Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hey, You, Get Off of My Clipboard, , , , and . Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)Towards a Translational Medical Research Ecosystem, , , , and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), (2011)GenderMag Improves Discoverability in the Field, Especially for Women: An Multi-Year Case Study of Suggest Edit, a Code Review Feature., , , , , , and . ICSE, page 189:1-189:12. ACM, (2024)Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes., , , , , , , , and . SOUPS, page 97-111. USENIX Association, (2016)POSTER: Android + Open Wi-Fis = Broken SSL?, , , and . (2013)Visual Access Control for Research Ecosystems, and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)Using personal examples to improve risk communication for security & privacy decisions., , , and . CHI, page 2647-2656. ACM, (2014)Position Statement: Risk Perception and the Acceptance of New Security Technology, , and . Symposium on Usable Privacy and Security (SOUPS), Workshop on Risk Perception in IT Security and Privacy, (2013)Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS)., , and . CHI, page 5257-5261. ACM, (2016)Nudge me right: Personalizing online security nudges to people's decision-making styles., , , , , and . Comput. Hum. Behav., (2020)