Jonas Hielscher

Orcid: 0000-0002-5159-3868

According to our database1, Jonas Hielscher authored at least 17 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
"What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness.
Proceedings of the 33rd USENIX Security Symposium, 2024

Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

"Everything We Encrypt Today Could Be Cracked" - Exploring (Post) Quantum Cryptography Misconceptions.
Proceedings of the 2024 European Symposium on Usable Security, 2024

Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' Promises.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security.
Proceedings of the 32nd USENIX Security Symposium, 2023

"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns.
Proceedings of the 32nd USENIX Security Symposium, 2023

Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions.
Proceedings of the 2023 European Symposium on Usable Security, 2023

A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover.
Digit. Investig., 2022

Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies.
CoRR, 2022

Caring About IoT-Security - An Interview Study in the Healthcare Sector.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting.
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021

Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Why IT Security Needs Therapy.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

A Systematic Analysis of Covert Channels in the Network Time Protocol.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021


  Loading...