005 Computerprogrammierung, Programme, Daten
Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (144)
- Institut für Verbraucherinformatik (IVI) (94)
- Fachbereich Wirtschaftswissenschaften (43)
- Fachbereich Informatik (36)
- Fachbereich Ingenieurwissenschaften und Kommunikation (2)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (2)
- Graduierteninstitut (1)
- Zentrum für Ethik und Verantwortung (ZEV) (1)
Document Type
- Conference Object (165)
- Article (58)
- Part of a Book (18)
- Book (monograph, edited volume) (12)
- Contribution to a Periodical (8)
- Master's Thesis (3)
- Research Data (2)
- Doctoral Thesis (2)
- Lecture (2)
- Report (2)
Year of publication
Has Fulltext
- no (273) (remove)
Keywords
- Usable Security (6)
- GDPR (5)
- Privacy (5)
- Usable Privacy (5)
- usable privacy (5)
- Cloud (4)
- Global Software Engineering (4)
- HTTP (4)
- REST (4)
- security (4)
- Java <Programmiersprache> (3)
- Offshoring (3)
- Python <Programmiersprache> (3)
- Qualitative research (3)
- SOA (3)
- Security (3)
- Web (3)
- web caching (3)
- web services (3)
- Authentication (2)
- Business Ethnography (2)
- Claim personal data (2)
- Cloud Security (2)
- Data literacy (2)
- Data takeout (2)
- Datenmanagement (2)
- Digital Sovereignty (2)
- Digitalisierung (2)
- Food (2)
- Global Software Development (2)
- Human Factors In Software Design (2)
- Malware analysis (2)
- Methodology (2)
- Software (2)
- TLS (2)
- User Experience (2)
- Verkehrsmittelwahl (2)
- WS-Security (2)
- end user development (2)
- software engineering (2)
- usability (2)
- 3D Printer (1)
- ACPYPE (1)
- API usability (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Ad Hoc Kommunikation (1)
- Adaptive Media Streaming (1)
- Adaptive Streaming (1)
- Adoption (1)
- Adoption Factors (1)
- Advance Encryption Standard (1)
- Affective computing (1)
- Agent-Based Modeling (1)
- Agilität (1)
- Alternde Gesellschaft (1)
- Analysis (1)
- Appropriation Infras-tructure (1)
- Articulation Work (1)
- Artificial Intelligence (1)
- Attention mechanism (1)
- Authentifikation (1)
- Autonomes Fahren (1)
- Autonomous Driving (1)
- Bewegungsmotivation (1)
- Big Data (1)
- Biometric data (1)
- Black-box models (1)
- Botnet tracking (1)
- Botnets (1)
- Browser cache (1)
- Cache Poisoning (1)
- Carbohydrate (1)
- Certificates (1)
- Chen (1)
- Cipher Block Chain (1)
- Climate Risks (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Clusteranalyse (1)
- CoAP (1)
- Collaborative design (1)
- Common Criteria (1)
- Community (1)
- Computer Aided Software Engineering (1)
- Computer Security (1)
- Computer Support (1)
- Computersicherheit (1)
- Computing Milieux (1)
- Conceptual model (1)
- Conficker (1)
- Conformance Testing (1)
- Connected Car (1)
- Constructionism (1)
- Consumer protection (1)
- Context (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Cooperative Work (1)
- Countermeasures (1)
- Crisis management (1)
- Curse of dimensionality (1)
- Cyber Attacks (1)
- Cyber Security (1)
- Cybercrime (1)
- Cybercrime Legislation (1)
- DASH (1)
- DNSSEC (1)
- DSGVO (1)
- Data Compression (1)
- Data Integration (1)
- Data Reduction (1)
- Data Tiles (1)
- Data collection (1)
- Data visualization (1)
- Datenbanken (1)
- Datenmodellierung (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Deep Learning (1)
- Denial of Service (1)
- Deployment (1)
- Design (1)
- Design Case Study (1)
- Design patterns (1)
- Deskriptive Datenanalyse (1)
- Difference-coding (1)
- Digital Energy Management (1)
