Author of the publication

Do-It-Yourself Data Protection – Empowerment or Burden?

, , , and . Data Protection on the Move. Current Developments in ICT and Privacy/Data Protection, Springer, Heidelberg/ New York/ London, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Success in online searches: Differences between evaluation and finding tasks., , , and . J. Assoc. Inf. Sci. Technol., 67 (12): 2897-2908 (2016)An Integrative Model of Mobile Phone Appropriation., , and . J. Comput. Mediat. Commun., 13 (3): 593-617 (2008)Do-It-Yourself Data Protection – Empowerment or Burden?, , , and . Data Protection on the Move. Current Developments in ICT and Privacy/Data Protection, Springer, Heidelberg/ New York/ London, (2016)Evolving Mobile Media: Uses and Conceptualizations of the Mobile Internet., , and . J. Comput. Mediat. Commun., 18 (4): 491-507 (2013)Quelle place dans la vie quotidienne pour la télévision mobile? résultats d'une étude de terrain longitudinale., and . IHM, page 111-118. ACM, (2008)Heuristic and Systematic Use of Search Engines., , , and . J. Comput. Mediat. Commun., 12 (3): 778-800 (2007)White Paper Das versteckte Internet, , , , , , , , , and 1 other author(s). Forum Privatheit und selbstbestimmtes Leben in der Digitalen Welt, Karlsruhe, (2015)Das versteckte Internet, , , , , , , , , and . (2015)The Development of Video Game Enjoyment in a Role Playing Game., , , and . Cyberpsychology Behav. Soc. Netw., 16 (4): 260-264 (2013)