Inter- and Transdisciplinary Work
Psychology 
- Empirically Investigating Extraneous Influences on the "APCO" Model - Childhood Brand Nostalgia and the Positivity Bias.
In Future Internet, 12(12) (220), 2020. - Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
In AIS Transactions on Replication Research, 6 (18): 1-18, 2020. - Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
In AIS Transactions on Replication Research, 6 (22): 1-7, 2020. - How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory.
In Behaviour & Information Technology, 39 (12): 1276-1296, 2019. - Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.
In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018. - JonDonym Users' Information Privacy Concerns.
In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%. - Privacy Concerns and Behavior of Pokémon Go Players in Germany.
In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017. - Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract).
In Preproceedings of IFIP Summer School on Privacy and Identity Management - the Smart World Revolution 2017 (IFIPSC2017), 2017. - Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go.
In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %. - Social engineering defence mechanisms and counteracting training strategies.
In Information and Computer Security, 25 (2): 206-222, 2017. - A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology.
In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
Economy 
Often costs for security measures set a boundary for practicable security measures. In that context, I am investigating how non-expert users can be supported when taking security decisions.On the other hand, if measures such as privacy enhancing technologies are not enforced by regulation, there needs to be a business model and it is important to investigate how much and under which circumstances the user is willing to pay.
- Why Do People Pay for Privacy?.
In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%. - Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018. - Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping.
In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
Law 
Laws and regulations on the one hand restrict the acceptable solution space for technical solutions, e.\,g.\ when certain technical solutions are not compliant.On the other hand, laws and regulations can enforce privacy or security measures, e.\,g.\ forcing energy providers to setup an information security management system. I am interested in designing compliant systems and investigating the effects of laws and regulations.
- On the use of Information Security Management Systems by German Energy Providers.
. - Juristische Bewertung eines Social-Engineering-Abwehr Trainings.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018. - Assessing Privacy Policies of Internet of Things Services.
In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
Digital Humanities 
- TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions.
In Journal of the Text Encoding Initiative, 2: 1-16, 2012. - Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster).
In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010. - A Framework for TEI-Based Scholarly Text Editions.
Technical Report, Universität Kassel, 2010.
Scientific Methodology 
- Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym.
IEEE Dataport, 2020. - Dataset on Actual Users of the Privacy-Enhancing Technology Tor.
IEEE Dataport, 2020. - Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
In AIS Transactions on Replication Research, 6 (18): 1-18, 2020. - Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
In AIS Transactions on Replication Research, 6 (22): 1-7, 2020. - A Systematic Analysis of User Evaluations in Security Research.
In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019. - German Translation of the Concerns for Information Privacy (CFIP) Construct.
Technical Report, SSRN, 2018. - German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire.
Technical Report, SSRN, 2018.