[{"language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47296","status":"public","publication":"CoRR","type":"journal_article","doi":"10.48550/arXiv.2302.14326","title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","volume":"abs/2302.14326","date_created":"2023-09-22T13:25:55Z","author":[{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Loh","full_name":"Loh, Wulf","first_name":"Wulf"}],"date_updated":"2024-06-05T12:39:48Z","citation":{"ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. <i>CoRR</i>. 2023;abs/2302.14326. doi:<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. <i>CoRR</i>, <i>abs/2302.14326</i>. <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">https://doi.org/10.48550/arXiv.2302.14326</a>","bibtex":"@article{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, volume={abs/2302.14326}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>}, journal={CoRR}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, year={2023} }","short":"T. Kohno, Y. Acar, W. Loh, CoRR abs/2302.14326 (2023).","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>CoRR</i>, vol. abs/2302.14326, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>.","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” <i>CoRR</i>, vol. abs/2302.14326, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>CoRR</i> abs/2302.14326 (2023). <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">https://doi.org/10.48550/arXiv.2302.14326</a>."},"year":"2023"},{"citation":{"ama":"Amft S, Höltervennhoff S, Huaman N, Acar Y, Fahl S. “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In: Kelley PG, Kapadia A, eds. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:171–190.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, and Sascha Fahl. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, 171–190. USENIX Association, 2023.","ieee":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, and S. Fahl, “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 171–190.","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Acar, Y., &#38; Fahl, S. (2023). “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In P. G. Kelley &#38; A. Kapadia (Eds.), <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i> (pp. 171–190). USENIX Association.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Acar_Fahl_2023, title={“Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Acar, Yasemin and Fahl, Sascha}, editor={Kelley, Patrick Gage and Kapadia, Apu}, year={2023}, pages={171–190} }","short":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, S. Fahl, in: P.G. Kelley, A. Kapadia (Eds.), Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 171–190.","mla":"Amft, Sabrina, et al. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, USENIX Association, 2023, pp. 171–190."},"page":"171–190","year":"2023","author":[{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"first_name":"Sandra","full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:29:29Z","publisher":"USENIX Association","date_updated":"2024-06-05T12:44:28Z","title":"\"Would You Give the Same Priority to the Bank and a Game? I Do Not!\" Exploring Credential Management Strategies and Obstacles during Password Manager Setup","type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","status":"public","editor":[{"first_name":"Patrick Gage","full_name":"Kelley, Patrick Gage","last_name":"Kelley"},{"first_name":"Apu","last_name":"Kapadia","full_name":"Kapadia, Apu"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47305","language":[{"iso":"eng"}]},{"year":"2023","citation":{"mla":"Höltervennhoff, Sandra, et al. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Höltervennhoff_Klostermeyer_Wöhler_Acar_Fahl_2023, title={“I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Höltervennhoff, Sandra and Klostermeyer, Philip and Wöhler, Noah and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","apa":"Höltervennhoff, S., Klostermeyer, P., Wöhler, N., Acar, Y., &#38; Fahl, S. (2023). “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","ama":"Höltervennhoff S, Klostermeyer P, Wöhler N, Acar Y, Fahl S. “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","ieee":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, and S. Fahl, “‘I wouldn’t want my unsafe code to run my pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Höltervennhoff, Sandra, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, and Sascha Fahl. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023."