Author of the publication

An investigation of phishing awareness and education over time: When and how to best remind users.

, , , , , , , and . SOUPS @ USENIX Security Symposium, page 259-284. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Die Erfolgskontrolle von Subventionen durch die Rechnungshöfe. Europäische Hochschulschriften Lang, Frankfurt am Main u.a., (2001)Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches., , , , , , and . ACM Trans. Comput. Hum. Interact., 30 (5): 77:1-77:53 (October 2023)Addressing misconceptions about password security effectively., and . STAST, page 16-27. ACM, (2017)Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit., , , , and . Datenschutz und Datensicherheit, 44 (8): 522-527 (2020)"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?"., , , , , and . HAISA, volume 658 of IFIP Advances in Information and Communication Technology, page 218-227. Springer, (2022)Productivity vs security: mitigating conflicting goals in organizations., , , , and . Inf. Comput. Secur., 25 (2): 137-151 (2017)Hobbit, a care robot supporting independent living at home: First prototype and lessons learned., , , , , , , , , and 1 other author(s). Robotics Auton. Syst., (2016)Smart toilet seat configuration for more autonomy using an AI-based 3D depth sensor., , , and . PETRA, page 111-112. ACM, (2021)Light as a Possible Guidance in the Toilet Room from the View of Dementia Experts., and . dHealth, volume 301 of Studies in Health Technology and Informatics, page 225-226. IOS Press, (2023)ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology., , , , , , and . EuroS&P, page 357-371. IEEE, (2016)