Folgen
Steffen Bartsch
Steffen Bartsch
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei cased.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Practitioners' perspectives on security in agile development
S Bartsch
2011 Sixth International Conference on Availability, Reliability and …, 2011
1142011
Mental models of verifiability in voting
MM Olembo, S Bartsch, M Volkamer
E-Voting and Identify: 4th International Conference, Vote-ID 2013, Guildford …, 2013
392013
How users bypass access control and why: the impact of authorization problems on individuals and the organization
S Bartsch, MA Sasse
UCL Department of Computer Science, 2012
242012
Voter, what message will motivate you to verify your vote?
MM Olembo, K Renaud, S Bartsch, M Volkamer
Workshop on Usable Security, 2014
192014
A calculus for the qualitative risk assessment of policy override authorization
S Bartsch
Proceedings of the 3rd international conference on Security of information …, 2010
182010
Effectively communicate risks for diverse users: A mental-models approach for individualized security interventions
S Bartsch, M Volkamer
INFORMATIK 2013–Informatik angepasst an Mensch, Organisation und Umwelt, 2013
152013
Contextualized web warnings, and how they cause distrust
S Bartsch, M Volkamer, H Theuerling, F Karayumak
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
142013
The transitivity-of-trust problem in android application interaction
S Bartsch, B Berger, M Bunke, K Sohr
2013 International Conference on Availability, Reliability and Security, 291-296, 2013
132013
Authorization enforcement usability case study
S Bartsch
International Symposium on Engineering Secure Software and Systems, 209-220, 2011
102011
Supporting agile development of authorization rules for SME applications
S Bartsch, K Sohr, C Bormann
Collaborative Computing: Networking, Applications and Worksharing: 4th …, 2009
102009
Capturing attention for warnings about insecure password fields–systematic development of a passive security intervention
N Kolb, S Bartsch, M Volkamer, J Vogt
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
92014
Adopting the cmu/apwg anti-phishing landing page idea for germany
M Volkamer, S Stockhardt, S Bartsch, M Kauer
2013 Third Workshop on Socio-Technical Aspects in Security and Trust, 46-52, 2013
92013
Guiding decisions on authorization policies: a participatory approach to decision support
S Bartsch, MA Sasse
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1502-1507, 2012
82012
Policy override in practice: model, evaluation, and decision support
S Bartsch
Security and Communication Networks 7 (1), 139-156, 2014
62014
Exploring twisted paths: Analyzing authorization processes in organizations
S Bartsch
2011 5th International Conference on Network and System Security, 216-223, 2011
62011
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung: Ein Lösungsvorschlag zur Erkennbarkeit von Kostenfallen als dem immer noch ungelösten Kernproblem
C Boos, S Bartsch, M Volkamer
Computer und Recht 30 (2), 119-127, 2014
52014
Supporting network access and service location in dynamic environments
D Kutscher, J Ott, S Bartsch
Campus-Wide Information Systems 24 (4), 225-251, 2007
52007
Towards the Systematic Development of Contextualized Security Interventions1
S Bartsch, M Volkamer
The 26th BCS Conference on Human Computer Interaction 26, 1-4, 2012
42012
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization
S Bartsch
Universität Bremen, 2012
32012
The Transitivity of Trust Problem in the Interaction of Android Applications
S Bartsch, K Sohr, M Bunke, O Hofrichter, B Berger
arXiv preprint arXiv:1204.1458, 2012
32012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20