[{"doi":"10.1007/978-3-662-64833-9_2","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1007/978-3-662-64833-9_2"}],"date_updated":"2024-04-18T10:10:54Z","oa":"1","author":[{"last_name":"Liebendörfer","orcid":"0000-0001-9887-2074","full_name":"Liebendörfer, Michael","id":"30933","first_name":"Michael"},{"first_name":"Reinhard","last_name":"Hochmuth","full_name":"Hochmuth, Reinhard"},{"last_name":"Biehler","full_name":"Biehler, Rolf","id":"16274","first_name":"Rolf"},{"first_name":"Niclas","full_name":"Schaper, Niclas","last_name":"Schaper"},{"full_name":"Büdenbender-Kuklinski, Christiane","last_name":"Büdenbender-Kuklinski","first_name":"Christiane"},{"first_name":"Elisa","last_name":"Lankeit","full_name":"Lankeit, Elisa"},{"first_name":"Johanna","last_name":"Ruge","full_name":"Ruge, Johanna"},{"full_name":"Schürmann, Mirko","id":"59707","orcid":"0000-0003-2646-085X","last_name":"Schürmann","first_name":"Mirko"}],"place":"Berlin, Heidelberg","page":"33-65","citation":{"apa":"Liebendörfer, M., Hochmuth, R., Biehler, R., Schaper, N., Büdenbender-Kuklinski, C., Lankeit, E., Ruge, J., &#38; Schürmann, M. (2022). Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik. In R. Hochmuth, R. Biehler, M. Liebendörfer, &#38; N. Schaper (Eds.), <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i> (pp. 33–65). Springer. <a href=\"https://doi.org/10.1007/978-3-662-64833-9_2\">https://doi.org/10.1007/978-3-662-64833-9_2</a>","short":"M. Liebendörfer, R. Hochmuth, R. Biehler, N. Schaper, C. Büdenbender-Kuklinski, E. Lankeit, J. Ruge, M. Schürmann, in: R. Hochmuth, R. Biehler, M. Liebendörfer, N. Schaper (Eds.), Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse, Springer, Berlin, Heidelberg, 2022, pp. 33–65.","bibtex":"@inbook{Liebendörfer_Hochmuth_Biehler_Schaper_Büdenbender-Kuklinski_Lankeit_Ruge_Schürmann_2022, place={Berlin, Heidelberg}, title={Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-64833-9_2\">10.1007/978-3-662-64833-9_2</a>}, booktitle={Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse}, publisher={Springer}, author={Liebendörfer, Michael and Hochmuth, Reinhard and Biehler, Rolf and Schaper, Niclas and Büdenbender-Kuklinski, Christiane and Lankeit, Elisa and Ruge, Johanna and Schürmann, Mirko}, editor={Hochmuth, Reinhard and Biehler, Rolf and Liebendörfer, Michael and Schaper, Niclas}, year={2022}, pages={33–65} }","mla":"Liebendörfer, Michael, et al. “Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik.” <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>, edited by Reinhard Hochmuth et al., Springer, 2022, pp. 33–65, doi:<a href=\"https://doi.org/10.1007/978-3-662-64833-9_2\">10.1007/978-3-662-64833-9_2</a>.","ama":"Liebendörfer M, Hochmuth R, Biehler R, et al. Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik. In: Hochmuth R, Biehler R, Liebendörfer M, Schaper N, eds. <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>. Springer; 2022:33-65. doi:<a href=\"https://doi.org/10.1007/978-3-662-64833-9_2\">10.1007/978-3-662-64833-9_2</a>","chicago":"Liebendörfer, Michael, Reinhard Hochmuth, Rolf Biehler, Niclas Schaper, Christiane Büdenbender-Kuklinski, Elisa Lankeit, Johanna Ruge, and Mirko Schürmann. “Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik.” In <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>, edited by Reinhard Hochmuth, Rolf Biehler, Michael Liebendörfer, and Niclas Schaper, 33–65. Berlin, Heidelberg: Springer, 2022. <a href=\"https://doi.org/10.1007/978-3-662-64833-9_2\">https://doi.org/10.1007/978-3-662-64833-9_2</a>.","ieee":"M. Liebendörfer <i>et al.</i>, “Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik,” in <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>, R. Hochmuth, R. Biehler, M. Liebendörfer, and N. Schaper, Eds. Berlin, Heidelberg: Springer, 2022, pp. 33–65."},"publication_identifier":{"issn":["2197-8751","2197-876X"],"isbn":["9783662648322","9783662648339"]},"publication_status":"published","_id":"42654","department":[{"_id":"363"},{"_id":"625"}],"user_id":"37888","editor":[{"last_name":"Hochmuth","full_name":"Hochmuth, Reinhard","first_name":"Reinhard"},{"last_name":"Biehler","full_name":"Biehler, Rolf","first_name":"Rolf"},{"last_name":"Liebendörfer","full_name":"Liebendörfer, Michael","first_name":"Michael"},{"last_name":"Schaper","full_name":"Schaper, Niclas","first_name":"Niclas"}],"status":"public","type":"book_chapter","title":"Ein Rahmenmodell für hochschuldidaktische Maßnahmen in der Mathematik","publisher":"Springer","date_created":"2023-03-02T10:47:45Z","year":"2022","language":[{"iso":"ger"}],"publication":"Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse"},{"citation":{"apa":"Wessel, L., &#38; Leuders, T. (2022). Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory. In R. Biehler, M. Liebendörfer, G. Gueudet, C. Rasmussen, &#38; C. Winslow (Eds.), <i>Practice-Oriented Research in Tertiary Mathematics Education</i> (pp. 349–368). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-031-14175-1_17\">https://doi.org/10.1007/978-3-031-14175-1_17</a>","bibtex":"@inbook{Wessel_Leuders_2022, place={Cham}, title={Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-14175-1_17\">10.1007/978-3-031-14175-1_17</a>}, booktitle={Practice-Oriented Research in Tertiary Mathematics Education}, publisher={Springer International Publishing}, author={Wessel, Lena and Leuders, Timo}, editor={Biehler, Rolf and Liebendörfer, Michael and Gueudet, G. and Rasmussen, C. and Winslow, C.}, year={2022}, pages={349–368} }","mla":"Wessel, Lena, and Timo Leuders. “Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory.” <i>Practice-Oriented Research in Tertiary Mathematics Education</i>, edited by Rolf Biehler et al., Springer International Publishing, 2022, pp. 349–68, doi:<a href=\"https://doi.org/10.1007/978-3-031-14175-1_17\">10.1007/978-3-031-14175-1_17</a>.","short":"L. Wessel, T. Leuders, in: R. Biehler, M. Liebendörfer, G. Gueudet, C. Rasmussen, C. Winslow (Eds.), Practice-Oriented Research in Tertiary Mathematics Education, Springer International Publishing, Cham, 2022, pp. 349–368.","ama":"Wessel L, Leuders T. Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory. In: Biehler R, Liebendörfer M, Gueudet G, Rasmussen C, Winslow C, eds. <i>Practice-Oriented Research in Tertiary Mathematics Education</i>. Springer International Publishing; 2022:349-368. doi:<a href=\"https://doi.org/10.1007/978-3-031-14175-1_17\">10.1007/978-3-031-14175-1_17</a>","chicago":"Wessel, Lena, and Timo Leuders. “Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory.” In <i>Practice-Oriented Research in Tertiary Mathematics Education</i>, edited by Rolf Biehler, Michael Liebendörfer, G. Gueudet, C. Rasmussen, and C. Winslow, 349–68. Cham: Springer International Publishing, 2022. <a href=\"https://doi.org/10.1007/978-3-031-14175-1_17\">https://doi.org/10.1007/978-3-031-14175-1_17</a>.","ieee":"L. Wessel and T. Leuders, “Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory,” in <i>Practice-Oriented Research in Tertiary Mathematics Education</i>, R. Biehler, M. Liebendörfer, G. Gueudet, C. Rasmussen, and C. Winslow, Eds. Cham: Springer International Publishing, 2022, pp. 349–368."},"page":"349-368","place":"Cham","year":"2022","publication_status":"published","publication_identifier":{"issn":["1869-4918","1869-4926"],"isbn":["9783031141744","9783031141751"]},"doi":"10.1007/978-3-031-14175-1_17","title":"Profession-Specific Curriculum Design in Mathematics Teacher Education: Connecting Disciplinary Practice to the Learning of Group Theory","author":[{"id":"85190","full_name":"Wessel, Lena","last_name":"Wessel","first_name":"Lena"},{"full_name":"Leuders, Timo","last_name":"Leuders","first_name":"Timo"}],"date_created":"2023-07-26T10:34:02Z","date_updated":"2024-04-18T10:14:09Z","publisher":"Springer International Publishing","status":"public","editor":[{"last_name":"Biehler","full_name":"Biehler, Rolf","first_name":"Rolf"},{"last_name":"Liebendörfer","full_name":"Liebendörfer, Michael","first_name":"Michael"},{"last_name":"Gueudet","full_name":"Gueudet, G.","first_name":"G."