Search Constraints
1 - 5 of 5
Number of results to display per page
Search Results
-
- Description:
- This dataset comprises self-reported questionnaire responses from 12,000 participants, capturing their conceptions, misconceptions, perceptions, and attitudes toward digital security. It also examines their familiarity with various digital security terms, experiences with cybercrime, and the protective measures participants employ to safeguard their online data. The survey, conducted in late 2021, includes responses from 1,000 participants in each of 12 countries: China, Germany, India, Israel, Italy, Mexico, Poland, Saudi Arabia, South Africa, Sweden, the UK, and the USA. , The dataset is provided in two files: , 1. "SurveyResponses_DigitalSecurityAroundTheWorld.csv": This file contains the complete survey responses from all 12,000 participants., 2. "DataMap_DigitalSecurityAroundTheWorld.pdf": This document includes each question and response option from the full questionnaire. It also maps the survey questions to their corresponding column names in the dataset, facilitating data interpretation., When using any part of our dataset for your own research:, please make sure to cite the following publications: , - Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, Angela Sasse, Yasemin Acar, and Markus Dürmuth. 2023. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 582, 1–23. https://doi.org/10.1145/3544548.3581410 , and - Franziska Herbert, Collins W. Munyendo, Jonas Hielscher, Steffen Becker, Yixin Zou. 2025. Digital Security Perceptions and Practices Around the World: A WEIRD vs. Non-WEIRD Comparison. In Proceedings of the 34th USENIX Security Symposium (USENIX Security 25). USENIX Association, Philadelphia, PA, USA. (in press)
- Keyword:
- human-centered security, privacy, online survey, and cross-country comparison
- Publisher:
- Language:
- English
- Date Uploaded:
- 2025-01-24
- Date Modified:
- 2025-02-19
- License:
- Creative Commons BY Attribution 4.0 International
- Resource Type:
- Dataset
-
- Description:
- Supporting Videos for the Master Thesis: Antifouling properties of plastron forming, ultra-porous, superhydrophobic DCP- and PFPE-based coatings by Georg Breilmann The Master Thesis was done in the Working Group Biointerfaces of Prof. Dr. Axel Rosenhahn in the Analytical Chemistry Chair, Faculty of Chemistry and Biochemistry Ruhr-Universität Bochum. The Videos show five different coatings after a static diatom attachment assay with the algae strain Navicula perminuta. The plastron forming samples were handled with a diving bell and were exposed for the first time after incubation to air. The bursting of the plastrons are presented in the Videos.
- Keyword:
- Antifouling, properties, plastron forming, ultra-porous, superhydrophobic , DCP-based, PFPE-based, coatings, and plastron bursting
- Subject:
- Analytical Chemistry and Master Thesis
- Publisher:
- Language:
- English
- Date Uploaded:
- 2024-11-01
- Date Modified:
- 2025-02-19
- License:
- Creative Commons CC0 1.0 Universal
- Resource Type:
- Audiovisual
-
- Description:
- Diese Software dient zum Erstellen computergenerierter Hologramme für die holographische Strahlformung von Laserstrahlen mittels Spatial Light Modulator. Zudem unterstützt die Software die Ansteuerung und Synchronisation der Laborhardware. Version 2.3 der Hologrammsoftware, letzte Änderung 17.10.2024 and Die Software wurde für Experimente bzw. Simulationen mehrerer Veröffentlichungen eingesetzt, u.a. Marx, Jan, Felix Behlau, Damian Haske, Cemal Esen, und Andreas Ostendorf. „Two-Photon Polymerization Based Fabrication of Millimeter-Sized Precision Fresnel Optics“. Applied Optics 63, Nr. 24 (8. August 2024): 6495–6503. https://doi.org/10.1364/ao.531069 Marx, Jan, Cemal Esen, Christian Lutz , Ralf Hellmann, und Andreas Ostendorf. „Holographic Tuning of Physical Axicons“. In LiM 2023 Proceedings. Hannover: Wissenschaftliche Gesellschaft Lasertechnik und Photonik e.V. (WLT), 2023. https://wlt.de/sites/default/files/2023-09/Contribution_154.pdf. Marx, Jan, Christian Lutz, Ralf Hellmann, und Cemal Esen. „Holographic Multi-Spot Generation for Ultra-Short Pulse Bessel Beam Processing of Stainless Steel“. In 12th CIRP Conference on Photonic Technologies [LANE 2022], herausgegeben von M. Schmidt, F. Vollertsen, und B. M. Colosimo, 111:648–52. Amsterdam: Elsevier, 2022. https://doi.org/10.1016/j.procir.2022.08.003
- Keyword:
- Hologram Calculation and Laboratory Control
- Publisher:
- Language:
- English and German
- Date Uploaded:
- 2024-10-17
- Date Modified:
- 2025-02-19
- License:
- MIT License
- Resource Type:
- Software
-
LAT Hologramm Software
User Collection- Description:
- Diese Software dient zum Erstellen computergenerierter Hologramme für die holographische Strahlformung von Laserstrahlen mittels Spatial Light Modulator. Zudem unterstützt die Software die Ansteuerung und Synchronisation der Laborhardware.
- Keyword:
- Laboratory Control and Hologram Calculation
- Publisher:
- Applied Laser Technologies, Ruhr University Bochum
- Language:
- German and English
- Date Created:
- 17.10.2024
- Resource Type:
- Software
0Collections1Works -
- Description:
- Single Sign-On (SSO) is an authentication process that allows users to access multiple services with a single set of login credentials. Although SSO improves the user experience, it poses challenges to developers to implement complex authentication protocols securely. External services, called brokers, simplify the integration of SSO. In this paper, we shed light on the emerging brokered SSO ecosystem, focusing on the security of the newly introduced actor, the broker. We systematically evaluate the landscape of brokered SSO, uncovering significant blind spots in previous research. Our study reveals that 25% of the websites with SSO integrate brokers for authentication, an area that has not been covered by any previous research. Through our comprehensive security evaluation, we identify three categories of threats associated with brokered SSO: (1) insufficient validation of redirect chains enabling injection attacks, (2) unauthorized data access enabling account takeovers, and (3) violations of security best current practices. We expose vulnerabilities in over 50 brokers, compromising the security of more than 2k websites. These findings represent only a lower bound of a critical situation, underscoring the urgent need for improved security measures and protocols to safeguard the integrity of brokered SSO systems.
- Keyword:
- Single Sign-On and Identity Broker
- Subject:
- IT Security, Single Sign-On, Authorization and Authentication, and Identity Brokers
- Publisher:
- Language:
- English
- Date Uploaded:
- 2024-10-02
- Date Modified:
- 2025-02-19
- License:
- MIT License
- Resource Type:
- Dataset