Change search
Link to record
Permanent link

Direct link
BETA
Fischer-Hübner, SimoneORCID iD iconorcid.org/0000-0002-6938-4466
Alternative names
Publications (10 of 152) Show all publications
Fischer-Hübner, S. (2018). Anonymity (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: (pp. 4). Springer-Verlag New York
Open this publication in new window or tab >>Anonymity
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2, p. 4-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65655 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-11Bibliographically approved
Fritsch, L. & Fischer-Hübner, S. (2018). Applications of Privacy and Security Research in the Upcoming Battlefield of Things. In: Audun Jøsang (Ed.), Proceedings of the 17th European Conference on Cyber Warfare and Security: . Paper presented at The 17th European Conference on Cyber Warfare and Security. Reading: Academic Conferences and Publishing International Limited
Open this publication in new window or tab >>Applications of Privacy and Security Research in the Upcoming Battlefield of Things
2018 (English)In: Proceedings of the 17th European Conference on Cyber Warfare and Security / [ed] Audun Jøsang, Reading: Academic Conferences and Publishing International Limited, 2018Conference paper, Published paper (Refereed)
Abstract [en]

This article presents the results of a trend scouting study on the applicability of contemporary information privacy and information security research in future defence scenarios in a 25-year-horizon. We sketch the expected digital warfare and defence environment as a “battlefield of things” where connected objects, connected soldiers and automated and autonomous sensing and acting systems are core elements. Based on this scenario, we discuss current research in information security and information privacy and their relevance and applicability for the future scenario.

Place, publisher, year, edition, pages
Reading: Academic Conferences and Publishing International Limited, 2018
Keywords
internet of things, autonomous systems, digital warfare, transfer of research, information privacy, information security, trend scouting, cyberwar, cybersecurity, weaponization of smart systems
National Category
Information Systems Human Computer Interaction Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-68386 (URN)978-1-911218-85-2 (ISBN)978-1-911218-86-9 (ISBN)
Conference
The 17th European Conference on Cyber Warfare and Security
Available from: 2018-07-04 Created: 2018-07-04 Last updated: 2018-07-05Bibliographically approved
Fischer-Hübner, S. & Hermann, D. (2018). Benutzbare Lösungen für den Datenschutz. In: Dr. Christian Reuter (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (pp. 119-138). Wiesbaden, Tyskland: Springer Vieweg
Open this publication in new window or tab >>Benutzbare Lösungen für den Datenschutz
2018 (English)In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement / [ed] Dr. Christian Reuter, Wiesbaden, Tyskland: Springer Vieweg , 2018, p. 119-138Chapter in book (Refereed)
Place, publisher, year, edition, pages
Wiesbaden, Tyskland: Springer Vieweg, 2018
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-66470 (URN)10.1007/978-3-658-19523-6 (DOI)9783658195229 (ISBN)9783658195236 (ISBN)
Available from: 2018-02-23 Created: 2018-02-23 Last updated: 2018-03-01Bibliographically approved
Karegar, F., Gerber, N., Volkamer, M. & Fischer-Hübner, S. (2018). Helping John to Make Informed Decisions on Using Social Login. In: Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018: . New York: ACM Publications
Open this publication in new window or tab >>Helping John to Make Informed Decisions on Using Social Login
2018 (English)In: Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, New York: ACM Publications, 2018Chapter in book (Other academic)
Place, publisher, year, edition, pages
New York: ACM Publications, 2018
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65743 (URN)
Projects
Credential (4896)
Funder
EU, Horizon 2020
Available from: 2018-01-19 Created: 2018-01-19 Last updated: 2018-06-26Bibliographically approved
Fischer-Hübner, S. (2018). Privacy-enhancing Technologies (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: . Springer-Verlag New York
Open this publication in new window or tab >>Privacy-enhancing Technologies
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65654 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-26Bibliographically approved
Fischer-Hübner, S. (2018). Pseudonymity (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: (pp. 99). Springer-Verlag New York
Open this publication in new window or tab >>Pseudonymity
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2, p. 99-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65656 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-11Bibliographically approved
Fischer-Hübner, S. (2018). Unobservability (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: (pp. 139). Springer-Verlag New York
Open this publication in new window or tab >>Unobservability
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2, p. 139-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65657 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-11Bibliographically approved
Karegar, F., Lindegren, D., Pettersson, J. S. & Fischer-Hübner, S. (2018). User Evaluations of an App Interface for Cloud-Based Identity Management. In: Paspallis N., Raspopoulos M., Barry C., Lang M., Linger H., Schneider C. (Ed.), Advances in Information Systems Development: . Paper presented at 6th International Conference on Information Systems Development (ISD) held in Larnaca, Cyprus, September 6 - 8, 2017 (pp. 205-223). Cham: Springer, 26
Open this publication in new window or tab >>User Evaluations of an App Interface for Cloud-Based Identity Management
2018 (English)In: Advances in Information Systems Development / [ed] Paspallis N., Raspopoulos M., Barry C., Lang M., Linger H., Schneider C., Cham: Springer, 2018, Vol. 26, p. 205-223Conference paper, Published paper (Refereed)
Abstract [en]

Within a project developing cloud technology for identity access management, usability tests of the mock-up of a mobile app identity provider were conducted to assess Internet users’ consciousness of data disclosures in consent forms and their comprehension of the flow of authentication data. Results show that using one’s fingerprint for giving consent was easy, but most participants did not have a correct view of where the fingerprint data is used and what entities would have access to it. Familiarity with ID apps appeared to aggravate misunderstanding. In addition, participants could not well recall details of personal data releases and settings for disclosure options. An evaluation with a confirmation screen improved the recall rate slightly. However, some participants voiced a desire to have control over their data and expressed a wish to manually select mandatory information. This can be a way of slowing users down and make them reflect more.