},{"full_name":"Rasmussen, C.","last_name":"Rasmussen","first_name":"C."},{"first_name":"C.","full_name":"Winslow, C.","last_name":"Winslow"}],"type":"book_chapter","publication":"Practice-Oriented Research in Tertiary Mathematics Education","language":[{"iso":"eng"}],"user_id":"37888","department":[{"_id":"643"}],"_id":"46160"},{"language":[{"iso":"eng"}],"user_id":"85819","department":[{"_id":"98"}],"_id":"53052","status":"public","editor":[{"last_name":"Trigueros","full_name":"Trigueros, Maria","first_name":"Maria"},{"first_name":"Berta","full_name":"Baerquero, Berta","last_name":"Baerquero"},{"first_name":"Reinhard","last_name":"Hochmuth","full_name":"Hochmuth, Reinhard"},{"full_name":"Peters, Jana","last_name":"Peters","first_name":"Jana"}],"type":"conference","publication":"Fourth conference of the International Network for Didactic Research in University Mathematics","conference":{"location":"Hannover"},"title":"Self-regulated learning in a mathematics course for engineers in the first semester: insights into students reported resource management and cognitive strategies","date_created":"2024-03-27T09:14:58Z","author":[{"last_name":"Kolbe","id":"85819","full_name":"Kolbe, Tim","first_name":"Tim"},{"first_name":"Lena","id":"85190","full_name":"Wessel, Lena","last_name":"Wessel"}],"date_updated":"2024-04-26T08:17:14Z","citation":{"ieee":"T. Kolbe and L. Wessel, “Self-regulated learning in a mathematics course for engineers in the first semester: insights into students reported resource management and cognitive strategies,” in <i>Fourth conference of the International Network for Didactic Research in University Mathematics</i>, Hannover, 2022, pp. 632–641.","chicago":"Kolbe, Tim, and Lena Wessel. “Self-Regulated Learning in a Mathematics Course for Engineers in the First Semester: Insights into Students Reported Resource Management and Cognitive Strategies.” In <i>Fourth Conference of the International Network for Didactic Research in University Mathematics</i>, edited by Maria Trigueros, Berta Baerquero, Reinhard Hochmuth, and Jana Peters, 632–41, 2022.","ama":"Kolbe T, Wessel L. Self-regulated learning in a mathematics course for engineers in the first semester: insights into students reported resource management and cognitive strategies. In: Trigueros M, Baerquero B, Hochmuth R, Peters J, eds. <i>Fourth Conference of the International Network for Didactic Research in University Mathematics</i>. ; 2022:632-641.","bibtex":"@inproceedings{Kolbe_Wessel_2022, title={Self-regulated learning in a mathematics course for engineers in the first semester: insights into students reported resource management and cognitive strategies}, booktitle={Fourth conference of the International Network for Didactic Research in University Mathematics}, author={Kolbe, Tim and Wessel, Lena}, editor={Trigueros, Maria and Baerquero, Berta and Hochmuth, Reinhard and Peters, Jana}, year={2022}, pages={632–641} }","mla":"Kolbe, Tim, and Lena Wessel. “Self-Regulated Learning in a Mathematics Course for Engineers in the First Semester: Insights into Students Reported Resource Management and Cognitive Strategies.” <i>Fourth Conference of the International Network for Didactic Research in University Mathematics</i>, edited by Maria Trigueros et al., 2022, pp. 632–41.","short":"T. Kolbe, L. Wessel, in: M. Trigueros, B. Baerquero, R. Hochmuth, J. Peters (Eds.), Fourth Conference of the International Network for Didactic Research in University Mathematics, 2022, pp. 632–641.","apa":"Kolbe, T., &#38; Wessel, L. (2022). Self-regulated learning in a mathematics course for engineers in the first semester: insights into students reported resource management and cognitive strategies. In M. Trigueros, B. Baerquero, R. Hochmuth, &#38; J. Peters (Eds.), <i>Fourth conference of the International Network for Didactic Research in University Mathematics</i> (pp. 632–641)."},"page":"632-641","year":"2022"},{"publication_status":"published","publication_identifier":{"issn":["2197-8751","2197-876X"],"isbn":["9783662648322","9783662648339"]},"place":"Berlin, Heidelberg","year":"2022","citation":{"bibtex":"@inbook{Schürmann_Liebendörfer_Büdenbender-Kuklinski_Lankeit_Ruge_Schaper_Biehler_Hochmuth_2022, place={Berlin, Heidelberg}, title={Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-64833-9_3\">10.1007/978-3-662-64833-9_3</a>}, booktitle={Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse}, publisher={Springer}, author={Schürmann, Mirko and Liebendörfer, Michael and Büdenbender-Kuklinski, Christiane and Lankeit, Elisa and Ruge, Johanna and Schaper, Niclas and Biehler, Rolf and Hochmuth, Reinhard}, editor={Hochmuth, Reinhard and Biehler, Rolf and Liebendörfer, Michael and Schaper, Niclas}, year={2022}, pages={67–113} }","mla":"Schürmann, Mirko, et al. “Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen.” <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>, edited by Reinhard Hochmuth et al., Springer, 2022, pp. 67–113, doi:<a href=\"https://doi.org/10.1007/978-3-662-64833-9_3\">10.1007/978-3-662-64833-9_3</a>.","short":"M. Schürmann, M. Liebendörfer, C. Büdenbender-Kuklinski, E. Lankeit, J. Ruge, N. Schaper, R. Biehler, R. Hochmuth, in: R. Hochmuth, R. Biehler, M. Liebendörfer, N. Schaper (Eds.), Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse, Springer, Berlin, Heidelberg, 2022, pp. 67–113.","apa":"Schürmann, M., Liebendörfer, M., Büdenbender-Kuklinski, C., Lankeit, E., Ruge, J., Schaper, N., Biehler, R., &#38; Hochmuth, R. (2022). Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen. In R. Hochmuth, R. Biehler, M. Liebendörfer, &#38; N. Schaper (Eds.), <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i> (pp. 67–113). Springer. <a href=\"https://doi.org/10.1007/978-3-662-64833-9_3\">https://doi.org/10.1007/978-3-662-64833-9_3</a>","ama":"Schürmann M, Liebendörfer M, Büdenbender-Kuklinski C, et al. Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen. In: Hochmuth R, Biehler R, Liebendörfer M, Schaper N, eds. <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>. Springer; 2022:67-113. doi:<a href=\"https://doi.org/10.1007/978-3-662-64833-9_3\">10.1007/978-3-662-64833-9_3</a>","ieee":"M. Schürmann <i>et al.</i>, “Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen,” in <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>, R. Hochmuth, R. Biehler, M. Liebendörfer, and N. Schaper, Eds. Berlin, Heidelberg: Springer, 2022, pp. 67–113.","chicago":"Schürmann, Mirko, Michael Liebendörfer, Christiane Büdenbender-Kuklinski, Elisa Lankeit, Johanna Ruge, Niclas Schaper, Rolf Biehler, and Reinhard Hochmuth. “Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen.” In <i>Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse</i>, edited by Reinhard Hochmuth, Rolf Biehler, Michael Liebendörfer, and Niclas Schaper, 67–113. Berlin, Heidelberg: Springer, 2022. <a href=\"https://doi.org/10.1007/978-3-662-64833-9_3\">https://doi.org/10.1007/978-3-662-64833-9_3</a>."