Publications

(sort by type) (sort by year)

2024

  1. Al-Momani, A.; Balenson, D.; Mann, Z. &.; Pape, S.; Petit, J. and Bösch, C.: Navigating Privacy Patterns in the Era of Robotaxis. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024, International Workshop on Privacy Engineering (IWPE) 2024, pages 32-39, 2024.
    PDFDOILinkLinkLinkLink Abstract ABMPPB24iwpeBibtexprivacypetsiotautopsy

    Citations:

  2. Bracamonte, V.; Loebner, S.; Tronnier, F.; Lieberknecht, A-K. and Pape, S.: User Issues and Concerns in Generative AI: A Mixed-Methods Analysis of App Reviews. In 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), 2024.
    Abstract BLTLP24chiraBibtexprivacymachine learning

    Citations:

2023

  1. Pape, S.; Syed-Winkler, S.; Garcia, A. M.; Chah, B.; Bkakria, A.; Hiller, M.; Walcher, T.; Lombard, A.; Abbas-Turki, A. and Yaich, R.: A Systematic Approach for Automotive Privacy Management. In CSCS '23: ACM Computer Science in Cars Symposium, Darmstadt, Germany, December 5th, 2023, ACM, 2023.
    PDFDOILinkLinkLinkLink Abstract PSGCBHWLAY23cscsBibtexprivacypetsautopsy

    Citations:

  2. Rannenberg, K.; Pape, S.; Tronnier, F. and Löbner, S.: Study on the technical evaluation of decentralization based de-identification procedures for personal data in the automotive sector. Technical Report 371, Forschungsvereinigung Automobiltechnik e.V. (FAT), 2023.
    LinkLinkLink Abstract RPTL23fatBibtexprivacypets

    Citations:

  3. Bracamonte, V.; Pape, S.; Löbner, S. and Tronnier, F.: Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts. In 20th Annual International Conference on Privacy, Security & Trust (PST 2023), Copenhagen, Denmark, 21-23 August, 2023.
    PDFDOILinkLinkLinkLink Abstract BPLT23pstBibtexmachine learning

    Citations:

  4. Löbner, S.; Pape, S. and Bracamonte, V.: User Acceptance Criteria for Privacy Preserving Machine Learning Techniques. In Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pages 149:1-149:8, ACM, 2023, 20th International Workshop on Trust, Privacy and Security in the Digital Society.
    PDFDOILinkLinkLinkLink Abstract LPB23trustbusBibtexprivacypetsmachine learningcs4e

    Citations:

  5. Fysarakis, K.; Lekidis, A.; Mavroeidis, V.; Lampropoulos, K.; Lyberopoulos, G.; Vidal, I. G-M.; Casals, J. C. T. i; Luna, E. R.; Sancho, A. A. M.; Mavrelos, A.; Tsantekidis, M.; Pape, S.; Chatzopoulou, A.; Nanou, C.; Drivas, G.; Photiou, V.; Spanoudakis, G. and Koufopavlou, O.: PHOENI2X -- A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange. Technical Report, 2023.
    PDFDOILinkLinkLinkLink Abstract FLMLLVVLSMTPCNDPSK23arxivBibtexsecurityserious gamephoeni2x

    Citations:

  6. Fysarakis, K.; Lekidis, A.; Mavroeidis, V.; Lampropoulos, K.; Lyberopoulos, G.; Vidal, I. G-M.; Casals, J. C. T. i; Luna, E. R.; Sancho, A. A. M.; Mavrelos, A.; Tsantekidis, M.; Pape, S.; Chatzopoulou, A.; Nanou, C.; Drivas, G.; Photiou, V.; Spanoudakis, G. and Koufopavlou, O.: PHOENI2X - A European Cyber Resilience Framework With Artificial Intelligence-Assisted Orchestration Automation For Business Continuity, Incident Response & Information Exchange. In IEEE CSR, 2023.
    PDFDOILinkLinkLinkLink Abstract FLMLLVVLSMTPCNDPSK23csrBibtexsecurityserious gamephoeni2x

    Citations:

  7. Bracamonte, V.; Pape, S. and Löbner, S.: Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools. In ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Proceedings, 2023.
    PDFLinkLink Abstract BPL23ifipsecBibtexprivacyhuman factors

    Citations:

  8. Harborth, D. and Pape, S.: A Privacy Calculus Model for Contact Tracing Apps: Analyzing the Use Behavior of the German Corona-Warn-App with a Longitudinal User Study. In Computers & Security: 103338, 2023.
    PDFDOILinkLinkLinkLink Abstract HP23coseBibtexprivacyhuman factorscs4e

    Citations:

  9. Hamm, P.; Pape, S. and Harborth, D.: Acceptance Factors and Obstacles for Cryptocurrency Adoption. In EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, pages 26-33, 2023.
    PDFDOILinkLinkLinkLink Abstract HPH23eiccBibtexprivacyhuman factors

    Citations:

  10. Hamm, P.; Pape, S. and Rannenberg, K.: The Influence of Privacy Concerns on Cryptocurrency Acceptance. In ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Proceedings, 2023.
    PDFDOILinkLinkLinkLink Abstract HPR23ifipsecBibtexhuman factorssioc

    Citations:

  11. Sadeghi, A.; Pape, S. and Harborth, D.: The impact of individuals' social environments on contact tracing app use: Survey Study. In JMIR Human Factors, 10:e45825, 2023.
    PDFDOILinkLinkLinkLink Abstract SPH23jmirhfBibtexhuman factorsiotcs4e

