Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Padlock, the Universal Security Symbol? - Exploring Symbols and Metaphors for Privacy and Security., , , , , , and . MUM, page 4-18. ACM, (2023)Revealing the Hidden Effects of Phishing Emails: An Analysis of Eye and Mouse Movements in Email Sorting Tasks., , , , , , , and . CoRR, (2023)PalmGazer: Unimanual Eye-hand Menus in Augmented Reality., , , , , , , and . SUI, page 10:1-10:12. ACM, (2023)VRsneaky: Stepping into an Audible Virtual World with Gait-Aware Auditory Feedback., , , , , and . CHI Extended Abstracts, page 1-4. ACM, (2020)Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks., , , and . EMPATHICH, page 2:1-2:6. ACM, (2023)VRsneaky: Increasing Presence in VR Through Gait-Aware Auditory Feedback., , , , , and . CHI, page 546. ACM, (2019)'Don't Annoy Me With Privacy Decisions!' - Designing Privacy-Preserving User Interfaces for SSI Wallets on Smartphones., , , , , and . IEEE Access, (2023)A Practical Method to Eye-tracking on the Phone: Toolkit, Accuracy and Precision., , , and . MUM, page 182-188. ACM, (2022)