Verena Distler
Verena Distler
University of the Bundeswehr Munich
Verified email at
Cited by
Cited by
Acceptability and Acceptance of Autonomous Mobility on Demand: the Impact of an Immersive Experience
V Distler, C Lallemand, T Bellet
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
How acceptable is this? How user experience factors can broaden our understanding of the acceptance of privacy trade-offs
V Distler, C Lallemand, V Koenig
Computers in Human Behavior 106, 106227, 2020
Security–Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security
V Distler, ML Zollinger, C Lallemand, P Roenne, P Ryan, V Koenig
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
A systematic literature review of empirical methods and risk representation in usable privacy and security research
V Distler, M Fassl, H Habib, K Krombholz, G Lenzini, C Lallemand, ...
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (6), 1-50, 2021
The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely
V Distler, G Lenzini, C Lallemand, V Koenig
New Security Paradigms Workshop (NSPW), 2020
User Experience Design for E-Voting: How mental models align with security mechanisms
ML Zollinger, V Distler, PB Roenne, PYA Ryan, C Lallemand, V Koenig
arXiv preprint arXiv:2105.14901, 2021
The influence of context on response to spear-phishing attacks: An in-situ deception study
V Distler
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
V Distler, C Lallemand, V Koenig
EuroUSEC 2020, 2020
“We Need a Big Revolution in Email Advertising”: Users’ Perception of Persuasion in Permission-based Advertising Emails
A Sergeeva, B Rohles, V Distler, V Koenig
Proceedings of the 2023 chi conference on human factors in computing systems …, 2023
Complex, but in a good way? How to represent encryption to non-experts through text and visuals–Evidence from expert co-creation and a vignette experiment
V Distler, T Gutfleisch, C Lallemand, G Lenzini, V Koenig
Computers in Human Behavior Reports 5, 100161, 2022
Do persuasive designs make smartphones more addictive?-A mixed-methods study on Chinese university students
X Chen, A Hedman, V Distler, V Koenig
Computers in Human Behavior Reports 10, 100299, 2023
Running out of time (rs): effects of scarcity cues on perceived task load, perceived benevolence and user experience on e-commerce sites
R Tuncer, A Sergeeva, K Bongard-Blanchy, V Distler, S Doublet, V Koenig
Behaviour & Information Technology, 1-19, 2023
Empirical Research Methods in Usable Privacy and Security
V Distler, M Fassl, H Habib, K Krombholz, G Lenzini, C Lallemand, ...
Human Factors in Privacy Research, 29-53, 2023
EyeSeeIdentity: Exploring Natural Gaze Behaviourfor Implicit User Identification during Photo Viewing}}
Y Abdrabou, M Hassib, S Hu, K Pfeuffer, M Khamis, A Bulling, F Alt, ...
Proceedings of the Usable Security Mini Conference 2024}} 11, 131814-131835, 2024
The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study
S Mukherjee, B Rohles, V Distler, G Lenzini, V Koenig
Computers & Education 207, 104925, 2023
Human-centered Behavioral and Physiological Security
F Alt, M Hassib, V Distler
Proceedings of the 2023 New Security Paradigms Workshop, 48-61, 2023
An (Un) Necessary Evil-Users'(Un) Certainty about Smartphone App Permissions and Implications for Privacy Engineering
K Bongard-Blanchy, JL Sterckx, A Rossi, V Distler, S Rivas, V Koenig
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 01-08, 2022
A UX Approach to Privacy and Security: the Impact of User, Contextual and System-Related Factors
V Distler, C Lallemand, V Koenig
CHI 2018 Workshop Exploring Individual Diffferences in Privacy, 2018
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment
X Chen, M Sacré, G Lenzini, S Greiff, V Distler, A Sergeeva
arXiv preprint arXiv:2402.11862, 2024
Defining and Fortifying Against Cognitive Vulnerabilities in Social Engineering (Dagstuhl Seminar 23462)
Y Abdelrahman, F Alt, T Dingler, C Hadnagy, A Maroño, V Distler
Schloss Dagstuhl–Leibniz-Zentrum für Informatik, 2024
The system can't perform the operation now. Try again later.
Articles 1–20