005 Computerprogrammierung, Programme, Daten
Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (109)
- Institut für Verbraucherinformatik (IVI) (83)
- Fachbereich Informatik (41)
- Fachbereich Wirtschaftswissenschaften (34)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (7)
- Fachbereich Ingenieurwissenschaften und Kommunikation (2)
- Graduierteninstitut (1)
- Institut für funktionale Gen-Analytik (IFGA) (1)
- Institute of Visual Computing (IVC) (1)
- Zentrum für Ethik und Verantwortung (ZEV) (1)
Document Type
- Conference Object (149)
- Article (52)
- Part of a Book (6)
- Book (monograph, edited volume) (3)
- Research Data (2)
- Doctoral Thesis (2)
- Working Paper (2)
- Contribution to a Periodical (1)
- Master's Thesis (1)
- Preprint (1)
Year of publication
Language
- English (220) (remove)
Keywords
- GDPR (8)
- Usable Security (7)
- HTTP (5)
- security (5)
- usable privacy (5)
- Big Data Analysis (4)
- Cloud (4)
- Global Software Engineering (4)
- Privacy (4)
- REST (4)
- Risk-based Authentication (4)
- Web (4)
- Authentication (3)
- Offshoring (3)
- Qualitative research (3)
- SOA (3)
- web caching (3)
- web services (3)
- Authentication features (2)
- Business Ethnography (2)
- Claim personal data (2)
- Cloud Security (2)
- Consumer Informatics (2)
- Data literacy (2)
- Data takeout (2)
- Digital Sovereignty (2)
- Food (2)
- Global Software Development (2)
- HCI (2)
- Human Factors In Software Design (2)
- IoT (2)
- Malware analysis (2)
- Methodology (2)
- Password (2)
- Practice Theory (2)
- Public Transport (2)
- Qualitative Study (2)
- Risk-based Authentication (RBA) (2)
- SOAP (2)
- Security (2)
- Smart Home (2)
- Software (2)
- Sustainability (2)
- TLS (2)
- Usable Privacy (2)
- User Experience (2)
- User-Centered Design (2)
- Voice Assistants (2)
- WS-Security (2)
- XML Signature (2)
- XML Signature Wrapping (2)
- end user development (2)
- software engineering (2)
- structural equation modeling (2)
- 3D Printer (1)
- ACPYPE (1)
- API Documentation (1)
- API usability (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Accounting practices (1)
- Adaptive Media Streaming (1)
- Adaptive Streaming (1)
- Administrative work (1)
- Adoption (1)
- Adoption Factors (1)
- Advance Encryption Standard (1)
- Advances in Design Science Research (1)
- Affective computing (1)
- Agent-Based Modeling (1)
- Analysis (1)
- Appropriation (1)
- Appropriation Infras-tructure (1)
- Articulation Work (1)
- Artificial Intelligence (1)
- Attention mechanism (1)
- Authentifikation (1)
- Autonomous Driving (1)
- Biometric data (1)
- Black-box models (1)
- Botnet tracking (1)
- Botnets (1)
- Browser cache (1)
- CAE metadata structures (1)
- Cache Poisoning (1)
- Carbohydrate (1)
- Certificates (1)
- Chloroquine (1)
- Cipher Block Chain (1)
- Climate Risks (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Co-performance (1)
- CoAP (1)
- Collaborative design (1)
- Community (1)
- Computer Aided Software Engineering (1)
- Computer Security (1)
- Computer Support (1)
- Computersicherheit (1)
- Computing Milieux (1)
- Conceptual model (1)
- Conficker (1)
- Conformance Testing (1)
- Connected Car (1)
- Constructionism (1)
- Consumer protection (1)
- Content Security Policies (1)
- Context (1)
- Cooperative Work (1)
- Countermeasures (1)
- Crisis management (1)
- Curse of dimensionality (1)
- Cyber Attacks (1)
- Cyber Security (1)
- Cybercrime (1)
- Cybercrime Legislation (1)
- DASH (1)
- DNSSEC (1)
- DSGVO (1)
- Data Compression (1)
- Data Integration (1)
- Data Protection Officer (1)
- Data Reduction (1)
- Data Tiles (1)
- Data collection (1)
- Data protection by design (1)
- Data visualization (1)
- Deep Learning (1)
- Denial of Service (1)
- Deployment (1)
- Design (1)
- Design Case Study (1)
- Design Probe (1)
- Design patterns (1)
- Developer Centered Security (1)
- Difference-coding (1)
- Digital Ecosystem (1)
- Digital Energy Management (1)
- Digital Plumbing (1)
- Digital Receipt (1)
- Digital signatures (1)
- Disclosive ethics (1)
- Distribute Software Development (1)
- Domestic Robots (1)
- Domestic Technology (1)
- Domestic workplace studies (1)
- E-Health (1)
- ELSI (1)
- Ecosystems (1)
- Effective purpose specification (1)
- Elderly (1)
- Electric micromobility (1)
- Embodied knowledge (1)
- Empirical Study (1)
- Employee data protection (1)
- Employment (1)
- End-User Development (1)
- Engaging Experience (1)
- Environment Perception (1)
- Eriodictyol (1)
- Ethnographic Research (1)
- Evaluation (1)
- Expert Interviews (1)
- Fake review cues (1)
- Fake review detection (1)
- File carving (1)
- Financial practices (1)
- Folk theories (1)
- Food Practices (1)
- Food literacy (1)
- Force field (1)
- Fragmented files (1)
- Frontend architecture (1)
- Full-text Search (1)
- Geo-tagging (1)
- Glycam06 (1)
- Grassroots (1)
- Gromacs (1)
- HFI (1)
- HTML5 (1)
- HTTPS (1)
- Header whitelisting (1)
- Highly Automated Driving (1)
- Host-Based Code Injection Attacks (1)
- Household management (1)
- Human autonomy (1)
- Human computer interaction (HCI) (1)
- Human factors (1)
- Human review fraud detection (1)
- Human-Centered Robotics (1)
- Human-Robot-Interaction (HRI) (1)
- Human-centered computing (1)
- Human-food interaction (1)
- Human–Food Interaction (1)
- Hydroxychloroquine (1)
- ICT (1)
- IIoT (1)
- Implementation Challenges (1)
- Individual Empowerment (1)
- Informational self-determination (1)
- Infrastructuring (1)
- Integrated Household Information System (1)
- Integration Platform as a Service (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Intelligent Process Automation (1)
- Interactive Artifacts (1)
- Interbank Market (1)
- Intermediaries (1)
- Internet Technology (1)
- Internet of Things (1)
- Interpretability (1)
- Interviews (1)
- Invisible AI (1)
- IoT services security (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- Large-Scale Online Services (1)
- Last mile problem (1)
- Lead userness (1)
- Learning (1)
- Learning Environments (1)
- Learning and Adaptive Systems (1)
- Legal metrology (1)
- Liquidity Crises (1)
- Live Streaming (1)
- Living Lab (1)
- Login (1)
- Malware (1)
- Malware Detection (1)
- Management (1)
- Marketplaces (1)
- Memory forensics (1)
- Mental Models (1)
- Mental models (1)
- Message Authentication (1)
- Microservices (1)
- Misconception (1)
- Mixed / augmented reality (1)
- Mobile devices (1)
- Mobility (1)
- Model surrogation (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multimodal Mobility (1)
- Nearshoring (1)
- Nonbonded scaling factor (1)
- Online Services (1)
- Open Access (1)
- OpenStack (1)
- Opinion scam (1)
- Organizations (1)
- PHR (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Passwort (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Performance (1)
- Personal Health Record (1)
- Phishing (1)
- Platform economy (1)
- Policy (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy in the workplace (1)
- Privacy patterns (1)
- Privacy perceptions (1)
- Privatsphäre (1)
- Programmer Workbench (1)
- Prudential Regulation (1)
- Public Key Infrastructure (1)
- Push-based Streaming (1)
- RACS (1)
- RBAR (1)
- REST security (1)
- Relative Energies (1)
- Repositories (1)
- Research Trajectories (1)
- Research methods (1)
- Restful Web Services (1)
- Review scam (1)
- Risk Perception (1)
- Risk-Based Account Recovery (1)
- Robotic Process Automation (1)
- SAML (1)
- SARS-CoV-2 (1)
- SELMA (1)
- SID (1)
- SME (1)
- SOS calls (1)
- SaaS (1)
- Safety (1)
- Scholarly workbench (1)
- Scientific workbench (1)
- Secure Cloud Storage (1)
- Secure Coding Practices (1)
- Secure data transfer (1)
- Security APIs (1)
- Security Protocol (1)
- Self-driving (1)
- Semantic gap (1)
- Service Design (1)
- Service-Oriented Architecture (1)
- Silmitasertib (1)
- Small to medium-sized enterprises (1)
- Smart metering (1)
- Smartphones (1)
- Sociable Technologies (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Socio Informatics (1)
- Software Development (1)
- Software Security (1)
- Software as a Service (1)
- Stuxnet (1)
- Sustainable HCI (1)
- Taste (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Transportation (1)
- Trust (1)
- Two-factor Authentication (1)
- UI-Dressing (1)
- URI (1)
- UXD (1)
- Usable Security and Privacy (1)
- Usage Experience (1)
- User Requirements (1)
- User-perspective (1)
- Valproic acid (1)
- Verification systems (1)
- Video (1)
- Virtual Reality (1)
- Voight-Kampff test (1)
- Warnings (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Security (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- WebSockets (1)
- Well-being (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Work (1)
- Workflow (1)
- XML (1)
- XML Security (1)
- XSpRES (1)
- accelerometer (1)
- attacks (1)
- caching (1)
- carsharing (1)
- co-design (1)
- conformations (1)
- connected car (1)
- consumer informatics (1)
- cooperation (1)
- critical consumerism (1)
- cryptographic apis (1)
- culture (1)
- culture of participation (1)
- data literacy (1)
- data management (1)
- data science (1)
- data science canvas (1)
- data visualization (1)
- database systems (1)
- decision support system (1)
- deep learning (1)
- democratization (1)
- design probe (1)
- developer console (1)
- digital fabrication (1)
- digital platform ecosystem (1)
- distributed systems (1)
- drugs (1)
- eco-feedback (1)
- emergency response (1)
- emotion recognition (1)
- employee privacy (1)
- end-to-end security (1)
- ethics (1)
- ethnographically informed studies (1)
- ethnography (1)
- factor analysis (1)
- focus groups (1)
- food waste (1)
- higher education (1)
- human-centred design (1)
- humanoidrobot (1)
- informational self-determination (1)
- innovative work behavior (1)
- intervention mechanisms (1)
- knowledge graphs (1)
- knowledge management (1)
- knowledge sharing practices (1)
- latent class analysis (1)
- maker communities (1)
- mental models (1)
- mobile computing (1)
- mobility intelligence (1)
- multi-sensory (1)
- natural language processing (1)
- ontology (1)
- open educational resources (OERs) (1)
- optimized geometries (1)
- organizational management and coordination (1)
- participatory design (1)
- pervasive computing (1)
- posture analysis (1)