},"page":"67-113","date_updated":"2024-04-30T13:38:57Z","oa":"1","publisher":"Springer","author":[{"id":"59707","full_name":"Schürmann, Mirko","orcid":"0000-0003-2646-085X","last_name":"Schürmann","first_name":"Mirko"},{"id":"30933","full_name":"Liebendörfer, Michael","orcid":"0000-0001-9887-2074","last_name":"Liebendörfer","first_name":"Michael"},{"full_name":"Büdenbender-Kuklinski, Christiane","last_name":"Büdenbender-Kuklinski","first_name":"Christiane"},{"first_name":"Elisa","last_name":"Lankeit","full_name":"Lankeit, Elisa"},{"first_name":"Johanna","full_name":"Ruge, Johanna","last_name":"Ruge"},{"full_name":"Schaper, Niclas","last_name":"Schaper","first_name":"Niclas"},{"id":"16274","full_name":"Biehler, Rolf","last_name":"Biehler","first_name":"Rolf"},{"first_name":"Reinhard","last_name":"Hochmuth","full_name":"Hochmuth, Reinhard"}],"date_created":"2023-03-02T10:50:19Z","title":"Evaluation von Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1007/978-3-662-64833-9_3"}],"doi":"10.1007/978-3-662-64833-9_3","type":"book_chapter","publication":"Unterstützungsmaßnahmen in mathematikbezogenen Studiengängen - Konzepte, Praxisbeispiele und Untersuchungsergebnisse","editor":[{"full_name":"Hochmuth, Reinhard","last_name":"Hochmuth","first_name":"Reinhard"},{"last_name":"Biehler","full_name":"Biehler, Rolf","first_name":"Rolf"},{"first_name":"Michael","full_name":"Liebendörfer, Michael","last_name":"Liebendörfer"},{"last_name":"Schaper","full_name":"Schaper, Niclas","first_name":"Niclas"}],"status":"public","_id":"42655","user_id":"30933","department":[{"_id":"363"},{"_id":"625"}],"language":[{"iso":"ger"}]},{"language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"913"}],"user_id":"99409","_id":"45334","status":"public","publication":"Applied Cognitive Psychology, ac3930","type":"journal_article","doi":"10.1002/acp.3930","title":"Effects of drawing instructions and strategic knowledge on mathematical modeling performance: Mediated by the use of the drawing strategy","volume":36,"author":[{"first_name":"Johanna","last_name":"Schönherr","full_name":"Schönherr, Johanna","id":"99409"},{"first_name":"S.","last_name":"Schukajlow","full_name":"Schukajlow, S."},{"last_name":"Blomberg","full_name":"Blomberg, J.","first_name":"J."},{"first_name":"C.","full_name":"Leopold, C.","last_name":"Leopold"}],"date_created":"2023-05-29T17:25:47Z","date_updated":"2024-05-02T07:56:23Z","intvolume":"        36","page":"402-417","citation":{"ieee":"J. Schönherr, S. Schukajlow, J. Blomberg, and C. Leopold, “Effects of drawing instructions and strategic knowledge on mathematical modeling performance: Mediated by the use of the drawing strategy,” <i>Applied Cognitive Psychology, ac3930</i>, vol. 36, no. 2, pp. 402–417, 2022, doi: <a href=\"https://doi.org/10.1002/acp.3930\">10.1002/acp.3930</a>.","chicago":"Schönherr, Johanna, S. Schukajlow, J. Blomberg, and C. Leopold. “Effects of Drawing Instructions and Strategic Knowledge on Mathematical Modeling Performance: Mediated by the Use of the Drawing Strategy.” <i>Applied Cognitive Psychology, Ac3930</i> 36, no. 2 (2022): 402–17. <a href=\"https://doi.org/10.1002/acp.3930\">https://doi.org/10.1002/acp.3930</a>.","ama":"Schönherr J, Schukajlow S, Blomberg J, Leopold C. Effects of drawing instructions and strategic knowledge on mathematical modeling performance: Mediated by the use of the drawing strategy. <i>Applied Cognitive Psychology, ac3930</i>. 2022;36(2):402-417. doi:<a href=\"https://doi.org/10.1002/acp.3930\">10.1002/acp.3930</a>","apa":"Schönherr, J., Schukajlow, S., Blomberg, J., &#38; Leopold, C. (2022). Effects of drawing instructions and strategic knowledge on mathematical modeling performance: Mediated by the use of the drawing strategy. <i>Applied Cognitive Psychology, Ac3930</i>, <i>36</i>(2), 402–417. <a href=\"https://doi.org/10.1002/acp.3930\">https://doi.org/10.1002/acp.3930</a>","bibtex":"@article{Schönherr_Schukajlow_Blomberg_Leopold_2022, title={Effects of drawing instructions and strategic knowledge on mathematical modeling performance: Mediated by the use of the drawing strategy}, volume={36}, DOI={<a href=\"https://doi.org/10.1002/acp.3930\">10.1002/acp.3930</a>}, number={2}, journal={Applied Cognitive Psychology, ac3930}, author={Schönherr, Johanna and Schukajlow, S. and Blomberg, J. and Leopold, C.}, year={2022}, pages={402–417} }","mla":"Schönherr, Johanna, et al. “Effects of Drawing Instructions and Strategic Knowledge on Mathematical Modeling Performance: Mediated by the Use of the Drawing Strategy.” <i>Applied Cognitive Psychology, Ac3930</i>, vol. 36, no. 2, 2022, pp. 402–17, doi:<a href=\"https://doi.org/10.1002/acp.3930\">10.1002/acp.3930</a>.","short":"J. Schönherr, S. Schukajlow, J. Blomberg, C. Leopold, Applied Cognitive Psychology, Ac3930 36 (2022) 402–417."},"year":"2022","issue":"2","publication_status":"published"},{"citation":{"short":"J. Schönherr, S. Schukajlow, C. Leopold, in: Proceedings of the 45th PME Conference, 2022, pp. 347–354.","bibtex":"@inproceedings{Schönherr_Schukajlow_Leopold_2022, title={Drawing instructions, strategic knowledge, strategy-based motivation, and students’ use of drawings}, volume={3}, booktitle={Proceedings of the 45th PME Conference}, author={Schönherr, Johanna and Schukajlow, S. and Leopold, C.}, year={2022}, pages={347–354} }","mla":"Schönherr, Johanna, et al. “Drawing Instructions, Strategic Knowledge, Strategy-Based Motivation, and Students’ Use of Drawings.” <i>Proceedings of the 45th PME Conference</i>, vol. 3, 2022, pp. 347–354.","apa":"Schönherr, J., Schukajlow, S., &#38; Leopold, C. (2022). Drawing instructions, strategic knowledge, strategy-based motivation, and students’ use of drawings. <i>Proceedings of the 45th PME Conference</i>, <i>3</i>, 347–354.","ama":"Schönherr J, Schukajlow S, Leopold C. Drawing instructions, strategic knowledge, strategy-based motivation, and students’ use of drawings. In: <i>Proceedings of the 45th PME Conference</i>. Vol 3. ; 2022:347–354.","chicago":"Schönherr, Johanna, S. Schukajlow, and C. Leopold. “Drawing Instructions, Strategic Knowledge, Strategy-Based Motivation, and Students’ Use of Drawings.” In <i>Proceedings of the 45th PME Conference</i>, 3:347–354, 2022.","ieee":"J. Schönherr, S. Schukajlow, and C. Leopold, “Drawing instructions, strategic knowledge, strategy-based motivation, and students’ use of drawings,” in <i>Proceedings of the 45th PME Conference</i>, 2022, vol. 3, pp. 347–354."},"intvolume":"         3","page":"347–354","year":"2022","publication_status":"published","title":"Drawing instructions, strategic knowledge, strategy-based motivation, and students' use of drawings","author":[{"id":"99409","full_name":"Schönherr, Johanna","last_name":"Schönherr","first_name":"Johanna"},{"first_name":"S.","last_name":"Schukajlow","full_name":"Schukajlow, S."},{"last_name":"Leopold","full_name":"Leopold, C.","first_name":"C."}],"date_created":"2023-05-29T17:34:03Z","volume":3,"date_updated":"2024-05-02T07:56:41Z","status":"public","type":"conference","publication":"Proceedings of the 45th PME Conference","language":[{"iso":"eng"}],"extern":"1","user_id":"99409","department":[{"_id":"913"}],"_id":"45339"},{"year":"2022","citation":{"short":"F. Massacci, A. Sabetta, J. Mirkovic, T. Murray, H. Okhravi, M. Mannan, A. Rocha, E. Bodden, D.E. Geer, IEEE Security &#38;amp; Privacy 20 (2022) 16–21.","mla":"Massacci, Fabio, et al. “‘Free’ as in Freedom to Protest?” <i>IEEE Security &#38;amp; Privacy</i>, vol. 20, no. 5, Institute of Electrical and Electronics Engineers (IEEE), 2022, pp. 16–21, doi:<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>.","bibtex":"@article{Massacci_Sabetta_Mirkovic_Murray_Okhravi_Mannan_Rocha_Bodden_Geer_2022, title={“Free” as in Freedom to Protest?}, volume={20}, DOI={<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>}, number={5}, journal={IEEE Security &#38;amp; Privacy}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Massacci, Fabio and Sabetta, Antonino and Mirkovic, Jelena and Murray, Toby and Okhravi, Hamed and Mannan, Mohammad and Rocha, Anderson and Bodden, Eric and Geer, Daniel E.}, year={2022}, pages={16–21} }","apa":"Massacci, F., Sabetta, A., Mirkovic, J., Murray, T., Okhravi, H., Mannan, M., Rocha, A., Bodden, E., &#38; Geer, D. E. (2022). “Free” as in Freedom to Protest? <i>IEEE Security &#38;amp; Privacy</i>, <i>20</i>(5), 16–21. <a href=\"https://doi.org/10.1109/msec.2022.3185845\">https://doi.org/10.1109/msec.2022.3185845</a>","ieee":"F. Massacci <i>et al.</i>, “‘Free’ as in Freedom to Protest?,” <i>IEEE Security &#38;amp; Privacy</i>, vol. 20, no. 5, pp. 16–21, 2022, doi: <a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>.","chicago":"Massacci, Fabio, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, and Daniel E. Geer. “‘Free’ as in Freedom to Protest?” <i>IEEE Security &#38;amp; Privacy</i> 20, no. 5 (2022): 16–21. <a href=\"https://doi.org/10.1109/msec.2022.3185845\">https://doi.org/10.1109/msec.2022.3185845</a>.","ama":"Massacci F, Sabetta A, Mirkovic J, et al. “Free” as in Freedom to Protest? <i>IEEE Security &#38;amp; Privacy</i>. 2022;20(5):16-21. doi:<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>"},"page":"16-21","intvolume":"        20","publication_status":"published","publication_identifier":{"issn":["1540-7993","1558-4046"]},"issue":"5","title":"“Free” as in Freedom to Protest?","doi":"10.1109/msec.2022.3185845","date_updated":"2024-05-06T11:33:14Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","author":[{"last_name":"Massacci","full_name":"Massacci, Fabio","first_name":"Fabio"},{"full_name":"Sabetta, Antonino","last_name":"Sabetta","first_name":"Antonino"},{"first_name":"Jelena","full_name":"Mirkovic, Jelena","last_name":"Mirkovic"},{"last_name":"Murray","full_name":"Murray, Toby","first_name":"Toby"},{"last_name":"Okhravi","full_name":"Okhravi, Hamed","first_name":"Hamed"},{"last_name":"Mannan","full_name":"Mannan, Mohammad","first_name":"Mohammad"},{"full_name":"Rocha, Anderson","last_name":"Rocha","first_name":"Anderson"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Geer","full_name":"Geer, Daniel E.","first_name":"Daniel E."}],"date_created":"2024-05-06T11:32:59Z","volume":20,"status":"public","type":"journal_article","publication":"IEEE Security &amp; Privacy","language":[{"iso":"eng"}],"_id":"53952","user_id":"15249","department":[{"_id":"76"}]},{"publisher":"IEEE","date_updated":"2024-05-23T11:01:43Z","author":[{"full_name":"Siewert, Hendrik","last_name":"Siewert","first_name":"Hendrik"},{"full_name":"Kretschmer, Martin","last_name":"Kretschmer","first_name":"Martin"},{"full_name":"Niemietz, Marcus","last_name":"Niemietz","first_name":"Marcus"},{"full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"}],"date_created":"2024-05-23T10:49:19Z","title":"On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers","doi":"10.1109/spw54247.2022.9833880","publication_status":"published","year":"2022","citation":{"chicago":"Siewert, Hendrik, Martin Kretschmer, Marcus Niemietz, and Juraj Somorovsky. “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers.” In <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">https://doi.org/10.1109/spw54247.2022.9833880</a>.","ieee":"H. Siewert, M. Kretschmer, M. Niemietz, and J. Somorovsky, “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers,” 2022, doi: <a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>.","ama":"Siewert H, Kretschmer M, Niemietz M, Somorovsky J. On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. In: <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>","short":"H. Siewert, M. Kretschmer, M. Niemietz, J. Somorovsky, in: 2022 IEEE Security and Privacy Workshops (SPW), IEEE, 2022.","mla":"Siewert, Hendrik, et al. “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers.” <i>2022 IEEE Security and Privacy Workshops (SPW)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>.","bibtex":"@inproceedings{Siewert_Kretschmer_Niemietz_Somorovsky_2022, title={On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers}, DOI={<a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>}, booktitle={2022 IEEE Security and Privacy Workshops (SPW)}, publisher={IEEE}, author={Siewert, Hendrik and Kretschmer, Martin and Niemietz, Marcus and Somorovsky, Juraj}, year={2022} }","apa":"Siewert, H., Kretschmer, M., Niemietz, M., &#38; Somorovsky, J. (2022). On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. <a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">https://doi.org/10.1109/spw54247.2022.9833880</a>"},"_id":"54435","user_id":"74619","department":[{"_id":"632"}],"language":[{"iso":"eng"}],"type":"conference","publication":"2022 IEEE Security and Privacy Workshops (SPW)","abstract":[{"lang":"eng","text":"Web browsers are among the most important but also complex software solutions to access the web. It is therefore not surprising that web browsers are an attractive target for attackers. Especially in the last decade, security researchers and browser vendors have developed sandboxing mechanisms like security-relevant HTTP headers to tackle the problem of getting a more secure browser. Although the security community is aware of the importance of security-relevant HTTP headers, legacy applications and individual requests from different parties have led to possible insecure configurations of these headers. Even if specific security headers are configured correctly, conflicts in their functionalities may lead to unforeseen browser behaviors and vulnerabilities. Recently, the first work which analyzed duplicated headers and conflicts in headers was published by Calzavara et al. at USENIX Security [1]. The authors focused on inconsistent protections by using both, the HTTP header X-Frame-Options and the framing protection of the Content-Security-Policy. We extend their work by analyzing browser behaviors when parsing duplicated headers, conflicting directives, and values that do not conform to the defined ABNF metalanguage specification. We created an open-source testbed running over 19,800 test cases, at which nearly 300 test cases are executed in the set of 66 different browsers. Our work shows that browsers conform to the specification and behave securely. However, all tested browsers behave differently when it comes, for example, to parsing the Strict-Transport-Security header. Moreover, Chrome, Safari, and Firefox behave differently if the header contains a character, which is not allowed by the defined ABNF. This results in the protection mechanism being fully enforced, partially enforced, or not enforced and thus completely bypassable."}],"status":"public"},{"date_updated":"2024-05-26T19:13:09Z","oa":"1","publisher":"ACM","date_created":"2022-01-12T10:22:53Z","author":[{"first_name":"Stefan","full_name":"Heindorf, Stefan","id":"11871","last_name":"Heindorf","orcid":"0000-0002-4525-6865"},{"last_name":"Blübaum","full_name":"Blübaum, Lukas","first_name":"Lukas"},{"full_name":"Düsterhus, Nick","last_name":"Düsterhus","first_name":"Nick"},{"first_name":"Till","last_name":"Werner","full_name":"Werner, Till"},{"last_name":"Golani","full_name":"Golani, Varun Nandkumar","first_name":"Varun Nandkumar"},{"first_name":"Caglar","last_name":"Demir","full_name":"Demir, Caglar","id":"43817"},{"last_name":"Ngonga Ngomo","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille","first_name":"Axel-Cyrille"}],"title":"EvoLearner: Learning Description Logics with Evolutionary Algorithms","doi":"10.1145/3485447.3511925","main_file_link":[{"url":"https://arxiv.org/abs/2111.04879","open_access":"1"}],"year":"2022","page":"818-828","citation":{"bibtex":"@inproceedings{Heindorf_Blübaum_Düsterhus_Werner_Golani_Demir_Ngonga Ngomo_2022, title={EvoLearner: Learning Description Logics with Evolutionary Algorithms}, DOI={<a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>}, booktitle={WWW}, publisher={ACM}, author={Heindorf, Stefan and Blübaum, Lukas and Düsterhus, Nick and Werner, Till and Golani, Varun Nandkumar and Demir, Caglar and Ngonga Ngomo, Axel-Cyrille}, year={2022}, pages={818–828} }","short":"S. Heindorf, L. Blübaum, N. Düsterhus, T. Werner, V.N. Golani, C. Demir, A.-C. Ngonga Ngomo, in: WWW, ACM, 2022, pp. 818–828.","mla":"Heindorf, Stefan, et al. “EvoLearner: Learning Description Logics with Evolutionary Algorithms.” <i>WWW</i>, ACM, 2022, pp. 818–28, doi:<a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>.","apa":"Heindorf, S., Blübaum, L., Düsterhus, N., Werner, T., Golani, V. N., Demir, C., &#38; Ngonga Ngomo, A.-C. (2022). EvoLearner: Learning Description Logics with Evolutionary Algorithms. <i>WWW</i>, 818–828. <a href=\"https://doi.org/10.1145/3485447.3511925\">https://doi.org/10.1145/3485447.3511925</a>","chicago":"Heindorf, Stefan, Lukas Blübaum, Nick Düsterhus, Till Werner, Varun Nandkumar Golani, Caglar Demir, and Axel-Cyrille Ngonga Ngomo. “EvoLearner: Learning Description Logics with Evolutionary Algorithms.” In <i>WWW</i>, 818–28. ACM, 2022. <a href=\"https://doi.org/10.1145/3485447.3511925\">https://doi.org/10.1145/3485447.3511925</a>.","ieee":"S. Heindorf <i>et al.