    Citations:

  12. Pape, S. and Harborth, D.: Acceptance Factors of Privacy-Enhancing Technologies on the Basis of Tor and JonDonym. In Human Factors in Privacy Research, pages 299-320, Springer International Publishing, 2023.
    PDFDOILinkLinkLinkLink Abstract PH23hfiprBibtexprivacyhuman factorspets

    Citations:

  13. Bracamonte, V.; Pape, S. and Löbner, S.: Comparing the Effect of Privacy and Non-privacy Social Media Photo Tools on Factors of Privacy Concern. In Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, pages 669-676, 2023.
    PDFDOILinkLinkLinkLink Abstract BPL23icisspBibtexprivacyhuman factorspets

    Citations:

  14. Harborth, D.; Pape, S. and McKenzie, L.: Why Individuals Do (Not) Use Contact Tracing Apps: A Health Belief Model Perspective on the German Corona-Warn-App. In Healthcare, 11 (4), 2023.
    PDFDOILinkLinkLinkLink Abstract HPM23healthcareBibtexhuman factors

    Citations: 2 (Google Scholar);

  15. Bieker, F.; Meyer, J.; Pape, S.; Schiering, I. and Weich, A., ed.: Privacy and Identity Management -- 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022 Virtual Event, August 30 - September 2, 2022 Proceedings. Springer, IFIP AICT 671, 2023.
    PDFDOILinkLinkLink Abstract BMPSW23ifipscBibtex

    Citations:

2022

  1. Syed-Winkler, S.; Pape, S. and Sabouri, A.: A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility. In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
    PDFDOILinkLinkLinkLink Abstract SPS22cscsBibtexprivacypetscloud computingiotautopsy

    Citations:

  2. Chaudhary, S.; Kompara, M.; Pape, S. and Gkioulos, V.: Properties for Cybersecurity Awareness Posters' Design and Quality Assessment. In ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pages 79:1-79:8, 2022, ETACS 2022.
    PDFDOILinkLinkLinkLink Abstract CKPG22etacsBibtexsecurityhuman factorscs4e

    Citations: 4 (Google Scholar);

  3. Harborth, D. and Pape, S.: A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App. In ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, pages 3-19, IFIP Advances in Information and Communication Technology 648, 2022.
    PDFPresentation slidesDOILinkLinkLinkLinkVideo Abstract HP22ifipsecBibtexprivacycs4e

    Citations: 4 (Google Scholar);

  4. Tronnier, F.; Pape, S.; Löbner, S. and Rannenberg, K.: A Discussion on Ethical Cybersecurity Issues in Digital Service Chains. In Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pages 222-256, Springer, Lecture Notes in Computer Science 13300, 2022.
    PDFDOILinkLinkLinkLink Abstract TPLR22guardBibtexsecurityhuman factors

    Citations: 6 (Google Scholar);

  5. Bracamonte, V.; Pape, S. and Löbner, S.: "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (3): 57-78, 2022.
    PDFDOILinkLinkLinkLink Abstract BPL22petsBibtexprivacyiotmachine learningcs4e

    Citations: 8 (Google Scholar);

  6. Chaudhary, S.; Pape, S.; Kompara, M.; Kavallieratos, G. and Gkioulos, V.: Guidelines for Enhancement of Societal Security Awareness. Technical Report Deliverable 3.19, CyberSec4Europe, 2022.
    PDFDOILinkLink Abstract CS4E22D3.19Bibtexprivacysecurityhuman factorsserious gamecs4e

    Citations:

  7. Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (1): 6-27, 2022.
    PDFDOILinkLinkLinkLink Abstract KGPBU22petsBibtexprivacyiotmachine learning

    Citations: 27 (Google Scholar); 3 (Open Citations);

2021

  1. Outi-Marja, L.; Cheminod, M.; Pape, S.; Tesfay, W. B.; Beckerle, M.; Fischer-Hübner, S.; Preuveneers, D.; Hassan, A.; Pasquale, L.; Kezmah, B.; Kompara, M.; Rodriguez, J. G.; Moreno, R. T. and Martinie, C.: Security Requirements and Risks Conceptualization. Technical Report Deliverable 3.16, CyberSec4Europe, 2021.
    PDFDOILinkLink Abstract CS4E21D3.16Bibtexprivacysecuritycs4e

    Citations:

  2. Löbner, S.; Tronnier, F.; Pape, S. and Rannenberg, K.: Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing. In CSCS '21: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, November 30th, 2021, pages 7:1-7:11, ACM, 2021.
    PDFDOILinkLinkLinkLink Abstract LTPR21cscsBibtexprivacypetsiot

    Citations: 12 (Google Scholar);

  3. Hatzivasilis, G.; Ioannidis, S.; Smyrlis, M.; Spanoudakis, G.; Frati, F.; Braghin, C.; Damiani, E.; Koshutanski, H.; Tsakirakis, G.; Hildebrandt, T.; Goeke, L.; Pape, S.; Blinder, O.; Vinov, M.; Leftheriotis, G.; Kunc, M.; Oikonomou, F.; Magilo, G.; Petrarolo, V.; Chieti, A. and Bordianu, R.: The THREAT-ARREST cyber ranges platform. In IEEE International Conference on Cyber Security and Resilience (CSR), IEEE, 2021.
    PDFDOILinkLinkLinkLink Abstract HISSFBDKTHGPBVLKOMPCB21crstBibtexsecurityserious gamethreat-arrest

    Citations: 8 (Google Scholar); 2 (Open Citations);

  4. Harborth, D. and Pape, S.: Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment. In Computers in Human Behavior, 122, 2021.
    PDFDOILinkLinkLinkLink Abstract HP21chbBibtexprivacyarpsychologycs4e

    Citations: 39 (Google Scholar); 11 (Open Citations);

  5. Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Response data - Survey on privacy impacts of voice & speech analysis. DepositOnce, 2021.
    DOILinkLink Abstract KGPBU21dataBibtexprivacymethodology

    Citations:

  6. Schmitz, C.; Schmid, M.; Harborth, D. and Pape, S.: Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities. In Computers & Security, 108, 2021.
    PDFDOILinkLinkLinkLink Abstract SSHP21coseBibtexsecurityhuman factorscs4e

    Citations: 27 (Google Scholar); 2 (Open Citations);

  7. Sofia, S.; Michalis, S.; Bouras, V. and Prevelakis, V., ed.: The THREAT-ARREST dissemination and exploitation report v.2. Technical Report Deliverable 8.8, Threat-Arrest, 2021.
    PDFDOILink Abstract TA21D8.8Bibtexsecuritythreat-arrest

    Citations:

  8. Harborth, D.; Pape, S. and Rannenberg, K.: Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym (Poster). In 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021.
    PosterDOILinkLink Abstract HPR21soupsposterBibtexprivacyhuman factorsanoncs4e

    Citations:

  9. Pape, S.; Klauer, A. and Rebler, M.: Leech: Let's Expose Evidently bad data Collecting Habits - Towards a Serious Game on Understanding Privacy Policies (Poster). In 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021.
    PDFPosterDOILinkLinkLinkLink Abstract PKR21soupsposterBibtexprivacyserious gamecs4ethreat-arrest

    Citations:

  10. Pape, S. and Kipker, D-K.: Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy. In Datenschutz und Datensicherheit, 45 (5): 310-314, 2021.
    PDFDOILinkLinkLinkLink Abstract PK21dudBibtexsecuritysocial engineeringlawcs4ehatchthreat-arrest

    Citations: 1 (Google Scholar); 1 (Open Citations);

  11. Rannenberg, K.; Pape, S.; Tronnier, F. and Löbner, S.: Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Technical Report, Goethe University Frankfurt, 2021.
    PDFDOILinkLinkLink Abstract RPTL21trBibtexprivacypetsiot

    Citations: 7 (Google Scholar); 1 (Open Citations);

  12. Löbner, S.; Tesfay, W. B.; Nakamura, T. and Pape, S.: Explainable Machine Learning for Default Privacy Setting Prediction. In IEEE Access, 9: 63700-63717, 2021.
    PDFDOILinkLinkLinkLink Abstract LTNP21accessBibtexprivacymachine learningcs4e

    Citations: 12 (Google Scholar); 2 (Open Citations);

  13. Pape, S.; Harborth, D. and Kröger, J. L.: Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App. In ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, pages 256-269, Springer, IFIP Advances in Information and Communication Technology 625, 2021.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PHK21ifipsecBibtexinformation systemsprivacypetscs4e

    Citations: 12 (Google Scholar); 4 (Open Citations);

  14. Goeke, L.; Pape, S. and Tsakirakis, G.: THREAT-ARREST serious games v2. Technical Report Deliverable 4.9, Threat-Arrest, 2021.
    PDFDOILink Abstract TA21D4.9Bibtexsecuritythreat-arrest

    Citations:

  15. Frati, F. and Braghin, C., ed.: The Stakeholders' Engagement & Online Channels Report v2. Technical Report Deliverable 8.7, Threat-Arrest, 2021.
    PDFDOILinkLink Abstract TA21D8.7Bibtexsecuritythreat-arrest

    Citations:

  16. Bracamonte, V.; Pape, S. and Kiyomoto, S.: Investigating User Intention to Use a Privacy Sensitive Information Detection Tool., 2021.
    PDFDOILinkLinkLink Abstract BPK21SCISBibtexprivacymachine learning

    Citations: 3 (Google Scholar);

  17. Pape, S.: Challenges for Designing Serious Games on Security and Privacy Awareness. In Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pages 3-16, Springer, IFIP Advances in Information and Communication Technology 644, 2021.
    PDFDOILinkLinkLink Abstract Pape21ifipscBibtexprivacysecurityhuman factorsserious gamecs4ethreat-arrest

    Citations: 1 (Open Citations);

2020

  1. Harborth, D. and Pape, S.: Empirically Investigating Extraneous Influences on the ``APCO'' Model - Childhood Brand Nostalgia and the Positivity Bias. In Future Internet, 12(12) (220), 2020.
    PDFDOILinkLinkLinkLink Abstract HP20futureinternetBibtexprivacypsychologyanon

    Citations: 5 (Google Scholar); 1 (Open Citations);

  2. Schmitz, C.; Sekulla, A. and Pape, S.: Asset-centric analysis and visualisation of attack trees. In Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers, pages 45-64, Springer, LNCS 12419, 2020.
    PDFDOILinkLinkLinkLink Abstract SSP20gramsecBibtexsecuritycritical infrastructurescs4e

    Citations: 4 (Google Scholar); 1 (Open Citations);

  3. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
    PDFDOILinkLinkLink Abstract PIHNKTR20trrBibtexprivacymethodologypsychology

    Citations: 11 (Google Scholar);

  4. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
    PDFDOILinkLinkLink Abstract PIHNKTR20trromdBibtexprivacymethodologypsychology

    Citations: 3 (Google Scholar);

  5. Canavese, D.; Lioy, A.; Pedone, I.; Regano, L.; Hatamian, M.; Löbner, S.; Pape, S.; Arastouei, N.; Skarmeta, A.; Hita, A. and Bernal, J.: Cybersecurity outlook 1. Technical Report Deliverable 3.10, CyberSec4Europe, 2020.
    PDFDOILinkLink Abstract CS4E20D3.10Bibtexprivacysecuritycs4e

    Citations:

  6. Hazilov, V. and Pape, S.: Systematic Scenario Creation for Serious Security-Awareness Games. In Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers, Springer International Publishing, Cham, LNCS 12580, 2020.
    PDFDOILinkLinkLinkLinkVideo Abstract HP20sposeBibtexsecuritysocial engineeringcs4ehatchthreat-arrest

    Citations: 5 (Google Scholar); 2 (Open Citations);

  7. Pape, S.; Goeke, L.; Quintanar, A. and Beckers, K.: Conceptualization of a CyberSecurity Awareness Quiz. In Computer Security - ESORICS 2020 International Workshops MSTEC, pages 61-76, Springer International Publishing, Cham, LNCS 12512, 2020.
    PDFPresentation slidesDOILinkLinkLinkLinkVideo Abstract PGQB20mstecBibtexsecurityserious gamesocial engineeringcs4ethreat-arrest

    Citations: 11 (Google Scholar); 3 (Open Citations);

  8. Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
    PDFDOILinkLinkLink Abstract Pape20habilBibtexprivacysecuritypetsserious gamesocial engineeringcloud computingioteconomylawpsychology

    Citations: 2 (Google Scholar);

  9. Lafuente, A. L.; Schlichtkrull, A.; Rannenberg, K.; Cuellar, J.; Lopez, J.; Gago, C. F.; Krenn, S.; Matyas, V.; Vykopal, J.; Pape, S. and Goodman, D.: CyberSec4Europe summer schools 1. Technical Report Deliverable 9.7, CyberSec4Europe, 2020.
    PDFDOILinkLink Abstract CS4E20D9.7Bibtexprivacysecuritycs4e

    Citations:

  10. Harborth, D.; Pape, S. and Rannenberg, K.: Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2020 (2): 111-128, 2020.
    PDFDOILinkLinkLinkLink Dataset Dataset Dataset Dataset Abstract HPR20petsBibtexinformation systemsprivacypetsanoncs4e

    Citations: 40 (Google Scholar); 13 (Open Citations);

  11. Pape, S.; Paci, F.; Juerjens, J. and Massacci, F.: Selecting a Secure Cloud Provider: An Empirical Study and Multi Criteria Approach. In Information, 11 (5), 2020.
    PDFDOILinkLinkLinkLink Abstract PPJM20informationBibtexsecuritycloud computingcloudatcs4eseconomics

    Citations: 6 (Google Scholar); 1 (Open Citations);

  12. Koshutanski, H.; Frati, F.; Hildebrandt, T.; Hatzivasilis, G.; Fysarakis, K.; Smyrlis, M.; Spanoudakis, G.; Blinder, O.; Goeke, L.; Pape, S.; Leftheriotis, G.; Tsakirakis, G.; Bravos, G. and Kunc, M.: Initial Prototype of Integrated THREAT-ARREST Platform. Technical Report Deliverable 6.1, Threat-Arrest, 2020.
    PDFDOILink Abstract TA20D6.1Bibtexsecuritythreat-arrest

    Citations:

  13. Koshutanski, H.; Frati, F.; Hildebrandt, T.; Hatzivasilis, G.; Fysarakis, K.; Smyrlis, M.; Spanoudaki, S.; Spanoudakis, G.; Blinder, O.; Goeke, L.; Quintanar, A.; Pape, S.; Tsakirakis, G. and Bravos, G.: Initial installation and usage guidelines for the THREAT-ARREST platform. Technical Report Deliverable 6.2, Threat-Arrest, 2020.
    PDFDOILink Abstract TA20D6.2Bibtexsecuritythreat-arrest

    Citations:

  14. Crispo, B.; Gupta, S.; Halunen, K.; Kompara, M.; Preuveneers, D.; Palanque, P.; Beckerle, M.; Martinie, C.; Hita, A. and Pape, S.: Usability Requirements Validation. Technical Report Deliverable 3.7, CyberSec4Europe, 2020.
    PDFDOILinkLink Abstract CS4E20D3.7Bibtexprivacysecuritycs4e

    Citations:

  15. Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers. In Presented at the Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020.
    PDFPresentation slidesDOILink Abstract PSKS20iccipBibtexinformation systemssecuritycritical infrastructureslawcs4esidate

    Citations:

  16. Schmitz, C. and Pape, S.: LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security. In Computers & Security, 90, 2020.
    PDFDOILinkLinkLinkLink Abstract SP20coseBibtexsecuritycritical infrastructuressidate

    Citations: 41 (Google Scholar); 14 (Researchgate); 19 (Open Citations);

  17. Frati, F. and Braghin, C., ed.: The Stakeholders' Engagement & Online Channels Report. Technical Report Deliverable 8.4, Threat-Arrest, 2020.
    PDFDOILinkLink Abstract TA20D8.4Bibtexsecuritythreat-arrest

    Citations:

