Sören Preibusch

Affiliations:
  • Google


According to our database1, Sören Preibusch authored at least 36 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Truth or Dare: Understanding and Predicting How Users Lie and Provide Untruthful Data Online.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2017
Toward Accountable Discrimination-Aware Data Mining: The Importance of Keeping the Human in the Loop - and Under the Looking Glass.
Big Data, 2017

Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Shopping for privacy: Purchase details leaked to PayPal.
Electron. Commer. Res. Appl., 2016

Control versus Effort in Privacy Warnings for Webforms.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

2015
The Value of Web Search Privacy.
IEEE Secur. Priv., 2015

Effortless Privacy Negotiations.
IEEE Secur. Priv., 2015

Privacy behaviors after Snowden.
Commun. ACM, 2015

Contextual Healing: Privacy through Interpretation Management.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Purchase Details Leaked to PayPal.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Better decision support through exploratory discrimination-aware data mining: foundations and empirical evidence.
Artif. Intell. Law, 2014

Privacy considerations for a pervasive eye tracking world.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Privacy choices online : preferences, incentives and enforcement.
PhD thesis, 2013

Guide to measuring privacy concern: Review of survey and observational instruments.
Int. J. Hum. Comput. Stud., 2013

Price versus privacy: an experiment into the competitive advantage of collecting less personal information.
Electron. Commer. Res., 2013

"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Privacy Analysis of a Hidden Friendship Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Exploring Discrimination: A User-centric Evaluation of Discrimination-Aware Data Mining.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
The Privacy Landscape: Product Differentiation on Data Collection.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Information Flow Control for Static Enforcement of User-Defined Privacy Policies.
Proceedings of the POLICY 2011, 2011

2010
The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

The Password Game: Negative Externalities from Weak Password Practices.
Proceedings of the Decision and Game Theory for Security, 2010

2009
The Privacy Jungle: On the Market for Data Protection in Social Networks.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Establishing Distributed Hidden Friendship Relations.
Proceedings of the Security Protocols XVII, 2009

Establishing Distributed Hidden Friendship Relations.
Proceedings of the Security Protocols XVII, 2009

2008
A Privacy-Protecting Business-Analytics Service for On-Line Transactions.
Int. J. Electron. Commer., 2008

An industrial application of symbolic model checking.
Inform. Forsch. Entwickl., 2008

2007
Spontaneous Privacy Policy Negotiations in Pervasive Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Checking the TWIN Elevator System by Translating Object-Z to SMV.
Proceedings of the Formal Methods for Industrial Critical Systems, 2007

2006
Implementing Privacy Negotiations in E-Commerce.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Implementing Privacy Negotiation Techniques in E-Commerce.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

2004
SIMT -- A Privacy Preserving Web Metrics Tool.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004


  Loading...