Marian Harbach

Orcid: 0000-0001-8677-811X

According to our database1, Marian Harbach authored at least 29 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Nudge me right: Personalizing online security nudges to people's decision-making styles.
Comput. Hum. Behav., 2020

2019
A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Quantifying Users' Beliefs about Software Updates.
CoRR, 2018

2016
The Anatomy Of Smartphone Unlocking: Why and How Android Users Around the World Lock their Phones.
GetMobile Mob. Comput. Commun., 2016

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2014
On the adoption of end-user IT security measures.
PhD thesis, 2014

It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Using personal examples to improve risk communication for security & privacy decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
On the ecological validity of a password study.
Proceedings of the Symposium On Usable Privacy and Security, 2013

On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Sorry, I Don't Get It: An Analysis of Warning Message Texts.
Proceedings of the Financial Cryptography and Data Security, 2013

Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers.
Proceedings of the Financial Cryptography and Data Security, 2013

Location privacy revisited: factors of privacy decisions.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Rethinking SSL development in an appified world.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
All our messages are belong to us: usable confidentiality in social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Confidentiality as a Service - Usable Security for the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Helping Johnny 2.0 to encrypt his Facebook conversations.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

TrustSplit: usable confidentiality for social network messaging.
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012

Human-centric visual access control for clinical data management.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Towards measuring warning readability.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Why eve and mallory love android: an analysis of android SSL (in)security.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Semantic Validation of BPEL Fragment Compositions.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

2009
A Streaming Intrusion Detection System for Grid Computing Environments.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009


  Loading...