Name
Affiliation
Papers
SEBASTIAN PAPE
Univ Kassel, Databases & Interact Syst Res Grp, Wilhelmshoher Allee 73, D-34121 Kassel, Germany
30
Collaborators
Citations 
PageRank 
50
17
10.95
Referers 
Referees 
References 
55
414
155
Search Limit
100414
Title
Citations
PageRank
Year
Maturity Level Assessments Of Information Security Controls: An Empirical Analysis Of Practitioners Assessment Capabilities00.342021
Asset-Centric Analysis and Visualisation of Attack Trees.00.342020
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.00.342020
How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor00.342020
Empirically Investigating Extraneous Influences On The "Apco" Model - Childhood Brand Nostalgia And The Positivity Bias00.342020
LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security00.342020
How Nostalgic Feelings Impact Pokemon Go Players - Integrating Childhood Brand Nostalgia Into The Technology Acceptance Theory00.342020
A Structured Comparison Of The Corporate Information Security Maturity Level00.342019
A Systematic Analysis of User Evaluations in Security Research00.342019
Protect - An Easy Configurable Serious Game To Train Employees Against Social Engineering Attacks00.342019
Applying Privacy Patterns to the Internet of Things’ (IoT) Architecture30.452019
Why Do People Pay For Privacy-Enhancing Technologies? The Case Of Tor And Jondonym00.342019
Esara: A Framework For Enterprise Smartphone Apps Risk Assessment00.342019
Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur.00.342019
Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.00.342018
PERSUADED: Fighting Social Engineering Attacks with a Serious Game.00.342018
Assessing Privacy Policies of Internet of Things Services.10.362018
JonDonym Users' Information Privacy Concerns.00.342018
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.00.342017
A Structured Comparison of Social Engineering Intelligence Gathering Tools.00.342017
IT Security Status of German Energy Providers.00.342017
Social Engineering Defence Mechanisms And Counteracting Training Strategies00.342017
Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go10.362017
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology.00.342016
STAGE: a software tool for automatic grading of testing exercises: case study paper.20.382016
On Gender Specific Perception Of Data Sharing In Japan00.342016
A Serious Game for Eliciting Social Engineering Security Requirements50.592016
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers50.692013
A Survey on Non-transferable Anonymous Credentials.00.342008
Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy.00.342007