Author of the publication

Exploring Security Processes in Organizations: the Case of Smartphones.

, and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing., , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 137-152. Springer, (2018)Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing., , , and . CoRR, (2019)Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit., , , and . Inform. Spektrum, 42 (1): 38-47 (2019)Tampering with Motes: Real-World Attacks on Wireless Sensor Networks., , and . Sicherheit, volume P-77 of LNI, page 26-29. GI, (2006)Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte., , and . Sicherheit, volume P-195 of LNI, page 7-24. GI, (2012)Specifying IT Security Awareness., and . DEXA Workshops, page 326-330. IEEE Computer Society, (2014)Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks., , and . CHI Extended Abstracts, page 288:1-288:15. ACM, (2023)Secure Multi-Party Computation with Security Modules., , and . Sicherheit, volume P-62 of LNI, page 41-52. GI, (2005)Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten., , , and . Sicherheit, volume P-228 of LNI, page 37-51. GI, (2014)User Authentication in Sensor Networks., , and . GI Jahrestagung (2), volume P-51 of LNI, page 385-389. GI, (2004)