Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SEC (37. : 2022 : Kopenhagen; Online) ICT systems security and privacy protection
1. Verfasser: Richter, Alexander (VerfasserIn)
Weitere Verfasser: Kühtreiber, Patrick (VerfasserIn), Reinhardt, Delphine (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage 2022 Vella, Mark
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring 2022 Dey, Alexandre
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App 2022 Harborth, David
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring 2022 Wilkens, Florian
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps 2022 Foroughipour, Ardalan
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy 2022 Siapiti, Efi
Usability Insights from Establishing TLS Connections 2022 Kraus, Lydia
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones 2022 Li, Wenjuan
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature 2022 Zhong, Bingnan
Anonymous Trusted Data Relocation for TEEs 2022 Guita, Vasco
Deriving and Using Synthetic Consequences for Privacy Risk Modeling 2022 Shapiro, Stuart S.
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features 2022 Sun, Peishuai
Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches 2022 Richter, Alexander
Post-Quantum Cheating Detectable Private Information Retrieval 2022 Zhu, Lin
Greedy Networking in Cryptocurrency Blockchain 2022 Wuthier, Simeon
Usability of Antivirus Tools in a Threat Detection Scenario 2022 Körber, Michael
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties 2022 Wu, Shaoqiang
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions 2022 Saaim, Kunwar Muhammed
Evaluation of Circuit Lifetimes in Tor 2022 Köster, Kevin
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials 2022 Kalos, Vasilis
Alle Artikel auflisten