- Digital Plumbing (1)
- Digital signatures (1)
- Digitaler Konsum (1)
- Digitalisierungsstrategie (1)
- Dimensionsreduktion (1)
- Disclosive ethics (1)
- Distribute Software Development (1)
- Domestic Robots (1)
- ELSI (1)
- ERM (1)
- Ecosystems (1)
- Elderly (1)
- Electric micromobility (1)
- Electronic Data Capture (EDC) (1)
- Employee data protection (1)
- Employment (1)
- End-User Development (1)
- Entity-Relationship-Datenmodell (1)
- Entity-Relationship-Modell (1)
- Entitätsmengen-Beziehungs-Modell (1)
- Environment Perception (1)
- Ethnographic Research (1)
- Evaluation (1)
- File carving (1)
- Folk theories (1)
- Force field (1)
- Fragmented files (1)
- Frontend architecture (1)
- Full-text Search (1)
- Geo-tagging (1)
- Geschäftsmodell (1)
- Gesundheit (1)
- Glycam06 (1)
- Grassroots (1)
- Gromacs (1)
- HCI (1)
- HFI (1)
- HTML5 (1)
- HTTPS (1)
- Hauswirtschaft (1)
- Highly Automated Driving (1)
- Host-Based Code Injection Attacks (1)
- Human autonomy (1)
- Human computer interaction (1)
- Human computer interaction (HCI) (1)
- Human factors (1)
- Human-Centered Robotics (1)
- Human-Robot-Interaction (HRI) (1)
- Human-centered computing (1)
- Human–Food Interaction (1)
- ICT (1)
- IIoT (1)
- ISO 27000 (1)
- IT-Management (1)
- IT-Sicherheitsanforderungen (1)
- IT-Strategie (1)
- Individual Empowerment (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Infrastructuring (1)
- Infrastruktur (1)
- Integration Platform as a Service (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Intelligent Process Automation (1)
- Interbank Market (1)
- Internet Technology (1)
- Internet of Things (1)
- Interpretability (1)
- Interviews (1)
- Invisible AI (1)
- IoT (1)
- IoT services security (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- KMU (1)
- Labordaten (1)
- Last mile problem (1)
- Lead userness (1)
- Learning (1)
- Learning Environments (1)
- Learning and Adaptive Systems (1)
- Legal Design (1)
- Legal metrology (1)
- Liquidity Crises (1)
- Live Streaming (1)
- Living Lab (1)
- Login (1)
- Malware (1)
- Malware Detection (1)
- Management (1)
- Marketplaces (1)
- Memory forensics (1)
- Mental Models (1)
- Mental models (1)
- Message Authentication (1)
- Microservices (1)
- Misconception (1)
- Mixed / augmented reality (1)
- Mobile devices (1)
- Mobility (1)
- Mobiltelefone (1)
- Model surrogation (1)
- Modellierung (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Nachhaltigkeit (1)
- Nearshoring (1)
- Nonbonded scaling factor (1)
- Nutzerakzeptanz (1)
- Online Services (1)
- Open Access (1)
- Organizations (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Passwort (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Performance (1)
- Persuasive Systeme (1)
- Phishing (1)
- Platform economy (1)
- Policy (1)
- Practice Theory (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Privatsphäre (1)
- Programmer Workbench (1)
- Prudential Regulation (1)
- Public Key Infrastructure (1)
- Public Transport (1)
- Push-based Streaming (1)
- Qualitative Study (1)
- RACS (1)
- RBAR (1)
- REDCap (1)
- REST security (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Relationenmodell (1)
- Relativer Mehrwert (1)
- Repositories (1)
- Research Trajectories (1)
- Research methods (1)
- Resilienz (1)
- Restful Web Services (1)
- Risk Perception (1)
- Risk-Based Account Recovery (1)
- Robotic Process Automation (1)
- SELMA (1)
- SID (1)
- SME (1)
- SOAP (1)
- SOS calls (1)
- SaaS (1)
- Safety (1)
- Scholarly workbench (1)
- Schutzobjekte (1)
- Scientific workbench (1)
- Secure Cloud Storage (1)
- Secure data transfer (1)
- Security APIs (1)
- Security Protocol (1)
- Selbstfahrende Autos (1)
- Selbstfahrtechnik (1)
- Self-Driving Cars (1)
- Self-driving (1)
- Sensorbasierte Systeme (1)
- Service Design (1)
- Service-Oriented Architecture (1)
- Shared Autonomous Vehicles (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Small to medium-sized enterprises (1)
- Smart Home (1)
- Smart metering (1)
- Smartphones (1)
- Sociable Technologies (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Socio Informatics (1)
- Software Development (1)
- Software Security (1)
- Software as a Service (1)
- Stuxnet (1)
- Sustainability (1)
- Sustainable HCI (1)
- Taste (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Transportation (1)
- Trust (1)
- UI-Dressing (1)
- URI (1)
- Umfrage (1)
- Usage Experience (1)
- User Requirements (1)
- User-Centered Design (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Verbraucherforschung (1)
- Verbraucherinformatik (1)
- Verification systems (1)
- Video (1)
- Virtual Reality (1)
- Voice Assistants (1)
- Voight-Kampff test (1)
- Warnings (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Security (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- WebSockets (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Work (1)
- Workflow (1)
- XML (1)
- XML Security (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XSpRES (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- appropriation (1)
- attacks (1)
- breakdowns (1)
- caching (1)
- carsharing (1)
- co-design (1)
- connected car (1)
- consumer informatics (1)
- cooperation (1)
- critical consumerism (1)
- cryptographic apis (1)
- culture (1)
- culture of participation (1)
- data visualization (1)
- decision support system (1)
- democratization (1)
- design probe (1)
- developer console (1)
- digital fabrication (1)
- digital platform ecosystem (1)
- distributed systems (1)
- eco-feedback (1)
- emergency response (1)
- emotion recognition (1)
- end-to-end security (1)
- ethics (1)
- ethnographically informed studies (1)
- ethnography (1)
- focus groups (1)
- human-centred design (1)
- humanoidrobot (1)
- innovative work behavior (1)
- intervention mechanisms (1)
- knowledge management (1)
- knowledge sharing practices (1)
- maker communities (1)
- mobile computing (1)
- mobility intelligence (1)
- multi-sensory (1)
- organizational management and coordination (1)
- participatory design (1)
- pervasive computing (1)
- privacy by design (1)
- privacy preferences (1)
- privacy settings (1)
- process infrastructure (1)
- project management (1)
- prosumption (1)
- qualitative research methods (1)
- reCAPTCHA (1)
- recommender systems (1)
- right to access (1)
- security and privacy literacy (1)
- security warning design (1)
- services (1)
- shared mobility (1)
- sharing (1)
- signature (1)
- small enterprises (1)
- smart meters (1)
- social robots (1)
- software development (1)
- structural equation modeling (1)
- sustainability (1)
- sustainable mobility (1)
- technological platform (1)
- transparency-enhancing technologies (1)
- usable secure email (1)
- user interface design (1)
- user journey (1)
- validity (1)
- visibility (1)
- visualization (1)
- voice interaction (1)
- web services security (1)
- wine (1)
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Der Programmier-Trainingsplan für alle, die weiter kommen wollen.
