Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
José Antonio Cortés
T. J. Volkoff
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Giovannetti Vittorio
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
SEBASTIAN PAPE
Author Info
Open Visualization
Name
Affiliation
Papers
SEBASTIAN PAPE
Univ Kassel, Databases & Interact Syst Res Grp, Wilhelmshoher Allee 73, D-34121 Kassel, Germany
30
Collaborators
Citations
PageRank
50
17
10.95
Referers
Referees
References
55
414
155
Search Limit
100
414
Publications (30 rows)
Collaborators (50 rows)
Referers (55 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Maturity Level Assessments Of Information Security Controls: An Empirical Analysis Of Practitioners Assessment Capabilities
0
0.34
2021
Asset-Centric Analysis and Visualisation of Attack Trees.
0
0.34
2020
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
0
0.34
2020
How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor
0
0.34
2020
Empirically Investigating Extraneous Influences On The "Apco" Model - Childhood Brand Nostalgia And The Positivity Bias
0
0.34
2020
LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security
0
0.34
2020
How Nostalgic Feelings Impact Pokemon Go Players - Integrating Childhood Brand Nostalgia Into The Technology Acceptance Theory
0
0.34
2020
A Structured Comparison Of The Corporate Information Security Maturity Level
0
0.34
2019
A Systematic Analysis of User Evaluations in Security Research
0
0.34
2019
Protect - An Easy Configurable Serious Game To Train Employees Against Social Engineering Attacks
0
0.34
2019
Applying Privacy Patterns to the Internet of Things’ (IoT) Architecture
3
0.45
2019
Why Do People Pay For Privacy-Enhancing Technologies? The Case Of Tor And Jondonym
0
0.34
2019
Esara: A Framework For Enterprise Smartphone Apps Risk Assessment
0
0.34
2019
Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur.
0
0.34
2019
Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.
0
0.34
2018
PERSUADED: Fighting Social Engineering Attacks with a Serious Game.
0
0.34
2018
Assessing Privacy Policies of Internet of Things Services.
1
0.36
2018
JonDonym Users' Information Privacy Concerns.
0
0.34
2018
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
0
0.34
2017
A Structured Comparison of Social Engineering Intelligence Gathering Tools.
0
0.34
2017
IT Security Status of German Energy Providers.
0
0.34
2017
Social Engineering Defence Mechanisms And Counteracting Training Strategies
0
0.34
2017
Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go
1
0.36
2017
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology.
0
0.34
2016
STAGE: a software tool for automatic grading of testing exercises: case study paper.
2
0.38
2016
On Gender Specific Perception Of Data Sharing In Japan
0
0.34
2016
A Serious Game for Eliciting Social Engineering Security Requirements
5
0.59
2016
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers
5
0.69
2013
A Survey on Non-transferable Anonymous Credentials.
0
0.34
2008
Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy.
0
0.34
2007
1