Application Domains

Cloud / Edge / Fog Computing cloud computing

  1. Syed-Winkler, S.; Pape, S. and Sabouri, A.: A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility. In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
    PDFDOILinkLinkLinkLink Abstract SPS22cscsBibtexprivacypetscloud computingiotautopsy

    Citations:

  2. Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
    PDFDOILinkLinkLink Abstract Pape20habilBibtexprivacysecuritypetsserious gamesocial engineeringcloud computingioteconomylawpsychology

    Citations: 2 (Google Scholar);

  3. Pape, S.; Paci, F.; Juerjens, J. and Massacci, F.: Selecting a Secure Cloud Provider: An Empirical Study and Multi Criteria Approach. In Information, 11 (5), 2020.
    PDFDOILinkLinkLinkLink Abstract PPJM20informationBibtexsecuritycloud computingcloudatcs4eseconomics

    Citations: 6 (Google Scholar); 1 (Open Citations);

  4. Pape, S. and Stankovic, J.: An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 287-306, Springer International Publishing, Cham, LNCS 11980, 2019.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PS19sposeBibtexinformation systemssecuritycloud computing

    Citations: 5 (Google Scholar);

  5. Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
    PDFDOILinkLinkLinkLink Abstract PR19monetBibtexprivacysoftware engineeringpetscloud computingiot

    Citations: 46 (Google Scholar); 31 (Researchgate); 23 (Open Citations);

  6. Bleikertz, S.; Mastelic, T.; Pape, S.; Pieters, W. and Dimkov, T.: Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
    PDFDOILinkLinkLinkLink Abstract BMPPD13ic2eBibtexsecuritycloud computingsecureclouds

    Citations: 17 (Google Scholar); 14 (Researchgate); 9 (Open Citations);

Internet of Things (IoT) iot

  1. Sadeghi, A.; Pape, S. and Harborth, D.: The impact of individuals' social environments on contact tracing app use: Survey Study. In JMIR Human Factors, 10:e45825, 2023.
    PDFDOILinkLinkLinkLink Abstract SPH23jmirhfBibtexhuman factorsiotcs4e

    Citations:

  2. Syed-Winkler, S.; Pape, S. and Sabouri, A.: A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility. In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
    PDFDOILinkLinkLinkLink Abstract SPS22cscsBibtexprivacypetscloud computingiotautopsy

    Citations:

  3. Bracamonte, V.; Pape, S. and Löbner, S.: "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (3): 57-78, 2022.
    PDFDOILinkLinkLinkLink Abstract BPL22petsBibtexprivacyiotmachine learningcs4e

    Citations: 8 (Google Scholar);

  4. Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (1): 6-27, 2022.
    PDFDOILinkLinkLinkLink Abstract KGPBU22petsBibtexprivacyiotmachine learning

    Citations: 27 (Google Scholar); 3 (Open Citations);

  5. Löbner, S.; Tronnier, F.; Pape, S. and Rannenberg, K.: Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing. In CSCS '21: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, November 30th, 2021, pages 7:1-7:11, ACM, 2021.
    PDFDOILinkLinkLinkLink Abstract LTPR21cscsBibtexprivacypetsiot

    Citations: 12 (Google Scholar);

  6. Rannenberg, K.; Pape, S.; Tronnier, F. and Löbner, S.: Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Technical Report, Goethe University Frankfurt, 2021.
    PDFDOILinkLinkLink Abstract RPTL21trBibtexprivacypetsiot

    Citations: 7 (Google Scholar); 1 (Open Citations);

  7. Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
    PDFDOILinkLinkLink Abstract Pape20habilBibtexprivacysecuritypetsserious gamesocial engineeringcloud computingioteconomylawpsychology

    Citations: 2 (Google Scholar);

  8. Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
    PDFDOILinkLinkLinkLink Abstract PR19monetBibtexprivacysoftware engineeringpetscloud computingiot

    Citations: 46 (Google Scholar); 31 (Researchgate); 23 (Open Citations);

  9. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PTKSP18ifipsecBibtexprivacyiotlawanon

    Citations: 23 (Google Scholar); 11 (Researchgate); 6 (Open Citations);

Machine Learning machine learning

  1. Bracamonte, V.; Pape, S.; Löbner, S. and Tronnier, F.: Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts. In 20th Annual International Conference on Privacy, Security & Trust (PST 2023), Copenhagen, Denmark, 21-23 August, 2023.
    PDFDOILinkLinkLinkLink Abstract BPLT23pstBibtexmachine learning

    Citations:

  2. Löbner, S.; Pape, S. and Bracamonte, V.: User Acceptance Criteria for Privacy Preserving Machine Learning Techniques. In Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pages 149:1-149:8, ACM, 2023, 20th International Workshop on Trust, Privacy and Security in the Digital Society.
    PDFDOILinkLinkLinkLink Abstract LPB23trustbusBibtexprivacypetsmachine learningcs4e

    Citations:

  3. Bracamonte, V.; Pape, S. and Löbner, S.: "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (3): 57-78, 2022.
    PDFDOILinkLinkLinkLink Abstract BPL22petsBibtexprivacyiotmachine learningcs4e

    Citations: 8 (Google Scholar);

  4. Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (1): 6-27, 2022.
    PDFDOILinkLinkLinkLink Abstract KGPBU22petsBibtexprivacyiotmachine learning