In diesem Übungsbuch trainierst du anhand von kurzweiligen und praxisnahen Aufgaben deine Programmierfähigkeiten. Jedes Kapitel beginnt mit einem kurzen Warmup zum behandelten Programmierkonzept; die Umsetzung übst du dann anhand von zahlreichen Workout-Aufgaben. Du startest mit einfachen Aufgaben und steigerst dich hin zu komplexeren Fragestellungen. Damit dir nicht langweilig wird, gibt es über 150 praxisnahe Übungen. So lernst du z. B. einen BMI-Rechner oder einen PIN-Generator zu programmieren oder wie du eine Zeitangabe mit einer analogen Uhr anzeigen kannst. (Verlagsangaben)
Datenmodellierung
(2023)
Although climate-induced liquidity risks can cause significant disruptions and instabilities in the financial sector, they are frequently overlooked in current debates and policy discussions. This paper proposes a macro-financial agent-based integrated assessment model to investigate the transmission channels of climate risks to financial instability and study the emergence of liquidity crises through interbank market dynamics. Our simulations show that the financial system could experience serious funding and market liquidity shortages due to climate-induced liquidity crises. Our investigation contributes to our understanding of the impact - and possible solutions - to climate-induced liquidity crises, besides the issue of asset stranding related to transition risks usually considered in the existing studies.
Risikobasierte Authentifizierung (RBA) ist ein adaptiver Ansatz zur Stärkung der Passwortauthentifizierung. Er überwacht eine Reihe von Merkmalen, die sich auf das Loginverhalten während der Passworteingabe beziehen. Wenn sich die beobachteten Merkmalswerte signifikant von denen früherer Logins unterscheiden, fordert RBA zusätzliche Identitätsnachweise an. Regierungsbehörden und ein Erlass des US-Präsidenten empfehlen RBA, um Onlineaccounts vor Angriffen mit gestohlenen Passwörtern zu schützen. Trotz dieser Tatsachen litt RBA unter einem Mangel an offenem Wissen. Es gab nur wenige bis keine Untersuchungen über die Usability, Sicherheit und Privatsphäre von RBA. Das Verständnis dieser Aspekte ist jedoch wichtig für eine breite Akzeptanz.
Diese Arbeit soll ein umfassendes Verständnis von RBA mit einer Reihe von Studien vermitteln. Die Ergebnisse ermöglichen es, datenschutzfreundliche RBA-Lösungen zu schaffen, die die Authentifizierung stärken bei gleichzeitig hoher Menschenakzeptanz.
There has been a growing interest in taste research in the HCI and CSCW communities. However, the focus is more on stimulating the senses, while the socio-cultural aspects have received less attention. However, individual taste perception is mediated through social interaction and collective negotiation and is not only dependent on physical stimulation. Therefore, we study the digital mediation of taste by drawing on ethnographic research of four online wine tastings and one self-organized event. Hence, we investigated the materials, associated meanings, competences, procedures, and engagements that shaped the performative character of tasting practices. We illustrate how the tastings are built around the taste-making process and how online contexts differ in providing a more diverse and distributed environment. We then explore the implications of our findings for the further mediation of taste as a social and democratized phenomenon through online interaction.
This open access book brings together the latest developments from industry and research on automated driving and artificial intelligence.
Environment perception for highly automated driving heavily employs deep neural networks, facing many challenges. How much data do we need for training and testing? How to use synthetic data to save labeling costs for training? How do we increase robustness and decrease memory usage? For inevitably poor conditions: How do we know that the network is uncertain about its decisions? Can we understand a bit more about what actually happens inside neural networks? This leads to a very practical problem particularly for DNNs employed in automated driving: What are useful validation techniques and how about safety?
This book unites the views from both academia and industry, where computer vision and machine learning meet environment perception for highly automated driving. Naturally, aspects of data, robustness, uncertainty quantification, and, last but not least, safety are at the core of it. This book is unique: In its first part, an extended survey of all the relevant aspects is provided. The second part contains the detailed technical elaboration of the various questions mentioned above.
Login Data Set for Risk-Based Authentication
Synthesized login feature data of >33M login attempts and >3.3M users on a large-scale online service in Norway. Original data collected between February 2020 and February 2021.
This data sets aims to foster research and development for <a href="https://riskbasedauthentication.org">Risk-Based Authentication (RBA) systems. The data was synthesized from the real-world login behavior of more than 3.3M users at a large-scale single sign-on (SSO) online service in Norway.