Michaela Kauer

According to our database1, Michaela Kauer authored at least 22 papers between 2009 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Analyse des aktuellen Stands der Berücksichtigung von Usability bei der Softwareentwicklung in deutschen kleinen und mittleren Unternehmen.
Proceedings of the Mensch und Computer 2015, 2015

Conduct-by-Wire.
Proceedings of the Handbuch Fahrerassistenzsysteme, 2015

2014
Authentication Schemes - Comparison and Effective Password Spaces.
Proceedings of the Information Systems Security - 10th International Conference, 2014

"A Bank Would Never Write That!" A Qualitative Study on E-Mail Trust Decisions.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications.
Inf. Secur. Tech. Rep., 2013

The importance of identification for the acceptance of consumer electronics on the example of the Wii.
Behav. Inf. Technol., 2013

Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

Click Me If You Can! - When Do Users Follow a Call to Action in an Online Message?
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

A Comparison of American and German Folk Models of Home Computer Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Contextualized Security Interventions in Password Transmission Scenarios.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

Improving privacy settings for facebook by using interpersonal distance as criterion.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Identification as determining factor of techology acceptance for hedonic and dual use products.
PhD thesis, 2012

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Temporal analysis of the gate concept as enabler for highly automated driving based on the Conduct-by-Wire approach.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

2011
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

User study of the improved Helios voting system interfaces.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Development of a cooperative system behavior for a highly automated vehicle guidance concept based on the Conduct-by-Wire principle.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

2010
Verification of a maneuver catalog for a maneuver-based vehicle guidance system.
Proceedings of the IEEE International Conference on Systems, 2010

How to conduct a car? A design example for maneuver based driver-vehicle interaction.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2010

2009
Konzipierung einers interaktiven Informationsdisplays - Aber Wii?!
Proceedings of the Berichtband des siebten Workshops des German Chapters der Usability Professionals Association e.V., 2009

Versuchsplanung - vom Auftrag zum Abschlussbericht in 90 Minuten.
Proceedings of the Berichtband des siebten Workshops des German Chapters der Usability Professionals Association e.V., 2009


  Loading...