Prof. Dr.-Ing. Rainer Böhme, M.A.

Kontakt

Portrait

Forschungsschwerpunkte

  • Ökonomie der IT-Sicherheit
  • Digitale Forensik
  • Steganographie und Steganalyse
  • Sicherheit und Usability
  • Datenschutzfördernde Technik
  • Ökonomische und verhaltenswissenschaftliche Aspekte von Datenschutz und Privatsphäre
  • Virtuelle Währungen und kryptographische Finanzinstrumente

Vita

Akademische Ausbildung

2008Promotion zum Doktoringenieur
1998 - 2003Studium der Kommunikationswissenschaft, Wirtschaftswissenschaften und Informatik an der Technischen Universität Dresden und der Université Paris XII

Beruflicher Werdegang

seit 03/2015Universitätsprofessor für Security and Privacy (Sicherheit und Datenschutz), Institut für Informatik, Leopold-Franzens-Universität Innsbruck
seit 03/2015Projektleiter, Institut für Wirtschaftsinformatik, Westfälische Wilhelms-Universität Münster
seit 2014Lehrauftrag an der Ruhr-Universität Bochum, Modul "Sicherheitsmanagement" im Fernstudiengang "Applied IT Security Master of Science"
09/2010 - 02/2015Juniorprofessor für Wirtschaftsinformatik, speziell IT-Sicherheit an der Westfälischen Wilhelms-Universität Münster
2009 - 2010Postdoktorand am International Computer Science Institute, Berkeley, Kalifornien
2007 - 2009Wissenschaftlicher Mitarbeiter am Lehrstuhl Datenschutz und Datensicherheit (Prof. Dr. Andreas Pfitzmann) der Technischen Universität Dresden
2005 - 2007Mitarbeiter der Europäischen Zentralbank, Generaldirektorat Volkswirtschaft

Mitgliedschaften und Aktivitäten in Gremien

seit 2013Associate Editor, EURASIP Journal on Information Security
seit 2013Associate Editor, Electronic Commerce Research
2015Vorsitz des Programmkomitees, New Security Paradigms Workshop (NSPW)
2015Vorsitz des Programmkomitees, Financial Cryptography and Data Security
2013 - 2015Area Editor Security & Privacy, Information Systems
2014Organisator und Vorsitz des Programmkomitees, 1st Workshop on Bitcoin Research
2014Tagungsleiter, 8th International Conference on IT Security Incident Management & IT Forensics
2013Track Co-Chair, 21st European Conference on Information Systems (ECIS)
2012Vorsitz des Programmkomitees, 11th Workshop on the Economics of Information Security (WEIS)
2010Vorsitz des Programmkomitees, 12th Information Hiding Conference

Publikationen

  • Böhme R, Laube S, Riek M. 2018. ‘A Fundamental Approach to Cyber Risk Analysis.’ Variance 11, Nr. 2. [Im Druck]
  • Machuletz D, Laube S, Böhme R. 2018. ‘Webcam Covering as Planned Behavior.’Contributed to the Conference on Human Factors in Computing Systems (ACM CHI), Montreal, Canada. doi: 10.1145/3173574.3173754. [Im Druck]
  • Pesch Paulina, Böhme Rainer. 2017. „Datenschutz trotz öffentlicher Blockchain? – Chancen und Risiken bei der Verfolgung und Prävention Bitcoin-bezogener Straftaten.“ DuD 2017, Nr. 2: 93-98.
  • Böhme Rainer, Grzywotz Johanna, Pesch Paulina, Rückert Christian, Safferling Christoph. 2017. Prävention von Straftaten mit Bitcoins und Alt-Coins – Handlungsempfehlung zur Regulierung virtueller Kryptowährungen im Rahmen des Projekts BITCRIME (Teilprojekt Deutschland) / Bitcoin and Alt-Coin Crime Prevention – A Recommendation for the Regulation of Virtual Cryptocurrencies in the context of the BITCRIME project (German Subproject). , 2017.
  • Böhme R, Pesch P. 2017. „Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie.“ DuD 2017, Nr. 7. [Im Druck]
  • Yildiz Esra, Böhme Rainer. 2017. ‘Effects of Information Security Risk Visualization on Managerial Decision Making.’Contributed to the Proceedings of the 2nd European Workshop on Usable Security (EuroUSEC), Paris, Frankreich. doi: http://dx.doi.org/10.14722/eurousec.2017.23010.
  • Laube S, Böhme R. 2017. ‘Strategic Aspects of Cyber Risk Information Sharing.’ ACM Computing Surveys 50, Nr. 5. doi: 10.1145/3124398.
  • Laube S, Böhme R. 2016. ‘The Economics of Mandatory Security Breach Reporting to Authorities.’ Journal of Cybersecurity 2, Nr. 1: 29-41. doi: 10.1093/cybsec/tyw002.
  • Machuletz D, Sendt H, Laube S, Böhme R. 2016. ‘Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior.’Contributed to the Proceedings of the 1st European Workshop on Usable Security (EuroUSEC), Internet Society, Darmstadt, Germany. doi: http://dx.doi.org/10.14722/eurousec.2016.23014.
  • Carnein Matthias, Schöttle Pascal, Böhme Rainer. 2016. ‘Telltale Watermarks for Counting JPEG Compressions.’ In Proceedings of the IS&T Electronic Imaging: Media Watermarking, Security, and Forensics (EI '16), 1-10. doi: 10.2352/ISSN.2470-1173.2016.8.MWSF-072.
  • Riek, M., Böhme, R., Ciere, M., Ganan, C., and van Eeten, M. 2016. ‘Estimating the Costs of Consumer-facing Cybercrime: A Tailored Instrument and Representative Data for Six EU Countries.’Contributed to the Workshop on the Economics of Information Security (WEIS), University of California at Berkeley. [Akzeptiert]
  • Möser Malte, Böhme Rainer. 2016. ‘Join Me on a Market for Anonymity.’Contributed to the Proceedings of the Workshop on the Economics of Information Security (WEIS), University of California at Berkeley. [Akzeptiert]
  • Böhme Rainer, Christin Nicolas, Edelman Benjamin, Moore Tyler. 2015. ‘Bitcoin: Economics, Technology, and Governance.’ Journal of Economic Perspectives 29, Nr. 2: 213-38. doi: 10.1257/jep.29.2.213.
  • Laube S, Böhme R. 2015. „Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz.“Beitrag präsentiert auf der 12. Internationale Tagung Wirtschaftsinformatik, Osnabrück, Deutschland.
  • Möser Malte, Böhme Rainer. 2015. ‘Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees.’Contributed to the 2nd Workshop on Bitcoin Research, affiliated with the 19th International Conference on Financial Cryptography and Data Security, Puerto Rico.
  • Laube S, Böhme R. 2015. ‘The Economics of Mandatory Security Breach Reporting to Authorities.’Contributed to the 14th Workshop on the Economics of Information Security (WEIS), Delft, Netherlands. [Akzeptiert]
  • Laube S, Böhme R. 2015. ‘Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls.’Contributed to the ACM Conference on Computer and Communication Security (ACM CCS), 2nd Workshop on Information Sharing and Collaborative Security, Denver, Colorado. doi: 10.1145/2808128.2808132.
  • Carnein Matthias, Schöttle Pascal, Böhme Rainer. 2015. ‘Forensics of High-Quality JPEG Images with Color Subsampling.’ In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '15), 1-6. doi: 10.1109/WIFS.2015.7368556.
  • Riek Markus, Böhme Rainer, Moore Tyler. 2014. ‘Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users.’Contributed to the 13th Workshop on the Economics of Information Security (WEIS), The Pennsylvania State University, State College, Pennsylvania. [Akzeptiert]
  • Böhme R, Luhn S. 2014. „Die Privatssphäre des Verbrauchers - Ein Luxusgut?.“ In Der gläserne Verbraucher - Wird Datenschutz zum Verbraucherschutz?, herausgegeben von Bala C, Müller K, 41-56. Düsseldorf: Verbraucherzentrale NRW.
  • Kirchner Matthias, Böhme Rainer. 2014. ‘Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers.’Contributed to the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy. doi: 10.1109/ICASSP.2014.6854349.
  • Laszka Aron, Johnson Benjamin, Schöttle Pascal, Grossklags Jens, Böhme Rainer. 2014. ‘Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.’ ACM Transactions on Internet Technology 14, Nr. 2-3: 19:1-22. doi: 10.1145/2663499.
  • Korff Stefan, Böhme Rainer. 2014. ‘Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation.’Contributed to the Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA.
  • Boehm Franziska, Böhme Rainer. 2014. ‘Improving Informed Consent for Consumers in E-Commerce – An Interdisciplinary Perspective.’Contributed to the Privacy Law Scholars Conference (PLCS), Washington, DC.
  • Carnein Matthias, Schöttle Pascal, Böhme Rainer. 2014. ‘Predictable Rain? Steganalysis of Public-key Steganography Using Wet Paper Codes.’ In Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec '14), edited by Unterweger, Andreas; Uhl, Andreas; Katzenbeisser, Stefan; Kwitt, Roland; Piva, Alessandro, 97-108. New York, NY, USA: ACM. doi: 10.1145/2600918.2600942.
  • Böhme R, Laube S. 2014. „Das IT-Sicherheitsgesetz.“ In Mittelstand im Blick: Compliance und Risikomanagement, herausgegeben von Baetge Jörg, Kirsch Hans-Jürgen, 17-36. Düsseldorf: IDW Verlag.
  • Luhn S, Bruns I, Böhme R. 2014. ‘Consumer Participation in Online Contracts - Exploring Cross-Out Clauses.’Contributed to the GI Sicherheit 2014, Wien, Österreich.
  • Möser Malte, Böhme Rainer, Breuker Dominic. 2014. ‘Towards Risk Scoring of Bitcoin Transactions.’Contributed to the 1st Workshop on Bitcoin Research in Assocation with Financial Crypto 14, Barbados.
  • Böhme, Rainer. 2013. ‘Internet Protocol Adoption: Learning from Bitcoin.’Contributed to the IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge, UK.
  • Schöttle Pascal, Böhme Rainer. 2013. „Die totale Transparenz.“ In Ethische Herausforderungen im Web 2.0, herausgegeben von Dabrowski Martin, Wolf Judith, Abmeier Karlies, 1-23.: Schöningh. [Im Druck]
  • Johnson, Benjamin, Schöttle, Pascal, Laszka, Aron, Grossklags, Jens, Böhme, Rainer. 2013. ‘Bitspotting: Detecting Optimal Adaptive Steganography.’ In Digital Forensics and Watermaking, edited by Shi Yun Q., Kim Hyoung-Joong, Pérez-González Fernando, 1-15. Berlin Heidelberg: Springer. [Im Druck]
  • Schöttle Pascal, Laszka Aron, Johnson Benjamin, Grossklags Jens, Boehme Rainer. 2013. ‘A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding.’Contributed to the Proceedings of the 21th European Signal Processing Conference (EUSIPCO), 2013, Marrakech, Morocco. [Im Druck]
  • Ker Andrew D., Bas Patrick, Böhme Rainer, Cogranne Remi, Craver Scott, Filler Tomas, Fridrich Jessica, Pevny Tomas. 2013. ‘Moving steganography and steganalysis from the laboratory into the real world.’Contributed to the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France. doi: 10.1145/2482513.2482965.
  • Lai ShiYue, Böhme Rainer. 2013. ‘Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection..’Contributed to the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada. doi: 10.1109/ICASSP.2013.6638214.
  • Laszka A., Johnson B., Schöttle P., Grossklags J., Böhme R. 2013. ‘Managing the weakest link: A game-theoretic approach for the mitigation of insider threats.’Contributed to the 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, Großbritannien. doi: 10.1007/978-3-642-40203-6_16.
  • Böhme Rainer, Ed. 2013. The Economics of Information Security and Privacy. Berlin Heidelberg: Springer.
  • Böhme Rainer, Kirchner Matthias. 2013. ‘Counter-Forensics: Attacking Image Forensics.’ In Digital Image Forensics: There is More to a Picture Than Meets the Eye, edited by Sencar Husrev T., Memon Nasir D., 327-366. New York: Springer. doi: 10.1007/978-1-4614-0757-7_12.
  • Möser Malte, Böhme Rainer, Breuker Dominic. 2013. ‘An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem.’Contributed to the APWG eCrime Researchers Summit (ECRIME 2013), San Francisco, USA.
  • Böhme Rainer, Grossklags Jens. 2013. ‘Trading Agent Kills Market Information: Evidence from Online Social Lending.’ In Web and Internet Economics, 9th International Conference, WINE 2013, Cambridge, MA, USA, edited by Chen Yiling, Immorlica Nicole, 68-81. Berlin Heidelberg: Springer.
  • Anderson Ross, Barton Chris, Böhme Rainer, Clayton Richard, Eeten Michael van, Levi Michael, Moore Tyler, Savage Stefan. 2012. ‘Measuring the Cost of Cybercrime.’Contributed to the Workshop of Economics and Information Security (WEIS), Berlin.
  • Böhme Rainer. 2012. ‘Security Audits Revisited.’ In Proceedings of Financial Cryptography and Data Security, edited by Keromytis Angelo, 129-147. Berlin Heidelberg: Springer.
  • Johnson Benjamin, Schöttle Pascal, Böhme Rainer. 2012. ‘Where to Hide the Bits?.’ In Decision and Game Theory for Security, edited by Grossklags Jens, Walrand Jean, 1-17. Berlin Heidelberg: Springer.
  • Böhme Rainer, Moore Tyler. 2012. ‘How Do Consumers React to Cybercrime?.’ In Proceedings of eCrime Researchers Summit.: IEEE Press.
  • Schöttle Pascal, Korff Stefan, Böhme Rainer. 2012. ‘Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding.’Contributed to the IEEE International Workshop on Information Forensics and Security (WIFS), Teneriffa.
  • Schöttle Pascal, Böhme Rainer. 2012. „A Game-Theoretic Approach to Content-Adaptive Steganography.“ In Information Hiding (14th International Conference), herausgegeben von Kirchner Matthias, Ghosal Dipak, 125-141. Berlin Heidelberg: Springer-Verlag.
  • Becker Jörg, Breuker Dominic, Heide Tobias, Holler Justus, Rauer Hans Peter, Böhme Rainer. 2012. ‘Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.’ In Workshop on the Economics of Information Security (WEIS 2012), 1-17.
  • Lai ShiYue, Böhme Rainer. 2011. ‘Countering Counter-Forensics: The Case of JPEG Compression.’ In Information Hiding (13th International Conference), edited by Filler T, Pevny T, Craver S, Ker A, 285-298. Berlin: Springer.
  • Böhme Rainer, Pötzsch Stefanie. 2011. ‘Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data.’ In Proceedings of Financial Cryptography and Data Security, edited by Danezis George, 1-15. Berlin Heidelberg: Springer.
  • Johnson Benjamin, Böhme Rainer, Grossklags Jens. 2011. ‘Security Games with Market Insurance.’ In Decision and Game Theory for Security, edited by Baras J S, Katz J, Altmann E, 117-130. Berlin Heidelberg: Springer.
  • Böhme Rainer, Félegyházi Márk. 2011. ‘Security Investment with Penetration Testing.’ IEEE COMSOC E-Letter 6, Nr. 5: 6-8.
  • Böhme Rainer, Grossklags Jens. 2011. ‘The Security Cost of Cheap User Interaction.’Contributed to the New Security Paradigms Workshop, Marin County, CA.
  • Böhme Rainer, Grossklags Jens. 2011. „Vanishing Signals: Trading Agent Kills Market Information.“ In NetEcon (ACM Electronic Commerce Workshop).
  • Böhme Rainer. 2011. „Wann sind IT-Security-Audits nützlich?.“ In Tagungsband Wirtschaftsinformatik, 385-394.
  • Böhme R. 2010. Advanced Statistical Steganalysis. Berlin, Heidelberg: Springer-Verlag.

Dissertationen

Laube, StefanAustausch von sicherheitsrelevanten Informationen mit Behörden2014 - 2017


Impressum | Datenschutzhinweis | © 2018 Institut
Institut
Beispielstr. 1
· 48155 Münster
Tel: +49 251 83-22223 · Fax: 0251 - 83 22 22 4
E-Mail: