default search action
Ingolf Becker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j7]Daniel Blackwell, Ingolf Becker, David Clark:
Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer. Empir. Softw. Eng. 30(1): 22 (2025) - 2024
- [j6]Gerard Buckley, Tristan Caulfield, Ingolf Becker:
How might the GDPR evolve? A question of politics, pace and punishment. Comput. Law Secur. Rev. 54: 106033 (2024) - [j5]Gerard Buckley, Tristan Caulfield, Ingolf Becker:
GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved? J. Cybersecur. 10(1) (2024) - 2023
- [j4]Charles Weir, Ingolf Becker, Lynne Blair:
Incorporating software security: using developer workshops to engage product managers. Empir. Softw. Eng. 28(1): 21 (2023) - 2020
- [j3]Jason Morris, Ingolf Becker, Simon Parkin:
An analysis of perceptions and support for Windows 10 Home Edition update features. J. Cybersecur. 6(1) (2020) - [j2]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw. Pract. Exp. 50(3): 275-298 (2020) - 2017
- [j1]Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017)
Conference and Workshop Papers
- 2023
- [c17]Sarah Ying Zheng, Ingolf Becker:
Phishing to improve detection. EuroUSEC 2023: 334-343 - [c16]Marilyne Ordekian, Ingolf Becker, Marie Vasek:
Shaping Cryptocurrency Gatekeepers with a Regulatory "Trial and Error". FC Workshops 2023: 113-132 - [c15]Sarah Y. Zheng, Ingolf Becker:
Checking, nudging or scoring? Evaluating e-mail user security tools. SOUPS 2023: 57-76 - [c14]Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue:
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. USENIX Security Symposium 2023: 1541-1558 - 2022
- [c13]Phil Demetriou, Ingolf Becker, Stephen Hailes:
Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection. ICISSP 2022: 579-586 - [c12]Gerard Buckley, Tristan Caulfield, Ingolf Becker:
"It may be a pain in the backside but..." Insights into the resilience of business after GDPR. NSPW 2022: 21-34 - [c11]Sarah Y. Zheng, Ingolf Becker:
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. SOUPS @ USENIX Security Symposium 2022: 253-271 - 2021
- [c10]Ingolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael McGuire, Shujun Li:
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. HICSS 2021: 1-10 - [c9]Charles Weir, Ingolf Becker, Lynne Blair:
A Passion for Security: Intervening to Help Software Developers. ICSE (SEIP) 2021: 21-30 - 2019
- [c8]Tasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion, Shujun Li:
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. DependSys 2019: 277-293 - [c7]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for software security: creating a lightweight program of assurance techniques for developers. ICSE (SEIP) 2019: 41-50 - 2018
- [c6]Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble:
Light-Touch Interventions to Improve Software Development Security. SecDev 2018: 85-93 - [c5]Ingolf Becker, Simon Parkin, M. Angela Sasse:
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. USENIX Security Symposium 2018: 239-253 - 2017
- [c4]Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. HCI (22) 2017: 25-44 - 2016
- [c3]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c2]Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse:
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. SOUPS 2016: 253-270 - [c1]Simon Parkin, Kat Krol, Ingolf Becker, M. Angela Sasse:
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots. WSF@SOUPS 2016
Informal and Other Publications
- 2024
- [i5]Gerard Buckley, Tristan Caulfield, Ingolf Becker:
GDPR: Is it worth it? Perceptions of workers who have experienced its implementation. CoRR abs/2405.10225 (2024) - 2023
- [i4]Daniel Blackwell, Ingolf Becker, David Clark:
Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer. CoRR abs/2308.09081 (2023) - [i3]Carlos Rombaldo Junior, Ingolf Becker, Shane Johnson:
Unaware, Unfunded and Uneducated: A Systematic Review of SME Cybersecurity. CoRR abs/2309.17186 (2023) - 2022
- [i2]Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue:
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. CoRR abs/2210.02137 (2022) - 2021
- [i1]Gerard Buckley, Tristan Caulfield, Ingolf Becker:
"It may be a pain in the backside but..." Insights into the impact of GDPR on business after three years. CoRR abs/2110.11905 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint