Change search
Refine search result
3456789 251 - 300 of 887
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 251.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Andersson, Christer
    Panchenko, Andriy
    Practical Anonymous Communication on the Mobile Internet using TOR2007Conference paper (Refereed)
  • 252.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    de Leeuw, ElisabethFritsch, Lothar
    Policies and Research in Identity Management: Proceedings of the Second IFIP WG11.6 working conference IDMAN 2010, Oslo, Norway, November 18-19, 20102010Conference proceedings (editor) (Refereed)
  • 253.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Duquenoy, PennyMiddlesex University, The United Kingdom.Zuccato, AlbinTeliaSonera, Sweden.Martucci, LeonardoKarlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    The Future of Identity in the Information Society2008Collection (editor) (Refereed)
  • 254.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Escudero Pascual, A.
    Lindskog, H.
    Preventing Privacy Attacks and Cyber Crime in the Mobile Internet2002Conference paper (Refereed)
  • 255.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Furnell, Steven
    Lambrinoudakis, Costas
    Trust and Privacy in Digital Business: Third International Conference, Proceedings of TrustBus 20062006Book (Refereed)
  • 256.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Georgiadou, Yola
    Surveillance and Privacy2010In: What Kind of Information Society?: Governance, Virtuality, Surveillance, Substainability, Resilience / [ed] Berleur, Jacques J.; Hercheui, Magda David; Hilty, Lorenz M., Berlin: Springer , 2010, p. 175-177Conference paper (Refereed)
  • 257.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    A Holistic Privacy Framework for RFID Applications: FIDIS EU Project Deliverable D12.32007Report (Refereed)
  • 258.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Benefits of Privacy-Enhancing Identity Management2008In: Asia-Pacific Business Review, ISSN 0973-2470, Vol. 4, no 4, p. 36-52Article in journal (Refereed)
    Abstract [en]

    Privacy-enhancing identity management systems allow users to act securely in the information society while keeping sovereignty over their personal spheres. This paper elaborates the benefits that privacy-enhancing identity management can provide for both end users and services sides. These benefits include increased privacy protection for end users and enhanced trust relations between users and services sides. The PRIME system developed within the EU project PRIME (Privacy and Identity Management for Europe) and a PRIME-enable e-shopping application scenario are used to illustrate these benefits. Besides, also potential business drivers for services sides to deploy privacy-enhancing identity management systems are discussed.

  • 259.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    PRIME Framework V32008Report (Refereed)
  • 260.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    RFID: Radio Frequency Identification2009In: The Future of Identity in the Information Society: Challenges and Opportunities. Chapter 4: High-Tech ID and Emerging Technologies / [ed] K. Rannenberg; D. Royer; André Deuker. Chapter 4 edited by Martin Meints and Mark Gasson, Heidelberg: Springer , 2009Chapter in book (Refereed)
  • 261.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hansen, Marit
    Technik fuer mehr Transparenz2010In: digma - Zeitschrift für Datenrecht und Informationssicherheit, ISSN 1424-9944, Vol. 10, no 1, p. 34-37Article in journal (Refereed)
  • 262.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Holvast, Jan
    Duquennoy, Penny
    Zuccato, Albin
    Proceedings of the IFIP WG 9.2, 9.6/11.7 Summer School on Risks and Challenges of the Network Society, Karlstad University Studies 2004:35, June 2004, ISBN 91-85335-03-72004Book (Refereed)
    Abstract [en]

    Mobile phones, i-Mode, WAP, telephone, fax, e-mail, Internet and personal digital assistants (PDAs) are dominating our society - which is fast becoming a Network society characterised by electronic communications. While these developments bring many social and economic benefits, they also pose several social, ethical, political and cultural consequences and challenges.



