Author of the publication

Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.

, , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 172-182. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions., and . GI-Jahrestagung, volume P-220 of LNI, page 1971-1984. GI, (2013)Rechtliche und technische Nutzerunterstützung bei der Button-Lösung, Ein Lösungsvorschlag zur Erkennbarkeit von Kostenfallen als dem immer noch ungelösten Kernproblem, , and . Computer und Recht (CR), (2014)Practitioners' Perspectives on Security in Agile Development.. ARES, page 479-484. IEEE Computer Society, (2011)A calculus for the qualitative risk assessment of policy override authorization.. SIN, page 62-70. ACM, (2010)Authorization Enforcement Usability Case Study.. ESSoS, volume 6542 of Lecture Notes in Computer Science, page 209-220. Springer, (2011)Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten., , , , , , and . GI-Jahrestagung, volume P-232 of LNI, page 2069-2080. GI, (2014)Benutzbare Sicherheit für wirksame Berechtigungen in Organisationen.. Ausgezeichnete Informatikdissertationen, volume D-13 of LNI, GI, (2012)Exploring twisted paths: Analyzing authorization processes in organizations.. NSS, page 216-223. IEEE, (2011)How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization., and . ECIS, page 53. (2013)Guiding decisions on authorization policies: a participatory approach to decision support., and . SAC, page 1502-1507. ACM, (2012)