default search action
Sören Preibusch
Person information
- affiliation: Google
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c25]Kopo M. Ramokapane, Gaurav Misra, Jose M. Such, Sören Preibusch:
Truth or Dare: Understanding and Predicting How Users Lie and Provide Untruthful Data Online. CHI 2021: 557:1-557:15
2010 – 2019
- 2017
- [j10]Bettina Berendt, Sören Preibusch:
Toward Accountable Discrimination-Aware Data Mining: The Importance of Keeping the Human in the Loop - and Under the Looking Glass. Big Data 5(2): 135-152 (2017) - [c24]Jose M. Such, Joel Porter, Sören Preibusch, Adam N. Joinson:
Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study. CHI 2017: 3821-3832 - 2016
- [j9]Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt:
Shopping for privacy: Purchase details leaked to PayPal. Electron. Commer. Res. Appl. 15: 52-64 (2016) - [c23]Kat Krol, Sören Preibusch:
Control versus Effort in Privacy Warnings for Webforms. WPES@CCS 2016: 13-23 - 2015
- [j8]Sören Preibusch:
Privacy behaviors after Snowden. Commun. ACM 58(5): 48-55 (2015) - [j7]Kat Krol, Sören Preibusch:
Effortless Privacy Negotiations. IEEE Secur. Priv. 13(3): 88-91 (2015) - [j6]Sören Preibusch:
The Value of Web Search Privacy. IEEE Secur. Priv. 13(5): 24-32 (2015) - [c22]Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt:
Purchase Details Leaked to PayPal. Financial Cryptography 2015: 217-226 - [c21]Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling:
Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing. SEC 2015: 97-111 - [c20]Rula Sayaf, Sören Preibusch, Dave Clarke:
Contextual Healing: Privacy through Interpretation Management. SmartCity 2015: 360-365 - 2014
- [j5]Bettina Berendt, Sören Preibusch:
Better decision support through exploratory discrimination-aware data mining: foundations and empirical evidence. Artif. Intell. Law 22(2): 175-209 (2014) - [c19]Daniel J. Liebling, Sören Preibusch:
Privacy considerations for a pervasive eye tracking world. UbiComp Adjunct 2014: 1169-1177 - 2013
- [b1]Sören Preibusch:
Privacy choices online : preferences, incentives and enforcement. University of Cambridge, UK, 2013 - [j4]Sören Preibusch, Dorothea Kübler, Alastair R. Beresford:
Price versus privacy: an experiment into the competitive advantage of collecting less personal information. Electron. Commer. Res. 13(4): 423-455 (2013) - [j3]Sören Preibusch:
Guide to measuring privacy concern: Review of survey and observational instruments. Int. J. Hum. Comput. Stud. 71(12): 1133-1143 (2013) - [c18]Florian Kammüller, Sören Preibusch:
Privacy Analysis of a Hidden Friendship Protocol. DPM/SETOP 2013: 83-99 - [c17]Miguel Malheiros, Sören Preibusch, Martina Angela Sasse:
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. TRUST 2013: 250-266 - [p1]Sören Preibusch, Kat Krol, Alastair R. Beresford:
The Privacy Economics of Voluntary Over-disclosure in Web Forms. The Economics of Information Security and Privacy 2013: 183-209 - 2012
- [c16]Joseph Bonneau, Sören Preibusch, Ross J. Anderson:
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. Financial Cryptography 2012: 25-40 - [c15]Bettina Berendt, Sören Preibusch:
Exploring Discrimination: A User-centric Evaluation of Discrimination-Aware Data Mining. ICDM Workshops 2012: 344-351 - [c14]Sören Preibusch, Kat Krol, Alastair R. Beresford:
The Privacy Economics of Voluntary Over-disclosure in Web Forms. WEIS 2012 - 2011
- [c13]Sören Preibusch:
Information Flow Control for Static Enforcement of User-Defined Privacy Policies. POLICY 2011: 133-136 - [c12]Sören Preibusch, Joseph Bonneau:
The Privacy Landscape: Product Differentiation on Data Collection. WEIS 2011 - [c11]Sören Preibusch, Joseph Bonneau:
The Privacy Landscape: Product Differentiation on Data Collection. WEIS (Springer Volume) 2011: 263-283 - 2010
- [c10]Sören Preibusch, Joseph Bonneau:
The Password Game: Negative Externalities from Weak Password Practices. GameSec 2010: 192-207 - [c9]Joseph Bonneau, Sören Preibusch:
The Password Thicket: Technical and Market Failures in Human Authentication on the Web. WEIS 2010
2000 – 2009
- 2009
- [c8]Sören Preibusch, Alastair R. Beresford:
Establishing Distributed Hidden Friendship Relations. Security Protocols Workshop 2009: 321-334 - [c7]Sören Preibusch:
Establishing Distributed Hidden Friendship Relations. Security Protocols Workshop 2009: 335-342 - [c6]Joseph Bonneau, Sören Preibusch:
The Privacy Jungle: On the Market for Data Protection in Social Networks. WEIS 2009 - 2008
- [j2]Florian Kammüller, Sören Preibusch:
An industrial application of symbolic model checking. Inform. Forsch. Entwickl. 22(2): 95-108 (2008) - [j1]Bettina Berendt, Sören Preibusch, Maximilian Teltzrow:
A Privacy-Protecting Business-Analytics Service for On-Line Transactions. Int. J. Electron. Commer. 12(3): 115-150 (2008) - 2007
- [c5]Sören Preibusch, Florian Kammüller:
Checking the TWIN Elevator System by Translating Object-Z to SMV. FMICS 2007: 38-55 - [c4]Sören Preibusch:
Spontaneous Privacy Policy Negotiations in Pervasive Environments. OTM Workshops (2) 2007: 814-823 - 2006
- [c3]Sören Preibusch:
Implementing Privacy Negotiations in E-Commerce. APWeb 2006: 604-615 - 2005
- [c2]Sören Preibusch:
Implementing Privacy Negotiation Techniques in E-Commerce. CEC 2005: 387-390 - 2004
- [c1]Maximilian Teltzrow, Sören Preibusch, Bettina Berendt:
SIMT -- A Privacy Preserving Web Metrics Tool. CEC 2004: 263-270
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint