Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technikfolgen-Abschätzung: Ubiquitäres Computing und Informationelle Selbstbestimmung, , , , , , , and . Studie, Bundesministerium für Bildung und Forschung (BMBF), Berlin, (July 2006)Track and Treat - Usage of E-Mail Tracking for Newsletter Individualization., , , and . ECIS, page 59. (2018)Ethics of AI-Supported Autonomous Driving., , , , and . PACIS, page 289. (2022)Shedding Light on Mobile App Store Censorship, , , and . Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization, page 193–198. Association for Computing Machinery, (2019)Detecting child sexual abuse material: A comprehensive survey, , , and . Forensic Science International: Digital Investigation, (2020)Topological analysis of cloud service connectivity., , and . Comput. Ind. Eng., (2015)Detecting new generations of threats using attribute-based attack graphs., , , and . IET Inf. Secur., 13 (4): 293-303 (2019)A multilayer graph model of the internet topology., , and . Int. J. Netw. Virtual Organisations, 22 (3): 219-245 (2020)Relevance of Ethical Guidelines for Artificial Intelligence - a Survey and Evaluation., , and . ECIS, (2019)In-memory Databases in Business Information Systems., , , , , , , , , and 1 other author(s). Bus. Inf. Syst. Eng., 3 (6): 389-395 (2011)