All Stories

  1. User Acceptance Criteria for Privacy Preserving Machine Learning Techniques
  2. Acceptance Factors and Obstacles for Cryptocurrency Adoption
  3. Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment
  4. Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing
  5. Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym
  6. How nostalgic feelings impact Pokémon Go players – integrating childhood brand nostalgia into the technology acceptance theory
  7. A Systematic Analysis of User Evaluations in Security Research
  8. STAGE