</i>, “EvoLearner: Learning Description Logics with Evolutionary Algorithms,” in <i>WWW</i>, 2022, pp. 818–828, doi: <a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>.","ama":"Heindorf S, Blübaum L, Düsterhus N, et al. EvoLearner: Learning Description Logics with Evolutionary Algorithms. In: <i>WWW</i>. ACM; 2022:818-828. doi:<a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>"},"_id":"29290","department":[{"_id":"574"}],"user_id":"11871","language":[{"iso":"eng"}],"publication":"WWW","type":"conference","abstract":[{"text":"Classifying nodes in knowledge graphs is an important task, e.g., predicting\r\nmissing types of entities, predicting which molecules cause cancer, or\r\npredicting which drugs are promising treatment candidates. While black-box\r\nmodels often achieve high predictive performance, they are only post-hoc and\r\nlocally explainable and do not allow the learned model to be easily enriched\r\nwith domain knowledge. Towards this end, learning description logic concepts\r\nfrom positive and negative examples has been proposed. However, learning such\r\nconcepts often takes a long time and state-of-the-art approaches provide\r\nlimited support for literal data values, although they are crucial for many\r\napplications. In this paper, we propose EvoLearner - an evolutionary approach\r\nto learn ALCQ(D), which is the attributive language with complement (ALC)\r\npaired with qualified cardinality restrictions (Q) and data properties (D). We\r\ncontribute a novel initialization method for the initial population: starting\r\nfrom positive examples (nodes in the knowledge graph), we perform biased random\r\nwalks and translate them to description logic concepts. Moreover, we improve\r\nsupport for data properties by maximizing information gain when deciding where\r\nto split the data. We show that our approach significantly outperforms the\r\nstate of the art on the benchmarking framework SML-Bench for structured machine\r\nlearning. Our ablation study confirms that this is due to our novel\r\ninitialization method and support for data properties.","lang":"eng"}],"status":"public"},{"year":"2022","citation":{"ama":"Pestryakova S, Vollmers D, Sherif M, et al. CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications. <i>Scientific Data</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>","ieee":"S. Pestryakova <i>et al.</i>, “CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications,” <i>Scientific Data</i>, 2022, doi: <a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>.","chicago":"Pestryakova, Svetlana , Daniel Vollmers, Mohamed Sherif, Stefan Heindorf, Muhammad  Saleem, Diego Moussallem, and Axel-Cyrille Ngonga Ngomo. “CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications.” <i>Scientific Data</i>, 2022. <a href=\"https://doi.org/10.1038/s41597-022-01298-2\">https://doi.org/10.1038/s41597-022-01298-2</a>.","bibtex":"@article{Pestryakova_Vollmers_Sherif_Heindorf_Saleem_Moussallem_Ngonga Ngomo_2022, title={CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications}, DOI={<a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>}, journal={Scientific Data}, author={Pestryakova, Svetlana  and Vollmers, Daniel and Sherif, Mohamed and Heindorf, Stefan and Saleem, Muhammad  and Moussallem, Diego and Ngonga Ngomo, Axel-Cyrille}, year={2022} }","short":"S. Pestryakova, D. Vollmers, M. Sherif, S. Heindorf, M. Saleem, D. Moussallem, A.-C. Ngonga Ngomo, Scientific Data (2022).","mla":"Pestryakova, Svetlana, et al. “CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications.” <i>Scientific Data</i>, 2022, doi:<a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>.","apa":"Pestryakova, S., Vollmers, D., Sherif, M., Heindorf, S., Saleem, M., Moussallem, D., &#38; Ngonga Ngomo, A.-C. (2022). CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications. <i>Scientific Data</i>. <a href=\"https://doi.org/10.1038/s41597-022-01298-2\">https://doi.org/10.1038/s41597-022-01298-2</a>"},"title":"CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications","doi":"10.1038/s41597-022-01298-2","main_file_link":[{"url":"https://papers.dice-research.org/2022/NSDJ_CovidPubGraph/public.pdf","open_access":"1"}],"date_updated":"2024-05-26T19:14:21Z","oa":"1","author":[{"full_name":"Pestryakova, Svetlana ","last_name":"Pestryakova","first_name":"Svetlana "},{"first_name":"Daniel","full_name":"Vollmers, Daniel","last_name":"Vollmers"},{"first_name":"Mohamed","orcid":"https://orcid.org/0000-0002-9927-2203","last_name":"Sherif","full_name":"Sherif, Mohamed","id":"67234"},{"full_name":"Heindorf, Stefan","id":"11871","orcid":"0000-0002-4525-6865","last_name":"Heindorf","first_name":"Stefan"},{"last_name":"Saleem","full_name":"Saleem, Muhammad ","first_name":"Muhammad "},{"first_name":"Diego","id":"71635","full_name":"Moussallem, Diego","last_name":"Moussallem"},{"first_name":"Axel-Cyrille","last_name":"Ngonga Ngomo","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille"}],"date_created":"2022-02-15T16:59:29Z","status":"public","publication":"Scientific Data","type":"journal_article","language":[{"iso":"eng"}],"_id":"29851","department":[{"_id":"574"}],"user_id":"11871"},{"status":"public","type":"conference","alternative_title":["Increasing Perceived Control and Understanding"],"file_date_updated":"2024-05-30T18:04:31Z","user_id":"11871","department":[{"_id":"574"},{"_id":"760"}],"project":[{"grant_number":"438445824","name":"TRR 318 - B1: TRR 318 - Subproject B1","_id":"121"}],"_id":"34674","citation":{"chicago":"Sieger, Leonie Nora, Julia Hermann, Astrid Schomäcker, Stefan Heindorf, Christian Meske, Celine-Chiara Hey, and Ayşegül Doğangün. “User Involvement in Training Smart Home Agents.” In <i>International Conference on Human-Agent Interaction</i>. ACM, 2022. <a href=\"https://doi.org/10.1145/3527188.3561914\">https://doi.org/10.1145/3527188.3561914</a>.","ieee":"L. N. Sieger <i>et al.</i>, “User Involvement in Training Smart Home Agents,” presented at the HAI ’22: International Conference on Human-Agent Interaction, Christchurch, New Zealand, 2022, doi: <a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>.","ama":"Sieger LN, Hermann J, Schomäcker A, et al. User Involvement in Training Smart Home Agents. In: <i>International Conference on Human-Agent Interaction</i>. ACM; 2022. doi:<a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>","mla":"Sieger, Leonie Nora, et al. “User Involvement in Training Smart Home Agents.” <i>International Conference on Human-Agent Interaction</i>, ACM, 2022, doi:<a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>.","short":"L.N. Sieger, J. Hermann, A. Schomäcker, S. Heindorf, C. Meske, C.-C. Hey, A. Doğangün, in: International Conference on Human-Agent Interaction, ACM, 2022.","bibtex":"@inproceedings{Sieger_Hermann_Schomäcker_Heindorf_Meske_Hey_Doğangün_2022, title={User Involvement in Training Smart Home Agents}, DOI={<a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>}, booktitle={International Conference on Human-Agent Interaction}, publisher={ACM}, author={Sieger, Leonie Nora and Hermann, Julia and Schomäcker, Astrid and Heindorf, Stefan and Meske, Christian and Hey, Celine-Chiara and Doğangün, Ayşegül}, year={2022} }","apa":"Sieger, L. N., Hermann, J., Schomäcker, A., Heindorf, S., Meske, C., Hey, C.-C., &#38; Doğangün, A. (2022). User Involvement in Training Smart Home Agents. <i>International Conference on Human-Agent Interaction</i>. HAI ’22: International Conference on Human-Agent Interaction, Christchurch, New Zealand. <a href=\"https://doi.org/10.1145/3527188.3561914\">https://doi.org/10.1145/3527188.3561914</a>"},"publication_status":"published","has_accepted_license":"1","main_file_link":[{"open_access":"1","url":"https://papers.dice-research.org/2022/HAI_SmartHome/User_Involvement_in_Training_Smart_Home_Agents_public.pdf"}],"doi":"10.1145/3527188.3561914","conference":{"end_date":"2022-12-08","location":"Christchurch, New Zealand","name":"HAI '22: International Conference on Human-Agent Interaction","start_date":"2022-12-05"},"author":[{"first_name":"Leonie Nora","last_name":"Sieger","id":"93402","full_name":"Sieger, Leonie Nora"},{"first_name":"Julia","full_name":"Hermann, Julia","last_name":"Hermann"},{"last_name":"Schomäcker","full_name":"Schomäcker, Astrid","first_name":"Astrid"},{"first_name":"Stefan","id":"11871","full_name":"Heindorf, Stefan","last_name":"Heindorf","orcid":"0000-0002-4525-6865"},{"first_name":"Christian","last_name":"Meske","full_name":"Meske, Christian"},{"first_name":"Celine-Chiara","last_name":"Hey","full_name":"Hey, Celine-Chiara"},{"first_name":"Ayşegül","full_name":"Doğangün, Ayşegül","last_name":"Doğangün"}],"oa":"1","date_updated":"2024-05-30T18:04:45Z","file":[{"date_updated":"2024-05-30T18:04:31Z","date_created":"2024-05-30T18:04:31Z","creator":"heindorf","file_size":1151728,"file_id":"54524","file_name":"User_Involvement_in_Training_Smart_Home_Agents_public.