Oksana Kulyk (Karlsruhe Institute of Technology); Paul Gerber, Karola Marky, Christopher Beckmann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
View More Papers
Scenario-Driven Assessment of Cyber Risk Perception at the Security...
Simon Parkin (TU Delft), Kristen Kuhn, Siraj Ahmed Shaikh (Coventry University)
Read MoreUnderstanding reCAPTCHAv2 via a Large-Scale Live User Study
Andrew Searles (University of California Irvine), Renascence Tarafder Prapty (University of California Irvine), Gene Tsudik (University of California Irvine)
Read MoreContinuous Smartphone Authentication using Wristbands
Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)
Read MoreAnalyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read More