Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training., , , and . CoRR, (2023)How Do Users Chain Email Accounts Together?, , and . SEC, volume 625 of IFIP Advances in Information and Communication Technology, page 416-429. Springer, (2021)Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)., , and . CoRR, (2022)Usability Insights from Establishing TLS Connections., , , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 289-305. Springer, (2022)Applications of educational data mining and learning analytics on data from cybersecurity training., , , and . Educ. Inf. Technol., 27 (9): 12179-12212 (2022)Even if users do not read security directives, their behavior is not so catastrophic., , , , and . Commun. ACM, 65 (1): 37-40 (2022)Will you trust this TLS certificate?: perceptions of people working in IT., , , and . ACSAC, page 718-731. ACM, (2019)Using Linked Data and LOD2 stack in Emergency Management, and . Proceedings of International Conference on Information Society Technology and Management, Information Society of the Republic of Serbia, (2013)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals., , , , , and . ITiCSE (1), page 236-242. ACM, (2023)