Svenja Polst

According to our database1, Svenja Polst authored at least 29 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
8. Usable Security und PrivacyWorkshop.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

2021
Von Ideen zu Lösungen - Herausforderungen nach Innovations- und Kreativitätsworkshops.
Softwaretechnik-Trends, 2021

Using Vision Videos in Virtual Focus Groups: Experiences and Recommendations.
Softwaretechnik-Trends, 2021

Verarbeitung von Beschäftigtendaten.
Datenschutz und Datensicherheit, 2021

Components and Architecture for the Implementation of Technology-Driven Employee Data Protection.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Guidelines for Validation Interviews with Senior Citizens.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

7. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2021, 2021

Changing Citizens' Attitude Towards Novel Mobility Measures with a Game: Procedure and Game Concept.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

2020
Anforderungen und Rahmenwerk für den betrieblichen Datenschutz.
Softwaretechnik-Trends, 2020

Anforderungserhebung in Smarten Stadtquartieren: Ein Motivationskonzept für Bürger.
Softwaretechnik-Trends, 2020

Using Vision Videos in a Virtual Focus Group: Experiences and Recommendations.
CoRR, 2020

Eliciting Requirements from Citizens - What Can We Learn from Other Disciplines?
Proceedings of the Joint Proceedings of REFSQ-2020 Workshops, 2020

Requirements Assessment in Smart City Districts: A Motivation Concept for Citizens.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020

Fehlalarme bei AAL-Systemen - Ergebnisse einer Pilotstudie.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

Privacy ad Absurdum - How Workplace Privacy Dashboards Compromise Privacy.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

6. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

2019
The Perception of Emojis for Analyzing App Feedback.
Int. J. Interact. Mob. Technol., 2019

Enabling Users to Specify Correct Privacy Requirements.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2019

5. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2019, 2019

Heuristics and Models for Evaluating the Usability of Security Measures.
Proceedings of Mensch und Computer 2019, Hamburg, Germany, September 8-11, 2019, 2019

Beware of the Fakes - Overview of Fake Detection Methods for Online Product Reviews.
Proceedings of the Social Computing and Social Media. Design, Human Behavior and Analytics, 2019

A Comprehensive Persona Template to Understand Citizens' Mobility Needs.
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2019

Company Privacy Dashboards: Employee Needs and Requirements.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

2018
Is there Really a Need for Using NLP to Elicit Requirements? A Benchmarking Study to Assess Scalability of Manual Analysis.
Proceedings of the Joint Proceedings of REFSQ-2018 Workshops, 2018

Satisfying and Efficient Privacy Settings.
Proceedings of the Mensch und Computer 2018, 2018

WDP vs. Nielsen's Heuristics: A Comparison.
Proceedings of the Mensch und Computer 2018, 2018

Evaluation kontextueller Datenschutzerklärungen.
Proceedings of the Mensch und Computer 2018, 2018

Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Human Issues, 2018

2017
A User-Centered Model for Usable Security and Privacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017


  Loading...