Gökhan Bal
Gökhan Bal
Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Styx: Privacy Risk Communication for the Android Smartphone Platform Based on Apps’ Data-Access Behavior Patterns
G Bal, K Rannenberg, JI Hong
Computers & Security 53, 187-202, 2015
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones
G Bal, K Rannenberg, J Hong
IFIP International Information Security Conference, 113-126, 2014
Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications
G Bal
Mobile Security Technologies - MoST, 2012
Explicitness of Consequence Information in Privacy Warnings: Experimentally Investigating the Effects on Perceived Risk, Trust, and Privacy Information Quality
G Bal
35th International Conference on Information Systems (ICIS 2014), 2014
Designing Privacy Indicators for Smartphone App Markets: A New Perspective on the Nature of Privacy Risks of Apps
G Bal
20th Americas Conference on Information Systems (AMCIS 2014), 2014
Balancing Security and Usability of Local Security Mechanisms for Mobile Devices
S Yang, G Bal
IFIP International Information Security Conference, 327-338, 2012
User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps
G Bal, K Rannenberg
W3C Workshop on Privacy and User–Centric Controls, 2014
Injecting trust to cryptographic key management
G Bal, AU Schmidt, N Kuntze
2009 11th International Conference on Advanced Communication Technology 2 …, 2009
On gender specific perception of data sharing in Japan
M Tschersich, S Kiyomoto, S Pape, T Nakamura, G Bal, H Takasaki, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
Privacy by Sustainable Identity Management Enablers
S Koschinat, G Bal, C Weber, K Rannenberg
Privacy and Identity Management for Life, 431-452, 2011
Improving the Effectiveness of Privacy Risk Communication in Smartphone App Ecosystems
G Bal
Verlag Dr. Kovač, 2015
Trusted Computing Sicherheit für Webbrowser
G Bal
Fraunhofer-Institut für Sichere Informationstechnologie, 2009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12