Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What About My Privacy? Helping Users Understand Online Privacy Policies, , , , and . Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering, page 56--65. (2022)How to Identify Changing Contexts of Use with Creativity Workshops - An Experience Report., , , and . INTERACT (Workshops), volume 13198 of Lecture Notes in Computer Science, page 88-97. Springer, (2021)Privacy Explanations - A Means to End-User Trust., , , and . CoRR, (2022)Context, Content, Consent - How to Design User-Centered Privacy Explanations (S)., , and . SEKE, page 86-89. KSI Research Inc., (2023)Detecting Security Vulnerabilities using Clone Detection and Community Knowledge., , , and . SEKE, page 245-324. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)What About My Privacy?Helping Users Understand Online Privacy Policies., , , , and . ICSSP/ICGSE, page 56-65. ACM, (2022)Exploring Explainability: A Definition, a Model, and a Knowledge Catalogue., , and . RE, page 197-208. IEEE, (2021)Which Information Help agile Teams the Most? An Experience Report on the Problems and Needs., , , , and . SEAA, page 306-313. IEEE, (2020)How to Identify Changing Contexts of Use with Creativity Workshops--An Experience Report, , , and . IFIP Conference on Human-Computer Interaction, page 88--97. Springer, (2021)Explainable software systems: from requirements analysis to system evaluation., , and . Requir. Eng., 27 (4): 457-487 (2022)