Florian Schaub

According to our database1, Florian Schaub authored at least 91 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations.
TWEB, 2019

Beyond Mandatory: Making Data Breach Notifications Useful for Consumers.
IEEE Security & Privacy, 2019

(Un)informed Consent: Studying GDPR Consent Notices in the Field.
CoRR, 2019

"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Privacy and Security Threat Models and Mitigation Strategies of Older Adults.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

The Impact of Student Opt-Out on Educational Predictive Models.
Proceedings of the 9th International Conference on Learning Analytics & Knowledge, 2019

"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology.
Proceedings of the Information in Contemporary Society - 14th International Conference, 2019

You 'Might' Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

It's My Data! Tensions Among Stakeholders of a Learning Analytics Dashboard.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

(Un)informed Consent: Studying GDPR Consent Notices in the Field.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privacy in Mobile and Pervasive Computing
Synthesis Lectures on Mobile and Pervasive Computing, Morgan & Claypool Publishers, 2018

Context-Adaptive Privacy Mechanisms.
Proceedings of the Handbook of Mobile Data Privacy., 2018

PrivOnto: A semantic framework for the analysis of privacy policies.
Semantic Web, 2018

Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers.
PACMHCI, 2018

Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility.
IMWUT, 2018

We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy.
CoRR, 2018

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.
CoRR, 2018

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Concern But No Action: Consumers' Reactions to the Equifax Data Breach.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Exploring End User Programming Needs in Home Automation.
ACM Trans. Comput.-Hum. Interact., 2017

Designing Effective Privacy Notices and Controls.
IEEE Internet Computing, 2017

Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

On the Use of Emojis in Mobile Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Automated Analysis of Privacy Requirements for Mobile Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Identifying the Provision of Choices in Privacy Policy Text.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

The Impact of Assistive Technology on Communication Quality Between Deaf and Hearing Individuals.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition.
ACM Trans. Softw. Eng. Methodol., 2016

Crowdsourcing privacy policy analysis: Potential, challenges and best practices.
it - Information Technology, 2016

Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work?
Proceedings of the 25th International Conference on World Wide Web, 2016

Drone-based Privacy Interfaces: Opportunities and Challenges.
Proceedings of the Workshop on Security Fatigue, 2016

Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Implications of the Use of Emojis in Mobile Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

The Creation and Analysis of a Website Privacy Policy Corpus.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Automated Analysis of Privacy Requirements for Mobile Apps.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Automatic Extraction of Opt-Out Choices from Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making.
IEEE Pervasive Computing, 2015

What do they know about me? Contents and Concerns of Online Behavioral Profiles.
CoRR, 2015

Pseudonym Schemes in Vehicular Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2015

A Design Space for Effective Privacy Notices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

The Impact of Timing on the Salience of Smartphone App Privacy Notices.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Dynamic privacy adaptation in ubiquitous computing.
PhD thesis, 2014

Hover Pad: interacting with autonomous and self-actuated displays in space.
Proceedings of the 27th Annual ACM Symposium on User Interface Software and Technology, 2014

P.I.A.N.O.: Faster Piano Learning with Interactive Projection.
Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, 2014

Scaling requirements extraction to the crowd: Experiments with privacy policies.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Privacy implications of presence sharing in mobile messaging applications.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

PriCal: context-adaptive privacy in ambient calendar displays.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, UbiComp '14, Seattle, WA, 2014

Crowdsourcing the Extraction of Data Practices from Privacy Policies.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Broken display = broken interface': the impact of display damage on smartphone interaction.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

User Authentication for Rotary Knob Controlled In-car Applications.
Proceedings of the 6th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, Seattle, WA, USA, September 17, 2014

2013
On credibility improvements for automotive navigation systems.
Personal and Ubiquitous Computing, 2013

ProTACD: A Generic Privacy Process for Vehicle Development.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Exploring the design space of graphical passwords on smartphones.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

P.I.A.N.O.: enhancing instrument learning via interactive projected augmentation.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

homeBLOX: making home automation usable.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

PriCal: dynamic privacy adaptation of collaborative calendar displays.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

homeBLOX: introducing process-driven home automation.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Find my stuff: supporting physical objects search with relative positioning.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Prifi beacons: piggybacking privacy implications on wifi beacons.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

MIBA: multitouch image-based authentication on smartphones.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Efficiency analysis of geocast target region specifications for VANET applications.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Ginger: An Access Control Framework for Telematics Applications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards context adaptive privacy decisions in ubiquitous computing.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Password entry usability and shoulder surfing susceptibility on different smartphone platforms.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Find my stuff: a search engine for everyday objects.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Privacy context model for dynamic privacy adaptation in ubiquitous computing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
WiSec 2011 demo: PRECIOSA PeRA - practical enforcement of privacy policies in intelligent transportation systems.
Mobile Computing and Communications Review, 2011

Modeling in-network aggregation in VANETs.
IEEE Communications Magazine, 2011

PrivacyJudge: Effective Privacy Controls for Online Published Information.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

diretto: A Toolkit for Distributed Reporting and Collaboration.
Proceedings of the Mensch & Computer 2011: überMEDIEN|ÜBERmorgen, 2011

2010
V-Tokens for Conditional Pseudonymity in VANETs.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

On the potential of generic modeling for VANET data aggregation protocols.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

Interaction weaknesses of personal navigation devices.
Proceedings of 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2010

Towards Territorial Privacy in Smart Environments.
Proceedings of the Intelligent Information Privacy Management, 2010

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
A VANET-based emergency vehicle warning system.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Privacy Requirements in Vehicular Communication Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...