Scientific Publications

Scientific Publications by ESRs

  1. Majid Hatamian and Jetzabel Serna-Olvera. Beacon Alarming: Informed decision-making supporter and privacy risk analyser in Smartphone applications. In Proceedings of IEEE International Conference on Consumer Electronics (ICCE 2017). Las Vegas, NV. January 2017. [PDF] [bib]
  2. Agnieszka Kitkowska, Joachim Meyer, Erik Wastlund, Leonardo A. Martucci. Is it harmful? Measuring People’s Perceptions of Online Privacy Issues. In Proceedings of Symposium on Usable Privacy and Security (SOUPS 2017), Poster. Baltimore, MD. July 2017. [PDF] [bib]
  3. Majid Hatamian, Jetzabel Serna, Kai Rannenberg, and Bodo Igler. FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps. In Proceedings of International Conference On Trust, Privacy & Security In Digital Business (TrustBus 2017). Lyon, France. August 2017. [PDF] [bib]
  4. Patrick Murmann and Simone Fischer-Hübner. Tools for Achieving Usable Ex Post Transparency: A Survey.  IEEE Access, Vol. 5, 2017. [PDF] [bib]
  5. Yefim Shulman. Towards a Broadening of Privacy Decision Making Models: The Use of Cognitive Architectures. IFIP Summer School on Privacy and Identity Management 2017, Ispra, Italy, September 2017 [PDF] [bib]
  6. Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi. NFC payments – Gaps between user perception and reality. IFIP Summer School on Privacy and Identity Management 2017, Ispra, Italy, September 2017 [PDF] [bib]
  7. Alexander Railean and Delphine Reinhardt. Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-cycle of IoT Devices. In Proceedings of the IFIP Summer School on Privacy and Identity Management 2017. Ispra, Italy. September 2017. [PDF] [bib]
  8. Agnieszka Kitkowska, Joachim Meyer, Erik Wastlund, and Leonardo A. Martucci. Is it harmful? Re-examining online privacy concerns. IFIP Summer School on Privacy and Identity Management 2017, Ispra, Italy, September 2017 [PDF] [bib]
  9. Majid Hatamian and Jetzabel Serna. ARM: ANN-based Ranking Model for Privacy and Security Analysis in Smartphone Ecosystems. In Proceedings of IEEE International Carnahan Conference on Security Technology (ICCST 2017). Madrid, Spain. October 2017. [PDF] [bib]
  10. Hubert A. Jäger, Lamya Abdullah, and Juan Quintero. Vertrauenswürdiges Backend. In Datenschutz und Datensicherheit – DuD , Springer. December 2017. [PDF] [bib]
  11. Mark Warner and Ann Blandford. Do I really have to publicly disclose my HIV status? CHI Workshop “Moving Beyond a One-Size Fits All Approach: Exploring Individual Differences in Privacy.” Montreal, Canada. April 2018. [PDF] [bib]
  12. Agnieszka Kitkowska. Reaching Beyond the Borders: Investigating Differences in Privacy Harms Concerns. CHI Workshop “Moving Beyond a One-Size Fits All Approach: Exploring Individual Differences in Privacy.” Montreal, Canada. April 2018. [PDF] [bib]
  13. Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska and Sabrina Kirrane. It’s shocking! Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser. 32nd Annual Conference on Data and Applications Security and Privacy (DBSec 2018). Bergamo, Italy, July 2018. [PDF] [bib]
  14. Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi. Changed the Cup, Not the Saucer — NFC Payments in Supermarkets. In Proceedings of 20th International Conference on Human-Computer Interaction (HCI International 2018). Las Vegas, USA, July 2018. [PDF] [bib]
  15. Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber and Peter Mayer. Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. USENIX Symposium on Usable Privacy and Security (SOUPS 2018). Baltimore, USA, August 2018. [PDF] [bib]
  16. Yefim Shulman and Joachim Meyer. Is Privacy Controllable? 13th International IFIP Summer School on Privacy and Identity Management. Vienna, Austria, August 2018. [PDF] [bib]
  17. Alexandr Railean and Delphine Reinhardt. Let there be LITE: design and evaluation of a label for IoT transparency enhancement. In Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2018). Barcelona, Spain, September 2018. [PDF] [bib]
  18. Patrick Murmann. Usable transparency for enhancing privacy in mobile health apps. 20th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2018), Poster. Barcelona, Spain, September 2018. [PDF] [bib].
  19. Alexandros Mittos, Jeremy Blackburn, Emiliano De Cristofaro.“23andMe confirms: I’m super white” — Analyzing Twitter Discourse On Genetic Testing. 5th International Workshop on ​Genome Privacy and Security (GenoPri’18), Basel, Switzerland, October 2018. [PDF] [bib].
  20. G. Anthony Giannoumis, Molly K. Land, Agnieszka Kitkowska, Maria Mikhaylova. Comment on Article 22 and Its Intersection with Obligations for Accessibility. Book Chapter in “The UN Convention on the Rights of Persons with Disabilities – A Commentary.” [PDF] [bib].
  21. Mark Warner, Andreas Gutmann, M. Angela Sasse, and Ann Blandford. Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. In Proceedings of the 21st ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2018). Jersey City, US, November 2018. [PDF] [bib]
  22. Luiza Jarovsky. Improving Consent in Information Privacy through Autonomy-Preserving Protective Measures (APPMs). European Data Protection Law Review. Volume 4, Issue 4. 2018. [PDF] [bib]
  23. Lamya Abdullah, Felix Freiling, Juan Quintero, Zinaida Benenson. Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (SECPRE 2018). [PDF] [bib]
  24. David Harborth, Majid Hatamian, Welderufael B. Tesfay, Kai Rannenberg. A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications. 52nd Hawaii International Conference on System Sciences 2019 (HICSS 2019). Maui, Hawaii, January 2019. [PDF] [bib]
  25. Majid Hatamian. “Hard to Understand, Easy to Ignore”‘: An Automated Approach to Predict Mobile App Permission Requests. 34th ACM/SIGAPP Symposium On Applied Computing (SAC 2019), Student Research Abstract. Limassol, Cyprus, April 2019. [PDF] [bib]
  26. Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, Ann Blandford. Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men. ACM CHI Conference on Human Factors in Computing Systems (CHI 2019). Glasgow, UK, May 2019. [PDF] [bib]
  27. Majid Hatamian, Jetzabel Serna, Kai Rannenberg. Revealing the Unrevealed: Mining Smartphone Users Privacy Perception on App Markets. Computer & Security. Vol. 83, June 2019. [PDF] [bib]
  28. Majid Hatamian, Sebastian Pape, and Kai Rannenberg. ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2019). Lisbon, Portugal, June 2019. [PDF] [bib]
  29. Andreas Gutmann and Mark Warner. Fight to be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems. Annual Privacy Forum 2019. Rome, Italy, June 2019. [PDF] [bib]
  30. Majid Hatamian, Nurul Momen, Lothar Fritsch, and Kai Rannenberg. A Multilateral Privacy Impact Analysis Method for Android Apps. Annual Privacy Forum 2019. Rome, Italy, June 2019. [PDF] [bib]
  31. Alexandros Mittos, Bradley Malin, Emiliano De Cristofaro. Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective. Proceedings on Privacy Enhancing Technologies (PoPETs 2019), Vol. 2019, Issue 1. Stockholm, Sweden, July 2019. [PDF] [bib]
  32. Lamya Abdullah and Juan Quintero. Sealed computation: a mechanism to support privacy-aware trustworthy cloud service. Information & Computer Security. To be published in 2019. [PDF] [bib]