},"title":"\"I wouldn’t want my unsafe code to run my pacemaker\": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust","date_updated":"2024-06-05T12:49:13Z","publisher":"USENIX Association","author":[{"first_name":"Sandra","full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff"},{"first_name":"Philip","last_name":"Klostermeyer","full_name":"Klostermeyer, Philip"},{"last_name":"Wöhler","full_name":"Wöhler, Noah","first_name":"Noah"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:27:45Z","editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"last_name":"Troncoso","full_name":"Troncoso, Carmela","first_name":"Carmela"}],"status":"public","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","type":"conference","language":[{"iso":"eng"}],"_id":"47301","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931"},{"publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","type":"conference","status":"public","editor":[{"first_name":"Joseph A.","full_name":"Calandrino, Joseph A.","last_name":"Calandrino"},{"full_name":"Troncoso, Carmela","last_name":"Troncoso","first_name":"Carmela"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47298","language":[{"iso":"eng"}],"citation":{"ama":"Mink J, Kaur H, Schmüser J, Fahl S, Acar Y. “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","chicago":"Mink, Jaron, Harjot Kaur, Juliane Schmüser, Sascha Fahl, and Yasemin Acar. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, and Y. Acar, “‘Security is not my field, I’m a stats guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","apa":"Mink, J., Kaur, H., Schmüser, J., Fahl, S., &#38; Acar, Y. (2023). “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","short":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, Y. Acar, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Mink, Jaron, et al. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","bibtex":"@inproceedings{Mink_Kaur_Schmüser_Fahl_Acar_2023, title={“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Mink, Jaron and Kaur, Harjot and Schmüser, Juliane and Fahl, Sascha and Acar, Yasemin}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }"},"year":"2023","date_created":"2023-09-22T13:26:37Z","author":[{"full_name":"Mink, Jaron","last_name":"Mink","first_name":"Jaron"},{"first_name":"Harjot","last_name":"Kaur","full_name":"Kaur, Harjot"},{"first_name":"Juliane","last_name":"Schmüser","full_name":"Schmüser, Juliane"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"date_updated":"2024-06-05T12:42:46Z","publisher":"USENIX Association","title":"\"Security is not my field, I’m a stats guy\": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry"},{"type":"conference","publication":"2023 IEEE Symposium on Security and Privacy (SP)","status":"public","user_id":"14931","department":[{"_id":"858"}],"_id":"47842","language":[{"iso":"eng"}],"extern":"1","publication_status":"published","citation":{"ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>.","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>"},"year":"2023","author":[{"last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291","first_name":"Marcel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2023-10-06T16:11:54Z","date_updated":"2024-06-05T12:44:03Z","publisher":"IEEE","doi":"10.1109/sp46215.2023.10179320","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security"},{"type":"journal_article","publication":"CoRR","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47295","language":[{"iso":"eng"}],"citation":{"chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i> abs/2306.09708 (2023). <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>.","ieee":"S. Amft <i>et al.</i>, “Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication,” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","mla":"Amft, Sabrina, et al. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, CoRR abs/2306.09708 (2023).","bibtex":"@article{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication}, volume={abs/2306.09708}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>}, journal={CoRR}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, year={2023} }","ama":"Amft S, Höltervennhoff S, Huaman N, et al. Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>. 2023;abs/2306.09708. doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>, <i>abs/2306.09708</i>. <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>"},"year":"2023","date_created":"2023-09-22T13:25:13Z","author":[{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"first_name":"Sandra","last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra"},{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"volume":"abs/2306.09708","date_updated":"2024-06-05T12:43:30Z","doi":"10.48550/arXiv.2306.09708","title":"Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication"},{"language":[{"iso":"eng"}],"_id":"47294","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"status":"public","type":"journal_article","publication":"CoRR","title":"S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit","doi":"10.48550/arXiv.2307.15642","date_updated":"2024