Author of the publication

Obstacles to the Adoption of Secure Communication Tools.

, , , , , and . IEEE Symposium on Security and Privacy, page 137-153. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interventions for software security: creating a lightweight program of assurance techniques for developers., , , , , and . ICSE (SEIP), page 41-50. IEEE / ACM, (2019)Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr., , , and . PACMHCI, 2 (CSCW): 181:1-181:22 (2018)Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty., , and . WEIS, (2015)Accounting for taste: using profile similarity to improve recommender systems, , , and . CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, page 1057--1066. New York, NY, USA, ACM Press, (2006)IT-Sicherheit ist mehr als Technik., , and . Datenschutz und Datensicherheit, 43 (11): 673-674 (2019)Piloting of Multimedia Integrated Communications for European Researchers (MICE), , and . Proceedings of International Networking Conference INET'93, page DCA-1--DCA-12. San Francisco, California, (August 1993)Getting Users Smart Quick about Security: Results from 90 Minutes of Using a Persuasive Toolkit for Facilitating Information Security Problem Solving by Non-Professionals., , and . CoRR, (2022)Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies., , , , , , , , , and . CoRR, (2022)"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns., , , and . USENIX Security Symposium, page 4105-4122. USENIX Association, (2023)2 Fast 2 Secure: A Case Study of Post-Breach Security Changes., , , and . EuroS&P Workshops, page 192-201. IEEE, (2019)