    Citations: 27 (Google Scholar); 3 (Open Citations);

  5. Löbner, S.; Tesfay, W. B.; Nakamura, T. and Pape, S.: Explainable Machine Learning for Default Privacy Setting Prediction. In IEEE Access, 9: 63700-63717, 2021.
    PDFDOILinkLinkLinkLink Abstract LTNP21accessBibtexprivacymachine learningcs4e

    Citations: 12 (Google Scholar); 2 (Open Citations);

  6. Bracamonte, V.; Pape, S. and Kiyomoto, S.: Investigating User Intention to Use a Privacy Sensitive Information Detection Tool., 2021.
    PDFDOILinkLinkLink Abstract BPK21SCISBibtexprivacymachine learning

    Citations: 3 (Google Scholar);

Augmented Reality ar

  1. Harborth, D. and Pape, S.: Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment. In Computers in Human Behavior, 122, 2021.
    PDFDOILinkLinkLinkLink Abstract HP21chbBibtexprivacyarpsychologycs4e

    Citations: 39 (Google Scholar); 11 (Open Citations);

  2. Harborth, D. and Pape, S.: Investigating Privacy Concerns related to Mobile Augmented Reality Applications. In Proceedings of the 40th International Conference on Information Systems ICIS 2019, Munich, Germany, December 13-15, 2019, 2019.
    PDFDOILinkLinkLinkLink Abstract HP19icisBibtexinformation systemsprivacyar

    Citations: 11 (Google Scholar);

  3. Harborth, D. and Pape, S.: How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory. In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
    PDFDOILinkLinkLinkLink Abstract HP19bitBibtexinformation systemsarpsychologyanon

    Citations: 37 (Google Scholar); 10 (Researchgate); 9 (Open Citations);

  4. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDFDOILinkLinkLinkLink Abstract HP17ifipscBibtexinformation systemsprivacypetsarpsychologyanon

    Citations: 14 (Google Scholar); 5 (Researchgate); 5 (Open Citations);

  5. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract)., 2017.
    PDFDOILinkLink Abstract HP17ifipsc_eaBibtexinformation systemsprivacyarpsychology

    Citations:

  6. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
    PDFDOILinkLinkLinkLink Abstract HP17ismarBibtexinformation systemsarpsychology

    Citations: 39 (Google Scholar); 25 (Researchgate); 9 (Open Citations);

Critical Infrastructures critical infrastructures

  1. Schmitz, C.; Sekulla, A. and Pape, S.: Asset-centric analysis and visualisation of attack trees. In Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers, pages 45-64, Springer, LNCS 12419, 2020.
    PDFDOILinkLinkLinkLink Abstract SSP20gramsecBibtexsecuritycritical infrastructurescs4e

    Citations: 4 (Google Scholar); 1 (Open Citations);

  2. Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers. In Presented at the Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020.
    PDFPresentation slidesDOILink Abstract PSKS20iccipBibtexinformation systemssecuritycritical infrastructureslawcs4esidate

    Citations:

  3. Schmitz, C. and Pape, S.: LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security. In Computers & Security, 90, 2020.
    PDFDOILinkLinkLinkLink Abstract SP20coseBibtexsecuritycritical infrastructuressidate

    Citations: 41 (Google Scholar); 14 (Researchgate); 19 (Open Citations);

  4. Sekulla, A.; Schmitz, C.; Pape, S. and Pipek, V.: Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur. In Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), February 24-27, 2019, Siegen, Germany, pages 1978, 2019.
    PDFDOILinkLinkLinkLink Abstract SSPP19wiBibtexsecuritycritical infrastructuressidate

    Citations:

  5. Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2018.
    PDFDOILinkLink Abstract PPRSST18trBibtexsecuritycritical infrastructuressidate

    Citations:

  6. Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE). In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkLinkLinkBibtexsecuritycritical infrastructuressidate

    Citations: 2 (Google Scholar); 1 (Researchgate);

  7. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkLinkBibtexsecuritycritical infrastructuressidate

    Citations: 1 (Researchgate);

  8. Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkBibtexsecuritycritical infrastructuressidate

    Citations:

  9. Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkBibtexsecuritycritical infrastructuressidate

    Citations:

  10. Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments. In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
    PDFDOILinkLinkLinkLink Abstract SSPPR18haisaBibtexsecuritycritical infrastructuressidate

    Citations: 6 (Google Scholar); 1 (Researchgate);

  11. Dax, J.; Ivan, A.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: IT Security Status of German Energy Providers. Technical Report, Cornell University, arXiv, 2017.
    PDFDOILinkLinkLinkLink Abstract DILPPRSS17trBibtexsecuritycritical infrastructuressidate

    Citations: 3 (Google Scholar);

  12. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2017.
    PDFDOILinkLink Abstract DLPPRSS17trBibtexsecuritycritical infrastructuressidate

    Citations:

  13. Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger. In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
    PDFPosterDOILink Abstract DHKLPPRST16mkwiBibtexsecuritycritical infrastructuressidate

    Citations:

  14. Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDFDOILinkLinkLinkLink Abstract DLPSPR16haisaBibtexsecuritycritical infrastructuressidate

    Citations: 4 (Google Scholar); 3 (Researchgate);

E-Commerce e-commerce

  1. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PTBGLR18sicherheitBibtexprivacypetse-commerceeconomysioc

    Citations: 2 (Google Scholar); 2 (Researchgate);