Publications
(sort by type) (sort by year)2024
- Navigating Privacy Patterns in the Era of Robotaxis. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024, International Workshop on Privacy Engineering (IWPE) 2024, pages 32-39, 2024.
Citations: - User Issues and Concerns in Generative AI: A Mixed-Methods Analysis of App Reviews. In 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), 2024.
Citations:
2023
- A Systematic Approach for Automotive Privacy Management. In CSCS '23: ACM Computer Science in Cars Symposium, Darmstadt, Germany, December 5th, 2023, ACM, 2023.
Citations: - Study on the technical evaluation of decentralization based de-identification procedures for personal data in the automotive sector. Technical Report 371, Forschungsvereinigung Automobiltechnik e.V. (FAT), 2023.
Citations: - Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts. In 20th Annual International Conference on Privacy, Security & Trust (PST 2023), Copenhagen, Denmark, 21-23 August, 2023.
Citations: - User Acceptance Criteria for Privacy Preserving Machine Learning Techniques. In Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pages 149:1-149:8, ACM, 2023, 20th International Workshop on Trust, Privacy and Security in the Digital Society.
Citations: - PHOENI2X -- A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange. Technical Report, 2023.
Citations: - PHOENI2X - A European Cyber Resilience Framework With Artificial Intelligence-Assisted Orchestration Automation For Business Continuity, Incident Response & Information Exchange. In IEEE CSR, 2023.
Citations: - Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools. In ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Proceedings, 2023.
Citations: - A Privacy Calculus Model for Contact Tracing Apps: Analyzing the Use Behavior of the German Corona-Warn-App with a Longitudinal User Study. In Computers & Security: 103338, 2023.
Citations: - Acceptance Factors and Obstacles for Cryptocurrency Adoption. In EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, pages 26-33, 2023.
Citations: - The Influence of Privacy Concerns on Cryptocurrency Acceptance. In ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Proceedings, 2023.
Citations: - The impact of individuals' social environments on contact tracing app use: Survey Study. In JMIR Human Factors, 10:e45825, 2023.
Citations: - Acceptance Factors of Privacy-Enhancing Technologies on the Basis of Tor and JonDonym. In Human Factors in Privacy Research, pages 299-320, Springer International Publishing, 2023.
Citations: - Comparing the Effect of Privacy and Non-privacy Social Media Photo Tools on Factors of Privacy Concern. In Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, pages 669-676, 2023.
Citations: - Why Individuals Do (Not) Use Contact Tracing Apps: A Health Belief Model Perspective on the German Corona-Warn-App. In Healthcare, 11 (4), 2023.
Citations: 2 (Google Scholar); - Privacy and Identity Management -- 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022 Virtual Event, August 30 - September 2, 2022 Proceedings. Springer, IFIP AICT 671, 2023.
Citations:
2022
- A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility. In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
Citations: - Properties for Cybersecurity Awareness Posters' Design and Quality Assessment. In ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pages 79:1-79:8, 2022, ETACS 2022.
Citations: 4 (Google Scholar); - A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App. In ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, pages 3-19, IFIP Advances in Information and Communication Technology 648, 2022.
Citations: 4 (Google Scholar); - A Discussion on Ethical Cybersecurity Issues in Digital Service Chains. In Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pages 222-256, Springer, Lecture Notes in Computer Science 13300, 2022.
Citations: 6 (Google Scholar); - "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (3): 57-78, 2022.
Citations: 8 (Google Scholar); - Guidelines for Enhancement of Societal Security Awareness. Technical Report Deliverable 3.19, CyberSec4Europe, 2022.
Citations: - Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (1): 6-27, 2022.
Citations: 27 (Google Scholar); 3 (Open Citations);
2021
- Security Requirements and Risks Conceptualization. Technical Report Deliverable 3.16, CyberSec4Europe, 2021.
Citations: - Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing. In CSCS '21: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, November 30th, 2021, pages 7:1-7:11, ACM, 2021.
Citations: 12 (Google Scholar); - The THREAT-ARREST cyber ranges platform. In IEEE International Conference on Cyber Security and Resilience (CSR), IEEE, 2021.
Citations: 8 (Google Scholar); 2 (Open Citations); - Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment. In Computers in Human Behavior, 122, 2021.
Citations: 39 (Google Scholar); 11 (Open Citations); - Response data - Survey on privacy impacts of voice & speech analysis. DepositOnce, 2021.
Citations: - Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities. In Computers & Security, 108, 2021.
Citations: 27 (Google Scholar); 2 (Open Citations); - The THREAT-ARREST dissemination and exploitation report v.2. Technical Report Deliverable 8.8, Threat-Arrest, 2021.