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"lang":"eng","text":"Smart home systems contain plenty of features that enhance wellbeing in everyday life through artificial intelligence (AI). However, many users feel insecure because they do not understand the AI’s functionality and do not feel they are in control of it. Combining technical, psychological and philosophical views on AI, we rethink smart homes as interactive systems where users can partake in an intelligent agent’s learning. Parallel to the goals of explainable AI (XAI), we explored the possibility of user involvement in supervised learning of the smart home to have a first approach to improve acceptance, support subjective understanding and increase perceived control. In this work, we conducted two studies: In an online pre-study, we asked participants about their attitude towards teaching AI via a questionnaire. In the main study, we performed a Wizard of Oz laboratory experiment with human participants, where participants spent time in a prototypical smart home and taught activity recognition to the intelligent agent through supervised learning based on the user’s behaviour. We found that involvement in the AI’s learning phase enhanced the users’ feeling of control, perceived understanding and perceived usefulness of AI in general. The participants reported positive attitudes towards training a smart home AI and found the process understandable and controllable. We suggest that involving the user in the learning phase could lead to better personalisation and increased understanding and control by users of intelligent agents for smart home automation."}],"publication":"International Conference on Human-Agent Interaction","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["human-agent interaction","smart homes","supervised learning","participation"],"year":"2022","quality_controlled":"1","title":"User Involvement in Training Smart Home Agents","date_created":"2022-12-21T09:48:43Z","publisher":"ACM"},{"citation":{"mla":"Tirtarasa, Satyadharma, and Anni-Yasmin Turhan. “Computing Generalizations of Temporal ΕL Concepts with next and Global.” <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>, edited by Jiman Hong et al., ACM, 2022, pp. 903–910, doi:<a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>.","short":"S. Tirtarasa, A.-Y. Turhan, in: J. Hong, M. Bures, J.W. Park, T. Cerný (Eds.), SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022, ACM, 2022, pp. 903–910.","bibtex":"@inproceedings{Tirtarasa_Turhan_2022, title={Computing generalizations of temporal ϵL concepts with next and global}, DOI={<a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>}, booktitle={SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022}, publisher={ACM}, author={Tirtarasa, Satyadharma and Turhan, Anni-Yasmin}, editor={Hong, Jiman and Bures, Miroslav and Park, Juw Won and Cerný, Tomás}, year={2022}, pages={903–910} }","apa":"Tirtarasa, S., &#38; Turhan, A.-Y. (2022). Computing generalizations of temporal ϵL concepts with next and global. In J. Hong, M. Bures, J. W. Park, &#38; T. Cerný (Eds.), <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i> (pp. 903–910). ACM. <a href=\"https://doi.org/10.1145/3477314.3507136\">https://doi.org/10.1145/3477314.3507136</a>","ama":"Tirtarasa S, Turhan A-Y. Computing generalizations of temporal ϵL concepts with next and global. In: Hong J, Bures M, Park JW, Cerný T, eds. <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>. ACM; 2022:903–910. doi:<a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>","ieee":"S. Tirtarasa and A.-Y. Turhan, “Computing generalizations of temporal ϵL concepts with next and global,” in <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>, 2022, pp. 903–910, doi: <a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>.","chicago":"Tirtarasa, Satyadharma, and Anni-Yasmin Turhan. “Computing Generalizations of Temporal ΕL Concepts with next and Global.” In <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>, edited by Jiman Hong, Miroslav Bures, Juw Won Park, and Tomás Cerný, 903–910. ACM, 2022. <a href=\"https://doi.org/10.1145/3477314.3507136\">https://doi.org/10.1145/3477314.3507136</a>."},"page":"903–910","year":"2022","author":[{"last_name":"Tirtarasa","full_name":"Tirtarasa, Satyadharma","first_name":"Satyadharma"},{"first_name":"Anni-Yasmin","full_name":"Turhan, Anni-Yasmin","id":"104470","last_name":"Turhan"}],"date_created":"2024-03-26T10:54:20Z","publisher":"ACM","date_updated":"2024-06-03T08:07:35Z","doi":"10.1145/3477314.3507136","title":"Computing generalizations of temporal ϵL concepts with next and global","type":"conference","publication":"SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022","status":"public","editor":[{"last_name":"Hong","full_name":"Hong, Jiman","first_name":"Jiman"},{"last_name":"Bures","full_name":"Bures, Miroslav","first_name":"Miroslav"},{"full_name":"Park, Juw Won","last_name":"Park","first_name":"Juw Won"},{"first_name":"Tomás","last_name":"Cerný","full_name":"Cerný, Tomás"}],"user_id":"9503","department":[{"_id":"888"}],"_id":"52924","language":[{"iso":"eng"}]},{"status":"public","publication":"Theory Pract. Log. Program.","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"888"}],"user_id":"9503","_id":"52918","page":"162–192","intvolume":"        22","citation":{"apa":"Baader, F., Koopmann, P., Michel, F., Turhan, A.-Y., &#38; Zarrieß, B. (2022). Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner. <i>Theory Pract. Log. Program.</i>, <i>22</i>(2), 162–192. <a href=\"https://doi.org/10.1017/S1471068421000466\">https://doi.org/10.1017/S1471068421000466</a>","bibtex":"@article{Baader_Koopmann_Michel_Turhan_Zarrieß_2022, title={Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner}, volume={22}, DOI={<a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>}, number={2}, journal={Theory Pract. Log. Program.}, author={Baader, Franz and Koopmann, Patrick and Michel, Friedrich and Turhan, Anni-Yasmin and Zarrieß, Benjamin}, year={2022}, pages={162–192} }","short":"F. Baader, P. Koopmann, F. Michel, A.-Y. Turhan, B. Zarrieß, Theory Pract. Log. Program. 22 (2022) 162–192.","mla":"Baader, Franz, et al. “Efficient TBox Reasoning with Value Restrictions Using the Flower Reasoner.” <i>Theory Pract. Log. Program.</i>, vol. 22, no. 2, 2022, pp. 162–192, doi:<a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>.","ama":"Baader F, Koopmann P, Michel F, Turhan A-Y, Zarrieß B. Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner. <i>Theory Pract Log Program</i>. 2022;22(2):162–192. doi:<a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>","ieee":"F. Baader, P. Koopmann, F. Michel, A.-Y. Turhan, and B. Zarrieß, “Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner,” <i>Theory Pract. Log. Program.</i>, vol. 22, no. 2, pp. 162–192, 2022, doi: <a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>.","chicago":"Baader, Franz, Patrick Koopmann, Friedrich Michel, Anni-Yasmin Turhan, and Benjamin Zarrieß. “Efficient TBox Reasoning with Value Restrictions Using the Flower Reasoner.” <i>Theory Pract. Log. Program.</i> 22, no. 2 (2022): 162–192. <a href=\"https://doi.org/10.1017/S1471068421000466\">https://doi.org/10.1017/S1471068421000466</a>."},"year":"2022","issue":"2","doi":"10.1017/S1471068421000466","title":"Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner","volume":22,"date_created":"2024-03-26T10:53:00Z","author":[{"full_name":"Baader, Franz","last_name":"Baader","first_name":"Franz"},{"last_name":"Koopmann","full_name":"Koopmann, Patrick","first_name":"Patrick"},{"full_name":"Michel, Friedrich","last_name":"Michel","first_name":"Friedrich"},{"first_name":"Anni-Yasmin","last_name":"Turhan","id":"104470","full_name":"Turhan, Anni-Yasmin"},{"first_name":"Benjamin","last_name":"Zarrieß","full_name":"Zarrieß, Benjamin"}],"date_updated":"2024-06-03T08:25:12Z"},{"title":"REBench: Microbenchmarking Framework for Relation Extraction Systems","doi":"10.1007/978-3-031-19433-7_37","publisher":"Springer International Publishing","date_updated":"2024-06-04T12:24:49Z","author":[{"first_name":"Ali","full_name":"Manzoor, Ali","id":"77309","last_name":"Manzoor"},{"first_name":"Muhammad","full_name":"Saleem, Muhammad","last_name":"Saleem"},{"first_name":"Axel-Cyrille","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille","last_name":"Ngonga Ngomo"}],"date_created":"2024-06-04T12:21:30Z","place":"Cham","year":"2022","citation":{"chicago":"Manzoor, Ali, Muhammad Saleem, and Axel-Cyrille Ngonga Ngomo. “REBench: Microbenchmarking Framework for Relation Extraction Systems.” In <i>The Semantic Web – ISWC 2022</i>. Cham: Springer International Publishing, 2022. <a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">https://doi.org/10.1007/978-3-031-19433-7_37</a>.","ieee":"A. Manzoor, M. Saleem, and A.-C. Ngonga Ngomo, “REBench: Microbenchmarking Framework for Relation Extraction Systems,” in <i>The Semantic Web – ISWC 2022</i>, Cham: Springer International Publishing, 2022.","ama":"Manzoor A, Saleem M, Ngonga Ngomo A-C. REBench: Microbenchmarking Framework for Relation Extraction Systems. In: <i>The Semantic Web – ISWC 2022</i>. Springer International Publishing; 2022. doi:<a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">10.1007/978-3-031-19433-7_37</a>","apa":"Manzoor, A., Saleem, M., &#38; Ngonga Ngomo, A.-C. (2022). REBench: Microbenchmarking Framework for Relation Extraction Systems. In <i>The Semantic Web – ISWC 2022</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">https://doi.org/10.1007/978-3-031-19433-7_37</a>","short":"A. Manzoor, M. Saleem, A.-C. Ngonga Ngomo, in: The Semantic Web – ISWC 2022, Springer International Publishing, Cham, 2022.","bibtex":"@inbook{Manzoor_Saleem_Ngonga Ngomo_2022, place={Cham}, title={REBench: Microbenchmarking Framework for Relation Extraction Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">10.1007/978-3-031-19433-7_37</a>}, booktitle={The Semantic Web – ISWC 2022}, publisher={Springer International Publishing}, author={Manzoor, Ali and Saleem, Muhammad and Ngonga Ngomo, Axel-Cyrille}, year={2022} }","mla":"Manzoor, Ali, et al. “REBench: Microbenchmarking Framework for Relation Extraction Systems.” <i>The Semantic Web – ISWC 2022</i>, Springer International Publishing, 2022, doi:<a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">10.1007/978-3-031-19433-7_37</a>."},"publication_status":"published","publication_identifier":{"isbn":["9783031194320","9783031194337"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"_id":"54585","user_id":"77309","department":[{"_id":"574"}],"status":"public","type":"book_chapter","publication":"The Semantic Web – ISWC 2022"},{"title":"If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers","publisher":"USENIX Association","date_updated":"2024-06-05T12:52:28Z","date_created":"2023-09-22T13:21:22Z","author":[{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Jan H.","last_name":"Klemmer","full_name":"Klemmer, Jan H."},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"year":"2022","page":"313–330","citation":{"mla":"Huaman, Nicolas, et al. “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.” <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, edited by Sonia Chiasson and Apu Kapadia, USENIX Association, 2022, pp. 313–330.","short":"N. Huaman, A. Krause, D. Wermke, J.H. Klemmer, C. Stransky, Y. Acar, S. Fahl, in: S. Chiasson, A. Kapadia (Eds.), Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022, USENIX Association, 2022, pp. 313–330.","bibtex":"@inproceedings{Huaman_Krause_Wermke_Klemmer_Stransky_Acar_Fahl_2022, title={If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers}, booktitle={Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022}, publisher={USENIX Association}, author={Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha}, editor={Chiasson, Sonia and Kapadia, Apu}, year={2022}, pages={313–330} }","apa":"Huaman, N., Krause, A., Wermke, D., Klemmer, J. H., Stransky, C., Acar, Y., &#38; Fahl, S. (2022). If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. In S. Chiasson &#38; A. Kapadia (Eds.), <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i> (pp. 313–330). USENIX Association.","ama":"Huaman N, Krause A, Wermke D, et al. If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. In: Chiasson S, Kapadia A, eds. <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>. USENIX Association; 2022:313–330.","ieee":"N. Huaman <i>et al.</i>, “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers,” in <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, 2022, pp. 313–330.","chicago":"Huaman, Nicolas, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, and Sascha Fahl. “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.” In <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, edited by Sonia Chiasson and Apu Kapadia, 313–330. USENIX Association, 2022."},"extern":"1","language":[{"iso":"eng"}],"_id":"47289","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","editor":[{"full_name":"Chiasson, Sonia","last_name":"Chiasson","first_name":"Sonia"},{"last_name":"Kapadia","full_name":"Kapadia, Apu","first_name":"Apu"}],"status":"public","publication":"Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022","type":"conference"},{"type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","status":"public","user_id":"14931","department":[{"_id":"858"}],"_id":"47844","language":[{"iso":"eng"}],"extern":"1","publication_status":"published","citation":{"ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>","ieee":"J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>.","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022} }","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>"},"year":"2022","date_created":"2023-10-06T16:12:30Z","author":[{"first_name":"Jan","last_name":"Jancar","full_name":"Jancar, Jan"},{"first_name":"Marcel","last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291"},{"first_name":"Daniel De Almeida","full_name":"Braga, Daniel De Almeida","last_name":"Braga"},{"first_name":"Mohamed","full_name":"Sabt, Mohamed","last_name":"Sabt"},{"full_name":"Schwabe, Peter","last_name":"Schwabe","first_name":"Peter"},{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"first_name":"Pierre-Alain","full_name":"Fouque, Pierre-Alain","last_name":"Fouque"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"publisher":"IEEE","date_updated":"2024-06-05T12:55:00Z","doi":"10.1109/sp46214.2022.9833713","title":"“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks"},{"language":[{"iso":"eng"}],"extern":"1","_id":"47286","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"status":"public","type":"conference","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","title":"How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study","doi":"10.1109/SP46214.2022.9833756","publisher":"IEEE","date_updated":"2024-06-05T12:53:00Z","author":[{"last_name":"Gutfleisch","full_name":"Gutfleisch, Marco","first_name":"Marco"},{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"first_name":"Niklas","last_name":"Busch","full_name":"Busch, Niklas"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Sasse","full_name":"Sasse, M. Angela","first_name":"M. Angela"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:18:54Z","year":"2022","citation":{"short":"M. Gutfleisch, J.H. Klemmer, N. Busch, Y. Acar, M.A. Sasse, S. Fahl, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 893–910.","mla":"Gutfleisch, Marco, et al. “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 893–910, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>.","bibtex":"@inproceedings{Gutfleisch_Klemmer_Busch_Acar_Sasse_Fahl_2022, title={How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Gutfleisch, Marco and Klemmer, Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2022}, pages={893–910} }","apa":"Gutfleisch, M., Klemmer, J. H., Busch, N., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2022). How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. <a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">https://doi.org/10.1109/SP46214.2022.9833756</a>","ama":"Gutfleisch M, Klemmer JH, Busch N, Acar Y, Sasse MA, Fahl S. How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:893–910. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>","ieee":"M. Gutfleisch, J. H. Klemmer, N. Busch, Y. Acar, M. A. Sasse, and S. Fahl, “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 893–910, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>.","chicago":"Gutfleisch, Marco, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">https://doi.org/10.1109/SP46214.2022.9833756</a>."},"page":"893–910"},{"doi":"10.1109/SP46214.2022.9833755","title":"27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University","author":[{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Oliver","full_name":"Wiese, Oliver","last_name":"Wiese"},{"first_name":"Volker","full_name":"Roth, Volker","last_name":"Roth"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:19:56Z","publisher":"IEEE","date_updated":"2024-06-05T12:53:20Z","page":"860–875","citation":{"ama":"Stransky C, Wiese O, Roth V, Acar Y, Fahl S. 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:860–875. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>","ieee":"C. Stransky, O. Wiese, V. Roth, Y. Acar, and S. Fahl, “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 860–875, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>.","chicago":"Stransky, Christian, Oliver Wiese, Volker Roth, Yasemin Acar, and Sascha Fahl. “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">https://doi.org/10.1109/SP46214.2022.9833755</a>.","short":"C. Stransky, O. Wiese, V. Roth, Y. Acar, S. Fahl, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 860–875.","mla":"Stransky, Christian, et al. “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 860–875, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>.","bibtex":"@inproceedings{Stransky_Wiese_Roth_Acar_Fahl_2022, title={27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Stransky, Christian and Wiese, Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={860–875} }","apa":"Stransky, C., Wiese, O., Roth, V., Acar, Y., &#38; Fahl, S. (2022). 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. <a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">https://doi.org/10.1109/SP46214.2022.9833755</a>"},"year":"2022","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47287","status":"public","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","type":"conference"},{"title":"Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples","date_updated":"2024-06-05T12:53:43Z","publisher":"USENIX Association","author":[{"last_name":"Kaur","full_name":"Kaur, Harjot","first_name":"Harjot"},{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"first_name":"Daniel","full_name":"Votipka, Daniel","last_name":"Votipka"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:17:23Z","year":"2022","citation":{"bibtex":"@inproceedings{Kaur_Amft_Votipka_Acar_Fahl_2022, title={Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples}, booktitle={31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022}, publisher={USENIX Association}, author={Kaur, Harjot and Amft, Sabrina and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha}, editor={Butler, Kevin R. B. and Thomas, Kurt}, year={2022}, pages={4041–4058} }","short":"H. Kaur, S. Amft, D. Votipka, Y. Acar, S. Fahl, in: K.R.B. Butler, K. Thomas (Eds.), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, USENIX Association, 2022, pp. 4041–4058.","mla":"Kaur, Harjot, et al. “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.” <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and Kurt Thomas, USENIX Association, 2022, pp. 4041–4058.","ama":"Kaur H, Amft S, Votipka D, Acar Y, Fahl S. Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. In: Butler KRB, Thomas K, eds. <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>. USENIX Association; 2022:4041–4058.","apa":"Kaur, H., Amft, S., Votipka, D., Acar, Y., &#38; Fahl, S. (2022). Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. In K. R. B. Butler &#38; K. Thomas (Eds.), <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i> (pp. 4041–4058). USENIX Association.","chicago":"Kaur, Harjot, Sabrina Amft, Daniel Votipka, Yasemin Acar, and Sascha Fahl. “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.” In <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and Kurt Thomas, 4041–4058. USENIX Association, 2022.","ieee":"H. Kaur, S. Amft, D. Votipka, Y. Acar, and S. Fahl, “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples,” in <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>, 2022, pp. 4041–4058."},"page":"4041–4058","language":[{"iso":"eng"}],"extern":"1","_id":"47283","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"editor":[{"first_name":"Kevin R. B.","last_name":"Butler","full_name":"Butler, Kevin R. B."},{"full_name":"Thomas, Kurt","last_name":"Thomas","first_name":"Kurt"}],"status":"public","type":"conference","publication":"31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022"},{"citation":{"apa":"Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2022). They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. <i>IEEE Secur. Priv.</i>, <i>20</i>(2), 49–60. <a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">https://doi.org/10.1109/MSEC.2021.3123795</a>","short":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, IEEE Secur. Priv. 20 (2022) 49–60.","bibtex":"@article{Huaman_Amft_Oltrogge_Acar_Fahl_2022, title={They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web}, volume={20}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>}, number={2}, journal={IEEE Secur. Priv.}, author={Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={49–60} }","mla":"Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web.” <i>IEEE Secur. Priv.</i>, vol. 20, no. 2, 2022, pp. 49–60, doi:<a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>.","ama":"Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. <i>IEEE Secur Priv</i>. 2022;20(2):49–60. doi:<a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>","chicago":"Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha Fahl. “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web.” <i>IEEE Secur. Priv.</i> 20, no. 2 (2022): 49–60. <a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">https://doi.org/10.1109/MSEC.2021.3123795</a>.","ieee":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web,” <i>IEEE Secur. Priv.</i>, vol. 20, no. 2, pp. 49–60, 2022, doi: <a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>."},"page":"49–60","intvolume":"        20","year":"2022","issue":"2","doi":"10.1109/MSEC.2021.3123795","title":"They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web","date_created":"2023-09-22T13:22:05Z","author":[{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"last_name":"Oltrogge","full_name":"Oltrogge, Marten","first_name":"Marten"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"volume":20,"date_updated":"2024-06-05T12:54:05Z","status":"public","type":"journal_article","publication":"IEEE Secur. Priv.","language":[{"iso":"eng"}],"extern":"1","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47290"}]
