Author of the publication

"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to privacy by default.

, , and . SAC, page 1235-1246. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely., , , and . NSPW, page 45-58. ACM, (2020)Gaming concepts and incentives to change driver behaviour., and . Med-Hoc-Net, page 146-151. IEEE, (2012)Socio-Technical Security Metrics (Dagstuhl Seminar 14491), , , , and . Dagstuhl Reports, 4 (12): 1--28 (2015)An (Un)Necessary Evil - Users' (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering., , , , , and . EuroS&P Workshops, page 1-8. IEEE, (2022)"We Need a Big Revolution in Email Advertising": Users' Perception of Persuasion in Permission-based Advertising Emails., , , and . CHI, page 652:1-652:21. ACM, (2023)What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory., , , , , and . SOUPS @ USENIX Security Symposium, page 487-506. USENIX Association, (2024)Empathy in Design Scale: Development and Initial Insights., , , and . CHI Extended Abstracts, page 373:1-373:7. ACM, (2022)Running out of time(rs): effects of scarcity cues on perceived task load, perceived benevolence and user experience on e-commerce sites., , , , , and . Behav. Inf. Technol., 43 (11): 2281-2299 (August 2024)Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security., , and . EuroS&P Workshops, page 220-229. IEEE, (2020)From #MuseumAtHome to #AtHomeAtTheMuseum: Digital Museums and Dialogical Engagement Beyond the COVID-19 Pandemic., , , , and . ACM Journal on Computing and Cultural Heritage, 15 (2): 30:1-30:29 (2022)