270 results on '"Volkamer, A."'
Search Results
2. Systematic User Evaluation of a Second Device Based Cast-as-Intended Verifiability Approach.
3. SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing.
4. Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners.
5. Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool.
6. Transformers for Molecular Property Prediction: Lessons Learned from the Past Five Years.
7. Wirkung von Webshop-Gütesiegeln.
8. Guided Docking as a Data Generation Approach Facilitates Structure-Based Machine Learning on Kinases.
9. "Data Protection Can Sometimes Be a Nuisance" A Notification Study on Data Sharing Practices in City Apps.
10. Erstellung eines Erklärvideos zur Verwendung von S/MIME (WIP).
11. Usability and Understanding of Individual Verifiability in the 2023 GI-Election.
12. Influence of URL Formatting on Users' Phishing URL Detection.
13. Encouraging Organisational Information Security Incident Reporting.
14. A user-centred approach to facilitate locating company security policies.
15. Transformers for molecular property prediction: Lessons learned from the past five years.
16. Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen - Die Basis der Demokratie in der digitalen Dekade.
17. Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E‑Mails - Was bei Weiterleitungs-URLs in E‑Mails aus Marketinggründen zu beachten ist.
18. Weiterleitungs-URLs in E-Mails.
19. Cookie-Nutzung nach Inkrafttreten des TTDSG.
20. 'Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?'.
21. Increasing security without decreasing usability: A comparison of various verifiable voting systems.
22. 'I don't know why I check this...' - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
23. German Voters' Attitudes Towards Voting Online with a Verifiable System.
24. Recent Developments in the Context of Online Elections and Digital Polls in Germany.
25. Shoulder-Surfing Resistant Authentication for Augmented Reality.
26. Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security-Gründen.
27. SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
28. Cookie Disclaimers: Impact of Design and Users' Attitude.
29. Individual Verifiability with Return Codes: Manipulation Detection Efficacy.
30. Why Is Online Voting Still Largely a Black Box?
31. Council of Europe Guidelines on the Use of ICT in Electoral Processes.
32. Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video.
33. Cookie disclaimers: Dark patterns and lack of transparency.
34. TeachOpenCADD 2022: open source and FAIR Python pipelines to assist in structural bioinformatics and cheminformatics research.
35. Manipulative Designs von Cookies.
36. KiSSim: Predicting Off-Targets from Structural Similarities in the Kinome.
37. A Literature Review on Virtual Reality Authentication.
38. How to Increase Smart Home Security and Privacy Risk Perception.
39. 'Healthy surveillance': Designing a concept for privacy-preserving mask recognition AI in the age of pandemics.
40. Vision: What Johnny learns about Password Security from Videos posted on YouTube.
41. Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites.
42. SMILE - Smart eMaIl Link Domain Extractor.
43. PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays.
44. Usable Security: Security 'Warnings' 2.0.
45. Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
46. An investigation of phishing awareness and education over time: When and how to best remind users.
47. Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.
48. Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
49. Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen.
50. Analysing Simulated Phishing Campaigns for Staff.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.