Inter- and Transdisciplinary Work

Psychology psychology

  1. Harborth, D. and Pape, S.: Empirically Investigating Extraneous Influences on the "APCO" Model - Childhood Brand Nostalgia and the Positivity Bias.
    In Future Internet, 12(12) (220), 2020.
    PDFDOILinkLink Abstract HP20futureinternetBibtexprivacypsychologyanon

  2. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
    In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
    PDFDOILinkLink Abstract PIHNKTR20trrBibtexprivacymethodologypsychology

  3. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
    In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
    PDFDOILinkLink Abstract PIHNKTR20trromdBibtexprivacymethodologypsychology

  4. Harborth, D. and Pape, S.: How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory.
    In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
    PDFDOILinkLink Abstract HP19bitBibtexinformation systemsarpsychologyanon

  5. Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.
    In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
    PDFLink Abstract HP18amcisBibtexinformation systemsprivacypetspsychologyanon

  6. Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns.
    In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILink Dataset Dataset Abstract HP18ifipsecBibtexinformation systemsprivacypetspsychologyanon

  7. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany.
    In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDFDOILink Abstract HP17ifipscBibtexinformation systemsprivacypetsarpsychologyanon

  8. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract).
    In Preproceedings of IFIP Summer School on Privacy and Identity Management - the Smart World Revolution 2017 (IFIPSC2017), 2017.
    PDF Abstract HP17ifipsc_eaBibtexinformation systemsprivacyarpsychology

  9. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go.
    In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
    PDFDOILink Abstract HP17ismarBibtexinformation systemsarpsychology

  10. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies.
    In Information and Computer Security, 25 (2): 206-222, 2017.
    PDFDOILinkLink Abstract SBP17icsBibtexsecuritysocial engineeringpsychology

  11. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology.
    In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDFLink Abstract SBP16haisaBibtexsecuritysocial engineeringpsychology

Economy economy

Often costs for security measures set a boundary for practicable security measures. In that context, I am investigating how non-expert users can be supported when taking security decisions.
On the other hand, if measures such as privacy enhancing technologies are not enforced by regulation, there needs to be a business model and it is important to investigate how much and under which circumstances the user is willing to pay.
  1. Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy?.
    In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDFDOILinkLink Dataset Dataset Abstract HCP19ifipsecBibtexinformation systemsprivacypetseconomyanon

  2. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
    In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDFPresentation slidesDOILink Abstract HBGPR18sicherheitBibtexinformation systemsprivacypetseconomyanonsioc

  3. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping.
    In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDFPresentation slidesDOILink Abstract PTBGLR18sicherheitBibtexprivacypetse-commerceeconomysioc

Law law

Laws and regulations on the one hand restrict the acceptable solution space for technical solutions, e.\,g.\ when certain technical solutions are not compliant.
On the other hand, laws and regulations can enforce privacy or security measures, e.\,g.\ forcing energy providers to setup an information security management system. I am interested in designing compliant systems and investigating the effects of laws and regulations.
  1. Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers.
    .
    Abstract PSKS20iccipBibtexinformation systemssecuritycritical infrastructureslawcs4esidate

  2. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings.
    In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    PDFLinkBibtexsecuritysocial engineeringserious gamelawhatchsidate

  3. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services.
    In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDFPresentation slidesDOILink Abstract PTKSP18ifipsecBibtexprivacyiotlawanon

Digital Humanities digital humanities

  1. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions.
    In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDFDOILinkLink Abstract PSW12jteiBibtexsoftware engineeringdigital humanitiesteichi

  2. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster).
    In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    PosterLinkBibtexsoftware engineeringdigital humanitiesteichi

  3. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions.
    Technical Report, Universität Kassel, 2010.
    PDFLink Abstract PSW10trBibtexsoftware engineeringdigital humanitiesteichi

Scientific Methodology methodology

  1. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym.
    IEEE Dataport, 2020.
    PDFDOILinkLink Dataset Dataset Abstract HP20dataportJDBibtexprivacypetsmethodologyanon

  2. Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Tor.
    IEEE Dataport, 2020.
    PDFDOILinkLink Dataset Dataset Abstract HP20dataportTorBibtexprivacypetsmethodologyanon

  3. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
    In AIS Transactions on Replication Research, 6 (18): 1-18, 2020.
    PDFDOILinkLink Abstract PIHNKTR20trrBibtexprivacymethodologypsychology

  4. Pape, S.; Ivan, A.; Harborth, D.; Nakamura, T.; Kiyomoto, S.; Takasaki, H. and Rannenberg, K.: Open Materials Discourse: Re-evaluating Internet Users' Information Privacy Concerns: The Case in Japan.
    In AIS Transactions on Replication Research, 6 (22): 1-7, 2020.
    PDFDOILinkLink Abstract PIHNKTR20trromdBibtexprivacymethodologypsychology

  5. Hamm, P.; Harborth, D. and Pape, S.: A Systematic Analysis of User Evaluations in Security Research.
    In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
    PDFDOILinkLink Abstract HHP19iwsmrBibtexsecuritymethodologycs4e

  6. Harborth, D. and Pape, S.: German Translation of the Concerns for Information Privacy (CFIP) Construct.
    Technical Report, SSRN, 2018.
    PDFDOILink Abstract HP18ssrn_cfipBibtexprivacymethodologyanon

  7. Harborth, D. and Pape, S.: German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire.
    Technical Report, SSRN, 2018.
    PDFDOILink Abstract HP18ssrn_utautBibtexinformation systemsmethodologyanon