Citations: - Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym (Poster). In 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021.
Citations: - Leech: Let's Expose Evidently bad data Collecting Habits - Towards a Serious Game on Understanding Privacy Policies (Poster). In 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021.
Citations: - Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy. In Datenschutz und Datensicherheit, 45 (5): 310-314, 2021.
Citations: 1 (Google Scholar); 1 (Open Citations); - Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Technical Report, Goethe University Frankfurt, 2021.
Citations: 7 (Google Scholar); 1 (Open Citations); - Explainable Machine Learning for Default Privacy Setting Prediction. In IEEE Access, 9: 63700-63717, 2021.
Citations: 12 (Google Scholar); 2 (Open Citations); - Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App. In ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, pages 256-269, Springer, IFIP Advances in Information and Communication Technology 625, 2021.
Citations: 12 (Google Scholar); 4 (Open Citations); - THREAT-ARREST serious games v2. Technical Report Deliverable 4.9, Threat-Arrest, 2021.
Citations: - The Stakeholders' Engagement & Online Channels Report v2. Technical Report Deliverable 8.7, Threat-Arrest, 2021.
Citations: -
Citations: 3 (Google Scholar); - Challenges for Designing Serious Games on Security and Privacy Awareness. In Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pages 3-16, Springer, IFIP Advances in Information and Communication Technology 644, 2021.
Citations: 1 (Open Citations);
2020
- Empirically Investigating Extraneous Influences on the ``APCO'' Model - Childhood Brand Nostalgia and the Positivity Bias. In Future Internet, 12(12) (220), 2020.
Citations: 5 (Google Scholar); 1 (Open Citations); - Asset-centric analysis and visualisation of attack trees. In Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers, pages 45-64, Springer, LNCS 12419, 2020.
Citations: 4 (Google Scholar); 1 (Open Citations); - Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
Citations: 11 (Google Scholar); - Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
Citations: 3 (Google Scholar); - Cybersecurity outlook 1. Technical Report Deliverable 3.10, CyberSec4Europe, 2020.
Citations: - Systematic Scenario Creation for Serious Security-Awareness Games. In Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers, Springer International Publishing, Cham, LNCS 12580, 2020.
Citations: 5 (Google Scholar); 2 (Open Citations); - Conceptualization of a CyberSecurity Awareness Quiz. In Computer Security - ESORICS 2020 International Workshops MSTEC, pages 61-76, Springer International Publishing, Cham, LNCS 12512, 2020.
Citations: 11 (Google Scholar); 3 (Open Citations); -
Citations: 2 (Google Scholar); - CyberSec4Europe summer schools 1. Technical Report Deliverable 9.7, CyberSec4Europe, 2020.
Citations: - Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2020 (2): 111-128, 2020.
Citations: 40 (Google Scholar); 13 (Open Citations); - Selecting a Secure Cloud Provider: An Empirical Study and Multi Criteria Approach. In Information, 11 (5), 2020.
Citations: 6 (Google Scholar); 1 (Open Citations); - Initial Prototype of Integrated THREAT-ARREST Platform. Technical Report Deliverable 6.1, Threat-Arrest, 2020.
Citations: - Initial installation and usage guidelines for the THREAT-ARREST platform. Technical Report Deliverable 6.2, Threat-Arrest, 2020.
Citations: - Usability Requirements Validation. Technical Report Deliverable 3.7, CyberSec4Europe, 2020.
Citations: - On the use of Information Security Management Systems by German Energy Providers. In Presented at the Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020.
Citations: - LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security. In Computers & Security, 90, 2020.
Citations: 41 (Google Scholar); 14 (Researchgate); 19 (Open Citations); - The Stakeholders' Engagement & Online Channels Report. Technical Report Deliverable 8.4, Threat-Arrest, 2020.
Citations: - The THREAT-ARREST dissemination and exploitation report v.1 1. Technical Report Deliverable 8.5, Threat-Arrest, 2020.
Citations: - Clustering results and SU-ICT-03 project CONCERTATION conference year 1. Technical Report Deliverable 10.1, CyberSec4Europe, 2020.
Citations: - Usable security & privacy methods and recommendations. Technical Report Deliverable 3.5, CyberSec4Europe, 2020.
Citations: - Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym. IEEE Dataport, 2020.
Citations: - Dataset on Actual Users of the Privacy-Enhancing Technology Tor. IEEE Dataport, 2020.
Citations: - How Privacy Concerns, Trust and Risk Beliefs and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor. In ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 51 (1): 51-69, 2020.
Citations: 29 (Google Scholar); 5 (Open Citations);
2019
- Investigating Privacy Concerns related to Mobile Augmented Reality Applications. In Proceedings of the 40th International Conference on Information Systems ICIS 2019, Munich, Germany, December 13-15, 2019, 2019.
