Jan Zibuschka

According to our database1, Jan Zibuschka authored at least 56 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
User preferences for privacy features in digital assistants.
Electron. Mark., 2021

Mapping Identity Management in Data Lakes.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021

Learning to Learn: Facets of Generativity in Machine Learning Frameworks.
Proceedings of the 42nd International Conference on Information Systems, 2021

Trust is Good, Control is Better - Customer Preferences Regarding Control in Teleoperated and Autonomous Taxis.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Corporate Digital Responsibility - Extended Conceptualization and Empirical Assessment.
Proceedings of the 29th European Conference on Information Systems, 2021

2020
Lean Privacy by Design.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

A Human Digital Twin as Building Block of Open Identity Management for the Internet of Things.
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020

2019
User preferences and willingness to pay for in-vehicle assistance.
Electron. Mark., 2019

Anonymization Is Dead - Long Live Privacy.
Proceedings of the Open Identity Summit 2019, 2019

The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems.
Proceedings of the Open Identity Summit 2019, 2019

Consumer-Based Ranking for Strategic Selection of IoT Business Models.
Proceedings of the 40th International Conference on Information Systems, 2019

Nutzerpräferenzen und Zahlungsbereitschaften für einen sicheren und datenschutzfreundlichen digitalen Assistenten.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft, INFORMATIK 2019, 2019

Analysis of Automation Potentials in Privacy Impact Assessment Processes.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Users' Preferences Concerning Privacy Properties of Assistant Systems on the Internet of Things.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2017
About User Preferences and Willingness to Pay for a Secure and Privacy Protective Ubiquitous Personal Assistant.
Proceedings of the 25th European Conference on Information Systems, 2017

2016
Zahlungsbereitschaft für Datenschutzfunktionen intelligenter Assistenten.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2016

On the Road to Secure and Privacy-Preserving IoT Ecosystems.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

2015
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Securing systems on the Internet of Things via physical properties of devices and communications.
Proceedings of the Annual IEEE Systems Conference, 2015

2014
Ein Vorgehensmodell zum Entwurf tragfähiger IT-Sicherheitsinfrastrukturen im organisationsübergreifenden Datenaustausch.
PhD thesis, 2014

Users' willingness to pay for web identity management systems.
Eur. J. Inf. Syst., 2014

2013
Saving Energy in Production Using Mobile Services.
Proceedings of the Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013

2012
Sichere Verknüpfung von Mashup Widgets durch Identity Based Encryption - Datenschutz in Geschäftsanwendungen.
Datenschutz und Datensicherheit, 2012

On Some Conjectures in IT Security: The Case for Viable Security Solutions.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Interoperability for information systems in public urban transport security: The SECUR-ED interoperability notation.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

A concept for interoperability of security systems in public transport.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

Empirical analysis of passenger trajectories within an urban transport hub.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

2011
Location-Based Services.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy and Identity Management Requirements: An Application Prototype Perspective.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Mobile Emergency Management Services Targeting Large Public Events.
Int. J. Serv. Sci. Manag. Eng. Technol., 2011

On the effectiveness of mobile service notification for passenger egress during large public events.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

Using mobile social media for emergency management - A design science approach.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

Secure Mashup-Providing Platforms - Implementing Encrypted Wiring.
Proceedings of the Current Trends in Web Engineering, 2011

Datenschutz und Identitätsmanagement für Communities - Communities für Datenschutz und Identitätsmanagement.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Community-Unterstützung für Pseudo-SSO-Systeme.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Entwurf eines multitouch-systems für die organisations- und IT-system- übergreifende zusammenarbeit im krisenmanagement in frühen und späten phasen.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Geschäftsmodelle für privatsphärenfreundliche soziale Online-Netzwerke.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Designing Viable Security Solutions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Mobiles ortsbezogenes Projektmanagement
CoRR, 2010

MT4j - A Cross-platform Multi-touch Development Framework
CoRR, 2010

Diffusion of Federated Identity Management.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Stakeholder Analysis of a Platform and Ecosystem for Open Innovation in SMEs.
Proceedings of the Collaborative Networks for a Sustainable World, 2010

Entwurf eines kollaborativen Multi-Touch-Systems zur Planung und Abwicklung von Großveranstaltungen.
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010

eTourismus und Katastrophenschutz: Neue mobile Mehrwertdienste durch IKTIntegration.
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010

Informations- und Kommunikationsdienste im Notfallmanagement (Vorwort).
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010

Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Agent-based Simulation for Evaluation of a Mobile Emergency Management System.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Facilitating the Adoption of Tor by Focusing on a Promising Target Group.
Proceedings of the Identity and Privacy in the Internet Age, 2009

2008
Legal considerations on privacy-enhancing Location Based Services using PRIME technology.
Comput. Law Secur. Rev., 2008

Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

2007
Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Enabling Privacy of Real-Life LBS.
Proceedings of the New Approaches for Security, 2007

Implementing Strong Authentication Interoperability with Legacy Systems.
Proceedings of the Policies and Research in Identity Management, 2007

Privacy-Friendly LBS: A Prototype-Supported Case Study.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Single Sign On mit Signaturen - Integration von elektronischen Signaturen und Passwortsystemen.
Datenschutz und Datensicherheit, 2006


  Loading...