Security and Privacy Awareness
- July 12th, 2021: Proud that David succesfully defended his phd thesis, today!
- June 23rd, 2021: Just presented our paper Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App at IFIP SEC 2021.
- June 21st, 2021: Our paper The THREAT-ARREST cyber ranges platform about THREAT-ARREST was accepted at the IEEE CSR Workshop on Cyber Ranges and Security Training (CRST)
- June 11th, 2021: The poster Leech: Let's Expose Evidently bad data Collecting Habits - Towards a Serious Game on Understanding Privacy Policies (Poster) with Alexander and Michaela was accepted at SOUPS's poster track.
- June 11th, 2021: The poster Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym (Poster) with David and Kai was accepted at SOUPS's poster track.
- April 29th, 2021: Another Statement about digital contact tracing is now online.
- April 18th, 2021: The paper Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities with Christopher, Michael and David was accepted for publication at Computers and Security.
- April 16th, 2021: The paper Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment with David was accepted for publication at Computers in Human Behaviour.
- April 14th, 2021: The paper Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy with Dennis was accepted for publication at the Journal Datenschutz und Datensicherheit.
- April 11th, 2021: The paper Explainable Machine Learning for Default Privacy Setting Prediction with Sascha, Welde and Toru was accepted for publication at IEEE Access.
- March 23rd, 2021: The paper Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App with David and Jacob was accepted for publication at IFIP SEC 2021.
- February 22nd, 2021: I passed my habilitation lecture on Fairness in Machine Learning (German) at Goethe University Frankfurt.
- January 19th, 2021: Vanessa presented our paper Investigating User Intention to Use a Privacy Sensitive Information Detection Tool at SCIS.
- January 18th, 2021: My habilitation thesis was accepted by the extended faculty council of the mathematics and computer science faculty at Goethe University Frankfurt.
- November 28th, 2020: Empirically Investigating Extraneous Influences on the "APCO" Model - Childhood Brand Nostalgia and the Positivity Bias with David has been accepted for publication at Future Internet.
- November 2nd, 2020: Open Materials Discourse accompanying the paper Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan with Ana, David, Toru, Shinsaku, Haruo and Kai online at AIS Transactions on Replications Research.
- August 19th, 2020: The paper Conceptualization of a CyberSecurity Awareness Quiz with Ludger, Alejandro and Kristian was accepted for publication at the 2nd Model-Driven Simulation and Training Environments for Cybersecurity (MSTEC).
- August 11th, 2020: The paper Systematic Scenario Creation for Serious Security-Awareness Games with Vera was accepted for publication at the 2nd Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE).
- July 30th, 2020: The article Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan with Ana, David, Toru, Shinsaku, Haruo and Kai was accepted for publication at AIS Transactions on Replications Research.
- June 9th, 2020: The article Asset-centric analysis and visualisation of attack trees with Christopher and Andre was accepted for presentation at Gramsec 2020.
- May 6th, 2020: The article Selecting a Secure Cloud Provider: An Empirical Study and Multi Criteria Approach with Federica, Jan and Fabio was accepted for publication at Information.
- April 19th, 2020: Joint Statement on Contact Tracing
My current research focus is in the area of security and privacy with a particular interest in a holistic view on the examined systems. In particular, my research interests include, but are not limited to (naturally there will be an overlap between some of the topics):
Usability and Human behaviorIt is important to design usable systems since otherwise improved security or privacy features won't be accepted by the users. On the other hand, usability is not the only factor deciding if a user accepts a certain system. I investigate how much certain factors influence the users' acceptance of privacy enhancing technologies and security measures.
Serious Games and GamificationI aim to enable users to detect and defend social engineering attacks and privacy violations, to regard security considerations and to understand privacy implications. For that purpose, I develop and evaluate Serious Games and gamify processes and systems to improve user engagement and productivity.
Privacy-Enhancing TechnologiesI investigate the development of secure and privacy-friendly architectures and practical solutions, such as anonymous e-commerce or the application of privacy patterns within fog and cloud computing environments. In particular, one of the re-occurring challenges is to make use of Privacy-Enhancing Technologies without degrading performance or usability.
Modeling & Measuring Privacy and Security
Applied CrytographyI am also interested in applied cryptography for security and privacy purposes and the development of (crytographic) attacker models to get further insights about the chances of attackers to successfully break crytographic systems.
- Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment.
In Computers in Human Behavior, 122, 2021.
- Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities.
In Computers & Security, 108, 2021.
Citations: 1 (Google Scholar);
- Explainable Machine Learning for Default Privacy Setting Prediction.
In IEEE Access, 9: 63700-63717, 2021.
- Requirements Engineering and Tool-Support for Security and Privacy.
- Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2020 (2): 111-128, 2020.
Citations: 12 (Google Scholar); 4 (Open Citations);
- LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security.
In Computers & Security, 90, 2020.
Citations: 17 (Google Scholar); 14 (Researchgate); 8 (Open Citations);
- How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory.
In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
Citations: 15 (Google Scholar); 10 (Researchgate); 4 (Open Citations);
- Applying Privacy Patterns to the Internet of Things' (IoT) Architecture.
In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
Citations: 30 (Google Scholar); 28 (Researchgate); 12 (Open Citations);
- Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go.
In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
Citations: 26 (Google Scholar); 22 (Researchgate); 6 (Open Citations);
- Social engineering defence mechanisms and counteracting training strategies.
In Information and Computer Security, 25 (2): 206-222, 2017.
Citations: 32 (Google Scholar); 24 (Researchgate); 15 (Open Citations);
- A Serious Game for Eliciting Social Engineering Security Requirements.
In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
Citations: 66 (Google Scholar); 47 (Researchgate); 22 (Open Citations);
- STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper.
In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
Citations: 7 (Google Scholar); 6 (Researchgate); 2 (Open Citations);
- Sample or Random Security - A Security Model for Segment-Based Visual Cryptography.
In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
Citations: 1 (Google Scholar); 2 (Researchgate);
- Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise.
Springer Vieweg, Research , 2014.
Citations: 7 (Google Scholar); 2 (Open Citations);
- Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers.
In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
Citations: 18 (Google Scholar); 14 (Researchgate); 8 (Open Citations);