- privacy at work (1)
- privacy by design (1)
- privacy preferences (1)
- privacy settings (1)
- process infrastructure (1)
- project management (1)
- prosumption (1)
- qualitative research methods (1)
- question answering (1)
- reCAPTCHA (1)
- recommender systems (1)
- right to access (1)
- security and privacy literacy (1)
- security warning design (1)
- semantic technologies (1)
- services (1)
- shared mobility (1)
- sharing (1)
- signature (1)
- simulation process (1)
- small enterprises (1)
- small molecule (1)
- smart meters (1)
- social robots (1)
- software development (1)
- spinal posture (1)
- sustainability (1)
- sustainable mobility (1)
- technological platform (1)
- text mining (1)
- transfer learning (1)
- transparency-enhancing technologies (1)
- usability (1)
- usable privacy controls (1)
- usable secure email (1)
- user interface design (1)
- user journey (1)
- validity (1)
- visibility (1)
- visualization (1)
- wearable sensor (1)
- web services security (1)
- wine (1)
The digitization of financial activities in consumers' lives is increasing, and the digitalization of invoicing processes is expected to play a significant role, although this area is not well understood regarding the private sector. Human-Computer Interaction (HCI) and Computer Supported Cooperative Work (CSCW) research have a long history of analyzing the socio-material and temporal aspects of work practices that are relevant for the domestic domain. The socio-material structuring of invoicing work and the working styles of consumers must be considered when designing effective consumer support systems. In this ethnomethodologically-informed, design-oriented interview study, we followed 17 consumers in their daily practices of dealing with invoices to make the invisible administrative work involved in this process visible. We identified and described the meaningful artifacts that were used in a spatial-temporal process within various storage locations such as input, reminding, intermediate (for postponing cases) buffers, and archive systems. Furthermore, we identified three different working styles that consumers exhibited: direct completion, at the next opportunity, and postpone as far as possible. This study contributes to our understanding of household economics and domestic workplace studies in the tradition of CSCW and has implications for the design of electronic invoicing systems.
The European General Data Protection Regulation requires the implementation of Technical and Organizational Measures (TOMs) to reduce the risk of illegitimate processing of personal data. For these measures to be effective, they must be applied correctly by employees who process personal data under the authority of their organization. However, even data processing employees often have limited knowledge of data protection policies and regulations, which increases the likelihood of misconduct and privacy breaches. To lower the likelihood of unintentional privacy breaches, TOMs must be developed with employees’ needs, capabilities, and usability requirements in mind. To reduce implementation costs and help organizations and IT engineers with the implementation, privacy patterns have proven to be effective for this purpose. In this chapter, we introduce the privacy pattern Data Cart, which specifically helps to develop TOMs for data processing employees. Based on a user-centered design approach with employees from two public organizations in Germany, we present a concept that illustrates how Privacy by Design can be effectively implemented. Organizations, IT engineers, and researchers will gain insight on how to improve the usability of privacy-compliant tools for managing personal data.
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Integrating physical simulation data into data ecosystems challenges the compatibility and interoperability of data management tools. Semantic web technologies and relational databases mostly use other data types, such as measurement or manufacturing design data. Standardizing simulation data storage and harmonizing the data structures with other domains is still a challenge, as current standards such as the ISO standard STEP (ISO 10303 ”Standard for the Exchange of Product model data”) fail to bridge the gap between design and simulation data. This challenge requires new methods, such as ontologies, to rethink simulation results integration. This research describes a new software architecture and application methodology based on the industrial standard ”Virtual Material Modelling in Manufacturing” (VMAP). The architecture integrates large quantities of structured simulation data and their analyses into a semantic data structure. It is capable of providing data permeability from the global digital twin level to the detailed numerical values of data entries and even new key indicators in a three-step approach: It represents a file as an instance in a knowledge graph, queries the file’s metadata, and finds a semantically represented process that enables new metadata to be created and instantiated.