Follow
Denis Feth
Denis Feth
Expert »Data Sovereignty«
Verified email at iese.fraunhofer.de
Title
Cited by
Cited by
Year
Flexible data-driven security for android
D Feth, A Pretschner
2012 IEEE Sixth International Conference on Software Security and …, 2012
472012
Why users ignore privacy policies–a survey and intention model for explaining user privacy behavior
M Rudolph, D Feth, S Polst
Human-Computer Interaction. Theories, Methods, and Human Issues: 20th …, 2018
402018
A user-centered model for usable security and privacy
D Feth, A Maier, S Polst
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
312017
Context-aware, data-driven policy enforcement for smart mobile devices in business environments
D Feth, C Jung
Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012
202012
Company privacy dashboards: employee needs and requirements
S Polst, P Kelbert, D Feth
HCI for Cybersecurity, Privacy and Trust: First International Conference …, 2019
162019
Context-aware policy enforcement for android
C Jung, D Feth, C Seise
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
162013
Requirements elicitation and derivation of security policy templates—an industrial case study
M Rudolph, D Feth, J Doerr, J Spilker
2016 IEEE 24th International Requirements Engineering Conference (RE), 283-292, 2016
152016
Heuristics and models for evaluating the usability of security measures
D Feth, S Polst
Proceedings of Mensch und Computer 2019, 275-285, 2019
112019
Transparency through contextual privacy statements
D Feth
Gesellschaft für Informatik eV, 2017
112017
User-centric security: optimization of the security-usability trade-off
D Feth
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
112015
Requirement and quality models for privacy dashboards
D Feth, H Schmitt
2020 IEEE 7th International Workshop on Evolving Security & Privacy …, 2020
92020
Privatheit am Arbeitsplatz: Transparenz und Selbstbestimmung bei Arbeit 4.0
J Tolsdorf, CK Bosse, A Dietrich, D Feth, H Schmitt
Datenschutz und Datensicherheit-DuD 44 (3), 176-181, 2020
72020
Evaluation kontextueller datenschutzerklärungen
AM Ortloff, L Güntner, M Windl, D Feth, S Polst
Gesellschaft für Informatik eV, 2018
72018
Components and architecture for the implementation of technology-driven employee data protection
F Dehling, D Feth, S Polst, B Steffes, J Tolsdorf
Trust, Privacy and Security in Digital Business: 18th International …, 2021
62021
Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms
MP Rudolph, D Feth
Gesellschaft für Informatik eV, 2019
52019
A framework for generating user-and domain-tailored security policy editors
M Rudolph, C Moucha, D Feth
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
52016
Dealing with uncertainty in context-aware mobile applications
C Jung, A Eitel, D Feth, M Rudolph
MOBILITY 2015, 9, 2015
52015
Automatic derivation of context descriptions
C Jung, D Feth, Y Elrakaiby
2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2015
52015
Datensouveränität in Digitalen Ökosystemen: Daten nutzbar machen, Kontrolle behalten
C Jung, A Eitel, D Feth
Datenwirtschaft und Datentechnologie: Wie aus Daten Wert entsteht, 203-220, 2022
32022
Benutzerfreundlicher datenschutz in cloud-basierten office-paketen
J Tolsdorf, F Dehling, D Feth
Datenschutz und Datensicherheit-dud 45 (1), 33-39, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20