Styx: Privacy Risk Communication for the Android Smartphone Platform Based on Apps’ Data-Access Behavior Patterns G Bal, K Rannenberg, JI Hong Computers & Security 53, 187-202, 2015 | 29 | 2015 |
Styx: Design and evaluation of a new privacy risk communication method for smartphones G Bal, K Rannenberg, J Hong ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 22 | 2014 |
Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications G Bal Mobile Security Technologies - MoST, 2012 | 18 | 2012 |
Designing Privacy Indicators for Smartphone App Markets: A New Perspective on the Nature of Privacy Risks of Apps G Bal 20th Americas Conference on Information Systems (AMCIS 2014), 2014 | 13 | 2014 |
Explicitness of Consequence Information in Privacy Warnings: Experimentally Investigating the Effects on Perceived Risk, Trust, and Privacy Information Quality G Bal 35th International Conference on Information Systems (ICIS 2014), 2014 | 10 | 2014 |
On gender specific perception of data sharing in Japan M Tschersich, S Kiyomoto, S Pape, T Nakamura, G Bal, H Takasaki, ... ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 8 | 2016 |
Balancing security and usability of local security mechanisms for mobile devices S Yang, G Bal Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 8 | 2012 |
Injecting trust to cryptographic key management G Bal, AU Schmidt, N Kuntze 2009 11th International Conference on Advanced Communication Technology 2 …, 2009 | 7 | 2009 |
User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps G Bal, K Rannenberg W3C Workshop on Privacy and User–Centric Controls, 2014 | 5 | 2014 |
Privacy by Sustainable Identity Management Enablers S Koschinat, G Bal, C Weber, K Rannenberg Privacy and Identity Management for Life, 431-452, 2011 | 3 | 2011 |
Improving the Effectiveness of Privacy Risk Communication in Smartphone App Ecosystems G Bal Verlag Dr. Kovač, 2015 | | 2015 |
Trusted Computing Sicherheit für Webbrowser G Bal Fraunhofer-Institut für Sichere Informationstechnologie, 2009 | | 2009 |