Author of the publication

Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing.

, , and . PerCom Workshops, page 364-367. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On credibility improvements for automotive navigation systems., , , and . Personal and Ubiquitous Computing, 17 (5): 803-813 (2013)A VANET-based emergency vehicle warning system., , , and . VNC, page 1-8. IEEE, (2009)Privacy Requirements in Vehicular Communication Systems., , and . CSE (3), page 139-145. IEEE Computer Society, (2009)Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition., , and . ACM Trans. Softw. Eng. Methodol., 25 (3): 22:1-22:24 (2016)Towards context adaptive privacy decisions in ubiquitous computing., , , and . PerCom Workshops, page 407-410. IEEE Computer Society, (2012)Dynamic privacy adaptation in ubiquitous computing.. University of Ulm, (2014)Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations., , , , , , , , , and 1 other author(s). TWEB, 13 (1): 1:1-1:29 (2019)We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy., , , , , and . CoRR, (2018)"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology., , , and . iConference, volume 11420 of Lecture Notes in Computer Science, page 754-766. Springer, (2019)Interaction weaknesses of personal navigation devices., , , and . AutomotiveUI, page 129-136. ACM, (2010)