Can security become a routine? A study of organizational change in an agile software development group A Poller, L Kocksch, S Türpe, FA Epp, K Kinder-Kurlanda Proceedings of the 2017 ACM conference on computer supported cooperative …, 2017 | 105 | 2017 |
Electronic Identity Cards for User Authentication—Promise and Practice A Poller, U Waldmann, S Vowé, S Türpe IEEE Security & Privacy Magazine 10 (1), 46-54, 2012 | 81 | 2012 |
Caring for IT security: Accountabilities, moralities, and oscillations in IT security practices L Kocksch, M Korn, A Poller, S Wagenknecht Proceedings of the ACM on Human-Computer Interaction 2 (CSCW), 1-20, 2018 | 53 | 2018 |
Attacking the BitLocker boot process S Türpe, A Poller, J Steffan, JP Stotz, J Trukenmüller Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009 | 48 | 2009 |
Managing Security Work in Scrum: Tensions and Challenges. S Türpe, A Poller SecSE@ ESORICS 2017, 34-49, 2017 | 32 | 2017 |
Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development {Team} S Türpe, L Kocksch, A Poller Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 25 | 2016 |
Robust image obfuscation for privacy protection in web 2.0 applications A Poller, M Steinebach, H Liu Media Watermarking, Security, and Forensics 2012 8303, 9-23, 2012 | 18 | 2012 |
An asset to security modeling? Analyzing stakeholder collaborations instead of threats to assets A Poller, S Türpe, K Kinder-Kurlanda Proceedings of the 2014 New Security Paradigms Workshop, 69-82, 2014 | 14 | 2014 |
First-time security audits as a turning point? challenges for security practices in an industry software development team A Poller, L Kocksch, K Kinder-Kurlanda, FA Epp Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016 | 12 | 2016 |
Threat analysis in the software development lifecycle J Whitmore, S Türpe, S Triller, A Poller, C Carlson IBM Journal of Research and Development 58 (1), 6: 1-6: 13, 2014 | 12 | 2014 |
Tracing contacts with mobile phones to curb the pandemic: topics and stances in people’s online comments about the official German contact-tracing app S Arzt, A Poller, G Vallejo Extended abstracts of the 2021 CHI conference on human factors in computing …, 2021 | 11 | 2021 |
Privatsphärenschutz in soziale-netzwerke-plattformen A Poller Fraunhofer SIT, 2008 | 11 | 2008 |
Investigating OSN users' privacy strategies with in-situ observation A Poller, P Ilyes, A Kramm, L Kocksch Proceedings of the companion publication of the 17th ACM conference on …, 2014 | 7 | 2014 |
Denkverbote für Star-Trek-Computer? Big Data, statistische Modelle und lernende Maschinen S Türpe, A Selzer, A Poller, M Bedner Datenschutz und Datensicherheit-DuD 38 (1), 31-35, 2014 | 4 | 2014 |
Soziale Netzwerke bewusst nutzen A Poller, U Waldmann Ein Dossier zu Datenschutz, Privatsphärenschutz und Unternehmenssicherheit …, 2013 | 4 | 2013 |
Approaches for automated software security evaluations A Poller | 4 | 2006 |
Designing privacy-aware online social networks-A reflective socio-technical approach A Poller, P Ilyes, A Kramm Proceedings of the Conference on Computer-Supported Cooperative Work and …, 2013 | 3 | 2013 |
Emission statt Transaktion: Weshalb das klassische Datenschutzparadigma nicht mehr funktioniert S Türpe, J Geuter, A Poller Informationelle Selbstbestimmung im digitalen Wandel, 227-248, 2017 | 2 | 2017 |
Merkmalsextraktion für die Klassifikation von Bestandteilen in Dokument-Bildern A Poller | 2 | 2005 |
Security Analysis of TrueCrypt M Baluda, A Fuchs, P Holzinger, L Nguyen, L Othmane, A Poller, J Repp, ... https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies …, 2015 | 1 | 2015 |