Verena Distler
Université du Luxembourg
H-index: 7
Europe-Luxembourg
Top articles of Verena Distler
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment
arXiv preprint arXiv:2402.11862
2024/2/19
Defining and Fortifying Against Cognitive Vulnerabilities in Social Engineering (Dagstuhl Seminar 23462)
2024
Florian Alt
H-Index: 34
Verena Distler
H-Index: 4
EyeSeeIdentity: Exploring Natural Gaze Behaviourfor Implicit User Identification during Photo Viewing}}
Proceedings of the Usable Security Mini Conference 2024}}
2024
Yasmeen Abdrabou
H-Index: 5
Mariam Hassib
H-Index: 14
Ken Pfeuffer
H-Index: 12
Mohamed Khamis
H-Index: 18
Andreas Bulling
H-Index: 45
Florian Alt
H-Index: 34
Sarah Prange
H-Index: 4
Lukas Mecke
H-Index: 4
Florian Alt
H-Index: 34
Florian Alt
H-Index: 34
Mariam Hassib
H-Index: 14
Verena Distler
H-Index: 4
Lukas Mecke
H-Index: 4
Felix Dietz
H-Index: 1
Florian Alt
H-Index: 34
Mariam Hassib
H-Index: 14
Daniela Pöhn
H-Index: 3
Felix Dietz
H-Index: 1
Wolfgang Hommel
H-Index: 6
Florian Alt
H-Index: 34
Florian Alt
H-Index: 34
The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study
Computers & Education
2023/12/1
The Perceived Influence of E-Shopping Cues on Customers' Buying Decisions
2023/10/30
Analysing the Influence of Loss-Gain Framing on Data Disclosure Behaviour: A Study on the Use Case of App Permission Requests
Proceedings of the 2023 European Symposium on Usable Security
2023/10/13
Human-centered Behavioral and Physiological Security
2023/9/18
Running out of time (rs): effects of scarcity cues on perceived task load, perceived benevolence and user experience on e-commerce sites
Behaviour & Information Technology
2023/8/3
The influence of authentication time on trust, perception of speed and UX in the context of a facial authentication mechanism
2023/7/10
Do persuasive designs make smartphones more addictive?-A mixed-methods study on Chinese university students
Computers in Human Behavior Reports
2023/5/1
Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks
2023/4/23
The influence of context on response to spear-phishing attacks: An in-situ deception study
2023/4/19
Verena Distler
H-Index: 4
“We Need a Big Revolution in Email Advertising”: Users’ Perception of Persuasion in Permission-based Advertising Emails
2023/4/19
Verena Distler
H-Index: 4
Vincent Koenig
H-Index: 11
Empirical Research Methods in Usable Privacy and Security
2023/3/10
An (Un) Necessary Evil-Users'(Un) Certainty about Smartphone App Permissions and Implications for Privacy Engineering
2022/6/6
" Do we need an entire course about it?": Evaluating two years of teaching HCI in computer science
2022/5/1
Verena Distler
H-Index: 4
Vincent Koenig
H-Index: 11
Complex, but in a good way? How to represent encryption to non-experts through text and visuals–Evidence from expert co-creation and a vignette experiment
Computers in Human Behavior Reports
2022/3/1
A systematic literature review of empirical methods and risk representation in usable privacy and security research
2021/12/23
The Experience of Security in Human-Computer Interactions: Understanding Security Perceptions Through the Concept of User Experience
2021/9/21
Verena Distler
H-Index: 4
User Experience Design for E-Voting: How mental models align with security mechanisms
arXiv preprint arXiv:2105.14901
2021/5/31
Marie-Laure Zollinger
H-Index: 3
Verena Distler
H-Index: 4
Carine Lallemand
H-Index: 12
Vincent Koenig
H-Index: 11