Inter- and Transdisciplinary Work

Psychology psychology

  1. Harborth, D. and Pape, S.: Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment. In Computers in Human Behavior, 122, 2021.
    PDFDOILinkLinkLinkLink Abstract HP21chbBibtexprivacyarpsychologycs4e

    Citations: 39 (Google Scholar); 11 (Open Citations);

  2. Harborth, D. and Pape, S.: Empirically Investigating Extraneous Influences on the ``APCO'' Model - Childhood Brand Nostalgia and the Positivity Bias. In Future Internet, 12(12) (220), 2020.
    PDFDOILinkLinkLinkLink Abstract HP20futureinternetBibtexprivacypsychologyanon

    Citations: 5 (Google Scholar); 1 (Open Citations);

  3. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
    PDFDOILinkLinkLink Abstract PIHNKTR20trrBibtexprivacymethodologypsychology

    Citations: 11 (Google Scholar);

  4. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
    PDFDOILinkLinkLink Abstract PIHNKTR20trromdBibtexprivacymethodologypsychology

    Citations: 3 (Google Scholar);

  5. Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
    PDFDOILinkLinkLink Abstract Pape20habilBibtexprivacysecuritypetsserious gamesocial engineeringcloud computingioteconomylawpsychology

    Citations: 2 (Google Scholar);

  6. Harborth, D. and Pape, S.: How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory. In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
    PDFDOILinkLinkLinkLink Abstract HP19bitBibtexinformation systemsarpsychologyanon

    Citations: 37 (Google Scholar); 10 (Researchgate); 9 (Open Citations);

  7. Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILinkLinkLinkLink Dataset Dataset Abstract HP18ifipsecBibtexinformation systemsprivacypetspsychologyanon

    Citations: 17 (Google Scholar); 6 (Researchgate); 8 (Open Citations);

  8. Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
    PDFDOILinkLinkLinkLink Abstract HP18amcisBibtexinformation systemsprivacypetspsychologyanon

    Citations: 16 (Google Scholar); 12 (Researchgate);

  9. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDFDOILinkLinkLinkLink Abstract HP17ifipscBibtexinformation systemsprivacypetsarpsychologyanon

    Citations: 14 (Google Scholar); 5 (Researchgate); 5 (Open Citations);

  10. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract)., 2017.
    PDFDOILinkLink Abstract HP17ifipsc_eaBibtexinformation systemsprivacyarpsychology

    Citations:

  11. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
    PDFDOILinkLinkLinkLink Abstract HP17ismarBibtexinformation systemsarpsychology

    Citations: 39 (Google Scholar); 25 (Researchgate); 9 (Open Citations);

  12. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
    PDFDOILinkLinkLinkLink Abstract SBP17icsBibtexsecuritysocial engineeringpsychology

    Citations: 52 (Google Scholar); 25 (Researchgate); 21 (Open Citations);

  13. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDFDOILinkLinkLinkLink Abstract SBP16haisaBibtexsecuritysocial engineeringpsychology

    Citations: 16 (Google Scholar); 7 (Researchgate);

Economy economy

Often costs for security measures set a boundary for practicable security measures. In that context, I am investigating how non-expert users can be supported when taking security decisions.
On the other hand, if measures such as privacy enhancing technologies are not enforced by regulation, there needs to be a business model and it is important to investigate how much and under which circumstances the user is willing to pay.
  1. Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
    PDFDOILinkLinkLink Abstract Pape20habilBibtexprivacysecuritypetsserious gamesocial engineeringcloud computingioteconomylawpsychology

    Citations: 2 (Google Scholar);

  2. Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym?. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HCP19ifipsecBibtexinformation systemsprivacypetseconomyanon

    Citations: 12 (Google Scholar); 4 (Open Citations);

  3. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract HBGPR18sicherheitBibtexinformation systemsprivacypetseconomyanonsioc

    Citations: 7 (Google Scholar); 2 (Researchgate); 1 (Open Citations);

  4. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PTBGLR18sicherheitBibtexprivacypetse-commerceeconomysioc

    Citations: 2 (Google Scholar); 2 (Researchgate);

Law law

Laws and regulations on the one hand restrict the acceptable solution space for technical solutions, e.\,g.\ when certain technical solutions are not compliant.
On the other hand, laws and regulations can enforce privacy or security measures, e.\,g.\ forcing energy providers to setup an information security management system. I am interested in designing compliant systems and investigating the effects of laws and regulations.
  1. Pape, S. and Kipker, D-K.: Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy. In Datenschutz und Datensicherheit, 45 (5): 310-314, 2021.
    PDFDOILinkLinkLinkLink Abstract PK21dudBibtexsecuritysocial engineeringlawcs4ehatchthreat-arrest

    Citations: 1 (Google Scholar); 1 (Open Citations);

  2. Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
    PDFDOILinkLinkLink Abstract Pape20habilBibtexprivacysecuritypetsserious gamesocial engineeringcloud computingioteconomylawpsychology

    Citations: 2 (Google Scholar);

  3. Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers. In Presented at the Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020.
    PDFPresentation slidesDOILink Abstract PSKS20iccipBibtexinformation systemssecuritycritical infrastructureslawcs4esidate

    Citations:

  4. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILinkLinkLinkLink Abstract PTKSP18ifipsecBibtexprivacyiotlawanon

    Citations: 23 (Google Scholar); 11 (Researchgate); 6 (Open Citations);

  5. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    PDFDOILinkLinkBibtexsecurityserious gamesocial engineeringlawhatchsidate

    Citations:

Digital Humanities digital humanities

  1. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions. In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDFDOILinkLinkLink Abstract PSW12jteiBibtexsoftware engineeringdigital humanitiesteichi

    Citations: 16 (Google Scholar); 6 (Researchgate); 4 (Open Citations);

  2. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster). In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    PosterDOILinkBibtexsoftware engineeringdigital humanitiesteichi

    Citations:

  3. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions. Technical Report, Universität Kassel, 2010.
    PDFDOILinkLink Abstract PSW10trBibtexsoftware engineeringdigital humanitiesteichi

    Citations:

Scientific Methodology methodology

  1. Kröger, J. L.; Gellrich, L.; Pape, S.; Brause, S. R. and Ullrich, S.: Response data - Survey on privacy impacts of voice & speech analysis. DepositOnce, 2021.
    DOILinkLink Abstract KGPBU21dataBibtexprivacymethodology

    Citations:

  2. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
    PDFDOILinkLinkLink Abstract PIHNKTR20trrBibtexprivacymethodologypsychology

    Citations: 11 (Google Scholar);

  3. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan. In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
    PDFDOILinkLinkLink Abstract PIHNKTR20trromdBibtexprivacymethodologypsychology

    Citations: 3 (Google Scholar);

  4. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym. IEEE Dataport, 2020.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HP20dataportJDBibtexprivacypetsmethodologyanon

    Citations:

  5. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Tor. IEEE Dataport, 2020.
    PDFDOILinkLinkLinkLink Dataset Dataset Abstract HP20dataportTorBibtexprivacypetsmethodologyanon

    Citations:

  6. Hamm, P.; Harborth, D. and Pape, S.: A Systematic Analysis of User Evaluations in Security Research. In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
    PDFDOILinkLinkLinkLink Abstract HHP19iwsmrBibtexsecuritymethodologycs4e

    Citations: 5 (Google Scholar); 3 (Researchgate); 2 (Open Citations);

  7. Harborth, D. and Pape, S.: German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire. Technical Report, SSRN, 2018.
    PDFDOILinkLinkLink Abstract HP18ssrn_utautBibtexinformation systemsmethodologyanon

    Citations: 23 (Google Scholar); 9 (Open Citations);

  8. Harborth, D. and Pape, S.: German Translation of the Concerns for Information Privacy (CFIP) Construct. Technical Report, SSRN, 2018.
    PDFDOILinkLinkLink Abstract HP18ssrn_cfipBibtexprivacymethodologyanon

    Citations: 16 (Google Scholar); 6 (Open Citations);