84 papers found
Refreshing results…
Conceptualization of a CyberSecurity Awareness Quiz
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security
How nostalgic feelings impact Pokémon Go players – integrating childhood brand nostalgia into the technology acceptance theory
A Structured Comparison of the Corporate Information Security Maturity Level
How Privacy Concerns and Trust and Risk Beliefs Influence Users’ Intentions to Use Privacy-Enhancing Technologies - The Case of Tor
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment
A Systematic Analysis of User Evaluations in Security Research
Correction to: ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym
Applying Privacy Patterns to the Internet of Things’ (IoT) Architecture
Assessing Privacy Policies of Internet of Things Services
Verkehrsprognosen
PERSUADED: Fighting Social Engineering Attacks with a Serious Game
German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire
JonDonym Users’ Information Privacy Concerns
Nutzung von Verkehrsdaten zur Verkehrsflussoptimierung
Überblick zu existierenden Plattformen für Mobilität und Verkehr
Bike Now: Eine mobile App für das Crowdsourcing von Floating Bike Data
Privacy Concerns and Behavior of Pokémon Go Players in Germany
German Translation of the Concerns for Information Privacy (CFIP) Construct
Missing publications? Read more about our data sources.