005 Computerprogrammierung, Programme, Daten
Refine
H-BRS Bibliography
- yes (130) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (63)
- Fachbereich Wirtschaftswissenschaften (58)
- Institut für Verbraucherinformatik (IVI) (48)
- Institut für Cyber Security & Privacy (ICSP) (42)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (7)
- Fachbereich Ingenieurwissenschaften und Kommunikation (3)
- Graduierteninstitut (1)
- Institut für funktionale Gen-Analytik (IFGA) (1)
- Institute of Visual Computing (IVC) (1)
- Zentrum für Ethik und Verantwortung (ZEV) (1)
Document Type
- Conference Object (54)
- Article (37)
- Part of a Book (15)
- Book (monograph, edited volume) (6)
- Working Paper (4)
- Conference Proceedings (3)
- Research Data (2)
- Master's Thesis (2)
- Report (2)
- Study Thesis (2)
Year of publication
Keywords
- Usable Security (8)
- GDPR (6)
- Big Data Analysis (4)
- Risk-based Authentication (4)
- Usable Privacy (4)
- usable privacy (3)
- Artificial Intelligence (2)
- Authentication (2)
- Authentication features (2)
- Consumer Informatics (2)
- Data literacy (2)
- Datenmanagement (2)
- Digital Sovereignty (2)
- Digitalisierung (2)
- Machine Learning (2)
- Password (2)
- Practice Theory (2)
- Privacy (2)
- Public Transport (2)
- Qualitative Study (2)
- Risk-based Authentication (RBA) (2)
- Smart Home (2)
- User Experience (2)
- Verkehrsmittelwahl (2)
- Voice Assistants (2)
- structural equation modeling (2)
- ACPYPE (1)
- API Documentation (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Accounting practices (1)
- Administrative work (1)
- Adoption (1)
- Adoption Factors (1)
- Advances in Design Science Research (1)
- Agent-Based Modeling (1)
- Agilität (1)
- Appropriation (1)
- Attention mechanism (1)
- Authentifikation (1)
- Autonomes Fahren (1)
- Autonomous Driving (1)
- Big Data (1)
- Biometric data (1)
- Black-box models (1)
- CAE metadata structures (1)
- CC (1)
- Carbohydrate (1)
- Chen (1)
- Chloroquine (1)
- Climate Risks (1)
- Cloud (1)
- Clusteranalyse (1)
- Co-performance (1)
- Common Criteria (1)
- Computersicherheit (1)
- Conceptual model (1)
- Connected Car (1)
- Consumer protection (1)
- Content Security Policies (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Creative Commons (1)
- Curse of dimensionality (1)
- Data (1)
- Data Integration (1)
- Data Literacy (1)
- Data Protection Officer (1)
- Data Science (1)
- Data Storytelling (1)
- Data Storytelling Process (1)
- Data protection by design (1)
- Data visualization (1)
- Data-Storytelling-Prozess (1)
- Datenbanken (1)
- Datenbanksysteme (1)
- Datenkompetenz (1)
- Datenmodellierung (1)
- Datenwissenschaft (1)
- Deep Learning (1)
- Design (1)
- Design Probe (1)
- Deskriptive Datenanalyse (1)
- Developer Centered Security (1)
- Digital Ecosystem (1)
- Digital Receipt (1)
- Digitale Lehre (1)
- Digitalisierungsstrategie (1)
- Dimensionsreduktion (1)
- Domestic Robots (1)
- Domestic Technology (1)
- Domestic workplace studies (1)
- E-Health (1)
- ERM (1)
- Effective purpose specification (1)
- Electric micromobility (1)
- Electronic Data Capture (EDC) (1)
- Embodied knowledge (1)
- Empirical Study (1)
- Employee data protection (1)
- Engaging Experience (1)
- Entity-Relationship-Datenmodell (1)
- Entity-Relationship-Modell (1)
- Entitätsmengen-Beziehungs-Modell (1)
- Environment Perception (1)
- Eriodictyol (1)
- Ethnographic Research (1)
- Expert Interviews (1)
- Fake review cues (1)
- Fake review detection (1)
- Financial practices (1)
- Folk theories (1)
- Food (1)
- Food Practices (1)
- Food literacy (1)
- Force field (1)
- Geo-tagging (1)
- Geschäftsmodell (1)
- Glycam06 (1)
- Gromacs (1)
- HCI (1)
- HTTP (1)
- Header whitelisting (1)
- Highly Automated Driving (1)
- Hochschullehre (1)
- Household management (1)
- Human autonomy (1)
- Human computer interaction (HCI) (1)
- Human review fraud detection (1)
- Human-Centered Robotics (1)
- Human-centered computing (1)
- Human-food interaction (1)
- Human–Food Interaction (1)
- Hydroxychloroquine (1)
- ISO 27000 (1)
- IT-Management (1)
- IT-Sicherheitsanforderungen (1)
- IT-Strategie (1)
- Implementation Challenges (1)
- Implementation Model (1)
- Individual Empowerment (1)
- Integrated Household Information System (1)
- Integration Platform as a Service (1)
- Intelligent Process Automation (1)
- Interactive Artifacts (1)
- Interbank Market (1)
- Intermediaries (1)
- Interpretability (1)