Citations: 11 (Google Scholar); - PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks. In Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 156-171, Springer International Publishing, Cham, LNCS 11981, 2019.
Citations: 15 (Google Scholar); 4 (Open Citations); - How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory. In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
Citations: 37 (Google Scholar); 10 (Researchgate); 9 (Open Citations); - An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 287-306, Springer International Publishing, Cham, LNCS 11980, 2019.
Citations: 5 (Google Scholar); - A Systematic Analysis of User Evaluations in Security Research. In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
Citations: 5 (Google Scholar); 3 (Researchgate); 2 (Open Citations); -
Citations: - Aggregating Corporate Information Security Maturity Levels of Different Assets. In Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers, pages 376-392, Springer Boston, IFIP Advances in Information and Communication Technology , 2019.
Citations: 1 (Google Scholar); - THREAT-ARREST THREAT serious games v1. Technical Report Deliverable 4.2, Threat-Arrest, 2019.
Citations: - Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym?. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
Citations: 12 (Google Scholar); 4 (Open Citations); - ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 165-179, 2019, Acceptance rate: 26 / 142 = 18.3%.
Citations: 2 (Google Scholar); 3 (Researchgate); 2 (Open Citations); - Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
Citations: 46 (Google Scholar); 31 (Researchgate); 23 (Open Citations); - A structured comparison of the corporate information security. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 223-237, 2019, Acceptance rate: 26 / 142 = 18.3%.
Citations: 8 (Google Scholar); 2 (Open Citations); - Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur. In Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), February 24-27, 2019, Siegen, Germany, pages 1978, 2019.
Citations: - THREAT-ARREST platform's initial reference architecture. Technical Report Deliverable 1.3, Threat-Arrest, 2019.
Citations: - How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies -- The Case of Tor. In 52nd Hawaii International Conference on System Sciences (HICSS) 2019, pages 4851-4860, 2019, Acceptance rate: 48%.
Citations: 24 (Google Scholar); 11 (Researchgate); - Abschlussbericht:Verbundprojekt: Anonymität Online der nächsten Generation (AN. ON-Next); Teilvorhaben:" Standardisierung und Geschäftsmodelle". Technical Report, Goethe-Universität Frankfurt am Main, 2019.
Citations: - Abschlussbericht: SIDATE-Sichere Informationsnetze bei kleinen und mittleren Energieversorgern; Teilvorhaben: IT-Sicherheitsmetriken für kleine und mittlere Energieversorger. Technical Report, Goethe-Universität Frankfurt am Main, 2019.
Citations: - Abschlussbericht: Selbstdatenschutz im Online-Commerce (SIOC); Teilvorhaben: Architektur, Modellierung und Nutzerakzeptanz von Selbstdatenschutztechniken im Online-Commerce. Technical Report, Goethe-Universität Frankfurt am Main, 2019.
Citations:
2018
- Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2018.
Citations: - Cyber-Gefahren auf dem Radar. In ManagementKompass: Unternehmen schützen -- Risiken minimieren, November (03): pages 9-12, 2018.
Citations: - JonDonym Users' Information Privacy Concerns. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
Citations: 17 (Google Scholar); 6 (Researchgate); 8 (Open Citations); - Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
Citations: 23 (Google Scholar); 11 (Researchgate); 6 (Open Citations); - German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire. Technical Report, SSRN, 2018.
Citations: 23 (Google Scholar); 9 (Open Citations); - German Translation of the Concerns for Information Privacy (CFIP) Construct. Technical Report, SSRN, 2018.
Citations: 16 (Google Scholar); 6 (Open Citations); - PERSUADED: Fighting Social Engineering Attacks with a Serious Game. In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
Citations: 26 (Google Scholar); 7 (Researchgate); 6 (Open Citations); - Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE). In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
Citations: 2 (Google Scholar); 1 (Researchgate); - Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
Citations: 1 (Researchgate); - Das SIDATE-Portal im Einsatz. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
Citations: - Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
Citations: 7 (Google Scholar); 2 (Researchgate); 1 (Open Citations); - SIDATE: Gefährdungen und Sicherheitsmassnahmen. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
Citations: - Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
Citations: 16 (Google Scholar); 12 (Researchgate); - Juristische Bewertung eines Social-Engineering-Abwehr Trainings. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
Citations: - Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
Citations: 2 (Google Scholar); 2 (Researchgate); - Easing the Burden of Security Self-Assessments. In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
Citations: 6 (Google Scholar); 1 (Researchgate);
2017
- Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. Technical Report, Cornell University, arXiv, 2017.
