Author of the publication

Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records?

, and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 1121-1132. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols., , , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 86-99. Springer, (2003)Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services.. WADS, volume 5835 of Lecture Notes in Computer Science, page 284-307. Springer, (2008)Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites., , , and . ADBIS (Workshops), volume 5968 of Lecture Notes in Computer Science, page 121-128. Springer, (2009)Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence., , and . IEEE Syst. J., 11 (2): 371-372 (2017)"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to privacy by default., , and . SAC, page 1235-1246. ACM, (2021)Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems., , and . MTW, volume 190 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study., , , , and . Comput. Educ., (December 2023)Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking., , and . SVV@ICLP, volume 118 of Electronic Notes in Theoretical Computer Science, page 57-70. Elsevier, (2003)"I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!" - Dark Patterns from the End-User Perspective., , , , , and . Conference on Designing Interactive Systems, page 763-776. ACM, (2021)Transparency by design in data-informed research: A collection of information design patterns., and . Comput. Law Secur. Rev., (2020)