Research outputs
56437
Projects
2017
People
1610
Recent Additions
-
PublicationGaze-based Opportunistic Privacy-preserving Human-Agent Collaboration(ACM, 2024-05-11)This paper introduces a novel system to enhance the spatiotemporal alignment of human abilities in agent-based workflows. This optimization is realized through the application of Linked Data and Semantic Web technologies and the system makes use of gaze data and contextual information. The showcased prototype demonstrates the feasibility of implementing such a system, where we specifically emphasize the system’s ability to constrain the dissemination of privacy-relevant information.
-
PublicationAuctentionAR -Auctioning Off Visual Attention in Mixed Reality(ACM, 2024-05-11)Mixed Reality technologies are increasingly interwoven with our everyday lives. A variety of powerful Head Mounted Displays have recently entered consumer electronics markets, and more are under development, opening new dimensions for spatial computing. This development will likely not stop at the advertising industry either, as first forays into this area have already been made. We present AuctentionAR which allows users to sell off their visual attention to interested parties. It consists of a HoloLens 2, a remote server executing the auctioning logic, the YOLOv7 model for image recognition of products which may induce an advertising intent, and several bidders interested in advertising their products. As this system comes with substantial privacy implications, we discuss what needs to be considered in future implementation so as to make this system a basis for a privacy preserving MR advertising future.
-
PublicationQR Code Integrity by Design(ACM, 2024-05-11)As QR codes become ubiquitous in various applications and places, their susceptibility to tampering, known as quishing, poses a significant threat to user security. In this paper we introduce SafeQR codes that address this challenge by introducing innovative design strategies to enhance QR code security. Leveraging visual elements and secure design principles, the project aims to make tampering more noticeable, thereby empowering users to recognize and avoid potential phishing threats. Further, we highlight the limitations of current user-education methods in combating quishing and propose different attacker models tailored to address quishing attacks. In addition, we introduce a multi-faceted defense strategy that merges design innovation with user vigilance. Through a user study, we demonstrate the efficacy of ’Integrity by Design’ QR codes. These innovatively designed QR codes significantly raise user suspicion in case of tampering and effectively reduce the likelihood of successful quishing attacks.
-
-
PublicationBerichterstattung nach der EU-Taxonomie-VO – Herausforderungen und Handlungsempfehlungen für europäische Nicht-Finanzunternehmen(Deutscher Fachverlag GmbH, 2024-03-25)
Most viewed
-
-
-
-
PublicationFirmen kaufen und verkaufen: ein M&A-Leitfaden für Unternehmer und Manager(Verlag NZZ, 2007)
-
Publication