Styx: Privacy Risk Communication for the Android Smartphone Platform Based on Apps’ Data-Access Behavior Patterns G Bal, K Rannenberg, JI Hong Computers & Security 53, 187-202, 2015 | 24 | 2015 |
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones G Bal, K Rannenberg, J Hong IFIP International Information Security Conference, 113-126, 2014 | 18 | 2014 |
Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications G Bal Mobile Security Technologies - MoST, 2012 | 16 | 2012 |
Explicitness of Consequence Information in Privacy Warnings: Experimentally Investigating the Effects on Perceived Risk, Trust, and Privacy Information Quality G Bal 35th International Conference on Information Systems (ICIS 2014), 2014 | 8 | 2014 |
Designing Privacy Indicators for Smartphone App Markets: A New Perspective on the Nature of Privacy Risks of Apps G Bal 20th Americas Conference on Information Systems (AMCIS 2014), 2014 | 8 | 2014 |
Balancing Security and Usability of Local Security Mechanisms for Mobile Devices S Yang, G Bal IFIP International Information Security Conference, 327-338, 2012 | 8 | 2012 |
User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps G Bal, K Rannenberg W3C Workshop on Privacy and User–Centric Controls, 2014 | 6 | 2014 |
Injecting trust to cryptographic key management G Bal, AU Schmidt, N Kuntze 2009 11th International Conference on Advanced Communication Technology 2 …, 2009 | 5 | 2009 |
On gender specific perception of data sharing in Japan M Tschersich, S Kiyomoto, S Pape, T Nakamura, G Bal, H Takasaki, ... IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016 | 4 | 2016 |
Privacy by Sustainable Identity Management Enablers S Koschinat, G Bal, C Weber, K Rannenberg Privacy and Identity Management for Life, 431-452, 2011 | 3 | 2011 |
Improving the Effectiveness of Privacy Risk Communication in Smartphone App Ecosystems G Bal Verlag Dr. Kovač, 2015 | | 2015 |
Trusted Computing Sicherheit für Webbrowser G Bal Fraunhofer-Institut für Sichere Informationstechnologie, 2009 | | 2009 |