Publication statistics

Pub. period:2009-2012
Pub. count:6
Number of co-authors:8


Number of publications with 3 favourite co-authors:

Niels Kammerer:
Sylvia Kempe:
Rainer Waxenberger:



Productive colleagues

Max-Emanuel Maurer's 3 most productive colleagues in number of publications:

Alexander De Luca:27
Heinrich Hussmann:14
Doris Hausen:8

Upcoming Courses

go to course
User Research - Methods and Best Practices
go to course
Get Your First Job as a UX or Interaction Designer
Starts tomorrow LAST CALL!

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !


Our Latest Books

The Glossary of Human Computer Interaction
by Mads Soegaard and Rikke Friis Dam
start reading
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading

Max-Emanuel Maurer


Publications by Max-Emanuel Maurer (bibliography)

 what's this?
Edit | Del

Maurer, Max-Emanuel, Waxenberger, Rainer and Hausen, Doris (2012): BroAuth: evaluating different levels of visual feedback for 3D gesture-based authentication. In: Proceedings of the 2012 International Conference on Advanced Visual Interfaces 2012. pp. 737-740.

Using digital gadgets we authenticate ourselves regularly. Usually authentication relies on standard PIN or password but novel input hardware facilitates new authentication techniques. In this work we present an authentication mechanism based on body movements captured by a depth sensor. This idea is motivated by the cultural body movements used as welcoming gestures, especially by gang members (secret handshakes). Our authentication technique 'BroAuth' lets the user interact with a virtual partner to perform password input. This is done through touching target zones on the own body and on the body of a virtual partner. In this paper we focus on evaluating usability and security of onscreen feedback for such a system. Three different types of feedback were tested during the input process: Text-only (1D), abstract user representation (2D) and a virtual avatar (live 3D). The most detailed but most insecure 3D feedback performed much worse than the abstract input modalities. Input times and user opinions show that an abstract 2D representation is the best tradeoff between usability and security for such a system.

© All rights reserved Maurer et al. and/or ACM Press

Edit | Del

Luca, Alexander De, Frauendienst, Bernhard, Maurer, Max-Emanuel, Seifert, Julian, Hausen, Doris, Kammerer, Niels and Hussmann, Heinrich (2011): Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 887-890.

Internet users are targets for ever-advancing phishing- and other attacks. The risks are, for example, to disclose credit card information or passwords to unauthorized instances. One approach to help users with insecure situations is provided by MoodyBoard, which uses ambient information to highlight potential risks. In this paper, we present findings from an evaluation of this system. Two user studies were conducted in order to find out whether an ambient security tool can protect users during sensitive tasks. We designed a pilot study to find out whether users understand the warnings and a security study to see if it helps to protect users from phishing attacks. Results show that MoodyBoard users behaved significantly more secure.

© All rights reserved Luca et al. and/or their publisher

Edit | Del

Maurer, Max-Emanuel, Luca, Alexander De and Hussmann, Heinrich (2011): Data type based security alert dialogs. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2359-2364.

Making users aware of insecure situations and behavior while browsing the Internet is a highly discussed and still difficult task. Both, passive and active warnings have their own specific disadvantages. While active warnings interrupt the current task and annoy the user, passive approaches often fail since they go unnoticed. In this work, we present first results of a concept displaying data type based alert dialogs whenever a user enters critical information into an online form. Such contextual dialogs appear right in the users' field of view representing a hybrid approach between active and passive warnings. An initial user study was conducted that showed a significant improvement of security awareness by participants that used the tool.

© All rights reserved Maurer et al. and/or their publisher

Edit | Del

Maurer, Max-Emanuel, Luca, Alexander De and Kempe, Sylvia (2011): Using data type based security alert dialogs to raise online security awareness. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 2.

When browsing the Internet, users are likely to be exposed to security and privacy threats -- like fraudulent websites. Automatic browser mechanisms can protect them only to some extent. In other situations it is still important to raise the users' security awareness at the right moment. Passive indicators are mostly overlooked and blocking warnings are quickly dismissed by habituated users. In this work, we present a new concept of warnings that appear in-context, right next to data the user has just entered. Those dialogs are displayed whenever critical data types -- e.g. credit card data -- are entered by the users into online forms. Since they do not immediately interrupt the users' interaction but appear right in the users' focus, it is possible to place important security information in a way that it can be easily seen. We implemented the concept as a Firefox plugin and evaluated it in a row of studies including two lab studies, one focus group and one real world study. Results show that the concept is very well accepted by the users and that with the plugin, especially non-expert participants were more likely to identify fraudulent (or phishing) websites than using the standard browser warnings. Besides this, we were able to gather interesting findings on warning usage.

© All rights reserved Maurer et al. and/or ACM Press

Edit | Del

Maurer, Max-Emanuel, Hausen, Doris, Luca, Alexander De and Hussmann, Heinrich (2010): Mobile or desktop websites?: website usage on multitouch devices. In: Proceedings of the Sixth Nordic Conference on Human-Computer Interaction 2010. pp. 739-742.

Mobile Internet is nearly a standard nowadays. Due to former bandwidth, input and screen limitations, website providers often created special versions of their websites for mobile devices. New hardware and interactions techniques like multitouch gestures enable a new way of browsing the original versions of websites. However, companies still spent effort and money in creating secondary versions of their original pages. With the rapid deployment of new mobile devices, the usefulness of mobile versions of websites becomes questionable. To investigate on users expectations, we conducted an online survey with 108 participants about their browsing habits and preferences on mobile devices. In a follow-up user study with 24 participants. The results of the survey show that more and more people prefer using original content instead of the mobile version, especially for users of new generation mobile devices like the iPhone or Android phones. Those results are supported by the user study, which shows no significant performance increase when comparing both versions -- the mobile and desktop one -- performing a visual search task.

© All rights reserved Maurer et al. and/or their publisher

Edit | Del

Maurer, Max-Emanuel and Luca, Alexander De (2009): SeCuUI: autocomplete your terminal input. In: Proceedings of 11th Conference on Human-computer interaction with mobile devices and services 2009. p. 83.

With SeCuUI we present a solution that aims to increase security of data entry on public terminals. The user can enter all data requested by the terminal using her mobile device. Sensitive data can be hidden from prying eyes by exclusively showing it on the user's mobile. To speed up the whole process, the SeCuUI-client stores previously entered data on the mobile device to provide auto form filling capabilities.

© All rights reserved Maurer and Luca and/or their publisher

Add publication
Show list on your website

Join our community and advance:




Join our community!

Page Information

Page maintainer: The Editorial Team