Interdisciplinary Work

Psychology

  1. Harborth, D. and Pape, S.: Empirically Investigating Extraneous Influences on the "APCO" Model - Childhood Brand Nostalgia and the Positivity Bias.
    In Future Internet, 2020.
    Abstract HP20futureinternetBibtexprivacypsychologyanon

  2. Harborth, D. and Pape, S.: How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory.
    In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
    PDFDOILinkLink Abstract HP19bitBibtexinformation systemsarpsychologyanon

  3. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies.
    In Information and Computer Security, 25 (2): 206-222, 2017.
    PDFDOILinkLink Abstract SBP17icsBibtexsecuritysocial engineeringpsychology

  4. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology.
    In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDFLink Abstract SBP16haisaBibtexsecuritysocial engineeringpsychology

Economy

Often costs for security measures set a boundary for practicable security measures. In that context, I am investigating how non-expert users can be supported when taking security decisions.
On the other hand, if measures such as privacy enhancing technologies are not enforced by regulation, there needs to be a business model and it is important to investigate how much and under which circumstances the user is willing to pay.
  1. Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy?.
    In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDFDOILinkLink Dataset Dataset Abstract HCP19ifipsecBibtexinformation systemsprivacyeconomyanon

  2. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
    In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDFPresentation slidesDOILink Abstract HBGPR18sicherheitBibtexinformation systemsprivacyeconomyanonsioc

  3. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping.
    In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDFPresentation slidesDOILink Abstract PTBGLR18sicherheitBibtexprivacye-commerceeconomysioc

Law

Laws and regulations on the one hand restrict the acceptable solution space for technical solutions, e.\,g.\ when certain technical solutions are not compliant.
On the other hand, laws and regulations can enforce privacy or security measures, e.\,g.\ forcing energy providers to setup an information security management system. I am interested in designing compliant systems and investigating the effects of laws and regulations.
  1. Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers.
    .
    Abstract PSKS20iccipBibtexinformation systemssecuritycritical infrastructureslawcs4esidate

  2. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings.
    In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    PDFLinkBibtexsecurityserious gamesocial engineeringlawhatchsidate

  3. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services.
    In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILink Abstract PTKSP18ifipsecBibtexprivacyiotlawanon

Digital Humanities

  1. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions.
    In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDFDOILinkLink Abstract PSW12jteiBibtexsoftware engineeringdigital humanitiesteichi

  2. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster).
    In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    PosterLinkBibtexsoftware engineeringdigital humanitiesteichi

  3. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions.
    Technical Report, Universität Kassel, 2010.
    PDFLink Abstract PSW10trBibtexsoftware engineeringdigital humanitiesteichi

Scientific Methodology

  1. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym.
    IEEE Dataport, 2020.
    PDFDOILinkLink Dataset Dataset Abstract HP20dataportJDBibtexprivacymethodologyanon

  2. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Tor.
    IEEE Dataport, 2020.
    PDFDOILinkLink Dataset Dataset Abstract HP20dataportTorBibtexprivacymethodologyanon

  3. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
    In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
    PDFDOILinkLink Abstract PIHNKTR20trrBibtexprivacymethodology

  4. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
    In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
    PDFDOILinkLink Abstract PIHNKTR20trromdBibtexprivacymethodology

  5. Hamm, P.; Harborth, D. and Pape, S.: A Systematic Analysis of User Evaluations in Security Research.
    In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
    PDFDOILinkLink Abstract HHP19iwsmrBibtexsecuritymethodologycs4e