Author of the publication

An Empirical Analysis of Privacy Dashboard Acceptance: the Google Case.

, , and . ECIS, page Research Paper 114. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Die FG - Berichte aus den Instituten.. Praxis der Informationsverarbeitung und Kommunikation, 28 (1): 60-61 (2005)Mit Sicherheit zukunftsfähig. DFG-Schwerpunktprogramm "Sicherheit in der Informations-und Kommunikationstechnik"., , and . Praxis der Informationsverarbeitung und Kommunikation, 26 (1): 5-14 (2003)Business Process Security Analysis - Design Time, Run Time, Audit Time., , and . it - Information Technology, 55 (6): 217-224 (2013)Placing Humans in the Feedback Loop of Social Infrastructures - NII Research Strategies on Cyber-Physical Systems., and . Informatik Spektrum, 36 (6): 520-529 (2013)Potentiale und Hürden des Electronic Commerce: Eine Momentaufnahme., and . Informatik Spektrum, 22 (4): 252-260 (1999)On Information Flow Forensics in Business Application Scenarios., , and . COMPSAC (2), page 324-328. IEEE Computer Society, (2009)978-0-7695-3726-9.Resilience - A New Research Field in Business Information Systems?, , and . BIS (Workshops), volume 160 of Lecture Notes in Business Information Processing, page 3-14. Springer, (2013)Hayek's Catallaxy: A Forward-Looking Concept for Information Systems?, , , and . AMCIS, page 234. Association for Information Systems, (2003)The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment., , and . KiVS Kurzbeiträge, page 131-141. VDE Verlag, (2003)FORTES: Forensic Information Flow Analysis of Business Processes., and . Distributed Usage Control, volume 10141 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)