Matthias Fassl

Matthias Fassl
Verified
Matthias verified their affiliation via an institutional email.
Verified
Matthias verified their affiliation via an institutional email.
  • Dr.-Ing.
  • PostDoc Position at Helmholtz Center for Information Security

About

9
Publications
702
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
175
Citations
Current institution
Helmholtz Center for Information Security
Current position
  • PostDoc Position
Additional affiliations
Independent Researcher
Independent Researcher
Position
  • Postdoctoral Researcher
October 2018 - present
CISPA Helmholtz Center for Information Security
Position
  • PhD Student
Education
November 2018 - October 2022
Saarland University
Field of study
  • Usable Security and Privacy
May 2014 - June 2018
TU Wien
Field of study
  • Computer Engineering

Publications

Publications (9)
Article
Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive security benefits and its occurrence in pop-culture media. Following the Theory of Reasoned Action,...
Chapter
Full-text available
A variety of methods and techniques are used in usable privacy and security (UPS) to study users’ experiences and behaviors. When applying empirical methods, researchers in UPS face specific challenges, for instance, to represent risk to research participants. This chapter provides an overview of the empirical research methods used in UPS and highl...
Chapter
Full-text available
Automatic updates are becoming increasingly common, which minimizes the amount of update decisions that users have to make. Rapidly deployed important updates have a major impact on security. However, automatic updates also reduce the users’ opportunities to build useful mental models which makes decision-making harder on other consumer devices wit...
Article
Full-text available
Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 pape...

Network

Cited By