  18. Sofia, S.; Konstantina, K.; Tsantekidis, M.; Pape, S.; Leftheriotis, G.; Chieti, A.; Oikonomou, F. and Bravos, G.: The THREAT-ARREST dissemination and exploitation report v.1 1. Technical Report Deliverable 8.5, Threat-Arrest, 2020.
    PDFDOILinkLink Abstract TA20D8.5Bibtexsecuritythreat-arrest

    Citations:

  19. Miller, V. M.; Miller, M.; Rannenberg, K.; Niknia, A.; Arastouei, N.; Pape, S.; Skarmeta, A.; Ferreira, A.; Markatos, E.; Matyas, V.; Crabu, M.; Lopez, J.; Fernandez, C.; Pasic, A.; Omerovic, A.; Lafuente, A. L.; Angelini, M.; Hemetsberger, L.; Halunen, K.; Krenn, S.; Annicchino, P.; Kamm, L.; Goodman, D.; Goodman, R.; Surinx, D.; Preuveneers, D.; Sterlini, P.; Kadenko, N.; Douligeris, C. and Benzekri, A.: Clustering results and SU-ICT-03 project CONCERTATION conference year 1. Technical Report Deliverable 10.1, CyberSec4Europe, 2020.
    PDFDOILinkLink Abstract CS4E20D10.1Bibtexprivacysecuritycs4e

    Citations:

  20. Halunen, K.; Cheminod, M.; Beckerle, M.; Durante, L.; Preuveneers, D.; Kompara, M.; Martinie, C.; Bernabe, J. B.; Garofalo, G.; Tesfay, W. B.; Pape, S.; Palanque, P.; Crispo, B. and Gupta, S.: Usable security & privacy methods and recommendations. Technical Report Deliverable 3.5, CyberSec4Europe, 2020.
    PDFDOILinkLink Abstract CS4E20D3.5Bibtexprivacysecuritycs4e

    Citations:

  21. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym. IEEE Dataport, 2020.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HP20dataportJDBibtexprivacypetsmethodologyanon

    Citations:

  22. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Tor. IEEE Dataport, 2020.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HP20dataportTorBibtexprivacypetsmethodologyanon

    Citations:

  23. Harborth, D. and Pape, S.: How Privacy Concerns, Trust and Risk Beliefs and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor. In ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 51 (1): 51-69, 2020.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HP20sigmisBibtexinformation systemsprivacypetsanon

    Citations: 29 (Google Scholar); 5 (Open Citations);

2019

  1. Harborth, D. and Pape, S.: Investigating Privacy Concerns related to Mobile Augmented Reality Applications. In Proceedings of the 40th International Conference on Information Systems ICIS 2019, Munich, Germany, December 13-15, 2019, 2019.
    PDFDOILinkLinkLinkLink Abstract HP19icisBibtexinformation systemsprivacyar

    Citations: 11 (Google Scholar);

  2. Goeke, L.; Quintanar, A.; Beckers, K. and Pape, S.: PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks. In Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 156-171, Springer International Publishing, Cham, LNCS 11981, 2019.
    PDFDOILinkLinkLinkLink Abstract GQBP19mstecBibtexsecurityserious gamesocial engineeringthreat-arrest

    Citations: 15 (Google Scholar); 4 (Open Citations);

  3. Harborth, D. and Pape, S.: How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory. In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
    PDFDOILinkLinkLinkLink Abstract HP19bitBibtexinformation systemsarpsychologyanon

    Citations: 37 (Google Scholar); 10 (Researchgate); 9 (Open Citations);

  4. Pape, S. and Stankovic, J.: An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 287-306, Springer International Publishing, Cham, LNCS 11980, 2019.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PS19sposeBibtexinformation systemssecuritycloud computing

    Citations: 5 (Google Scholar);

  5. Hamm, P.; Harborth, D. and Pape, S.: A Systematic Analysis of User Evaluations in Security Research. In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
    PDFDOILinkLinkLinkLink Abstract HHP19iwsmrBibtexsecuritymethodologycs4e

    Citations: 5 (Google Scholar); 3 (Researchgate); 2 (Open Citations);

  6. Schmid, M.; Akarkach, K. and Pape, S.: Comparison of different aggregated information security control maturities from AHP ranked companies (Extended abstract)., 2019.
    DOILink Abstract SAP19secBibtexsecurity

    Citations:

  7. Schmid, M. and Pape, S.: Aggregating Corporate Information Security Maturity Levels of Different Assets. In Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers, pages 376-392, Springer Boston, IFIP Advances in Information and Communication Technology , 2019.
    PDFDOILinkLinkLinkLink Abstract SP19ifipscBibtexprivacysecurity

    Citations: 1 (Google Scholar);

  8. Beckers, K.; Goeke, L.; Pape, S. and Bravos, G.: THREAT-ARREST THREAT serious games v1. Technical Report Deliverable 4.2, Threat-Arrest, 2019.
    PDFDOILinkLink Abstract TA19D4.2Bibtexsecurityserious gamesocial engineeringthreat-arrest

    Citations:

  9. Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym?. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HCP19ifipsecBibtexinformation systemsprivacypetseconomyanon

    Citations: 12 (Google Scholar); 4 (Open Citations);

  10. Hatamian, M.; Pape, S. and Rannenberg, K.: ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 165-179, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDFDOILinkLinkLinkLink Abstract HPR19ifipsecBibtexsecurityprivacy'n'us

    Citations: 2 (Google Scholar); 3 (Researchgate); 2 (Open Citations);

  11. Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
    PDFDOILinkLinkLinkLink Abstract PR19monetBibtexprivacysoftware engineeringpetscloud computingiot

    Citations: 46 (Google Scholar); 31 (Researchgate); 23 (Open Citations);

  12. Schmid, M. and Pape, S.: A structured comparison of the corporate information security. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 223-237, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDFDOILinkLinkLinkLink Abstract SP19ifipsecBibtexsecurity

    Citations: 8 (Google Scholar); 2 (Open Citations);

  13. Sekulla, A.; Schmitz, C.; Pape, S. and Pipek, V.: Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur. In Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), February 24-27, 2019, Siegen, Germany, pages 1978, 2019.
    PDFDOILinkLinkLinkLink Abstract SSPP19wiBibtexsecuritycritical infrastructuressidate

    Citations:

  14. Koshutanski, H.; Tsantekidis, M.; Damiani, E.; Frati, F.; Cimato, S.; Riccobene, E.; Hatzivasilis, G.; Fysarakis, K.; Spanoudakis, G.; Blinder, O.; Vinov, M.; Hildebrandt, T.; Wortmann, D.; Rompoti, V.; Bravos, G.; Chatzigiannakis, V.; Beckers, K.; Pape, S.; Kunc, M. and Bašta, P.: THREAT-ARREST platform's initial reference architecture. Technical Report Deliverable 1.3, Threat-Arrest, 2019.
    PDFDOILinkLink Abstract TA19D1.3Bibtexsecuritythreat-arrest

    Citations:

  15. Harborth, D. and Pape, S.: How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies -- The Case of Tor. In 52nd Hawaii International Conference on System Sciences (HICSS) 2019, pages 4851-4860, 2019, Acceptance rate: 48%.
    PDFDOILinkLinkLinkLink Abstract HP19hicssBibtexinformation systemsprivacypetsanon

    Citations: 24 (Google Scholar); 11 (Researchgate);

  16. Rannenberg, K.; Pape, S. and Harborth, D.: Abschlussbericht:Verbundprojekt: Anonymität Online der nächsten Generation (AN. ON-Next); Teilvorhaben:" Standardisierung und Geschäftsmodelle". Technical Report, Goethe-Universität Frankfurt am Main, 2019.
    DOILinkLinkBibtexanon

    Citations:

  17. Rannenberg, K.; Pape, S. and Schmitz, C.: Abschlussbericht: SIDATE-Sichere Informationsnetze bei kleinen und mittleren Energieversorgern; Teilvorhaben: IT-Sicherheitsmetriken für kleine und mittlere Energieversorger. Technical Report, Goethe-Universität Frankfurt am Main, 2019.
    DOILinkLinkBibtexsidate

    Citations:

  18. Rannenberg, K.; Pape, S. and Hamm, P.: Abschlussbericht: Selbstdatenschutz im Online-Commerce (SIOC); Teilvorhaben: Architektur, Modellierung und Nutzerakzeptanz von Selbstdatenschutztechniken im Online-Commerce. Technical Report, Goethe-Universität Frankfurt am Main, 2019.
    DOILinkLinkBibtexsioc

    Citations:

2018

  1. Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2018.
    PDFDOILinkLink Abstract PPRSST18trBibtexsecuritycritical infrastructuressidate

    Citations:

  2. Pape, S. and Rannenberg, K.: Cyber-Gefahren auf dem Radar. In ManagementKompass: Unternehmen schützen -- Risiken minimieren, November (03): pages 9-12, 2018.
    DOILinkLinkLinkLinkBibtexsecurity

    Citations:

  3. Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILinkLinkLinkLink Dataset Dataset Abstract HP18ifipsecBibtexinformation systemsprivacypetspsychologyanon

    Citations: 17 (Google Scholar); 6 (Researchgate); 8 (Open Citations);

  4. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PTKSP18ifipsecBibtexprivacyiotlawanon

    Citations: 23 (Google Scholar); 11 (Researchgate); 6 (Open Citations);

  5. Harborth, D. and Pape, S.: German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire. Technical Report, SSRN, 2018.
    PDFDOILinkLinkLink Abstract HP18ssrn_utautBibtexinformation systemsmethodologyanon

    Citations: 23 (Google Scholar); 9 (Open Citations);

  6. Harborth, D. and Pape, S.: German Translation of the Concerns for Information Privacy (CFIP) Construct. Technical Report, SSRN, 2018.
    PDFDOILinkLinkLink Abstract HP18ssrn_cfipBibtexprivacymethodologyanon

    Citations: 16 (Google Scholar); 6 (Open Citations);

  7. Aladawy, D.; Beckers, K. and Pape, S.: PERSUADED: Fighting Social Engineering Attacks with a Serious Game. In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
    PDFDOILinkLinkLinkLink Abstract ABP18trustbusBibtexprivacysecurityserious gamesocial engineeringsidate

    Citations: 26 (Google Scholar); 7 (Researchgate); 6 (Open Citations);

  8. Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE). In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkLinkLinkBibtexsecuritycritical infrastructuressidate

    Citations: 2 (Google Scholar); 1 (Researchgate);

  9. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkLinkBibtexsecuritycritical infrastructuressidate

    Citations: 1 (Researchgate);

  10. Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkBibtexsecuritycritical infrastructuressidate

    Citations:

  11. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract HBGPR18sicherheitBibtexinformation systemsprivacypetseconomyanonsioc

    Citations: 7 (Google Scholar); 2 (Researchgate); 1 (Open Citations);

  12. Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkBibtexsecuritycritical infrastructuressidate

    Citations:

  13. Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
    PDFDOILinkLinkLinkLink Abstract HP18amcisBibtexinformation systemsprivacypetspsychologyanon

    Citations: 16 (Google Scholar); 12 (Researchgate);

  14. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkBibtexsecurityserious gamesocial engineeringlawhatchsidate

    Citations:

  15. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PTBGLR18sicherheitBibtexprivacypetse-commerceeconomysioc

    Citations: 2 (Google Scholar); 2 (Researchgate);

  16. Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments. In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
    PDFDOILinkLinkLinkLink Abstract SSPPR18haisaBibtexsecuritycritical infrastructuressidate

    Citations: 6 (Google Scholar); 1 (Researchgate);

2017

  1. Harborth, D.; Herrmann, D.; Köpsell, S.; Pape, S.; Roth, C.; Federrath, H.; Kesdogan, D. and Rannenberg, K.: Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. Technical Report, Cornell University, arXiv, 2017.
    PDFDOILinkLinkLinkLink Abstract HHKPRFKR17anonBibtexprivacypetsanon

    Citations: 5 (Google Scholar); 2 (Researchgate);

  2. Dax, J.; Ivan, A.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: IT Security Status of German Energy Providers. Technical Report, Cornell University, arXiv, 2017.
    PDFDOILinkLinkLinkLink Abstract DILPPRSS17trBibtexsecuritycritical infrastructuressidate

    Citations: 3 (Google Scholar);

  3. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2017.
    PDFDOILinkLink Abstract DLPPRSS17trBibtexsecuritycritical infrastructuressidate

    Citations:

  4. Beckers, K.; Fries, V.; Groen, E. C. and Pape, S.: Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment. In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract BFGP17CreaREBibtexsecurityserious gamesocial engineeringhatch

    Citations: 3 (Google Scholar); 4 (Researchgate);

  5. Beckers, K.; Schosser, D.; Pape, S. and Schaab, P.: A Structured Comparison of Social Engineering Intelligence Gathering Tools. In Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pages 232-246, 2017, Revision 1, Table 7 was corrected, see https://link.springer.com/10.1007/978-3-319-64483-7_16.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract BSPS17trustbusBibtexprivacysecuritysocial engineeringsidate

    Citations: 8 (Google Scholar); 3 (Researchgate); 4 (Open Citations);

  6. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDFDOILinkLinkLinkLink Abstract HP17ifipscBibtexinformation systemsprivacypetsarpsychologyanon

    Citations: 14 (Google Scholar); 5 (Researchgate); 5 (Open Citations);

  7. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract)., 2017.
    PDFDOILinkLink Abstract HP17ifipsc_eaBibtexinformation systemsprivacyarpsychology

    Citations:

  8. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
    PDFDOILinkLinkLinkLink Abstract HP17ismarBibtexinformation systemsarpsychology

    Citations: 39 (Google Scholar); 25 (Researchgate); 9 (Open Citations);

  9. Pape, S.: Technische Bedingungen wirksamer Verschlüsselung. In Jahrbuch 2016, Deutsche Gesellschaft für Recht und Informatik, 2017, available via https://www.dgri.de/55/Publikationen/Schriftenreihe-der-DGRI.htm.
    PDFDOILinkLinkBibtexsecuritycrypto

    Citations:

  10. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
    PDFDOILinkLinkLinkLink Abstract SBP17icsBibtexsecuritysocial engineeringpsychology

    Citations: 52 (Google Scholar); 25 (Researchgate); 21 (Open Citations);

  11. Sailer, M.; Hoppenz, C.; Beckers, K. and Pape, S.: Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie. In Tagung der Sektion ``Empirische Bildungsforschung'' -- Educational Research and Governance (AEPF 2017), 2017.
    PDFDOILinkLink Abstract SHBP17aepfBibtexsecurityserious gamesocial engineering

    Citations:

2016

  1. Tesfay, W. B.; Serna, J. and Pape, S.: Challenges in Detecting Privacy Revealing Information in Unstructured Text. In Workshop on Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2016 at the International Semantic Web Conference (ISWC) 2016, Kobe, Japan, 2016.
    PDFDOILinkLinkLinkLink Abstract TSP16privonBibtexprivacy

    Citations: 12 (Google Scholar); 5 (Researchgate);

  2. Tschersich, M.; Kiyomoto, S.; Pape, S.; Nakamura, T.; Bal, G.; Takasaki, H. and Rannenberg, K.: On Gender Specific Perception of Data Sharing in Japan. In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pages 150-160, 2016, Acceptance rate: 27/139 = 20.9%.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract TKPNBTR16ifipsecBibtexinformation systemsprivacy

    Citations: 6 (Google Scholar); 5 (Researchgate); 1 (Open Citations);

  3. Beckers, K. and Pape, S.: A Serious Game for Eliciting Social Engineering Security Requirements. In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
    PDFDOILinkLinkLinkLink Abstract BP16reBibtexsecurityserious gamesocial engineeringhatchsidate

    Citations: 109 (Google Scholar); 49 (Researchgate); 42 (Open Citations);

  4. Beckers, K.; Pape, S. and Fries, V.: HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering. In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
    PDFPosterDOILinkLinkLinkLink Abstract BPF16bhciBibtexsecurityserious gamesocial engineeringhatchsidate

    Citations: 28 (Google Scholar); 25 (Researchgate);

  5. Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger. In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
    PDFPosterDOILink Abstract DHKLPPRST16mkwiBibtexsecuritycritical infrastructuressidate

    Citations:

  6. Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDFDOILinkLinkLinkLink Abstract DLPSPR16haisaBibtexsecuritycritical infrastructuressidate

    Citations: 4 (Google Scholar); 3 (Researchgate);

  7. Pape, S.; Flake, J.; Beckmann, A. and Jürjens, J.: STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PFBJ16icseBibtexsoftware engineering

    Citations: 19 (Google Scholar); 7 (Researchgate); 4 (Open Citations);

  8. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDFDOILinkLinkLinkLink Abstract SBP16haisaBibtexsecuritysocial engineeringpsychology

    Citations: 16 (Google Scholar); 7 (Researchgate);

2015

  1. Pape, S.; Serna-Olvera, J. and Tesfay, W.: Why Open Data May Threaten Your Privacy. In Workshop on Privacy and Inference, co-located with KI, 2015.
    PDFPresentation slidesDOILinkLink Abstract PST15prinfBibtexprivacy

    Citations: 9 (Google Scholar);

2014

  1. Pape, S.: Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract Pape14fcBibtexcrypto

    Citations: 2 (Google Scholar); 2 (Researchgate);

  2. Pape, S.: Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, Research , 2014.
    DOILinkLinkLink Abstract pape14authenticationBibtexprivacysecuritycrypto

    Citations: 10 (Google Scholar); 3 (Open Citations);

2013

  1. Pape, S.: The Challenge of Authentication in Insecure Environments.
    DOILinkBibtexprivacysecuritycrypto

    Citations:

  2. Bleikertz, S.; Mastelic, T.; Pape, S.; Pieters, W. and Dimkov, T.: Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
    PDFDOILinkLinkLinkLink Abstract BMPPD13ic2eBibtexsecuritycloud computingsecureclouds

    Citations: 17 (Google Scholar); 14 (Researchgate); 9 (Open Citations);

2012

  1. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions. In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDFDOILinkLinkLink Abstract PSW12jteiBibtexsoftware engineeringdigital humanitiesteichi

    Citations: 16 (Google Scholar); 6 (Researchgate); 4 (Open Citations);

  2. Ochoa, M.; Pape, S.; Ruhroth, T.; Sprick, B.; Stenzel, K. and Sudbrock, H.: Report on the RS3 Topic Workshop "Security Properties in Software Engineering". Technical Report, Universitätsbibliothek der Universität Augsburg, Universitätsstr. 22, 86159 Augsburg, 2012.
    PDFDOILinkLink Abstract OPRSSS12trBibtexsecuritysoftware engineeringmodelsec

    Citations:

2010

  1. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster). In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    PosterDOILinkBibtexsoftware engineeringdigital humanitiesteichi

    Citations:

  2. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions. Technical Report, Universität Kassel, 2010.
    PDFDOILinkLink Abstract PSW10trBibtexsoftware engineeringdigital humanitiesteichi

    Citations:

  3. Wolf, C.; Pape, S. and Porada, L.: Leitfaden zur Gründung von GI - Studierendengruppen (GI-SG)., 2010.
    DOILinkLinkBibtex

    Citations:

2009

  1. Pape, S.: A Survey on Non-transferable Anonymous Credentials. In The Future of Identity in the Information Society, pages 107-118, Springer Boston, Brno, Czech Republic, IFIP Advances in Information and Communication Technology 298, 2009.
    PDFDOILinkLinkLinkLink Abstract Pape09ifipscBibtexprivacy

    Citations: 4 (Google Scholar); 2 (Researchgate);

  2. Pape, S.: Some Observations on Reusing One-Time Pads within Dice Codings (abstract). Technical Report, in Tagungsband zum 10. Kryptotag, Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft für Informatik, 2009.
    DOILinkBibtexcrypto

    Citations:

  3. Greveler, U.; Laskov, P. and Pape, S.: Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen. In GI Jahrestagung: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 28.9.-2.10.2009, Lübeck, Proceedings, pages 186-190, GI, LNI 154, 2009.
    PDFDOILinkLinkLinkBibtexprivacy

    Citations:

2008

  1. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem. Vdm Verlag Dr. Müller, 2008.
    DOILinkLinkLink Abstract pape08ajtai-dworkBibtexcrypto

    Citations:

  2. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In The Future of Identity in the Information Society, pages 299-310, Springer Boston, IFIP International Federation for Information Processing 262, 2008.
    PDFDOILinkLinkLinkLink Abstract PB08ifipscBibtexprivacycrypto

    Citations: 1 (Google Scholar);

  3. Pape, S.: Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials (extended abstract)., 2008.
    DOILinkLinkBibtexprivacy

    Citations:

  4. Pape, S.: Embedding Biometric Information into Anonymous Credentials. Technical Report 68, in Extended Abstracts of the Second Privacy Enhancing Technologies Convention (PET-CON 2008.1), 2008.
    DOILinkLinkLink Abstract pape08petconBibtexprivacy

    Citations: 2 (Google Scholar); 1 (Researchgate);

2004

  1. Pape, S.; Dietz, L. and Tandler, P.: Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops. In Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04, 2004.
    PDFDOILinkLinkLink Abstract PDT04pervasiveBibtexsoftware engineering

    Citations: 15 (Google Scholar); 9 (Researchgate);

  2. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
    PDFDOILinkLink Abstract pape04thesisBibtexcrypto

    Citations: