Follow
Nina Gerber
Nina Gerber
Verified email at tu-darmstadt.de
Title
Cited by
Cited by
Year
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & security 77, 226-261, 2018
5262018
The'hedonic'in human-computer interaction: history, contributions, and future research directions
S Diefenbach, N Kolb, M Hassenzahl
Proceedings of the 2014 conference on Designing interactive systems, 305-314, 2014
2002014
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber
International Journal of Human-Computer Studies 133, 26-44, 2020
982020
This website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC) 4, 2018
922018
Investigating people’s privacy risk perception
N Gerber, B Reinheimer, M Volkamer
Proceedings on Privacy Enhancing Technologies, 2019
632019
Home sweet home? Investigating users’ awareness of smart home privacy threats
N Gerber, B Reinheimer, M Volkamer
Proceedings of an Interactive Workshop on the Human aspects of Smarthome …, 2018
392018
FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness
N Gerber, P Gerber, H Drews, E Kirchner, N Schlegel, T Schmidt, L Scholz
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
342018
“If it wasn’t secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies
V Zimmermann, N Gerber
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
342017
Finally johnny can encrypt: But does this make him feel more secure?
N Gerber, V Zimmermann, B Henhapl, S Emeröz, M Volkamer
Proceedings of the 13th International Conference on Availability …, 2018
332018
Helping john to make informed decisions on using social login
F Karegar, N Gerber, M Volkamer, S Fischer-Hübner
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1165-1174, 2018
322018
Developing and evaluating a five minute phishing awareness video
M Volkamer, K Renaud, B Reinheimer, P Rack, M Ghiglieri, P Mayer, ...
Trust, Privacy and Security in Digital Business: 15th International …, 2018
292018
Has the GDPR hype affected users’ reaction to cookie disclaimers?
O Kulyk, N Gerber, A Hilt, M Volkamer
Journal of Cybersecurity 6 (1), tyaa022, 2020
272020
Productivity vs security: mitigating conflicting goals in organizations
P Mayer, N Gerber, R McDermott, M Volkamer, J Vogt
Information & Computer Security 25 (2), 137-151, 2017
262017
Why johnny fails to protect his privacy
N Gerber, V Zimmermann, M Volkamer
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
252019
Security and privacy awareness in smart environments–a cross-country investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
222020
Das Privacy-Paradoxon–Ein Erklärungsversuch und Handlungsempfehlungen
P Gerber, M Volkamer, N Gerber
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher …, 2017
182017
Assistance in daily password generation tasks
K Marky, P Mayer, N Gerber, V Zimmermann
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
142018
Understanding Information Security Compliance-Why Goal Setting and Rewards Might be a Bad Idea.
N Gerber, R McDermott, M Volkamer, J Vogt
HAISA, 145-155, 2016
122016
I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads
P Mayer, N Gerber, B Reinheimer, P Rack, K Braun, M Volkamer
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
112019
Website operators are not the enemy either-Analyzing options for creating cookie consent notices without dark patterns
A Stöver, N Gerber, C Cornel, M Henz, K Marky, V Zimmermann, J Vogt
Gesellschaft für Informatik eV, 2022
102022
The system can't perform the operation now. Try again later.
Articles 1–20