Andreas Poller

Orcid: 0000-0001-9611-9310

According to our database1, Andreas Poller authored at least 15 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Tracing Contacts With Mobile Phones to Curb the Pandemic: Topics and Stances in People's Online Comments About the Official German Contact-Tracing App.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Exploring and managing the complexity of large infrastructure projects with network theory and model-based systems engineering - The example of radioactive waste disposal.
Syst. Eng., 2020

2019
The Practice Turn in IT Security - An Interdisciplinary Approach.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

2018
Caring for IT Security: Accountabilities, Moralities, and Oscillations in IT Security Practices.
Proc. ACM Hum. Comput. Interact., 2018

2017
Managing Security Work in Scrum: Tensions and Challenges.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017

Can Security Become a Routine?: A Study of Organizational Change in an Agile Software Development Group.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

First-time Security Audits as a Turning Point?: Challenges for Security Practices in an Industry Software Development Team.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2014
Threat analysis in the software development lifecycle.
IBM J. Res. Dev., 2014

Denkverbote für Star-Trek-Computer?
Datenschutz und Datensicherheit, 2014

An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to Assets.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Investigating OSN users' privacy strategies with in-situ observation.
Proceedings of the Computer Supported Cooperative Work, 2014

2012
Electronic Identity Cards for User Authentication - Promise and Practice.
IEEE Secur. Priv., 2012

Robust image obfuscation for privacy protection in Web 2.0 applications.
Proceedings of the Media Watermarking, 2012

2009
Attacking the BitLocker Boot Process.
Proceedings of the Trusted Computing, 2009


  Loading...