Melanie Volkamer
Melanie Volkamer
Verified email at - Homepage
Cited by
Cited by
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & security 77, 226-261, 2018
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014
The development of remote e-voting around the world: A review of roads and directions
R Krimmer, S Triessnig, M Volkamer
International Conference on E-Voting and Identity, 1-15, 2007
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities
M Volkamer
Springer, 2009
Usability analysis of Helios—an open source verifiable remote electronic voting system
F Karayumak, MM Olembo, M Kauer, M Volkamer
2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2011
User experiences of torpedo: Tooltip-powered phishing email detection
M Volkamer, K Renaud, B Reinheimer, A Kunz
Computers & Security 71, 100-113, 2017
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number Theory and Cryptography, 255-280, 2013
A formal approach towards measuring trust in distributed systems
G Schryen, M Volkamer, S Ries, SM Habib
Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011
this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC) 4, 2018
Ghost-safe-guarding home IoT environments with personalised real-time risk control
A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ...
Springer-Verlag Berlin, 2018
NoPhish: an anti-phishing education app
G Canova, M Volkamer, C Bergmann, R Borza
International workshop on security and trust management, 188-192, 2014
Information flow control to secure dynamic web service composition
D Hutter, M Volkamer
International Conference on Security in Pervasive Computing, 196-210, 2006
C4PS-helping Facebookers manage their privacy settings
T Paul, M Stopczynski, D Puscher, M Volkamer, T Strufe
International Conference on Social Informatics, 188-201, 2012
User study of the improved Helios voting system interfaces
F Karayumak, M Kauer, MM Olembo, T Volk, M Volkamer
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
Civitas and the real world: problems and solutions from a practical point of view
S Neumann, M Volkamer
2012 Seventh International Conference on Availability, Reliability and …, 2012
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
Teaching phishing-security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
Exploring consumers’ attitudes of smart TV related privacy risks
M Ghiglieri, M Volkamer, K Renaud
International Conference on Human Aspects of Information Security, Privacy …, 2017
NoPhish app evaluation: lab and retention study
G Canova, M Volkamer, C Bergmann, B Reinheimer
NDSS workshop on usable security, 2015
Investigating People's Privacy Risk Perception.
N Gerber, B Reinheimer, M Volkamer
Proc. Priv. Enhancing Technol. 2019 (3), 267-288, 2019
The system can't perform the operation now. Try again later.
Articles 1–20