Author of the publication

Under Lock and Key? Setting up a Secure Data Center at GESIS in Germany.

, and . IASSIST Conference, IASSIST, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ethically Intelligent? A Framework for Exploring Human Resource Management Challenges of Intelligent Working Environments., and . ISAmI, volume 219 of Advances in Intelligent Systems and Computing, page 213-219. Springer, (2013)Web Futures: Inclusive, Intelligent, Sustainable The 2020 Manifesto for Web Science, , , , , , , and . Dagstuhl Manifestos, (2021)"i always feel it must be great to be a hacker!": the role of interdisciplinary work in social media research., and . WebSci, page 91-98. ACM, (2014)Anonymisierung und sicherer Umgang mit Forschungsdaten in der empirischen Sozialforschung., and . Datenschutz und Datensicherheit, 39 (8): 515-519 (2015)Knowing in Algorithmic Regimes: Insights from a Roundtable, Discussion on Methods, Interactions and Politics., , , , , and . (2023)Archiving information from geotagged tweets to promote reproducibility and comparability in social media research., , , , and . Big Data Soc., 4 (2): 205395171773633 (December 2017)Fairness in Agreement With European Values: An Interdisciplinary Perspective on AI Regulation., , , , , , , and . AIES, page 107-118. ACM, (2022)Under Lock and Key? Setting up a Secure Data Center at GESIS in Germany., and . IASSIST Conference, IASSIST, (2013)Achieving real data security via community self-enforcement., and . IASSIST Conference, IASSIST, (2013)Legally Bound? Data Protection Legislation and Research Practice., and . IASSIST Conference, IASSIST, (2013)