Publications

Selected Publications

2022

Zimmermann, Verena; Marky, Karola; Renaud, Karen (2022): Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information. In: Behaviour & Information Technology, Taylor & Francis, DOI: 10.1080/0144929X.2022.2042384

2021

Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena (2021): Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience. In: i-com: Journal of Interactive Media, 20 (2), S. 161-175, de Gruyter Oldenbourg, ISSN 2196-6826, DOI: 10.1515/icom-2021-0021

Franz, Anjuli; Zimmermann, Verena; Albrecht, Gregor; Hartwig, Katrin; Reuter, Christian; Benlian, Alexander; Vogt, Joachim (2021): SoK: Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In: Proceedings of the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), S. 339-358, USENIX Association, 30th USENIX Security Symposium, virtual Conference, 08.-13.08.2021, ISBN 978-1-939133-25-0

Zimmermann, Verena; Renaud, Karen (2021): The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions. In: ACM Transactions on Computer-Human Interaction, 28 (1), S. 7:1-7:45, ACM, DOI: 10.1145/3429888

2020

Marky, Karola; Schmitz, Martin; Zimmermann, Verena; Herbers, Martin; Kunze, Kai; Mühlhäuser, Max (2020): 3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items. S. 12, ACM, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ISBN 978-1-4503-6708-0, DOI: 10.1145/3313831.3376189

2019

Zimmermann, Verena; Renaud, Karen (2019): Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset. In: International Journal of Human-Computer Studies, Elsevier, DOI: 10.1016/j.ijhcs.2019.05.005

2018

Renaud, Karen; Zimmermann, Verena (2018): Ethical guidelines for nudging in information security & privacy. In: International Journal of Human-Computer Studies (IJHCS), 120, S. 22-35, Elsevier, DOI: 10.1016/j.ijhcs.2018.05.011

JavaScript has been disabled in your browser