Author of the publication

Security but not for security's sake: The impact of social considerations on app developers' choices.

, , , , , and . ICSE (Workshops), page 141-144. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An OPC UA interface for an evolvable ISA88 control module., , , , , and . ETFA, page 1-9. IEEE, (2011)Category Structure of Language Types Common to Conceptual Modeling Languages., and . BMMDS/EMMSAD, volume 175 of Lecture Notes in Business Information Processing, page 317-331. Springer, (2014)Insights from a Study on Decision Making in Enterprise Architecture., and . PoEM (Short Papers), volume 1497 of CEUR Workshop Proceedings, page 21-30. CEUR-WS.org, (2015)An ISA88 Phase in IEC 61131-3 code based on the concepts of a Normalized flow element., , and . ETFA, page 1-8. IEEE, (2012)Safe cryptography for all: towards visual metaphor driven cryptography building blocks., , , and . SEAD@ICSE, page 41-44. ACM, (2018)A collaborative risk management framework for enterprise architecture., , and . RCIS, page 1-6. IEEE, (2014)Using Visual Notations with Modeling Experts or Novices: What do the Experts Think?. CAiSE Workshops, volume 286 of Lecture Notes in Business Information Processing, page 53-58. Springer, (2017)Does my dog really need a gadget?: What can we learn from pet owners' amotivations for using pet wearables?, , and . ACI, page 6:1-6:6. ACM, (2019)Challenges of Identifying Communities with Shared Semantics in Enterprise Modeling., and . PoEM, volume 134 of Lecture Notes in Business Information Processing, page 160-171. Springer, (2012)Noisy technology, unhappy dogs: where technology might support caregiving in the home., and . ACI, page 10:1-10:6. ACM, (2022)