Research Interests
I am a senior researcher working at the Deutsche Telekom Chair of Mobile Business & Multilateral Security at Goethe University Frankfurt. Currently I am also a temporary professor at the institute of business informatics at the University of Regensburg. My research focus is in the area of security and privacy with a particular interest in a holistic view on the examined systems. Thus, I consider economic aspects, human behaviour and try to enable users to regard security considerations and understand privacy implications.Currently, I'm involved in the projects Secure Information Networks for Small- and Medium-sized Energy Providers (SIDATE), Anonymity Online Next Generation (AN.ON-NG) and Self Data Protecion in Online-Commerce (SIOC). The aim of the SIDATE project is to support small and medium-sizes energy providers in assessing and improving their information security level. The AN.ON-NG project aims at integrating privacy-enhancing technologies into the internet infrastructure. The aim of the project Self Privacy in Online Commerce (SIOC) is the design of an anonymous approach to online shopping. AN.ON-NG and SIOC both build on data protection by design. Among their crucial success factors are to regard the stakeholders' interests, their business models and to improve the usability and performance for the users.
Further research interests include the application of serious gaming in the domains of social engineering and privacy perception, modelling security and applied cryptography.
- Modelling Security
- Formalization of attacker models and security goals
- Security metrics
- Holistic Security & Security Management
- Consideration of business processes
- Economics of security
- Human aspects of security
- Consideration of user behaviour
- Enabling non-experts to regard security considerations
- Security Standards (e.g. ISO 27000, Common Criteria)
- Relation between real and perceived security
- Social Engineering
- Applied Cryptography
- Visual Cryptography
- Privacy Enhancing Technologies (PET)
- Serious Gaming in the domains
- Social Engineering
- Privacy perception
- Risk Analysis
- Privacy
- Identity Management
Selected Publications
- Investigating Privacy Concerns Related to Mobile Augmented Reality Apps - A Vignette Based Online Experiment. In Computers in Human Behavior, 122, 2021.
- Explainable Machine Learning for Default Privacy Setting Prediction. In IEEE Access, 9: 63700-63717, 2021.
- Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities. In Computers & Security, 108, 2021.
- Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. In Proceedings on Privacy Enhancing Technologies (PoPETs), 2020 (2): 111-128, 2020.
- Requirements Engineering and Tool-Support for Security and Privacy.
- LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security. In Computers & Security, 90, 2020.
- How Nostalgic Feelings Impact Pokémon Go Players - Integrating Childhood Brand Nostalgia into the Technology Acceptance Theory. In Behaviour & Information Technology, 39 (12): 1276-1296, 2019.
- Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
- Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
- Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
- A Serious Game for Eliciting Social Engineering Security Requirements. In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
- STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
- Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
- Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, Research , 2014.
- Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
- A list of my publications
- A list of talks I have given
- A list of projects I have been involved in