Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stefan FeuerriegelProfessor, LMU MunichVerified email at lmu.de
- Dirk NeumannAlbert-Ludwigs-Universität FreiburgVerified email at is.uni-freiburg.de
- Bernhard LutzUniversity of Freiburg, Chair of Information Systems ResearchVerified email at is.uni-freiburg.de
- Dominik BärLMU MunichVerified email at lmu.de
- Kirill SolovevResearch Fellow, University of GiessenVerified email at wirtschaft.uni-giessen.de
- Marc T. P. AdamThe University of Newcastle, AustraliaVerified email at newcastle.edu.au
- Chiara DrolsbachJustus-Liebig-Universität GiessenVerified email at wi.jlug.de
- Yuwei ChuaiUniversity of LuxembourgVerified email at uni.lu
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- Jay Van BavelProfessor of Psychology & Neural Science, New York UniversityVerified email at nyu.edu
- Philip PärnametsResearcher, Karolinska Institutet, SwedenVerified email at ki.se
- Claire E RobertsonPhD Student, New York UniversityVerified email at nyu.edu
- Dominique GeisslerPhD, LMU MunichVerified email at lmu.de
- Abdurahman MaaroufLMU MunichVerified email at lmu.de
- Johannes JakubikPostdoc @ IBM Research EuropeVerified email at ethz.ch
- Michael VössingKarlsruhe Institute of TechnologyVerified email at kit.edu
- Josh A. GoldsteinResearch Fellow; Georgetown Center for Security and Emerging Technology (CSET)Verified email at georgetown.edu
- Michael TomzProfessor of Political Science, Stanford UniversityVerified email at stanford.edu
- Philipp Lorenz-SpreenJunior Research Group Leader at SynoSys+ScaDS.AI, TU Dresden and ARC, MPI for Human DevelopmentVerified email at tu-dresden.de
- Renee DiRestaGeorgetown UniversityVerified email at georgetown.edu