Ingolf Becker

Orcid: 0000-0002-3963-4743

According to our database1, Ingolf Becker authored at least 24 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Incorporating software security: using developer workshops to engage product managers.
Empir. Softw. Eng., 2023

Unaware, Unfunded and Uneducated: A Systematic Review of SME Cybersecurity.
CoRR, 2023

Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer.
CoRR, 2023

Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023

Checking, nudging or scoring? Evaluating e-mail user security tools.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Shaping Cryptocurrency Gatekeepers with a Regulatory "Trial and Error".
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Phishing to improve detection.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

"It may be a pain in the backside but..." Insights into the resilience of business after GDPR.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
"It may be a pain in the backside but..." Insights into the impact of GDPR on business after three years.
CoRR, 2021

A Passion for Security: Intervening to Help Software Developers.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2021

Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.
Softw. Pract. Exp., 2020

An analysis of perceptions and support for Windows 10 Home Edition update features.
J. Cybersecur., 2020

2019
Interventions for software security: creating a lightweight program of assurance techniques for developers.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength.
Proceedings of the 27th USENIX Security Symposium, 2018

Light-Touch Interventions to Improve Software Development Security.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017

"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
Proceedings of the Workshop on Security Fatigue, 2016

Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Are Payment Card Contracts Unfair? (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016


  Loading...