default search action
Verena Zimmermann
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Verena Zimmermann, Lorin Schöni, Thierry Schaltegger, Benjamin Ambuehl, Melanie Knieps, Nico Ebert:
Human-Centered Cybersecurity Revisited: From Enemies to Partners. Commun. ACM 67(11): 72-81 (2024) - [j18]Lorin Schöni, Karel Kubicek, Verena Zimmermann:
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock. Proc. Priv. Enhancing Technol. 2024(1): 192-216 (2024) - [j17]Nina Gerber, Alina Stöver, Justin Peschke, Verena Zimmermann:
Don't Accept All and Continue: Exploring Nudges for More Deliberate Interaction with Tracking Consent Notices. ACM Trans. Comput. Hum. Interact. 31(1): 1:1-1:36 (2024) - [c23]Karola Marky, Alina Stöver, Sarah Prange, Kira Bleck, Paul Gerber, Verena Zimmermann, Florian Müller, Florian Alt, Max Mühlhäuser:
Decide Yourself or Delegate - User Preferences Regarding the Autonomy of Personal Privacy Assistants in Private IoT-Equipped Environments. CHI 2024: 851:1-851:20 - [c22]Neele Roch, Hannah Sievers, Lorin Schöni, Verena Zimmermann:
Navigating Autonomy: Unveiling Security Experts' Perspectives on Augmented Intelligence in Cybersecurity. SOUPS @ USENIX Security Symposium 2024: 41-60 - [c21]Alexandra von Preuschen, Monika C. Schuhmacher, Verena Zimmermann:
Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in Cybersecurity. SOUPS @ USENIX Security Symposium 2024: 623-642 - [c20]Adrienn Toth, Zsolt Abraham, Verena Zimmermann:
Understanding University Students' Concerns Regarding Automated Learning Assessment Tools. UMAP (Adjunct Publication) 2024 - 2023
- [j16]Verena Zimmermann, Karola Marky, Karen Renaud:
Hybrid password meters for more secure passwords - a comprehensive study of password meters including nudges and password information. Behav. Inf. Technol. 42(6): 700-743 (2023) - [j15]Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, Lorin Schöni, Verena Zimmermann, Melanie Knieps:
Learning from safety science: A way forward for studying cybersecurity incidents in organizations. Comput. Secur. 134: 103435 (2023) - [j14]Verena Zimmermann:
Smart cities as a testbed for experimenting with humans? - Applying psychological ethical guidelines to smart city interventions. Ethics Inf. Technol. 25(4): 54 (2023) - [c19]Verena Zimmermann, Jasmin Haunschild, Alina Stöver, Nina Gerber:
Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains. MuC (Workshopband) 2023 - 2022
- [j13]Verena Zimmermann, Jasmin Haunschild, Marita Unden, Paul Gerber, Nina Gerber:
Sicherheitsherausforderungen für Smart-City-Infrastrukturen. Wirtschaftsinformatik Manag. 14(2): 119-126 (2022) - [c18]Otilia Pasnicu, Verena Zimmermann, Nina Gerber, Sarah Cardoso:
Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces. MuC 2022: 545-549 - [c17]Alina Stöver, Nina Gerber, Christin Cornel, Mona Henz, Karola Marky, Verena Zimmermann, Joachim Vogt:
Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns. MuC (Workshopband) 2022 - [i1]Verena Zimmermann, Paul Gerber, Alina Stöver:
That Depends - Assessing User Perceptions of Authentication Schemes across Contexts of Use. CoRR abs/2209.13958 (2022) - 2021
- [b1]Verena Zimmermann:
From the Quest to Replace Passwords towards Supporting Secure and Usable Password Creation. Technical University of Darmstadt, Germany, 2021 - [j12]Rolf Egert, Nina Gerber, Jasmin Haunschild, Philipp Kuehn, Verena Zimmermann:
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience. i-com 20(2): 161-175 (2021) - [j11]Verena Zimmermann, Karen Renaud:
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions. ACM Trans. Comput. Hum. Interact. 28(1): 7:1-7:45 (2021) - [c16]Lisa Marie Zankel, Paul Gerber, Verena Zimmermann, Nina Gerber:
Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems. AutomotiveUI (adjunct) 2021: 71-76 - [c15]Mario Avramidis, Christiane Kellner, Josefine Staudt, Verena Zimmermann, Nina Gerber:
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance. MuC (Workshopband) 2021 - [c14]Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, Joachim Vogt:
SoK: Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. SOUPS @ USENIX Security Symposium 2021: 339-358 - 2020
- [j10]Verena Zimmermann, Nina Gerber:
The password is dead, long live the password - A laboratory study on user perceptions of authentication schemes. Int. J. Hum. Comput. Stud. 133: 26-44 (2020) - [j9]Karen Renaud, Verena Zimmermann:
How to nudge in cyber security. Netw. Secur. 2020(11): 20 (2020) - [c13]Karola Marky, Martin Schmitz, Verena Zimmermann, Martin Herbers, Kai Kunze, Max Mühlhäuser:
3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items. CHI 2020: 1-12 - [c12]Karola Marky, Verena Zimmermann, Markus Funk, Jörg Daubert, Kira Bleck, Max Mühlhäuser:
Improving the Usability and UX of the Swiss Internet Voting Interface. CHI 2020: 1-13 - [c11]Karola Marky, Verena Zimmermann, Alina Stöver, Philipp Pascal Hoffmann, Kai Kunze, Max Mühlhäuser:
All in One! User Perceptions on Centralized IoT Privacy Settings. CHI Extended Abstracts 2020: 1-8
2010 – 2019
- 2019
- [j8]Verena Zimmermann, Paul Gerber, Karola Marky, Leon Böck, Florian Kirchbuchner:
Assessing Users' Privacy and Security Concerns of Smart Home Technologies. i-com 18(3): 197-216 (2019) - [j7]Verena Zimmermann, Karen Renaud:
Moving from a 'human-as-problem" to a 'human-as-solution" cybersecurity mindset. Int. J. Hum. Comput. Stud. 131: 169-187 (2019) - [j6]Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt:
Keep on rating - on the systematic rating and comparison of authentication schemes. Inf. Comput. Secur. 27(5) (2019) - [j5]Karen Renaud, Verena Zimmermann:
Encouraging password manager use. Netw. Secur. 2019(6): 20 (2019) - [c10]Nina Gerber, Verena Zimmermann, Melanie Volkamer:
Why Johnny Fails to Protect his Privacy. EuroS&P Workshops 2019: 109-118 - [c9]Verena Zimmermann, Ernestine Dickhaut, Paul Gerber, Joachim Vogt:
Vision: Shining Light on Smart Homes - Supporting Informed Decision-Making of End Users. EuroS&P Workshops 2019: 149-153 - 2018
- [j4]Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer, Tobias Hilt:
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp. Datenschutz und Datensicherheit 42(11): 680-685 (2018) - [j3]Karen Renaud, Verena Zimmermann:
Ethical guidelines for nudging in information security & privacy. Int. J. Hum. Comput. Stud. 120: 22-35 (2018) - [j2]Karen Renaud, Verena Zimmermann:
A user by any other name. Netw. Secur. 2018(9): 20 (2018) - [c8]Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer:
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? ARES 2018: 11:1-11:10 - [c7]Verena Zimmermann, Nina Gerber, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt, Peter Mayer:
The Quest to Replace Passwords Revisited - Rating Authentication Schemes. HAISA 2018: 38-48 - [c6]Karola Marky, Peter Mayer, Nina Gerber, Verena Zimmermann:
Assistance in Daily Password Generation Tasks. UbiComp/ISWC Adjunct 2018: 786-793 - [c5]Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, Melina von Wick:
'Home, Smart Home' - Exploring End Users' Mental Models of Smart Homes. MuC (Workshopband) 2018 - 2017
- [j1]Verena Zimmermann, Birgit Henhapl, Melanie Volkamer, Joachim Vogt:
Ende-zu-Ende sichere E-Mail-Kommunikation. Datenschutz und Datensicherheit 41(5): 308-313 (2017) - [c4]Verena Zimmermann, Nina Gerber:
"If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies. HCI (22) 2017: 265-283 - [c3]Karen Renaud, Verena Zimmermann:
Enriched nudges lead to stronger password replacements ... but implement mindfully. ISSA 2017: 1-9 - [c2]Nina Gerber, Verena Zimmermann:
Security vs. privacy? User preferences regarding text passwords and biometric authentication. MuC (Workshopband) 2017 - [c1]Verena Zimmermann, Birgit Henhapl, Nina Gerber, Matthias Enzmann:
Promoting Secure Email Communication and Authentication. MuC (Workshopband) 2017
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint