Application Domains
Cloud / Edge / Fog Computing 
- Syed-Winkler, S.; Pape, S. and Sabouri, A.: A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility.
In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
Citations:
- Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
.
Citations: 1
(Google Scholar);
- Pape, S.; Paci, F.; Juerjens, J. and Massacci, F.: Selecting a Secure Cloud Provider: An Empirical Study and Multi Criteria Approach.
In Information, 11 (5), 2020.
Citations: 5
(Google Scholar); 1
(Open Citations);
- Pape, S. and Stankovic, J.: An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security.
In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 287-306, Springer International Publishing, Cham, LNCS 11980, 2019.
Citations: 2
(Google Scholar);
- Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture.
In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
Citations: 41
(Google Scholar); 31
(Researchgate); 23
(Open Citations);
- Bleikertz, S.; Mastelic, T.; Pape, S.; Pieters, W. and Dimkov, T.: Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers.
In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
Citations: 19
(Google Scholar); 14
(Researchgate); 9
(Open Citations);
Internet of Things (IoT) 
- Sadeghi, A.; Pape, S. and Harborth, D.: The impact of individuals' social environments on contact tracing app use: Survey Study.
In JMIR Human Factors, to appear, 2023.
Citations:
- Syed-Winkler, S.; Pape, S. and Sabouri, A.: A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility.
In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
Citations:
- Bracamonte, V.; Pape, S. and Löbner, S.: "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content.
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (3): 57-78, 2022.
Citations: 5
(Google Scholar);
- Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns.
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (1): 6-27, 2022.
Citations: 23
(Google Scholar); 3
(Open Citations);
- Löbner, S.; Tronnier, F.; Pape, S. and Rannenberg, K.: Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.
In CSCS '21: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, November 30th, 2021, pages 7:1-7:11, ACM, 2021.
Citations: 9
(Google Scholar);
- Rannenberg, K.; Pape, S.; Tronnier, F. and Löbner, S.: Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector.
Technical Report, Goethe University Frankfurt, 2021.
Citations: 4
(Google Scholar); 1
(Open Citations);
- Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
.
Citations: 1
(Google Scholar);
- Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture.
In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
Citations: 41
(Google Scholar); 31
(Researchgate); 23
(Open Citations);
- Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services.
In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
Citations: 22
(Google Scholar); 11
(Researchgate); 6
(Open Citations);
Machine Learning 
- Bracamonte, V.; Pape, S. and Löbner, S.: "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content.
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (3): 57-78, 2022.
Citations: 5
(Google Scholar);
- Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns.
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (1): 6-27, 2022.
Citations: 23
(Google Scholar); 3
(Open Citations);
- Löbner, S.; Tesfay, W. B.; Nakamura, T. and Pape, S.: Explainable Machine Learning for Default Privacy Setting Prediction.
In IEEE Access, 9: 63700-63717, 2021.
Citations: 8
(Google Scholar); 2
(Open Citations);
- Bracamonte, V.; Pape, S. and Kiyomoto, S.: Investigating User Intention to Use a Privacy Sensitive Information Detection Tool.
, 2021.
Citations: 1
(Google Scholar);
Augmented Reality 
- Harborth, D. and Pape, S.: Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment.
In Computers in Human Behavior, 122, 2021.
Citations: 31
(Google Scholar); 11
(Open Citations);
- Harborth, D. and Pape, S.: Investigating Privacy Concerns related to Mobile Augmented Reality Applications.
In Proceedings of the 40th International Conference on Information Systems ICIS 2019, Munich, Germany, December 13-15, 2019, 2019.
Citations: 9
(Google Scholar);
- Harborth, D. and Pape, S.: How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory.
In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
Citations: 35
(Google Scholar); 10
(Researchgate); 9
(Open Citations);
- Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany.
In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
Citations: 13
(Google Scholar); 5
(Researchgate); 5
(Open Citations);
- Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract).
, 2017.
Citations:
- Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go.
In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
Citations: 39
(Google Scholar); 25
(Researchgate); 9
(Open Citations);
Critical Infrastructures 
- Schmitz, C.; Sekulla, A. and Pape, S.: Asset-centric analysis and visualisation of attack trees.
In Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers, pages 45-64, Springer, LNCS 12419, 2020.
Citations: 4
(Google Scholar); 1
(Open Citations);
- Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers.
In Presented at the Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020.
Citations:
- Schmitz, C. and Pape, S.: LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security.
In Computers & Security, 90, 2020.
Citations: 36
(Google Scholar); 14
(Researchgate); 19
(Open Citations);
- Sekulla, A.; Schmitz, C.; Pape, S. and Pipek, V.: Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur.
In Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), February 24-27, 2019, Siegen, Germany, pages 1978, 2019.
Citations:
- Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht.
Technical Report, Universität Siegen, 2018.
Citations:
- Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE).
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
Citations: 2
(Google Scholar); 1
(Researchgate);
- Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
Citations: 1
(Researchgate);
- Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
Citations:
- Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
Citations:
- Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments.
In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
Citations: 6
(Google Scholar); 1
(Researchgate);
- Dax, J.; Ivan, A.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: IT Security Status of German Energy Providers.
Technical Report, Cornell University, arXiv, 2017.
Citations: 3
(Google Scholar);
- Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht.
Technical Report, Universität Siegen, 2017.
Citations:
- Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger.
In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
Citations:
- Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions.
In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
Citations: 4
(Google Scholar); 3
(Researchgate);
E-Commerce 
- Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping.
In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
Citations: 1
(Google Scholar); 2
(Researchgate);