Author of the publication

Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services.

, , and . IESS, volume 279 of Lecture Notes in Business Information Processing, page 323-336. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems., , and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 317-325. Springer, (2011)Earning m-oney - a situation based approach for mobile business models., , , , and . ECIS, page 642-656. (2003)The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten., , and . New Media & Society, 19 (12): 1983-2002 (2017)Open Challenges - Towards the (Not So Distant) Future of Identity., and . The Future of Identity in the Information Society, Springer, (2009)Mobility and Identity., , and . The Future of Identity in the Information Society, Springer, (2009)Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten., , , , , , , and . Informatik Spektrum, 37 (1): 14-24 (2014)Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services., , and . IESS, volume 279 of Lecture Notes in Business Information Processing, page 323-336. (2017)Where Security Research Should Go in the Next Decade.. Secure Data Management, volume 8425 of Lecture Notes in Computer Science, page 28-32. Springer, (2013)A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2019)Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication., , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 111-124. Springer, (2012)