Author of the publication

PERSUADED: Fighting Social Engineering Attacks with a Serious Game.

, , and . TrustBus, volume 11033 of Lecture Notes in Computer Science, page 103-118. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asset-Centric Analysis and Visualisation of Attack Trees., , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 45-64. Springer, (2020)A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App., and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 3-19. Springer, (2022)HATCH: Hack And Trick Capricious Humans - A Serious Game on Social Engineering., , and . BCS HCI, BCS, (2016)A Systematic Approach for Automotive Privacy Management., , , , , , , , , and . CSCS, page 7:1-7:12. ACM, (2023)Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing., , , and . CSCS, page 7:1-7:11. ACM, (2021)Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen., , and . GI Jahrestagung, volume P-154 of LNI, page 186-190. GI, (2009)JonDonym Users' Information Privacy Concerns., and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 170-184. Springer, (2018)Easing the Burden of Security Self-Assessments., , , , and . HAISA, page 272-281. University of Plymouth, (2018)The Influence of Privacy Concerns on Cryptocurrency Acceptance., , and . SEC, volume 679 of IFIP Advances in Information and Communication Technology, page 45-58. Springer, (2023)DATASET ON ACTUAL USERS OF THE PRIVACY-ENHANCING TECHNOLOGY JONDONYM., and . (January 2020)