Privacy Settings in Online Social Networks - Preferences, Perception, and Reality M Netter, M Riesner, M Weber, G Pernul 46th Hawaii International Conference on System Science (HICSS), 2013 | 58 | 2013 |
Visualizing past personal data disclosures J Kolter, M Netter, G Pernul 2010 International Conference on Availability, Reliability and Security, 131-139, 2010 | 44 | 2010 |
Taxonomy of social network data types C Richthammer, M Netter, M Riesner, J Sänger, G Pernul EURASIP Journal on Information Security 2014, 1-17, 2014 | 38 | 2014 |
Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks A Cetto, M Netter, G Pernul, C Richthammer, M Riesner, C Roth, J Sänger 2nd International Workshop on Intelligent Digital Games for Empowerment and …, 2014 | 36 | 2014 |
Adaptive identity and access management—contextual data based policies M Hummer, M Kunz, M Netter, L Fuchs, G Pernul EURASIP Journal on Information Security 2016, 1-16, 2016 | 32 | 2016 |
Assisted Social Identity Management-Enhancing Privacy in the Social Web M Netter, M Riesner, G Pernul 10th International Conference on Wirtschaftsinformatik (WI), 2011 | 20* | 2011 |
Attacking Image Recognition Captchas: A Naive but Effective Approach C Fritsch, M Netter, A Reisser, G Pernul Trust, Privacy and Security in Digital Business: 7th International …, 2010 | 18 | 2010 |
Integrating security patterns into the electronic invoicing process M Netter, G Pernul Database and Expert Systems Application, 2009. DEXA'09. 20th International …, 2009 | 18 | 2009 |
Analyzing recent trends in enterprise identity management M Kunz, M Hummer, L Fuchs, M Netter, G Pernul 2014 25th international workshop on database and expert systems applications …, 2014 | 17 | 2014 |
Analyzing Privacy in Social Networks--An Interdisciplinary Approach M Netter, S Herbst, G Pernul 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 17 | 2011 |
Interdisciplinary Impact Analysis of Privacy in Social Networks M Netter, S Herbst, G Pernul Security and Privacy in Social Networks, 7-26, 2013 | 15 | 2013 |
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments M Riesner, M Netter, G Pernul information security technical report 17 (4), 185-198, 2013 | 14 | 2013 |
Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control C Richthammer, M Netter, G Riesner, Moritz, Pernul Availability, Reliability and Security (ARES), 2013 Eighth International …, 2013 | 11 | 2013 |
Advanced identity and access policy management using contextual data M Hummer, M Kunz, M Netter, L Fuchs, G Pernul 2015 10th international conference on availability, reliability and security …, 2015 | 10 | 2015 |
An analysis of implemented and desirable settings for identity management on social networking sites M Riesner, M Netter, G Pernul 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 8 | 2012 |
How to discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining M Kunz, L Fuchs, M Netter, G Pernul to be announced, 2016 | 7 | 2016 |
Analyzing quality criteria in role-based identity and access management M Kunz, L Fuchs, M Netter, G Pernul 2015 International Conference on Information Systems Security and Privacy …, 2015 | 7 | 2015 |
Refining the pattern-based reference model for electronic invoices by incorporating threats M Netter, EB Fernandez, G Pernul 2010 International Conference on Availability, Reliability and Security, 560-564, 2010 | 6 | 2010 |
Visualizing Social Roles-Design and Evaluation of a Bird's-Eye View of Social Network Privacy Settings M Netter, M Weber, M Diener, G Pernul | 4 | 2014 |
Privacy-preserving Infrastructure for Social Identity Management M Netter Shaker, 2013 | 4 | 2013 |