Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior N Gerber, P Gerber, M Volkamer Computers & security 77, 226-261, 2018 | 515 | 2018 |
Why doesn’t Jane protect her privacy? K Renaud, M Volkamer, A Renkema-Padmos Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 159 | 2014 |
The development of remote e-voting around the world: A review of roads and directions R Krimmer, S Triessnig, M Volkamer International Conference on E-Voting and Identity, 1-15, 2007 | 109 | 2007 |
User experiences of torpedo: Tooltip-powered phishing email detection M Volkamer, K Renaud, B Reinheimer, A Kunz Computers & Security 71, 100-113, 2017 | 100 | 2017 |
An investigation of phishing awareness and education over time: When and how to best remind users B Reinheimer, L Aldag, P Mayer, M Mossano, R Duezguen, B Lofthouse, ... Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 259-284, 2020 | 98 | 2020 |
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities M Volkamer Springer, 2009 | 93 | 2009 |
this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer O Kulyk, A Hilt, N Gerber, M Volkamer European Workshop on Usable Security (EuroUSEC) 4, 2018 | 91 | 2018 |
Usability analysis of Helios—an open source verifiable remote electronic voting system F Karayumak, MM Olembo, M Kauer, M Volkamer 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2011 | 83 | 2011 |
Mental models–general introduction and review of their application to human-centred security M Volkamer, K Renaud Number theory and cryptography: Papers in honor of johannes buchmann on the …, 2013 | 76 | 2013 |
Teaching phishing-security: which way is best? S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ... ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 69 | 2016 |
NoPhish: an anti-phishing education app G Canova, M Volkamer, C Bergmann, R Borza Security and Trust Management: 10th International Workshop, STM 2014 …, 2014 | 69 | 2014 |
GHOST-Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ... Euro-CYBERSEC, 68-78, 2018 | 62 | 2018 |
Investigating people’s privacy risk perception N Gerber, B Reinheimer, M Volkamer Proceedings on Privacy Enhancing Technologies, 2019 | 61 | 2019 |
NoPhish app evaluation: lab and retention study G Canova, M Volkamer, C Bergmann, B Reinheimer NDSS workshop on usable security, 2015 | 60 | 2015 |
Extending helios towards private eligibility verifiability O Kulyk, V Teague, M Volkamer E-Voting and Identity: 5th International Conference, VoteID 2015, Bern …, 2015 | 56 | 2015 |
Exploring consumers’ attitudes of smart TV related privacy risks M Ghiglieri, M Volkamer, K Renaud Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017 | 54 | 2017 |
User study of the improved Helios voting system interfaces F Karayumak, M Kauer, MM Olembo, T Volk, M Volkamer 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011 | 54 | 2011 |
A formal approach towards measuring trust in distributed systems G Schryen, M Volkamer, S Ries, SM Habib Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011 | 54 | 2011 |
Information flow control to secure dynamic web service composition D Hutter, M Volkamer International Conference on Security in Pervasive Computing, 196-210, 2006 | 53 | 2006 |
Civitas and the real world: problems and solutions from a practical point of view S Neumann, M Volkamer 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 52 | 2012 |