Place, publisher, year, edition, pages
Cham: Springer, 2018
Series
Lecture Notes in Information Systems and Organisation, ISSN 2195-4968 ; 26
Keywords
Cloud computing, Identity management, Data disclosure, Usable privacy, Smartphone
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-67323 (URN)10.1007/978-3-319-74817-7_13 (DOI)978-3-319-74816-0 (ISBN)978-3-319-74817-7 (ISBN)
Conference
6th International Conference on Information Systems Development (ISD) held in Larnaca, Cyprus, September 6 - 8, 2017
Note

This article was published as manuscript in Farzaneh Karegars licentiate thesis. 

Available from: 2018-05-17 Created: 2018-05-17 Last updated: 2018-07-02Bibliographically approved
Fischer-Hübner, S. & Berthold, S. (2017). Privacy Enhancing Technologies. (3ed.). In: John Vacca (Ed.), Computer and Information Security Handbook: (pp. 759-778). Morgan Kauffman/Elsevier
Open this publication in new window or tab >>Privacy Enhancing Technologies.
2017 (English)In: Computer and Information Security Handbook / [ed] John Vacca, Morgan Kauffman/Elsevier , 2017, 3, p. 759-778Chapter in book (Refereed)
Abstract [en]

In our modern information age, recent technical developments and trends, such as mobile and pervasive computing, big data, cloud computing, and Web 2.0 applications, increasingly pose privacy dilemmas. Due to the low costs and technical advances of storage technologies, masses of personal data can easily be stored. Once disclosed, these data may be retained forever, often without the knowledge of the individuals concerned, and be removed with difficulty. Hence, it has become hard for individuals to manage and control their personal spheres. Both legal and technical means are needed to protect privacy and to (re-)establish the individuals' control. This chapter provides an overview to the area of Privacy-Enhancing Technologies (PETs), which help to protect privacy by technically enforcing legal privacy principles. It will start with defining the legal foundations of PETs, and will present a classification of PETs as well as a definition of traditional privacy properties that PETs are addressing and metrics for measuring the level of privacy that PETs are providing. Then, a selection of the most relevant PETs is presented.

Place, publisher, year, edition, pages
Morgan Kauffman/Elsevier, 2017 Edition: 3
Keywords
Data minimization; Data subjects; Legal privacy; Legitimacy; Personal privacy; Privacy; Privacy-enhancing technologies; Purpose limitation; Purpose specification; Transparency
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65135 (URN)10.1016/B978-0-12-803843-7.00053-3 (DOI)9780128039298 (ISBN)9780128038437 (ISBN)
Available from: 2017-11-09 Created: 2017-11-09 Last updated: 2018-06-26Bibliographically approved
Murmann, P. & Fischer-Hübner, S. (2017). Tools for Achieving Usable Ex Post Transparency: A Survey. IEEE Access, 5, 22965-22991
Open this publication in new window or tab >>Tools for Achieving Usable Ex Post Transparency: A Survey
2017 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 5, p. 22965-22991Article in journal (Refereed) Published
Abstract [en]

Transparency of personal data processing is a basic privacy principle and a right that is well acknowledged by data protection legislation, such as the EU general data protection regulation (GDPR). The objective of ex post transparency enhancing tools (TETs) is to provide users with insight about what data have been processed about them and what possible consequences might arise after their data have been revealed, that is, ex post. This survey assesses the state of the art in scientific literature of the usability of ex post TETs enhancing privacy and discusses them in terms of their common features and unique characteristics. The article first defines the scope of usable transparency in terms of relevant privacy principles for providing transparency by taking the GDPR as a point of reference, and usability principles that are important for achieving transparency. These principles for usable transparency serve as a reference for classifying and assessing the surveyed TETs. The retrieval and screening process of the publications is then described, as is the process for deriving the subsequent classification of the characteristics of the TETs. The survey not only looks into what is made transparent by the TETs but also how transparency is actually achieved. A main contribution of this survey is a proposed classification that assesses the TETs based on their functionality, implementation and evaluation as described in the literature. It concludes by discussing the trends and limitations of the surveyed TETs in regard to the defined scope of usable TETs and shows possible directions of future research for addressing these gaps. This survey provides researchers and developers of privacy enhancing technologies an overview of the characteristics of state of the art ex post TETs, on which they can base their work.

Place, publisher, year, edition, pages
IEEE, 2017
Keywords
GDPR, HCI, privacy, transparency, usability, visualization
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65290 (URN)10.1109/ACCESS.2017.2765539 (DOI)000415170200021 ()
Projects
Privacy&Us
Funder
EU, Horizon 2020
Available from: 2017-11-29 Created: 2017-11-29 Last updated: 2018-06-26Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-6938-4466

Search in DiVA

Show all publications