- Invisible AI (1)
- IoT (1)
- Java <Programmiersprache> (1)
- KMU (1)
- Labordaten (1)
- Large-Scale Online Services (1)
- Last mile problem (1)
- Lead userness (1)
- Learning and Adaptive Systems (1)
- Liquidity Crises (1)
- Living Lab (1)
- Login (1)
- MLOps Tools (1)
- MLR (1)
- Marketplaces (1)
- Mental models (1)
- Microsoft (1)
- Misconception (1)
- Mixed / augmented reality (1)
- Mobile devices (1)
- Model surrogation (1)
- Modellierung (1)
- Multimodal Mobility (1)
- Nonbonded scaling factor (1)
- Nutzerakzeptanz (1)
- OER (1)
- Online Services (1)
- Open Access (1)
- Open Educational Ressources (1)
- OpenStack (1)
- Opinion scam (1)
- PHR (1)
- Passwort (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Personal Health Record (1)
- Policy (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy patterns (1)
- Prudential Regulation (1)
- Public Cloud Services (1)
- Python <Programmiersprache> (1)
- RBAR (1)
- REDCap (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Relationenmodell (1)
- Relative Energies (1)
- Relativer Mehrwert (1)
- Repositories (1)
- Requirements Engineering (1)
- Review scam (1)
- Risk Perception (1)
- Risk-Based Account Recovery (1)
- Robotic Process Automation (1)
- SAML (1)
- SARS-CoV-2 (1)
- SOAP (1)
- Safety (1)
- Scholarly workbench (1)
- Schutzobjekte (1)
- Scientific workbench (1)
- Secure Coding Practices (1)
- Selbstfahrende Autos (1)
- Selbstfahrtechnik (1)
- Self-Driving Cars (1)
- Self-driving (1)
- Semantic gap (1)
- Service Design (1)
- Shared Autonomous Vehicles (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Silmitasertib (1)
- Smartphones (1)
- Software as a Service (1)
- Sustainability (1)
- Taste (1)
- Trust (1)
- Two-factor Authentication (1)
- UXD (1)
- Umfrage (1)
- Usable Security and Privacy (1)
- User Requirements (1)
- User-Centered Design (1)
- User-perspective (1)
- Valproic acid (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Verification systems (1)
- Virtual Reality (1)
- Voight-Kampff test (1)
- Vorgehensmodell (1)
- Web (1)
- Well-being (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- Zeitreihenanalyse (1)
- accelerometer (1)
- carsharing (1)
- co-design (1)
- conformations (1)
- connected car (1)
- consumer informatics (1)
- critical consumerism (1)
- data literacy (1)
- data management (1)
- data science (1)
- data science canvas (1)
- database systems (1)
- decision support system (1)
- deep learning (1)
- democratization (1)
- digital platform ecosystem (1)
- drugs (1)
- employee privacy (1)
- ethics (1)
- ethnography (1)
- factor analysis (1)
- food waste (1)
- higher education (1)
- human-centred design (1)
- informational self-determination (1)
- innovative work behavior (1)
- intervention mechanisms (1)
- knowledge graphs (1)
- latent class analysis (1)
- mental models (1)
- mobility intelligence (1)
- multi-sensory (1)
- natural language processing (1)
- ontology (1)
- open educational resources (OERs) (1)
- optimized geometries (1)
- posture analysis (1)
- privacy at work (1)
- privacy by design (1)
- question answering (1)
- reCAPTCHA (1)
- recommender systems (1)
- right to access (1)
- security (1)
- security and privacy literacy (1)
- semantic technologies (1)
- shared mobility (1)
- simulation process (1)
- small molecule (1)
- spinal posture (1)
- sustainable mobility (1)
- text mining (1)
- transfer learning (1)
- transparency-enhancing technologies (1)
- usability (1)
- usable privacy controls (1)
- usable secure email (1)
- user interface design (1)
- user journey (1)
- wearable sensor (1)
- wine (1)
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Dieser Beitrag betrachtet den Stand der Entwicklung bei der Vernetzung von Fahrzeugen aus Sicht der IT-Sicherheit. Etablierte Kommunikationssysteme und Verkehrstelematikanwendungen im Automobil werden ebenso vorgestellt und diskutiert wie auch zukünftige Kommunikationstechnologien Car-2-Car und Car-2-X. IT-Sicherheit im Automobil ist ein schwieriges Feld, da es hier um eine Integration von neuen innovativen Anwendungen in eine hochkomplexe bestehende Fahrzeugarchitektur geht, die zu keinen neuen Gefährdungen für die Fahrzeuginsassen führen darf. Zudem bleibt die Funktionsweise dieser Anwendungen mit ihren Auswirkungen auf das informationelle Selbstbestimmungsrecht oft intransparent. Die abschließende Diskussion gibt Handlungsempfehlungen aus Sicht der Verbraucher.