Sigi Goode & Amir Riaz. (2023) Comparing security perceptions and relationship configurations of mobile device modders and non-modders. Information Technology & People.
Crossref
Jannik Lockl, Nico Thanner, Manuel Utz & Maximilian Röglinger. (2023) The Paradoxical Impact of Information Privacy on Privacy Preserving Technology: The Case of Self-Sovereign Identities. International Journal of Innovation and Technology Management 20:04.
Crossref
Michael Kubach & Heiko Roßnagel. (2023) Auf der Suche nach ökonomisch tragfähigen Identitäts-Ökosystemen: Gibt es einen Markt für digitale IDs?In Search of Economically Viable Identity Ecosystems: Is there a Market for Digital IDs?. HMD Praxis der Wirtschaftsinformatik 60:2, pages 422-436.
Crossref
Marco Hünseler & Eva Pöll. 2023. Privacy and Identity Management. Privacy and Identity Management
85
100
.
Alina Khayretdinova, Michael Kubach, Rachelle Sellung & Heiko Roßnagel. 2022. Selbstbestimmung, Privatheit und Datenschutz. Selbstbestimmung, Privatheit und Datenschutz
389
406
.
Frank Ebbers, Jan Zibuschka, Christian Zimmermann & Oliver Hinz. (2020) User preferences for privacy features in digital assistants. Electronic Markets 31:2, pages 411-426.
Crossref
Thomas Schulz, Markus Böhm, Heiko Gewald & Helmut Krcmar. (2020) Smart mobility – an analysis of potential customers’ preference structures. Electronic Markets 31:1, pages 105-124.
Crossref
Romilla Syed, Gurpreet Dhillon & Jason Merrick. (2018) The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media. Decision Sciences 50:3, pages 498-536.
Crossref
Jason X. S. Wu & Shan Liu. 2019. Data Science and Digital Business. Data Science and Digital Business
81
119
.
Jochen Bauer, Hilko Hoffmann, Thomas Feld, Mathias Runge, Oliver Hinz, Andreas Mayr, Kristina Förster, Franz Teske, Franziska Schäfer, Christoph Konrad & Jörg Franke. 2019. How AI Impacts Urban Living and Public Health. How AI Impacts Urban Living and Public Health
204
211
.
Hongying Zheng, Quan Yuan & Jianyong Chen. (2015) A framework for protecting personal information and privacy. Security and Communication Networks 8:16, pages 2867-2874.
Crossref
Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger & Pieter Ballon. (2015) Who manages the manager? Identity management and user ownership in the age of data. Who manages the manager? Identity management and user ownership in the age of data.
Moritz Christian Müller. 2014. Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity Management for Emerging Services and Technologies
177
187
.