Why users ignore privacy policies–a survey and intention model for explaining user privacy behavior M Rudolph, D Feth, S Polst Human-Computer Interaction. Theories, Methods, and Human Issues: 20th …, 2018 | 51 | 2018 |
Flexible data-driven security for android D Feth, A Pretschner 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 50 | 2012 |
A user-centered model for usable security and privacy D Feth, A Maier, S Polst Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017 | 38 | 2017 |
Context-aware, data-driven policy enforcement for smart mobile devices in business environments D Feth, C Jung Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012 | 20 | 2012 |
Company privacy dashboards: Employee needs and requirements S Polst, P Kelbert, D Feth HCI for Cybersecurity, Privacy and Trust: First International Conference …, 2019 | 19 | 2019 |
Context-aware policy enforcement for android C Jung, D Feth, C Seise 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 16 | 2013 |
Requirements elicitation and derivation of security policy templates—an industrial case study M Rudolph, D Feth, J Doerr, J Spilker 2016 IEEE 24th International Requirements Engineering Conference (RE), 283-292, 2016 | 15 | 2016 |
Transparency through contextual privacy statements D Feth Gesellschaft für Informatik eV, 2017 | 13 | 2017 |
User-centric security: optimization of the security-usability trade-off D Feth Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 13 | 2015 |
Heuristics and models for evaluating the usability of security measures D Feth, S Polst Proceedings of Mensch und Computer 2019, 275-285, 2019 | 11 | 2019 |
Requirement and quality models for privacy dashboards D Feth, H Schmitt 2020 IEEE 7th International Workshop on Evolving Security & Privacy …, 2020 | 9 | 2020 |
Achieving usable security and privacy through Human-Centered Design EC Groen, D Feth, S Polst, J Tolsdorf, S Wiefling, LL Iacono, H Schmitt Human Factors in Privacy Research, 83-113, 2023 | 8 | 2023 |
Privatheit am Arbeitsplatz: Transparenz und Selbstbestimmung bei Arbeit 4.0 J Tolsdorf, CK Bosse, A Dietrich, D Feth, H Schmitt Datenschutz und Datensicherheit-DuD 44 (3), 176-181, 2020 | 8 | 2020 |
Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms MP Rudolph, D Feth Gesellschaft für Informatik eV, 2019 | 7 | 2019 |
Evaluation kontextueller datenschutzerklärungen AM Ortloff, L Güntner, M Windl, D Feth, S Polst Gesellschaft für Informatik eV, 2018 | 7 | 2018 |
Components and architecture for the implementation of technology-driven employee data protection F Dehling, D Feth, S Polst, B Steffes, J Tolsdorf Trust, Privacy and Security in Digital Business: 18th International …, 2021 | 6 | 2021 |
A framework for generating user-and domain-tailored security policy editors M Rudolph, C Moucha, D Feth 2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016 | 5 | 2016 |
Dealing with uncertainty in context-aware mobile applications C Jung, A Eitel, D Feth, M Rudolph MOBILITY 2015, 9, 2015 | 5 | 2015 |
Automatic derivation of context descriptions C Jung, D Feth, Y Elrakaiby 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2015 | 5 | 2015 |
Benutzerfreundlicher datenschutz in cloud-basierten office-paketen J Tolsdorf, F Dehling, D Feth Datenschutz und Datensicherheit-dud 45 (1), 33-39, 2021 | 4 | 2021 |