Number of items: 40.
Conference or Workshop Item (A Paper)
Mustafa, Maryam and Asad, Abdul Moeed and Hassan, Shehrbano and Haider, Urooj and Durrani, Zainab and Krombholz, Katharina
(2023)
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
Gerhardt, Dañiel and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Gröber, Lea and Mrowczynski, Rafael and Vijay, Nimisha and Muller, Daphne A. and Dabrowski, Adrian and Krombholz, Katharina
(2023)
To Cloud or not to Cloud: A Qualitative Study on Self-Hosters’ Motivation, Operation, and Security Mindset.
Guthoff, Carolyn and Anell, Simon and Hainzinger, Johann and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
Ortloff, Anna-Marie and Fassl, Matthias and Ponticello, Alexander and Martius, Florin and Mertens, Anna and Krombholz, Katharina and Smith, Matthew
(2023)
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Hasan, Rakibul and Weil, Rebecca and Siegel, Rudolf and Krombholz, Katharina
(2023)
A Psychometric Scale to Measure Individuals’ Value of Other People’s Privacy (VOPP).
Fassl, Matthias and Krombholz, Katharina
(2023)
Why I Can't Authenticate --- Understanding the Low Adoption of Authentication Ceremonies with Autoethnography.
Hasan, Rakibul and Siegel, Rudolf and Weil, Rebecca and Krombholz, Katharina
(2022)
Developing a Psychometric Scale to Measure One’s Valuation of Other People’s Privacy.
Fassl, Matthias and Anell, Simon and Houy, Sabine and Lindorfer, Martina and Krombholz, Katharina
(2022)
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022)
Industrial practitioners' mental models of adversarial machine learning.
Pfeffer, Katharina and Mai, Alexandra and Weippl, Edgar and Rader, Emilee and Krombholz, Katharina
(2022)
Replication: Stories as Informal Lessons about Security.
Binkhorst, Veroniek and Fiebig, Tobias and Krombholz, Katharina and Pieters, Wolter and Labunets, Katsiaryna
(2022)
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Mai, Alexandra and Schedler, Oliver and Weippl, Edgar and Krombholz, Katharina
(2022)
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators’ Difficulties with TLS Configurations.
Mai, Alexandra and Guelmino, Leonard and Pfeffer, Katharina and Weippl, Edgar and Krombholz, Katharina
(2022)
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s).
Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021)
12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
Fassl, Matthias and Neumayr, Michaela and Schedler, Oliver and Krombholz, Katharina
(2021)
Transferring Update Behavior from Smartphones to Smart Consumer Devices.
(Submitted)
Pfeffer, Katharina and Mai, Alexandra and Dabrowski, Adrian and Gusenbauer, Matthias and Schindler, Philipp and Weippl, Edgar and Franz, Michael and Krombholz, Katharina
(2021)
On the Usability of Authenticity Checks for Hardware Security Tokens.
Ponticello, Alexander and Fassl, Matthias and Krombholz, Katharina
(2021)
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
Gröber, Lea and Fassl, Matthias and Gupta, Abhilash and Krombholz, Katharina
(2021)
Investigating Car Drivers’ Information Demand after Safety and Security Critical Incidents.
Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021)
Exploring User-Centered Security Design for Usable Authentication Ceremonies.
Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021)
Stop the Consent Theater.
Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020)
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Anell, Simon and Gröber, Lea and Krombholz, Katharina
(2020)
End User and Expert Perceptions of Threats and Potential Countermeasures.
Busse, Karoline and Tahaei, Mohammad and Krombholz, Katharina and von Zezschwitz, Emanuel and Smith, Matthew and Tian, Jing and Xu, Wenyuan
(2020)
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Sattar, Hosnieh and Krombholz, Katharina and Pons-Moll, Gerard and Fritz, Mario
(2020)
Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
Tiefenau, Christian and Häring, Maximilian and Krombholz, Katharina and von Zezschwitz, Emanuel
(2020)
Security, Availability, and Multiple Information Sources:
Exploring Update Behavior of System Administrators.
Mai, Alexandra and Pfeffer, Katharina and Gusenbauer, Matthias and Weippl, Edgar and Krombholz, Katharina
(2020)
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019)
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Alam, Aftab and Krombholz, Katharina and Bugiel, Sven
(2019)
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019)
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Suchan, Alexander and von Zezschwitz, Emanuel and Krombholz, Katharina
(2019)
Stop to Unlock - Improving the Security of Android Unlock Patterns.
Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018)
Investigating System Operators' Perspective on Security Misconfigurations.
Krombholz, Katharina and Dabrowski, Adrian and Purgathofer, Peter and Weippl, Edgar
(2018)
Poster: The Petri Dish Attack - Guessing Secrets Based on Bacterial Growth.
Krombholz, Katharina and Mayer, Wilfried and Schmiedecker, Martin and Weippl, Edgar
(2017)
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS.
Krombholz, Katharina and Dabrowski, Adrian and Smith, Matthew and Weippl, Edgar
(2017)
Exploring Design Directions for Wearable Privacy.
Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016)
Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar
(2016)
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Article
Fassl, Matthias and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon.
Proceedings of the ACM on Human-Computer Interaction, 7 (CSCW2).
Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Cranor, Lorrie Faith and Koenig, Vincent
(2021)
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Transactions on Computer-Human Interaction, 28 (6).
pp. 1-50.
ISSN 1073-0516
Book Section
Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Koenig, Vincent and Cranor, Lorrie Faith
(2023)
Empirical Research Methods in Usable Privacy and Security.
In:
Human Factors in Privacy Research.
Springer Cham, pp. 29-53.
ISBN 978-3-031-28643-8
This list was generated on Thu Nov 21 12:28:17 2024 CET.