


default search action
Florian Schütz
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Gilbert Georg Hövel, Anton Veynshter, Florian Schütz, Simon Trang:
Will the Ransom Be Paid? - Examining Influencing Factors of the Ransomware-Payment Decision. ECIS 2024 - [c12]Florian Schütz, Alexander Lukowitsch, Gilbert Georg Hövel, Simon Trang:
The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies. ECIS 2024 - [c11]Florian Rampold, Julia Heinsohn, Florian Schütz, Julia Klein, Thomas Keller, Kristin Masuch, Julia Warwas:
Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain. HICSS 2024: 3719-3728 - [c10]Gilbert Georg Hövel, Florian Schütz, Simon Trang:
Using Digital Nudging in Medical decision-making - A Taxonomy to Inform Research and Practice. PACIS 2024 - [c9]Florian Schütz, Lennart Steenken, Jannes Heinrich Diedrich Menck, Simon Hugenberg, Patricia Köpfer, Gilbert Georg Hövel, Simon Trang:
Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals' Cyber Security Competencies. PACIS 2024 - 2023
- [c8]Florian Schütz, Bastian Spierau, Florian Rampold, Robert C. Nickerson, Simon Trang:
Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models. ECIS 2023 - [c7]Florian Schütz, Florian Rampold, Kristin Masuch, Patricia Köpfer, Dominik Mann, Julia Warwas, Simon Trang:
Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model. HICSS 2023: 6118-6127 - [c6]Florian Schütz
, Laura Scholz, Simon Hugenberg, Julia Warwas
, Simon Trang
:
How to Strengthen Personal Cyber Security Competencies? Extending the Cyber Security Domain Model (CSDM) to Individuals: A Literature-Based Domain Analysis. WEB 2023: 46-62 - 2022
- [c5]Florian Schütz, Florian Rampold, Andre Kalisch, Kristin Masuch:
Consumer Cyber Insurance as Risk Transfer: A Coverage Analysis. CENTERIS/ProjMAN/HCist 2022: 521-528 - [c4]Florian Rampold, Florian Schütz, Kristin Masuch, Patricia Köpfer, Julia Warwas:
Are You Aware of Your Competencies? - the potentials of Competence Research to Design Effective SETA Programs. ECIS 2022 - [c3]Lucas Pfannenberg, Florian Schütz
, Sarah Gronemann, Eylert Spils ad Wilken, Kristin Masuch
, Simon Trang
:
Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review. WEB 2022: 12-27
2010 – 2019
- 2016
- [c2]Marie Lena Heidingsfelder, Florian Schütz, Simone Kaiser:
Expanding participation participatory design in technology agenda-setting. PDC (2) 2016: 25-28
2000 – 2009
- 2008
- [j1]Alexander Pretschner, Manuel Hilty, Florian Schütz, Christian Schaefer, Thomas Walter:
Usage Control Enforcement: Present and Future. IEEE Secur. Priv. 6(4): 44-53 (2008) - [c1]Alexander Pretschner, Florian Schütz, Christian Schaefer, Thomas Walter:
Policy Evolution in Distributed Usage Control. STM@IFIPTM 2008: 109-123
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint