Practitioners' perspectives on security in agile development S Bartsch 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 119 | 2011 |
Mental models of verifiability in voting MM Olembo, S Bartsch, M Volkamer E-Voting and Identify: 4th International Conference, Vote-ID 2013, Guildford …, 2013 | 41 | 2013 |
How users bypass access control and why: the impact of authorization problems on individuals and the organization S Bartsch, MA Sasse UCL Department of Computer Science, 2012 | 24 | 2012 |
Voter, what message will motivate you to verify your vote? MM Olembo, K Renaud, S Bartsch, M Volkamer Workshop on Usable Security, 2014 | 19 | 2014 |
A calculus for the qualitative risk assessment of policy override authorization S Bartsch Proceedings of the 3rd international conference on Security of information …, 2010 | 18 | 2010 |
Effectively communicate risks for diverse users: A mental-models approach for individualized security interventions S Bartsch, M Volkamer INFORMATIK 2013–Informatik angepasst an Mensch, Organisation und Umwelt …, 2013 | 16 | 2013 |
Contextualized web warnings, and how they cause distrust S Bartsch, M Volkamer, H Theuerling, F Karayumak Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013 | 15 | 2013 |
The transitivity-of-trust problem in android application interaction S Bartsch, B Berger, M Bunke, K Sohr 2013 International Conference on Availability, Reliability and Security, 291-296, 2013 | 13 | 2013 |
Supporting agile development of authorization rules for SME applications S Bartsch, K Sohr, C Bormann Collaborative Computing: Networking, Applications and Worksharing: 4th …, 2009 | 11 | 2009 |
Authorization enforcement usability case study S Bartsch International Symposium on Engineering Secure Software and Systems, 209-220, 2011 | 10 | 2011 |
Capturing attention for warnings about insecure password fields–systematic development of a passive security intervention N Kolb, S Bartsch, M Volkamer, J Vogt Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 9 | 2014 |
Adopting the cmu/apwg anti-phishing landing page idea for germany M Volkamer, S Stockhardt, S Bartsch, M Kauer 2013 Third Workshop on Socio-Technical Aspects in Security and Trust, 46-52, 2013 | 9 | 2013 |
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support S Bartsch, MA Sasse Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1502-1507, 2012 | 8 | 2012 |
Policy override in practice: model, evaluation, and decision support S Bartsch Security and Communication Networks 7 (1), 139-156, 2014 | 6 | 2014 |
Exploring twisted paths: Analyzing authorization processes in organizations S Bartsch 2011 5th International Conference on Network and System Security, 216-223, 2011 | 6 | 2011 |
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung: Ein Lösungsvorschlag zur Erkennbarkeit von Kostenfallen als dem immer noch ungelösten Kernproblem C Boos, S Bartsch, M Volkamer Computer und Recht 30 (2), 119-127, 2014 | 5 | 2014 |
Supporting network access and service location in dynamic environments D Kutscher, J Ott, S Bartsch Campus-Wide Information Systems 24 (4), 225-251, 2007 | 5 | 2007 |
Zertifizierte datensicherheit für android-anwendungen auf basis statischer programmanalysen S Bartsch, B Berger, E Bodden, A Brucker, J Heider, M Kus, S Maseberg, ... Gesellschaft für Informatik eV, 2014 | 3 | 2014 |
Towards the systematic development of contextualized security interventions1 S Bartsch, M Volkamer The 26th BCS Conference on Human Computer Interaction, 2012 | 3 | 2012 |
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization S Bartsch Universität Bremen, 2012 | 3 | 2012 |