-06-05T12:41:36Z","author":[{"last_name":"Tran","id":"99001","full_name":"Tran, Mindy","first_name":"Mindy"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Michel","full_name":"Cucker, Michel","last_name":"Cucker"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"last_name":"Kapravelos","full_name":"Kapravelos, Alexandros","first_name":"Alexandros"},{"full_name":"Kästner, Christian","last_name":"Kästner","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:55Z","volume":"abs/2307.15642","year":"2023","citation":{"apa":"Tran, M., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>, <i>abs/2307.15642</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>","bibtex":"@article{Tran_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit}, volume={abs/2307.15642}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>}, journal={CoRR}, author={Tran, Mindy and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"M. Tran, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.15642 (2023).","mla":"Tran, Mindy, et al. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","ama":"Tran M, Acar Y, Cucker M, et al. S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>. 2023;abs/2307.15642. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>","ieee":"M. Tran <i>et al.</i>, “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit,” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","chicago":"Tran, Mindy, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i> abs/2307.15642 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>."}},{"status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"_id":"47293","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","year":"2023","citation":{"ama":"Dunlap T, Acar Y, Cucker M, et al. S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2307.16557. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>","chicago":"Dunlap, Trevor, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2307.16557 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>.","ieee":"T. Dunlap <i>et al.</i>, “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","short":"T. Dunlap, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.16557 (2023).","bibtex":"@article{Dunlap_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-02: Industry Secure Supply Chain Summit}, volume={abs/2307.16557}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>}, journal={CoRR}, author={Dunlap, Trevor and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","mla":"Dunlap, Trevor, et al. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","apa":"Dunlap, T., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2307.16557</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>"},"title":"S3C2 Summit 2023-02: Industry Secure Supply Chain Summit","doi":"10.48550/arXiv.2307.16557","date_updated":"2024-06-05T12:41:59Z","volume":"abs/2307.16557","date_created":"2023-09-22T13:24:29Z","author":[{"first_name":"Trevor","full_name":"Dunlap, Trevor","last_name":"Dunlap"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Cucker, Michel","last_name":"Cucker","first_name":"Michel"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"first_name":"Christian","full_name":"Kästner, Christian","last_name":"Kästner"},{"first_name":"Laurie A.","full_name":"Williams, Laurie A.","last_name":"Williams"}]},{"citation":{"ama":"Enck W, Acar Y, Cukier M, Kapravelos A, Kästner C, Williams LA. S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2308.06850. doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>","ieee":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, and L. A. Williams, “S3C2 Summit 2023-06: Government Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","chicago":"Enck, William, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i> abs/2308.06850 (2023). <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>.","short":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2308.06850 (2023).","mla":"Enck, William, et al. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","bibtex":"@article{Enck_Acar_Cukier_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-06: Government Secure Supply Chain Summit}, volume={abs/2308.06850}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>}, journal={CoRR}, author={Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","apa":"Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2308.06850</i>. <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>"},"year":"2023","doi":"10.48550/arXiv.2308.06850","title":"S3C2 Summit 2023-06: Government Secure Supply Chain Summit","volume":"abs/2308.06850","date_created":"2023-09-22T13:23:45Z","author":[{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Cukier, Michel","last_name":"Cukier","first_name":"Michel"},{"first_name":"Alexandros","full_name":"Kapravelos, Alexandros","last_name":"Kapravelos"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"},{"first_name":"Laurie A.","full_name":"Williams, Laurie A.","last_name":"Williams"}],"date_updated":"2024-06-05T12:42:20Z","status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47292"},{"language":[{"iso":"eng"}],"_id":"47300","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","editor":[{"full_name":"Calandrino, Joseph A.","last_name":"Calandrino","first_name":"Joseph A."},{"last_name":"Troncoso","full_name":"Troncoso, Carmela","first_name":"Carmela"}],"status":"public","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","type":"conference","title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","publisher":"USENIX Association","date_updated":"2024-06-05T12:49:39Z","author":[{"last_name":"Kohno","full_name":"Kohno, Tadayoshi","first_name":"Tadayoshi"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"full_name":"Loh, Wulf","last_name":"Loh","first_name":"Wulf"}],"date_created":"2023-09-22T13:27:24Z","year":"2023","citation":{"chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"T. Kohno, Y. Acar, W. Loh, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }"}},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47312","status":"public","type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","title":"Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice","author":[{"full_name":"Neil, Lorenzo","last_name":"Neil","first_name":"Lorenzo"},{"first_name":"Harshini","last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843","id":"99000","full_name":"Sri Ramulu, Harshini"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Bradley","last_name":"Reaves","full_name":"Reaves, Bradley"}],"date_created":"2023-09-22T13:45:47Z","date_updated":"2024-06-05T12:50:02Z","publisher":"USENIX Association","citation":{"ama":"Neil L, Sri Ramulu H, Acar Y, Reaves B. Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. In: <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:283–299.","chicago":"Neil, Lorenzo, Harshini Sri Ramulu, Yasemin Acar, and Bradley Reaves. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299. USENIX Association, 2023.","ieee":"L. Neil, H. Sri Ramulu, Y. Acar, and B. Reaves, “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 283–299.","short":"L. Neil, H. Sri Ramulu, Y. Acar, B. Reaves, in: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 283–299.","mla":"Neil, Lorenzo, et al. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, USENIX Association, 2023, pp. 283–299.","bibtex":"@inproceedings{Neil_Sri Ramulu_Acar_Reaves_2023, title={Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Neil, Lorenzo and Sri Ramulu, Harshini and Acar, Yasemin and Reaves, Bradley}, year={2023}, pages={283–299} }","apa":"Neil, L., Sri Ramulu, H., Acar, Y., &#38; Reaves, B. (2023). Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299."},"page":"283–299","year":"2023"},{"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47291","language":[{"iso":"eng"}],"publication":"CoRR","type":"journal_article","status":"public","volume":"abs/2309.00744","author":[{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"first_name":"Marco","full_name":"Gutfleisch, Marco","last_name":"Gutfleisch"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Sasse, M. Angela","last_name":"Sasse","first_name":"M. Angela"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:23:22Z","date_updated":"2024-06-05T13:38:52Z","doi":"10.48550/arXiv.2309.00744","title":"\"Make Them Change it Every Week!\": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication","citation":{"mla":"Klemmer, Jan H., et al. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","short":"J.H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M.A. Sasse, S. Fahl, CoRR abs/2309.00744 (2023).","bibtex":"@article{Klemmer_Gutfleisch_Stransky_Acar_Sasse_Fahl_2023, title={“Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication}, volume={abs/2309.00744}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>}, journal={CoRR}, author={Klemmer, Jan H. and Gutfleisch, Marco and Stransky, Christian and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2023} }","apa":"Klemmer, J. H., Gutfleisch, M., Stransky, C., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2023). “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>, <i>abs/2309.00744</i>. <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>","ama":"Klemmer JH, Gutfleisch M, Stransky C, Acar Y, Sasse MA, Fahl S. “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>. 2023;abs/2309.00744. doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>","chicago":"Klemmer, Jan H., Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i> abs/2309.00744 (2023). <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>.","ieee":"J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, “‘Make Them Change it Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication,” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>."},"year":"2023"},{"language":[{"iso":"eng"}],"_id":"53362","user_id":"14931","department":[{"_id":"858"}],"editor":[{"first_name":"Weizhi","last_name":"Meng","full_name":"Meng, Weizhi"},{"last_name":"Jensen","full_name":"Jensen, Christian Damsgaard","first_name":"Christian Damsgaard"},{"last_name":"Cremers","full_name":"Cremers, Cas","first_name":"Cas"},{"first_name":"Engin","last_name":"Kirda","full_name":"Kirda, Engin"}],"status":"public","type":"conference","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023","title":"\"We’ve Disabled MFA for You\": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments","doi":"10.1145/3576915.3623180","date_updated":"2024-06-05T13:52:15Z","publisher":"ACM","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra","first_name":"Sandra"},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"full_name":"Simko, Lucy","last_name":"Simko","first_name":"Lucy"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2024-04-09T06:22:43Z","year":"2023","citation":{"apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In W. Meng, C. D. Jensen, C. Cremers, &#38; E. Kirda (Eds.), <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i> (pp. 3138–3152). ACM. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>","mla":"Amft, Sabrina, et al. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng et al., ACM, 2023, pp. 3138–3152, doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, in: W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, ACM, 2023, pp. 3138–3152.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={“We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}, publisher={ACM}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, editor={Meng, Weizhi and Jensen, Christian Damsgaard and Cremers, Cas and Kirda, Engin}, year={2023}, pages={3138–3152} }","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, 3138–3152. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>.","ieee":"S. Amft <i>et al.</i>, “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” in <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, 2023, pp. 3138–3152, doi: <a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In: Meng W, Jensen CD, Cremers C, Kirda E, eds. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>. ACM; 2023:3138–3152. doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>"},"page":"3138–3152"},{"title":"Securing Your Crypto-API Usage Through Tool Support - A Usability Study","doi":"10.1109/secdev56634.2023.00015","publisher":"IEEE","date_updated":"2024-06-05T13:51:00Z","date_created":"2023-12-04T11:07:08Z","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"full_name":"Reif, Michael","last_name":"Reif","first_name":"Michael"},{"first_name":"Anna-Katharina","last_name":"Wickert","full_name":"Wickert, Anna-Katharina"},{"first_name":"Sarah","last_name":"Nadi","full_name":"Nadi, Sarah"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"year":"2023","citation":{"bibtex":"@inproceedings{Krüger_Reif_Wickert_Nadi_Ali_Bodden_Acar_Mezini_Fahl_2023, title={Securing Your Crypto-API Usage Through Tool Support - A Usability Study}, DOI={<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>}, booktitle={2023 IEEE Secure Development Conference (SecDev)}, publisher={IEEE}, author={Krüger, Stefan and Reif, Michael and Wickert, Anna-Katharina and Nadi, Sarah and Ali, Karim and Bodden, Eric and Acar, Yasemin and Mezini, Mira and Fahl, Sascha}, year={2023} }","short":"S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.","mla":"Krüger, Stefan, et al. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” <i>2023 IEEE Secure Development Conference (SecDev)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","apa":"Krüger, S., Reif, M., Wickert, A.-K., Nadi, S., Ali, K., Bodden, E., Acar, Y., Mezini, M., &#38; Fahl, S. (2023). Securing Your Crypto-API Usage Through Tool Support - A Usability Study. <i>2023 IEEE Secure Development Conference (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>","ama":"Krüger S, Reif M, Wickert A-K, et al. Securing Your Crypto-API Usage Through Tool Support - A Usability Study. In: <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>","chicago":"Krüger, Stefan, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” In <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>.","ieee":"S. Krüger <i>et al.</i>, “Securing Your Crypto-API Usage Through Tool Support - A Usability Study,” 2023, doi: <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>."},"publication_status":"published","language":[{"iso":"eng"}],"_id":"49438","user_id":"14931","department":[{"_id":"76"},{"_id":"858"}],"status":"public","type":"conference","publication":"2023 IEEE Secure Development Conference (SecDev)"},{"language":[{"iso":"eng"}],"_id":"53368","department":[{"_id":"858"}],"user_id":"14931","status":"public","publication":"IEEE Security & Privacy","type":"journal_article","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","publisher":"IEEE","date_updated":"2024-06-05T13:53:18Z","volume":21,"date_created":"2024-04-09T07:14:43Z","author":[{"first_name":"Marcel","full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"year":"2023","intvolume":"        21","page":"59–63","citation":{"ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63."},"issue":"6"},{"user_id":"14931","department":[{"_id":"858"}],"_id":"53366","language":[{"iso":"eng"}],"type":"conference","publication":"2024 IEEE Symposium on Security and Privacy (SP)","status":"public","author":[{"first_name":"Mindy","id":"99001","full_name":"Tran, Mindy","last_name":"Tran"},{"first_name":"Collins W","full_name":"Munyendo, Collins W","last_name":"Munyendo"},{"first_name":"Harshini","last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843","id":"99000","full_name":"Sri Ramulu, Harshini"},{"last_name":"Rodriguez","full_name":"Rodriguez, Rachel Gonzalez","first_name":"Rachel Gonzalez"},{"first_name":"Luisa Ball","full_name":"Schnell, Luisa Ball","last_name":"Schnell"},{"last_name":"Sula","full_name":"Sula, Cora","first_name":"Cora"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"}],"date_created":"2024-04-09T07:11:01Z","date_updated":"2024-06-05T13:52:39Z","title":"Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study","citation":{"ama":"Tran M, Munyendo CW, Sri Ramulu H, et al. Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. In: <i>2024 IEEE Symposium on Security and Privacy (SP)</i>. ; 2023:4–4.","ieee":"M. Tran <i>et al.</i>, “Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study,” in <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","chicago":"Tran, Mindy, Collins W Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, and Yasemin Acar. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” In <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4, 2023.","bibtex":"@inproceedings{Tran_Munyendo_Sri Ramulu_Rodriguez_Schnell_Sula_Simko_Acar_2023, title={Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study}, booktitle={2024 IEEE Symposium on Security and Privacy (SP)}, author={Tran, Mindy and Munyendo, Collins W and Sri Ramulu, Harshini and Rodriguez, Rachel Gonzalez and Schnell, Luisa Ball and Sula, Cora and Simko, Lucy and Acar, Yasemin}, year={2023}, pages={4–4} }","short":"M. Tran, C.W. Munyendo, H. Sri Ramulu, R.G. Rodriguez, L.B. Schnell, C. Sula, L. Simko, Y. Acar, in: 2024 IEEE Symposium on Security and Privacy (SP), 2023, pp. 4–4.","mla":"Tran, Mindy, et al. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","apa":"Tran, M., Munyendo, C. W., Sri Ramulu, H., Rodriguez, R. G., Schnell, L. B., Sula, C., Simko, L., &#38; Acar, Y. (2023). Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4."},"page":"4–4","year":"2023"},{"volume":21,"author":[{"first_name":"Marcel","id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"}],"date_created":"2024-04-08T09:02:04Z","date_updated":"2024-06-05T13:51:52Z","doi":"10.1109/MSEC.2023.3316569","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","issue":"6","page":"59–63","intvolume":"        21","citation":{"chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>"},"year":"2023","department":[{"_id":"858"}],"user_id":"14931","_id":"53348","language":[{"iso":"eng"}],"publication":"IEEE Secur. Priv.","type":"journal_article","status":"public"},{"title":"The Use and Non-Use of Technology During Hurricanes","doi":"10.1145/3610215","date_updated":"2024-06-05T13:53:38Z","volume":7,"author":[{"first_name":"Lucy","full_name":"Simko, Lucy","last_name":"Simko"},{"last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843","id":"99000","full_name":"Sri Ramulu, Harshini","first_name":"Harshini"},{"first_name":"Tadayoshi","full_name":"Kohno, Tadayoshi","last_name":"Kohno"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"date_created":"2024-04-08T09:22:02Z","year":"2023","intvolume":"         7","page":"1–54","citation":{"ieee":"L. Simko, H. Sri Ramulu, T. Kohno, and Y. Acar, “The Use and Non-Use of Technology During Hurricanes,” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, pp. 1–54, 2023, doi: <a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","chicago":"Simko, Lucy, Harshini Sri Ramulu, Tadayoshi Kohno, and Yasemin Acar. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i> 7, no. CSCW2 (2023): 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>.","ama":"Simko L, Sri Ramulu H, Kohno T, Acar Y. The Use and Non-Use of Technology During Hurricanes. <i>Proc ACM Hum Comput Interact</i>. 2023;7(CSCW2):1–54. doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>","apa":"Simko, L., Sri Ramulu, H., Kohno, T., &#38; Acar, Y. (2023). The Use and Non-Use of Technology During Hurricanes. <i>Proc. ACM Hum. Comput. Interact.</i>, <i>7</i>(CSCW2), 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>","mla":"Simko, Lucy, et al. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, 2023, pp. 1–54, doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","short":"L. Simko, H. Sri Ramulu, T. Kohno, Y. Acar, Proc. ACM Hum. Comput. Interact. 7 (2023) 1–54.","bibtex":"@article{Simko_Sri Ramulu_Kohno_Acar_2023, title={The Use and Non-Use of Technology During Hurricanes}, volume={7}, DOI={<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>}, number={CSCW2}, journal={Proc. ACM Hum. Comput. Interact.}, author={Simko, Lucy and Sri Ramulu, Harshini and Kohno, Tadayoshi and Acar, Yasemin}, year={2023}, pages={1–54} }"},"issue":"CSCW2","language":[{"iso":"eng"}],"_id":"53352","department":[{"_id":"858"}],"user_id":"14931","status":"public","publication":"Proc. ACM Hum. Comput. Interact.","type":"journal_article"},{"date_created":"2023-11-02T09:31:17Z","title":"Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism","issue":"4-5","quality_controlled":"1","year":"2023","language":[{"iso":"eng"}],"publication":"Critical Sociology","author":[{"first_name":"Christian","last_name":"Fuchs","orcid":"0000-0003-0589-4579","id":"21863","full_name":"Fuchs, Christian"}],"volume":50,"date_updated":"2024-06-10T05:13:22Z","oa":"1","main_file_link":[{"url":"https://doi.org/10.1177/08969205231206488 ","open_access":"1"}],"doi":"10.1177/08969205231206488 ","related_material":{"link":[{"relation":"supplementary_material","description":"Comment on the article (Graham Murdock)","url":"https://doi.org/10.1177/08969205231201050"},{"description":"Response to Graham Murdock","relation":"supplementary_material","url":"https://doi.org/10.1177/08969205231201382 "}]},"publication_status":"published","citation":{"ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>. 2023;50(4-5):727-745. doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 727–45. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>.","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 727–745, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>, <i>50</i>(4–5), 727–745. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>","short":"C. Fuchs, Critical Sociology 50 (2023) 727–745.","mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 727–45, doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={727–745} }"},"page":"727-745","intvolume":"        50","user_id":"21863","department":[{"_id":"136"},{"_id":"11"}],"project":[{"name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation","_id":"1086"},{"_id":"1084","name":"PÖM: Politische Ökonomie der Medien und der Kommunikation"}],"_id":"48589","type":"journal_article","status":"public"},{"volume":50,"author":[{"first_name":"Christian","last_name":"Fuchs","orcid":"0000-0003-0589-4579","id":"21863","full_name":"Fuchs, Christian"}],"oa":"1","date_updated":"2024-06-10T05:14:13Z","doi":"10.1177/08969205231201382","main_file_link":[{"url":"https://doi.org/10.1177/08969205231201382 ","open_access":"1"}],"related_material":{"link":[{"url":"https://doi.org/10.1177/08969205231206488 ","description":"Original article to which this article refers","relation":"supplementary_material"},{"url":"https://doi.org/10.1177/08969205231201050","relation":"supplementary_material","description":"Comment by Graham Murdock to which this article refers"}]},"publication_status":"published","page":"757-765","intvolume":"        50","citation":{"apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>, <i>50</i>(4–5), 757–765. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>","mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 757–65, doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={757–765} }","short":"C. Fuchs, Critical Sociology 50 (2023) 757–765.","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 757–65. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>.","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 757–765, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>. 2023;50(4-5):757-765. doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>"},"department":[{"_id":"136"},{"_id":"11"}],"user_id":"21863","_id":"48590","project":[{"name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation","_id":"1086"},{"name":"PÖM: Politische Ökonomie der Medien und der Kommunikation","_id":"1084"}],"type":"journal_article","status":"public","date_created":"2023-11-02T09:36:35Z","title":"Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock","issue":"4-5","quality_controlled":"1","year":"2023","language":[{"iso":"eng"}],"publication":"Critical Sociology"}]
