Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Verena Zimmermann is active.

Publication


Featured researches published by Verena Zimmermann.


international conference on human-computer interaction | 2017

“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies

Verena Zimmermann; Nina Gerber

Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are well-acknowledged within the research community. A plurality of alternatives such as other knowledge-based, token-based or biometric authentication schemes have been developed. Although the usability of these schemes has been analyzed, the results concerning further user perceptions are complex and somewhat ambiguous. Further, most of these results stem from focus groups and surveys where the actual interaction with the systems was not tested. To shine light on this topic we conducted a laboratory study with 35 participants to compare and understand user perceptions of several biometric and non-biometric authentication schemes. We simulated the interaction with authentication schemes to protect our participants’ data and to avoid affecting influences of particular implementations. The results showed that the text password is still popular among the participants for reasons of familiarity and due to privacy aspects, namely because no personal information has to be provided. Fingerprint and iris recognition were well liked among the biometrics by many participants due to the perceived security of using a unique feature for authentication. However, the use of personal information also raised privacy concerns in others. This leads to the assumption that there might be two user groups preferring either passwords or biometrics. The assumption along with possible influencing variables such as authentication context or familiarity should be addressed in future research. The simulation of authentication schemes could further be improved by addressing realistic error rates to increase external validity of the study design.


Datenschutz Und Datensicherheit - Dud | 2017

Ende-zu-Ende sichere E-Mail-Kommunikation

Verena Zimmermann; Birgit Henhapl; Melanie Volkamer; Joachim Vogt

ZusammenfassungDer vorliegende Beitrag untersucht, ob die 1999 von Whitten und Tygar („Why Johnny can’t encrypt“) identifizierten Usability-Probleme von Ende-zu-Ende sicherer E-Mail-Kommunikation in heutigen Lösungen weiterhin existieren. Dafür wurde mithilfe der Methode Cognitive Walkthrough die Benutzbarkeit von zwei aktuellen Verschlüsselungsanwendungen (gpg4o®1 und Enigmail2) evaluiert. Die Ergebnisse werden im Zusammenhang mit den Erkenntnissen von Whitten und Tygar diskutiert.


International Journal of Human-computer Studies \/ International Journal of Man-machine Studies | 2018

Ethical guidelines for nudging in information security & privacy

Karen Renaud; Verena Zimmermann

Abstract There has recently been an upsurge of interest in the deployment of behavioural economics techniques in the information security and privacy domain. In this paper, we consider the nature of one particular intervention, the nudge, and the way it exercises its influence. We contemplate the ethical ramifications of nudging, in its broadest sense, deriving general principles for ethical nudging from the literature. We extrapolate these principles to the deployment of nudging in information security and privacy. Furthermore, we explain how researchers can use these guidelines to ensure that they satisfy the ethical requirements during nudge trials in information security and privacy. Our guidelines also provide guidance to ethics review boards that are required to evaluate nudge-related research.


Mensch & Computer Workshopband | 2017

Promoting Secure Email Communication and Authentication

Verena Zimmermann; Birgit Henhapl; Nina Gerber; Matthias Enzmann

Nowadays, the possibility to communicate securely is crucial for users in the private as well as in the business context. However, to do so they have to face problems regarding mismatching mental models of encryption and bad usability not only concerning the encryption, but also the authentication process. To solve this problem, we evaluate users’ perception on encryption and authentication schemes in order to (1) derive a process, which is more in line with their expectations and (2) use authentication schemes which provide security but also achieve a high acceptance rate from users. We plan to integrate our findings into a prototypical software in order to evaluate users’ acceptance for our technical approach.


Behavioural Public Policy | 2018

Nudging folks towards stronger password choices: providing certainty is the key

Karen Renaud; Verena Zimmermann


The LASER Workshop: Learning from Authoritative Security Experiment Results | 2017

Lessons Learned from Evaluating Eight Password Nudges in the Wild

Karen Renaud; Verena Zimmermann; Joseph Maguire; Steve Draper


availability, reliability and security | 2018

Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure?

Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer


Network Security | 2018

A user by any other name

Karen Renaud; Verena Zimmermann


Journal of Air Transport Management | 2018

Public perceptions of Frankfurt Airport's value - A survey approach

Verena Zimmermann; Ute Felscher-Suhr; Joachim Vogt


Behavioural Public Policy | 2018

Nudging folks towards stronger password choices: providing certainty is the key – CORRIGENDUM

Karen Renaud; Verena Zimmermann

Collaboration


Dive into the Verena Zimmermann's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nina Gerber

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Birgit Henhapl

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Joachim Vogt

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Melanie Volkamer

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sinem Emeröz

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge