Nina Gerber
Nina Gerber
Verified email at
Cited by
Cited by
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & Security 77, 226-261, 2018
“If It Wasn’t Secure, They Would Not Use It in the Movies”–Security Perceptions and User Acceptance of Authentication Technologies
V Zimmermann, N Gerber
International Conference on Human Aspects of Information Security, Privacy …, 2017
this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
Helping john to make informed decisions on using social login
F Karegar, N Gerber, M Volkamer, S Fischer-Hübner
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1165-1174, 2018
Home sweet home? Investigating users’ awareness of smart home privacy threats
N Gerber, B Reinheimer, M Volkamer
Proceedings of An Interactive Workshop on the Human aspects of Smarthome …, 2018
FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness
N Gerber, P Gerber, H Drews, E Kirchner, N Schlegel, T Schmidt, L Scholz
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber
International Journal of Human-Computer Studies 133, 26-44, 2020
Investigating people’s privacy risk perception
N Gerber, B Reinheimer, M Volkamer
Proceedings on Privacy Enhancing Technologies 2019 (3), 267-288, 2019
Productivity vs security: mitigating conflicting goals in organizations
P Mayer, N Gerber, R McDermott, M Volkamer, J Vogt
Information & Computer Security, 2017
Understanding Information Security Compliance-Why Goal Setting and Rewards Might be a Bad Idea.
N Gerber, R McDermott, M Volkamer, J Vogt
HAISA, 145-155, 2016
Branchenreport UX/Usability 2016
S Tretter, S Diefenbach, D Ullrich, N Gerber
Mensch und Computer 2015–Usability Professionals: Workshop, 7, 2015
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
N Gerber, V Zimmermann, B Henhapl, S Emeröz, M Volkamer, T Hilt
Datenschutz und Datensicherheit-DuD 42 (11), 680-685, 2018
Developing and evaluating a five minute phishing awareness video
M Volkamer, K Renaud, B Reinheimer, P Rack, M Ghiglieri, P Mayer, ...
International Conference on Trust and Privacy in Digital Business, 119-134, 2018
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure?
N Gerber, V Zimmermann, B Henhapl, S Emeröz, M Volkamer
Proceedings of the 13th International Conference on Availability …, 2018
Why Johnny Fails to Protect his Privacy
N Gerber, V Zimmermann, M Volkamer
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads
P Mayer, N Gerber, B Reinheimer, P Rack, K Braun, M Volkamer
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
The quest to replace passwords revisited–rating authentication schemes
V Zimmermann¹, N Gerber, M Kleboth¹, A von Preuschen¹, K Schmidt¹, ...
Proceedings of the Twelfth International Symposium on Human Aspects of …, 2018
Das Privacy-Paradoxon–Ein Erklärungsversuch und Handlungsempfehlungen
P Gerber, M Volkamer, N Gerber
Dialogmarketing Perspektiven 2016/2017, 139-167, 2017
Security vs. privacy? User preferences regarding text passwords and biometric authentication
N Gerber, V Zimmermann
Mensch und Computer 2017-Workshopband, 2017
Promoting Secure Email Communication and Authentication
V Zimmermann, B Henhapl, N Gerber, M Enzmann
Mensch und Computer 2017-Workshopband, 2017
The system can't perform the operation now. Try again later.
Articles 1–20