Sebastian Pape

Orcid: 0000-0002-0893-7856

Affiliations:
  • Continental Automotive Technologies, Germany
  • Goethe University Frankfurt, Germany


According to our database1, Sebastian Pape authored at least 72 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study.
Comput. Secur., September, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
CoRR, 2023

Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Acceptance Factors and Obstacles for Cryptocurrency Adoption.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Systematic Approach for Automotive Privacy Management.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023

User Acceptance Criteria for Privacy Preserving Machine Learning Techniques.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Discussion on Ethical Cybersecurity Issues in Digital Service Chains.
Proceedings of the Cybersecurity of Digital Service Chains, 2022

Personal information inference from voice recordings: User awareness and privacy concerns.
Proc. Priv. Enhancing Technol., 2022

"All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content.
Proc. Priv. Enhancing Technol., 2022

A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility.
Proceedings of the Computer Science in Cars Symposium, 2022

Properties for Cybersecurity Awareness Posters' Design and Quality Assessment.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Requirements engineering and tool-support for security and privacy
, 2021

Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy.
Datenschutz und Datensicherheit, 2021

Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities.
Comput. Secur., 2021

Investigating privacy concerns related to mobile augmented reality Apps - A vignette based online experiment.
Comput. Hum. Behav., 2021

Explainable Machine Learning for Default Privacy Setting Prediction.
IEEE Access, 2021

Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Challenges for Designing Serious Games on Security and Privacy Awareness.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021


Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021

2020
Dataset on Actual Users of the Privacy-Enhancing Technology Tor.
Dataset, January, 2020

DATASET ON ACTUAL USERS OF THE PRIVACY-ENHANCING TECHNOLOGY JONDONYM.
Dataset, January, 2020

Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
Proc. Priv. Enhancing Technol., 2020

Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach.
Inf., 2020

Empirically Investigating Extraneous Influences on the "APCO" Model - Childhood Brand Nostalgia and the Positivity Bias.
Future Internet, 2020

How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor.
Data Base, 2020

LiSRA: Lightweight Security Risk Assessment for decision support in information security.
Comput. Secur., 2020

How nostalgic feelings impact Pokémon Go players - integrating childhood brand nostalgia into the technology acceptance theory.
Behav. Inf. Technol., 2020

Conceptualization of a CyberSecurity Awareness Quiz.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Asset-Centric Analysis and Visualisation of Attack Trees.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Systematic Scenario Creation for Serious Security-Awareness Games.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Applying Privacy Patterns to the Internet of Things' (IoT) Architecture.
Mob. Networks Appl., 2019

Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

A Structured Comparison of the Corporate Information Security Maturity Level.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Aggregating Corporate Information Security Maturity Levels of Different Assets.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Investigating Privacy Concerns Related to Mobile Augmented Reality Applications.
Proceedings of the 40th International Conference on Information Systems, 2019

How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Systematic Analysis of User Evaluations in Security Research.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
PERSUADED: Fighting Social Engineering Attacks with a Serious Game.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
Proceedings of the Sicherheit 2018, 2018

Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.
Proceedings of the Sicherheit 2018, 2018

Assessing Privacy Policies of Internet of Things Services.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

JonDonym Users' Information Privacy Concerns.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Easing the Burden of Security Self-Assessments.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Social engineering defence mechanisms and counteracting training strategies.
Inf. Comput. Secur., 2017

Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
CoRR, 2017

IT Security Status of German Energy Providers.
CoRR, 2017

A Structured Comparison of Social Engineering Intelligence Gathering Tools.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017

Privacy Concerns and Behavior of Pokémon Go Players in Germany.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go.
Proceedings of the 2017 IEEE International Symposium on Mixed and Augmented Reality, 2017

2016
Challenges in Detecting Privacy Revealing Information in Unstructured Text.
Proceedings of the 4th Workshop on Society, 2016

On Gender Specific Perception of Data Sharing in Japan.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

A Serious Game for Eliciting Social Engineering Security Requirements.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

STAGE: a software tool for automatic grading of testing exercises: case study paper.
Proceedings of the 38th International Conference on Software Engineering, 2016

A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

HATCH: Hack And Trick Capricious Humans - A Serious Game on Social Engineering.
Proceedings of the HCI 2016, 2016

2014
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography.
Proceedings of the Financial Cryptography and Data Security, 2014

Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise
Springer, ISBN: 978-3-658-07116-5, 2014

2013
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

2009
Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

2008
A Survey on Non-transferable Anonymous Credentials.
Proceedings of the Future of Identity in the Information Society, 2008

2007
Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy.
Proceedings of the Future of Identity in the Information Society, 2007


  Loading...