default search action
Nina Gerber
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Alina Stöver, Sara Hahn, Simon Althaus, Ephraim Zimmer, Nina Gerber:
Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor? Datenschutz und Datensicherheit (dud) 48(10): 633-636 (2024) - [j16]Nina Gerber, Alina Stöver, Justin Peschke, Verena Zimmermann:
Don't Accept All and Continue: Exploring Nudges for More Deliberate Interaction with Tracking Consent Notices. ACM Trans. Comput. Hum. Interact. 31(1): 1:1-1:36 (2024) - [c36]Mandy Balthasar, Nina Gerber, Timo Jakobi:
Crafting Usable Security: Enhancing Public Understanding of Security and Privacy. MuC (Workshopband) 2024 - [c35]Sara Hahn, Nusaibah Al-Amrani, Sara Allagah, He Rong Huang, Eva Kircher, Cornelia Rehs, Joachim Vogt, Karola Marky, Nina Gerber:
How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study. NordiCHI 2024: 7:1-7:19 - [c34]Nina Gerber, Alina Stöver, Peter Mayer:
Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field. SOUPS @ USENIX Security Symposium 2024: 547-566 - [c33]Karola Marky, Nina Gerber, Henry John Krumb, Mohamed Khamis, Max Mühlhäuser:
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting. SP 2024: 3458-3477 - 2023
- [j15]Alina Stöver, Nina Gerber, Henning Pridöhl, Max Maass, Sebastian Bretthauer, Indra Spiecker genannt Döhmann, Matthias Hollick, Dominik Herrmann:
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges. Proc. Priv. Enhancing Technol. 2023(2): 251-264 (2023) - [j14]Alina Stöver, Sara Hahn, Felix Kretschmer, Nina Gerber:
Investigating how Users Imagine their Personal Privacy Assistant. Proc. Priv. Enhancing Technol. 2023(2): 384-402 (2023) - [c32]Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber:
Branchenreport UX/Usability 2023 - Ergebnisse der jährlichen Befragung unter UX/Usability Professionals in Deutschland. UP 2023: 517 - [c31]Verena Zimmermann, Jasmin Haunschild, Alina Stöver, Nina Gerber:
Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains. MuC (Workshopband) 2023 - 2022
- [j13]Karola Marky, Nina Gerber, Michelle Gabriela Pelzer, Mohamed Khamis, Max Mühlhäuser:
"You offer privacy like you offer tea": Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households. Proc. Priv. Enhancing Technol. 2022(4): 400-420 (2022) - [j12]Verena Zimmermann, Jasmin Haunschild, Marita Unden, Paul Gerber, Nina Gerber:
Sicherheitsherausforderungen für Smart-City-Infrastrukturen. Wirtschaftsinformatik Manag. 14(2): 119-126 (2022) - [c30]Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber:
Branchenreport UX/Usability 2022. UP 2022: 477 - [c29]Otilia Pasnicu, Verena Zimmermann, Nina Gerber, Sarah Cardoso:
Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces. MuC 2022: 545-549 - [c28]Alina Stöver, Nina Gerber, Christin Cornel, Mona Henz, Karola Marky, Verena Zimmermann, Joachim Vogt:
Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns. MuC (Workshopband) 2022 - [c27]Paul Bekaert, Norah Mohsen T. Alotaibi, Florian Mathis, Nina Gerber, Aidan Christopher Rafferty, Mohamed Khamis, Karola Marky:
Are Thermal Attacks a Realistic Threat? Investigating the Preconditions of Thermal Attacks in Users' Daily Lives. NordiCHI 2022: 76:1-76:9 - [c26]Nina Gerber, Karola Marky:
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User's Quest for More Secure and Privacy-Preserving Behavior. SOUPS @ USENIX Security Symposium 2022: 57-76 - 2021
- [j11]Rolf Egert, Nina Gerber, Jasmin Haunschild, Philipp Kuehn, Verena Zimmermann:
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience. i-com 20(2): 161-175 (2021) - [c25]Lisa Marie Zankel, Paul Gerber, Verena Zimmermann, Nina Gerber:
Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems. AutomotiveUI (adjunct) 2021: 71-76 - [c24]Alina Stöver, Nina Gerber, Sushma Kaushik, Max Mühlhäuser, Karola Marky:
Investigating Simple Privacy Indicators for Supporting Users when Installing New Mobile Apps. CHI Extended Abstracts 2021: 366:1-366:7 - [c23]Mandy Balthasar, Nina Gerber, Hartmut Schmitt:
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen. UP 2021: 448 - [c22]Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber:
Branchenreport UX/Usability 2021. UP 2021: 456 - [c21]Mario Avramidis, Christiane Kellner, Josefine Staudt, Verena Zimmermann, Nina Gerber:
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance. MuC (Workshopband) 2021 - [c20]Paul Gerber, Marvin Heidinger, Julia Stiegelmayer, Nina Gerber:
LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing: LOKI: Entwicklung eines Interfaces für die Aufgaben-basierte, Privatsphäre-freundliche Smart Home-Steuerung durch LOKale Informationsverarbeitung. MuC 2021: 578-581 - 2020
- [j10]Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer:
Has the GDPR hype affected users' reaction to cookie disclaimers? J. Cybersecur. 6(1) (2020) - [j9]Verena Zimmermann, Nina Gerber:
The password is dead, long live the password - A laboratory study on user perceptions of authentication schemes. Int. J. Hum. Comput. Stud. 133: 26-44 (2020) - [c19]Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer:
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation. Financial Cryptography Workshops 2020: 84-101
2010 – 2019
- 2019
- [j8]Oksana Kulyk, Nina Gerber, Melanie Volkamer, Annika Hilt:
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen. Datenschutz und Datensicherheit 43(2): 81-85 (2019) - [j7]Jacqueline Brendel, Nina Gerber:
Sichere Instant Messaging Apps. Datenschutz und Datensicherheit 43(5): 276-280 (2019) - [j6]Sina Zimmermann, Nina Gerber:
Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment. i-com 18(3): 271-285 (2019) - [j5]Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt:
Keep on rating - on the systematic rating and comparison of authentication schemes. Inf. Comput. Secur. 27(5) (2019) - [j4]Nina Gerber, Benjamin Reinheimer, Melanie Volkamer:
Investigating People's Privacy Risk Perception. Proc. Priv. Enhancing Technol. 2019(3): 267-288 (2019) - [c18]Peter Mayer, Nina Gerber, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, Melanie Volkamer:
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads. CHI 2019: 549 - [c17]Nina Gerber, Verena Zimmermann, Melanie Volkamer:
Why Johnny Fails to Protect his Privacy. EuroS&P Workshops 2019: 109-118 - [c16]Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber:
Branchenreport UX/Usability 2019. UP 2019 - 2018
- [j3]Nina Gerber, Paul Gerber, Melanie Volkamer:
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77: 226-261 (2018) - [j2]Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer, Tobias Hilt:
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp. Datenschutz und Datensicherheit 42(11): 680-685 (2018) - [c15]Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer:
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? ARES 2018: 11:1-11:10 - [c14]Verena Zimmermann, Nina Gerber, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt, Peter Mayer:
The Quest to Replace Passwords Revisited - Rating Authentication Schemes. HAISA 2018: 38-48 - [c13]Karola Marky, Peter Mayer, Nina Gerber, Verena Zimmermann:
Assistance in Daily Password Generation Tasks. UbiComp/ISWC Adjunct 2018: 786-793 - [c12]Marco Ghiglieri, Birgit Henhapl, Nina Gerber:
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird. MuC (Workshopband) 2018 - [c11]Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber:
Branchenreport UX/Usability 2018. UP 2018: 27-40 - [c10]Farzaneh Karegar, Nina Gerber, Melanie Volkamer, Simone Fischer-Hübner:
Helping john to make informed decisions on using social login. SAC 2018: 1165-1174 - [c9]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber:
Developing and Evaluating a Five Minute Phishing Awareness Video. TrustBus 2018: 119-134 - 2017
- [j1]Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs security: mitigating conflicting goals in organizations. Inf. Comput. Secur. 25(2): 137-151 (2017) - [c8]Verena Zimmermann, Nina Gerber:
"If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies. HCI (22) 2017: 265-283 - [c7]Nina Gerber, Paul Gerber, Maria Hernando:
Sharing the 'Real Me' - How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook. HCI (22) 2017: 640-655 - [c6]Nina Gerber, Verena Zimmermann:
Security vs. privacy? User preferences regarding text passwords and biometric authentication. MuC (Workshopband) 2017 - [c5]Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber:
Branchenreport UX/Usability 2017. UP 2017 - [c4]Verena Zimmermann, Birgit Henhapl, Nina Gerber, Matthias Enzmann:
Promoting Secure Email Communication and Authentication. MuC (Workshopband) 2017 - [c3]Nina Gerber, Paul Gerber, Hannah Drews, Elisa Kirchner, Noah Schlegel, Tim Schmidt, Lena Scholz:
FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness. STAST 2017: 53-63 - 2016
- [c2]Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea. HAISA 2016: 145-155 - [c1]Nina Gerber:
Let's get physical: Lässt sich User Experience physiologisch erfassen? MuC 2016
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint