Author of the publication

A Serious Game for Eliciting Social Engineering Security Requirements.

, and . RE, page 16-25. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Easing the Burden of Security Self-Assessments., , , , and . HAISA, page 272-281. University of Plymouth, (2018)JonDonym Users' Information Privacy Concerns., and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 170-184. Springer, (2018)Asset-Centric Analysis and Visualisation of Attack Trees., , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 45-64. Springer, (2020)A Systematic Approach for Automotive Privacy Management., , , , , , , , , and . CSCS, page 7:1-7:12. ACM, (2023)Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing., , , and . CSCS, page 7:1-7:11. ACM, (2021)Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen., , and . GI Jahrestagung, volume P-154 of LNI, page 186-190. GI, (2009)HATCH: Hack And Trick Capricious Humans - A Serious Game on Social Engineering., , and . BCS HCI, BCS, (2016)A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App., and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 3-19. Springer, (2022)DATASET ON ACTUAL USERS OF THE PRIVACY-ENHANCING TECHNOLOGY JONDONYM., and . (January 2020)The Influence of Privacy Concerns on Cryptocurrency Acceptance., , and . SEC, volume 679 of IFIP Advances in Information and Communication Technology, page 45-58. Springer, (2023)