Author of the publication

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.

, , and . SOUPS, page 13-28. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit., , , , and . Datenschutz und Datensicherheit, 44 (8): 522-527 (2020)Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches., , , , , , and . ACM Trans. Comput. Hum. Interact., 30 (5): 77:1-77:53 (October 2023)Die Erfolgskontrolle von Subventionen durch die Rechnungshöfe. Europäische Hochschulschriften Lang, Frankfurt am Main u.a., (2001)Productivity vs security: mitigating conflicting goals in organizations., , , , and . Inf. Comput. Secur., 25 (2): 137-151 (2017)Addressing misconceptions about password security effectively., and . STAST, page 16-27. ACM, (2017)Light as a Possible Guidance in the Toilet Room from the View of Dementia Experts., and . dHealth, volume 301 of Studies in Health Technology and Informatics, page 225-226. IOS Press, (2023)"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?"., , , , , and . HAISA, volume 658 of IFIP Advances in Information and Communication Technology, page 218-227. Springer, (2022)Hobbit, a care robot supporting independent living at home: First prototype and lessons learned., , , , , , , , , and 1 other author(s). Robotics Auton. Syst., (2016)Smart toilet seat configuration for more autonomy using an AI-based 3D depth sensor., , , and . PETRA, page 111-112. ACM, (2021)Rethinking the Privacy Calculus: On the Role of Dispositional Factors and Affect., , and . ICIS, Association for Information Systems, (2013)