Sebastian Pape
Orcid: 0000-0002-0893-7856Affiliations:
- Continental Automotive Technologies, Germany
- Goethe University Frankfurt, Germany
According to our database1,
Sebastian Pape
authored at least 75 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on m-chair.de
-
on orcid.org
-
on smjp.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study.
Comput. Secur., September, 2023
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
CoRR, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Personal information inference from voice recordings: User awareness and privacy concerns.
Proc. Priv. Enhancing Technol., 2022
"All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content.
Proc. Priv. Enhancing Technol., 2022
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility.
Proceedings of the Computer Science in Cars Symposium, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Datenschutz und Datensicherheit, 2021
Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities.
Comput. Secur., 2021
Investigating privacy concerns related to mobile augmented reality Apps - A vignette based online experiment.
Comput. Hum. Behav., 2021
IEEE Access, 2021
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021
2020
Dataset, January, 2020
Dataset, January, 2020
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
Proc. Priv. Enhancing Technol., 2020
Inf., 2020
Empirically Investigating Extraneous Influences on the "APCO" Model - Childhood Brand Nostalgia and the Positivity Bias.
Future Internet, 2020
How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor.
Data Base, 2020
LiSRA: Lightweight Security Risk Assessment for decision support in information security.
Comput. Secur., 2020
How nostalgic feelings impact Pokémon Go players - integrating childhood brand nostalgia into the technology acceptance theory.
Behav. Inf. Technol., 2020
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
Mob. Networks Appl., 2019
Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019
Proceedings of the 40th International Conference on Information Systems, 2019
How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
Proceedings of the Sicherheit 2018, 2018
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.
Proceedings of the Sicherheit 2018, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
Inf. Comput. Secur., 2017
CoRR, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Proceedings of the 2017 IEEE International Symposium on Mixed and Augmented Reality, 2017
2016
Proceedings of the 4th Workshop on Society, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the HCI 2016, 2016
2014
Proceedings of the Financial Cryptography and Data Security, 2014
Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise
Springer, ISBN: 978-3-658-07116-5, 2014
2013
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013
2009
Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
2008
Proceedings of the Future of Identity in the Information Society, 2008
2007
Proceedings of the Future of Identity in the Information Society, 2007