Citations: 5 (Google Scholar); 2 (Researchgate); - IT Security Status of German Energy Providers. Technical Report, Cornell University, arXiv, 2017.
Citations: 3 (Google Scholar); - Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2017.
Citations: - Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment. In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
Citations: 3 (Google Scholar); 4 (Researchgate); - A Structured Comparison of Social Engineering Intelligence Gathering Tools. In Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pages 232-246, 2017, Revision 1, Table 7 was corrected, see https://link.springer.com/10.1007/978-3-319-64483-7_16.
Citations: 8 (Google Scholar); 3 (Researchgate); 4 (Open Citations); - Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
Citations: 14 (Google Scholar); 5 (Researchgate); 5 (Open Citations); -
Citations: - Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
Citations: 39 (Google Scholar); 25 (Researchgate); 9 (Open Citations); - Technische Bedingungen wirksamer Verschlüsselung. In Jahrbuch 2016, Deutsche Gesellschaft für Recht und Informatik, 2017, available via https://www.dgri.de/55/Publikationen/Schriftenreihe-der-DGRI.htm.
Citations: - Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
Citations: 52 (Google Scholar); 25 (Researchgate); 21 (Open Citations); - Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie. In Tagung der Sektion ``Empirische Bildungsforschung'' -- Educational Research and Governance (AEPF 2017), 2017.
Citations:
2016
- Challenges in Detecting Privacy Revealing Information in Unstructured Text. In Workshop on Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2016 at the International Semantic Web Conference (ISWC) 2016, Kobe, Japan, 2016.
Citations: 12 (Google Scholar); 5 (Researchgate); - On Gender Specific Perception of Data Sharing in Japan. In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pages 150-160, 2016, Acceptance rate: 27/139 = 20.9%.
Citations: 6 (Google Scholar); 5 (Researchgate); 1 (Open Citations); - A Serious Game for Eliciting Social Engineering Security Requirements. In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
Citations: 109 (Google Scholar); 49 (Researchgate); 42 (Open Citations); - HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering. In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
Citations: 28 (Google Scholar); 25 (Researchgate); - Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger. In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
Citations: - Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
Citations: 4 (Google Scholar); 3 (Researchgate); - STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
Citations: 19 (Google Scholar); 7 (Researchgate); 4 (Open Citations); - A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
Citations: 16 (Google Scholar); 7 (Researchgate);
2015
- Why Open Data May Threaten Your Privacy. In Workshop on Privacy and Inference, co-located with KI, 2015.
Citations: 9 (Google Scholar);
2014
- Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
Citations: 2 (Google Scholar); 2 (Researchgate); - Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, Research , 2014.
Citations: 10 (Google Scholar); 3 (Open Citations);
2013
-
Citations: - Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
Citations: 17 (Google Scholar); 14 (Researchgate); 9 (Open Citations);
2012
- TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions. In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
Citations: 16 (Google Scholar); 6 (Researchgate); 4 (Open Citations); - Report on the RS3 Topic Workshop "Security Properties in Software Engineering". Technical Report, Universitätsbibliothek der Universität Augsburg, Universitätsstr. 22, 86159 Augsburg, 2012.
Citations:
2010
- Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster). In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
Citations: - A Framework for TEI-Based Scholarly Text Editions. Technical Report, Universität Kassel, 2010.
Citations: -
Citations:
2009
- A Survey on Non-transferable Anonymous Credentials. In The Future of Identity in the Information Society, pages 107-118, Springer Boston, Brno, Czech Republic, IFIP Advances in Information and Communication Technology 298, 2009.
Citations: 4 (Google Scholar); 2 (Researchgate); - Some Observations on Reusing One-Time Pads within Dice Codings (abstract). Technical Report, in Tagungsband zum 10. Kryptotag, Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft für Informatik, 2009.
Citations: - Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen. In GI Jahrestagung: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 28.9.-2.10.2009, Lübeck, Proceedings, pages 186-190, GI, LNI 154, 2009.
Citations:
2008
- Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem. Vdm Verlag Dr. Müller, 2008.
Citations: - Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In The Future of Identity in the Information Society, pages 299-310, Springer Boston, IFIP International Federation for Information Processing 262, 2008.
Citations: 1 (Google Scholar); - Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials (extended abstract)., 2008.
Citations: - Embedding Biometric Information into Anonymous Credentials. Technical Report 68, in Extended Abstracts of the Second Privacy Enhancing Technologies Convention (PET-CON 2008.1), 2008.
Citations: 2 (Google Scholar); 1 (Researchgate);
2004
- Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops. In Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04, 2004.
Citations: 15 (Google Scholar); 9 (Researchgate); -
Citations: