• 2018

    Forschungsartikel in Sammelband (Konferenz)

    Machuletz, D., Laube, S., & Böhme, R. (2018). Webcam Covering as Planned Behavior. In Proceedings of the Conference on Human Factors in Computing Systems (ACM CHI), Montreal, Canada. (online first)
    Mehr Details BibTeX DOI

    Forschungsartikel (Zeitschrift)

    Böhme, R., Laube, S., & Riek, M. (2018). A Fundamental Approach to Cyber Risk Analysis. Variance, 11(2). (online first)
    Mehr Details BibTeX Gesamter Text

  • 2017

    Forschungsartikel in Sammelband (Konferenz)

    Yildiz, E., & Böhme, R. (2017). Effects of Information Security Risk Visualization on Managerial Decision Making. In Proceedings of the 2nd European Workshop on Usable Security (EuroUSEC), Paris, Frankreich.
    Mehr Details BibTeX Gesamter Text DOI

    Forschungsartikel (Zeitschrift)

    Böhme, R., & Pesch, P. (2017). Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie. DuD, 2017(7). (online first)
    Mehr Details BibTeX Gesamter Text

    Laube, S., & Böhme, R. (2017). Strategic Aspects of Cyber Risk Information Sharing. ACM Computing Surveys, 50(5).
    Mehr Details BibTeX Gesamter Text DOI

    Pesch, P., & Böhme, R. (2017). Datenschutz trotz öffentlicher Blockchain? — Chancen und Risiken bei der Verfolgung und Prävention Bitcoin-bezogener Straftaten. DuD, 2017(2), 93–98.
    Mehr Details BibTeX

    Arbeitspapier / Working Paper

    Böhme, R., Grzywotz, J., Pesch, P., Rückert, C., & Safferling, C. (2017). Prävention von Straftaten mit Bitcoins und Alt-Coins — Handlungsempfehlung zur Regulierung virtueller Kryptowährungen im Rahmen des Projekts BITCRIME (Teilprojekt Deutschland) — Bitcoin and Alt-Coin Crime Prevention — A Recommendation for the Regulation of Virtual Cryptocurrencies in the context of the BITCRIME project (German Subproject).
    Mehr Details BibTeX Gesamter Text

  • 2016

    Forschungsartikel in Sammelband (Konferenz)

    Carnein, M., Schöttle, P., & Böhme, R. (2016). Telltale Watermarks for Counting JPEG Compressions. In Proceedings of the IS&T Electronic Imaging: Media Watermarking, Security, and Forensics (EI '16), San Francisco, CA, 1–10.
    Mehr Details BibTeX DOI

    Machuletz, D., Sendt, H., Laube, S., & Böhme, R. (2016). Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior. In Proceedings of the 1st European Workshop on Usable Security (EuroUSEC), Internet Society, Darmstadt, Germany.
    Mehr Details BibTeX Gesamter Text DOI

    Möser, M., & Böhme, R. (2016). Join Me on a Market for Anonymity. In Proceedings of the Workshop on the Economics of Information Security (WEIS), University of California at Berkeley. (accepted / in press (not yet published))
    Mehr Details BibTeX

    Riek, M., Böhme, R., Ciere, M., Ganan, C., & and, v. E. M. (2016). Estimating the Costs of Consumer-facing Cybercrime: A Tailored Instrument and Representative Data for Six EU Countries. In Proceedings of the Workshop on the Economics of Information Security (WEIS), University of California at Berkeley. (accepted / in press (not yet published))
    Mehr Details BibTeX Gesamter Text

    Forschungsartikel (Zeitschrift)

    Laube, S., & Böhme, R. (2016). The Economics of Mandatory Security Breach Reporting to Authorities. Journal of Cybersecurity, 2(1), 29–41.
    Mehr Details BibTeX Gesamter Text DOI

  • 2015

    Forschungsartikel in Sammelband (Konferenz)

    Carnein, M., Schöttle, P., & Böhme, R. (2015). Forensics of High-Quality JPEG Images with Color Subsampling. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '15), Rome, Italy, 1–6.
    Mehr Details BibTeX DOI

    Laube, S., & Böhme, R. (2015). Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. In Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS), 2nd Workshop on Information Sharing and Collaborative Security, Denver, Colorado.
    Mehr Details BibTeX Gesamter Text DOI

    Laube, S., & Böhme, R. (2015). The Economics of Mandatory Security Breach Reporting to Authorities. In Proceedings of the 14th Workshop on the Economics of Information Security (WEIS), Delft, Netherlands. (accepted / in press (not yet published))
    Mehr Details BibTeX Gesamter Text

    Laube, S., & Böhme, R. (2015). Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz. In Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik, Osnabrück, Deutschland, 1146–1162.
    Mehr Details BibTeX Gesamter Text

    Möser, M., & Böhme, R. (2015). Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. In Proceedings of the 2nd Workshop on Bitcoin Research, affiliated with the 19th International Conference on Financial Cryptography and Data Security, Puerto Rico.
    Mehr Details BibTeX Gesamter Text

    Forschungsartikel (Zeitschrift)

    Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, Technology, and Governance. Journal of Economic Perspectives, 29(2), 213–38.
    Mehr Details BibTeX Gesamter Text DOI

  • 2014

    Forschungsartikel (Buchbeitrag)

    Böhme, R., & Laube, S. (2014). Das IT-Sicherheitsgesetz. In Baetge, J., & Kirsch, H.-J. (Eds.), Mittelstand im Blick: Compliance und Risikomanagement (pp. 17–36). Düsseldorf: IDW Verlag.
    Mehr Details BibTeX

    Böhme, R., & Luhn, S. (2014). Die Privatssphäre des Verbrauchers — Ein Luxusgut?. In Bala, C., & Müller, K. (Eds.), Der gläserne Verbraucher — Wird Datenschutz zum Verbraucherschutz? (pp. 41–56). Beiträge zur Verbraucherforschung: Vol. 1. Düsseldorf: Verbraucherzentrale NRW.
    Mehr Details BibTeX

    Forschungsartikel in Sammelband (Konferenz)

    Boehm, F., & Böhme, R. (2014). Improving Informed Consent for Consumers in E-Commerce — An Interdisciplinary Perspective. In Proceedings of the Privacy Law Scholars Conference (PLCS), Washington, DC.
    Mehr Details BibTeX Gesamter Text

    Carnein, M., Schöttle, P., & Böhme, R. (2014). Predictable Rain? Steganalysis of Public-key Steganography Using Wet Paper Codes. In Unterweger, A., Uhl, A., Katzenbeisser, S., Kwitt, R., & Piva, A. (Eds.), Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec '14) (pp. 97–108). New York, NY, USA: ACM.
    Mehr Details BibTeX DOI

    Kirchner, M., & Böhme, R. (2014). Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers. In Proceedings of the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 4010–4014.
    Mehr Details BibTeX Gesamter Text DOI

    Korff, S., & Böhme, R. (2014). Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA.
    Mehr Details BibTeX Gesamter Text

    Luhn, S., Bruns, I., & Böhme, R. (2014). Consumer Participation in Online Contracts — Exploring Cross-Out Clauses. In Proceedings of the GI Sicherheit 2014, Wien, Österreich, 255–270.
    Mehr Details BibTeX

    Möser, M., Böhme, R., & Breuker, D. (2014). Towards Risk Scoring of Bitcoin Transactions. In Proceedings of the 1st Workshop on Bitcoin Research in Assocation with Financial Crypto 14, Barbados, 1–16.
    Mehr Details BibTeX

    Riek, M., Böhme, R., & Moore, T. (2014). Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users. In Proceedings of the 13th Workshop on the Economics of Information Security (WEIS), The Pennsylvania State University, State College, Pennsylvania. (accepted / in press (not yet published))
    Mehr Details BibTeX Gesamter Text

    Forschungsartikel (Zeitschrift)

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2014). Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Transactions on Internet Technology, 14(2-3), 19:1-22.
    Mehr Details BibTeX DOI

  • 2013

    Fachbuch (Herausgegebenes Buch)

    Böhme, R. (Ed.) (2013). The Economics of Information Security and Privacy. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Forschungsartikel (Buchbeitrag)

    Böhme, R., & Grossklags, J. (2013). Trading Agent Kills Market Information: Evidence from Online Social Lending. In Chen, Y., & Immorlica, N. (Eds.), Web and Internet Economics, 9th International Conference, WINE 2013, Cambridge, MA, USA (pp. 68–81). Lecture Notes in Computer Science: Vol. 8289. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Böhme, R., & Kirchner, M. (2013). Counter-Forensics: Attacking Image Forensics. In Sencar, H. T., & Memon, N. D. (Eds.), Digital Image Forensics: There is More to a Picture Than Meets the Eye (pp. 327–366). New York: Springer.
    Mehr Details BibTeX Gesamter Text DOI

    Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., & Böhme, R. (2013). Bitspotting: Detecting Optimal Adaptive Steganography. In Shi, Y. Q., Kim, H.-J., & Pérez-González, F. (Eds.), Digital Forensics and Watermaking (pp. 1–15). Lecture Notes in Computer Science. Berlin Heidelberg: Springer. (online first)
    Mehr Details BibTeX

    Schöttle, P., & Böhme, R. (2013). Die totale Transparenz. In Dabrowski, M., Wolf, J., & Abmeier, K. (Eds.), Ethische Herausforderungen im Web 2.0 (pp. 1–23). Schöningh. (online first)
    Mehr Details BibTeX

    Forschungsartikel in Sammelband (Konferenz)

    Böhme, R. (2013). Internet Protocol Adoption: Learning from Bitcoin. In Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge, UK.
    Mehr Details BibTeX

    Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevny, T. (2013). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 45–58.
    Mehr Details BibTeX DOI

    Lai, S., & Böhme, R. (2013). Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, 3028–3032.
    Mehr Details BibTeX DOI

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2013). Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, Großbritannien, 273–290.
    Mehr Details BibTeX Gesamter Text DOI

    Möser, M., Böhme, R., & Breuker, D. (2013). An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In Proceedings of the APWG eCrime Researchers Summit (ECRIME 2013), San Francisco, USA.
    Mehr Details BibTeX

    Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., & Boehme, R. (2013). A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding. In Proceedings of the 21th European Signal Processing Conference (EUSIPCO), 2013, Marrakech, Morocco. (online first)
    Mehr Details BibTeX

  • 2012

    Forschungsartikel (Buchbeitrag)

    Böhme, R. (2012). Security Audits Revisited. In Keromytis, A. (Ed.), Proceedings of Financial Cryptography and Data Security (pp. 129–147). Lecture Notes in Computer Science: Vol. 7397. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Johnson, B., Schöttle, P., & Böhme, R. (2012). Where to Hide the Bits?. In Grossklags, J., & Walrand, J. (Eds.), Decision and Game Theory for Security (pp. 1–17). Lecture Notes in Computer Science: Vol. 7638. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Schöttle, P., & Böhme, R. (2012). A Game-Theoretic Approach to Content-Adaptive Steganography. In Kirchner, M., & Ghosal, D. (Eds.), Information Hiding (14th International Conference) (pp. 125–141). Lecture Notes in Computer Science: Vol. 7692. Berlin Heidelberg: Springer-Verlag.
    Mehr Details BibTeX

    Forschungsartikel in Sammelband (Konferenz)

    Anderson, R., Barton, C., Böhme, R., Clayton, R., Eeten, M. v., Levi, M., Moore, T., & Savage, S. (2012). Measuring the Cost of Cybercrime. In Proceedings of the Workshop of Economics and Information Security (WEIS), Berlin.
    Mehr Details BibTeX

    Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H. P., & Böhme, R. (2012). Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. In Proceedings of the Workshop on the Economics of Information Security (WEIS) 2012, Berlin, Deutschland, 1–17.
    Mehr Details BibTeX Gesamter Text

    Böhme, R., & Moore, T. (2012). How Do Consumers React to Cybercrime?. In Proceedings of the APWG eCrime Researchers Summit (ECRIME 2012), Las Croabas.
    Mehr Details BibTeX

    Schöttle, P., Korff, S., & Böhme, R. (2012). Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Teneriffa, 193–198.
    Mehr Details BibTeX

  • 2011

    Forschungsartikel (Buchbeitrag)

    Böhme, R., & Pötzsch, S. (2011). Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In Danezis, G. (Ed.), Proceedings of Financial Cryptography and Data Security (pp. 1–15). Lecture Notes in Computer Science: Vol. 7035. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Johnson, B., Böhme, R., & Grossklags, J. (2011). Security Games with Market Insurance. In Baras, J. S., Katz, J., & Altmann, E. (Eds.), Decision and Game Theory for Security (pp. 117–130). Lecture Notes in Computer Science: Vol. 7037. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Lai, S., & Böhme, R. (2011). Countering Counter-Forensics: The Case of JPEG Compression. In Filler, T., Pevny, T., Craver, S., & Ker, A. (Eds.), Information Hiding (13th International Conference) (pp. 285–298). Lecture Notes in Computer Science: Vol. 6958. Berlin: Springer.
    Mehr Details BibTeX

    Forschungsartikel in Sammelband (Konferenz)

    Böhme, R. (2011). Wann sind IT-Security-Audits nützlich?. In Proceedings of the Wirtschaftsinformatik, Zürich, 385–394.
    Mehr Details BibTeX

    Böhme, R., & Grossklags, J. (2011). The Security Cost of Cheap User Interaction. In Proceedings of the New Security Paradigms Workshop, Marin County, CA, 67–82.
    Mehr Details BibTeX

    Böhme, R., & Grossklags, J. (2011). Vanishing Signals: Trading Agent Kills Market Information. In Proceedings of the NetEcon, San Jose, CA.
    Mehr Details BibTeX

    Forschungsartikel (Zeitschrift)

    Böhme, R., & Félegyházi, M. (2011). Security Investment with Penetration Testing. IEEE COMSOC E-Letter, 6(5), 6–8.
    Mehr Details BibTeX

  • 2010

    Fachbuch (Monographie)

    Böhme, R. (2010). Advanced Statistical Steganalysis. Berlin, Heidelberg: Springer-Verlag.
    Mehr Details BibTeX