    The aim of the IFIP WG 9.2, 9.6/11.7 Summer School, which was held 4-8 August 2003 at Karlstad University - Sweden , was to discuss Risks and Challenges of the Network Society. This report collects the contributions of the participants which were presented and discussed during the Summer School

  • 263.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Jonsson, E.
    Proceedings of the 7th Nordic Workshop on Secure IT Systems (Nordsec 2002)2002Book (Refereed)
  • 264.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Kesdogan, Dogan
    Martucci, Leonardo
    Privacy and Privacy-Enhancing Technologies2008In: Securing Information and Communication Systems: Principles, Technologies and Applications / [ed] Javier Lopez, Steven Furnell, Ahmed Patel, Sokratis Katsikas, USA: Artech House, 2008, p. 213-242Chapter in book (Refereed)
  • 265.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lambrinoudakis, CostasPernul, Günther
    Trust, Privacy and Security in Digital Business: Proceedings of the 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 20092009Conference proceedings (editor) (Refereed)
  • 266.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, H.
    Privacy Enhancement in the Mobile Internet2000Conference paper (Refereed)
  • 267.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, H.
    Teaching Privacy-Enhancing Technologies2001Conference paper (Refereed)
    Abstract [en]

    This paper discusses the increasing relevance of privacy-enhancing technologies (PET) and the importance of teaching PET within IT-security curricula. A structure for a PET course is presented, which can be used for designing PET overview courses or PET introductory lectures

  • 268.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lo Iacano, Luigi
    Möller, Sebastian
    Usable Security und Privacy2010In: Datenschutz und Datensicherheit, ISSN 1614-0702, Vol. 34, no 11, p. 773-782Article in journal (Refereed)
    Abstract [de]

    Bedienbarkeit, Verständlichkeit und Akzeptanz von Schutzmechanismen stehen bei deren Entwicklung in der Regel nicht im Vordergrund obwohl sie nachweislich einen erheblichen Einfluss auf das der Nutzer haben. Die Autoren geben einen überblick über die bisherigen Ansätze auf dem Gebiet Usable Security and Privacy und zeigen den weiteren Forschungs- und Entwicklungsbedarf auf.

  • 269.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Nilsson, Jenny
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Trust and Assurance Control: UI prototypes2009Report (Other academic)
    Abstract [en]

    This deliverable presents User Interface (UI) prototypes for a Trust Evaluation Function, which has the purpose of communicating reliable information about trustworthiness and assurance (that the stated privacy functionality is provided) of services sides to end users. For the design of this trust evaluation function, we have followed an interdisciplinary approach by investigating social factors for establishing reliable trust, technical and organizational means, as well as HCI (Human Computer Interaction) concepts for mediating evaluation results to the end users. Three iterations of mockups of trust evaluation function UIs that were produced and tested at Karlstad Universitys Ozlab are presented and discussed

  • 270.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Nilsson, M.
    Lindskog, H.
    Self-determination in the Mobile Internet2002Conference paper (Refereed)
    Abstract [en]

    Mobile Internet environments will offer a whole new range of services that might revolutionize our way of life. However, with these new technologies and services new risks to the users privacy arise, and both legal and technical privacy safeguards are needed to protect the user. This paper discusses privacy and privacy risks in the mobile Internet and presents the result of the PiMI prototype project, in which one browser built-in, and one proxy- based P3P user agent for mobile Internet environments have been developed. The PiMI prototype enhances the users control over the dissemination of user and user-device related information and thus protects their right for informational self-determination.

  • 271.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Olejar, D.
    Rannenberg, D.
    Security & Control of IT in Society2001Conference paper (Refereed)
  • 272.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Soren
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Bergmann, Mike
    Tech Univ Dresden, Dresden, Germany..
    Hansen, Marit
    Pearson, Siani
    HP Labs, Mississauga, ON, Canada..
    Mont, Marco Casassa
    HP Labs, Mississauga, ON, Canada..
    Human-Computer Interaction2011In: Digital privacy: PRIME - Privacy and identity management for Europe / [ed] Camenisch, Jan; Leenes, Ronald; Sommer, Dieter, Springer, 2011, p. 569-595Chapter in book (Refereed)
  • 273.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Evaluation of early prototypes (D[6-12].1.a): Public EU6FP IST deliverable2004Report (Refereed)
    Abstract [en]

    This document captures the results of the evaluation and analysis of these early prototypes and user interface mock-ups. The evaluation is done with reference to the legal, social, economic and application requirements documented in D1.1a. Besides, usability testing is performed to evaluate mock-ups and early prototypes from an HCI perspective. This evaluation should guide the future technical development and provide input to the selection of application scenarios for which application prototypes will be developed

  • 274.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Evaluation of Integrated Prototype Version 2: PRIME EU Project Deliverable D6.1.e2007Report (Refereed)
  • 275.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable Privacy and Identity Management: Challenges and Approaches2008Conference paper (Other (popular science, discussion, etc.))
  • 276.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Rannenberg, Kai
    Yngström, Louise
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006)2006Book (Refereed)
    Abstract [en]

    This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on Security and Privacy in Dynamic Environments held in May 2224 2006 in Karlstad, Sweden. The first IFIP/SEC conference was arranged in May 1983 in Stockholm, Sweden, one year before TC-11 was founded, with the active participation of the Swedish IT Security Community. The IFIP/SEC conferences have since then become the flagship events of TC-11.We are very pleased that we succeeded with our bid to after 23 years hold the IFIP/SEC conference again in Sweden.



    The IT environment now includes novel, dynamic approaches such as mobility, wearability, ubiquity, ad hoc use, mind/body orientation, and business/market orientation. This modern environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches whilst retaining the benefit of previous research efforts. Papers offering research contributions focusing on dynamic environments in addition to other aspects of computer security and privacy were solicited for submission to IFIP/SEC 2006. We received 141 submissions which were all reviewed by at least three members of the international program committee. At a one-day program committee meeting, the submitted papers were discussed, and 35 papers were selected for presentation at the conference, which means an acceptance rate of 24.8%. A special emphasis of IFIP/SEC 2006 is on Privacy and Privacy Enhancing Technologies, which is addressed by 9 of the 35 accepted papers. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection and network forensics.



    These Proceedings also include the papers of the following two workshops that are associated with SEC 2006: the workshop on Security Culture organized by IFIP Working Group 11.1/11.8 as well as the I-NetSec06 workshop on Privacy and Anonymity Issues in Networked and Distributed Systems organized by IFIP Working Group 11.4. Both workshops were organized autonomously by the respective IFIP Working Groups. They had their own call for papers, program committees, and selection processes with acceptance rates of papers similar to the one of the main IFIP/SEC 2006 conference.



    IFIP/SEC 2006 is organized in cooperation with Karlstad University, SIG Security, and Dataföreningen i Sverige. We would like to thank Microsoft AB, Karlstads kommun, SAAB AB, and TietoEnator, who are sponsoring IFIP/SEC 2006. Furthermore, we gratefully thank all authors, members of the program committees, and additional reviewers for their contributions to the scientific quality of this conference and the two workshops. Last but not least, we owe thanks to the organizing committee, and especially to its chair Dr. Albin Zuccato, for all the efforts and dedication in preparing this conference

  • 277.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Zwingelberg, Harald
    UI Prototypes: Policy Administration and Presentation - Version 22010Report (Other academic)
    Abstract [en]

    Privacy Policies are an important prerequisite for user control in privacy-enhancing identity management. The transparency of privacy policies can be enhanced if users are informed about mismatches of a site’s policy with the user’s preferences. Investigating understandable and transparent privacy policies, a user-friendly visualisation of policy mismatches as well as simplified and usable privacy preference management “on the fly” are the objectives of the deliverable. User Interfaces for policy display and management also need to meet technical requirements by the PrimeLife Policy Language PPL. This deliverable is first summarising the technical features and HCI (Human Computer Interaction) requirements of PPL, and is then discussing icons presenting the important aspects of privacy policies and different iterations of User Interface (UI) prototypes for policy display and preference administration.

  • 278.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Census 2011 and Privacy: Editorial2011In: It-information technology, ISSN 1611-2776, Vol. 53, no 1, p. 3-4Article in journal (Other academic)
  • 279.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy-Enhancing Technologies2009In: Encyclopedia of Database Systems / [ed] Ling Liu & M. Tamer Özsu, Boston: Springer Berlin/Heidelberg, 2009, p. 2142-2147Chapter in book (Refereed)
  • 280.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Transparency Enhancing Tools & HCI for Policy Display and Informed Consent2011In: Privacy, Accountability, Trust – Challenges and Opportunities: ENISA Report / [ed] Rodica Tirtea (ENISA), European Network and Information Security Agency, Technical Competence Department , 2011Chapter in book (Refereed)
  • 281.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Duquenoy, PennyMiddlesex University, School of Engineering and Information Sciences, London, UK.Hansen, MaritUnabhängiges Landeszentrum für Datenschutz, Schleswig-Holstein, Kiel, Germany.Leenes, RonaldTilburg University, The Netherlands.Zhang, GeKarlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers2011Collection (editor) (Refereed)
  • 282.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Furnell, Steven
    School of Computing & Mathematics, University of Plymouth, Plymouth, United Kingdom .
    Lambrinoudakis, Costas
    Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece .
    Exploring Trust, Security and Privacy in Digital Business2009In: Transactions on Large-Scale Data- and Knowledge-Centered Systems, ISSN 1869-1994, Vol. 1, no 1, p. 191-210Article in journal (Refereed)
    Abstract [en]

    Security and privacy are widely held to be fundamental requirements for establishing trust in digital business. This paper examines the relationship between the factors, and the different strategies that may be needed in order to provide an adequate foundation for users’ trust. The discussion begins by recognising that users often lack confidence that sufficient security and privacy safeguards can be delivered from a technology perspective, and therefore require more than a simple assurance that they are protected. One contribution in this respect is the provision of a Trust Evaluation Function, which supports the user in reaching more informed decisions about the safeguards provided in different contexts. Even then, however, some users will not be satisfied with technology-based assurances, and the paper consequently considers the extent to which risk mitigation can be offered via routes, such as insurance. The discussion concludes by highlighting a series of further open issues that also require attention in order for trust to be more firmly and widely established.

  • 283.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center.
    Trust and Assurance HCI2011In: Privacy and Identity Management for Life / [ed] Jan Camenisch, Simone Fischer-Hübner, Kai Rannenberg, Berlin: Springer Berlin/Heidelberg, 2011, p. 245-260Chapter in book (Refereed)
  • 284.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hermann, Dominik
    University of Bamberg, Germany.
    Benutzbare Lösungen für den Datenschutz2018In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement / [ed] Christian Reuter, Wiesbaden, Tyskland: Springer, 2018, p. 119-138Chapter in book (Refereed)
  • 285.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hoofnagle, Chris Jay
    University of California, Berkeley, U.S.A..
    Kronitiris, Ioannis
    Rannenberg, Kai
    Goethe University Frankfurt, Germany.
    Waidner, Michael
    TU Darmstadt, Germany.
    Online Privacy: Towards Information Self-Determination on the Internet (Dagstuhl Perspective Workshop 11061)2011In: Dagstuhl Reports, ISSN 2192-5283, Vol. 1, no 2, p. 1-15Article in journal (Refereed)
    Abstract [en]

    While the collection and monetization of user data has become a main source for funding “free” services like search engines, online social networks, news sites and blogs, neither privacy-enhancing technologies nor its regulations have kept up with user needs and privacy preferences. The aim of this Manifesto is to raise awareness for the actual state of the art of online privacy, especially in the international research community and in ongoing efforts to improve the respective legal frameworks, and to provide concrete recommendations to industry, regulators, and research agencies for improving online privacy. In particular we examine how the basic principle of informationalself-determination, as promoted by European legal doctrines, could be applied to infrastructures like the internet, Web 2.0 and mobile telecommunication networks.

  • 286.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hopper, Nicholas
    Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings2011Book (Refereed)
  • 287.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable privacy-enhancing Identity Management: Challenges and Approaches2010In: Information and Communication Technologies, Society and Human Beings: Theory and Framework (Festschrift in honor of Gunilla Bradley) / [ed] Darek Haftor, Anita Mirijamdotter, Hershey PA: IGI Global, 2010, p. 172-189Chapter in book (Refereed)
    Abstract [en]

    A critical success factor for Privacy-Enhancing Technologies (PETs), and for Privacy-Enhancing Identity Management in particular, will be user-friendly and intelligible user interfaces that are legally compliant and convey trust. Such user interfaces have to meet challenges such as the user-friendly representation of complex PET concepts (such as “pseudonyms”, “unlinkabilty” or “anonymous credentials”) that are unfamiliar to many users, the provision of security, the enforcement of legal privacy principles, such as informed consent or transparency, as well as the mediation of reliable trust to the end users. In this paper, we will discuss such challenges for usable privacy-enhancing identity management and will provide some HCI guidelines for addressing those challenges.

  • 288.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Division for Information Technology.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    HCI requirements for Transparency and Accountability Tools for Cloud Service Chains2015In: Accountability and Security for the Cloud: First Summer School, Cloud Acountability Project, A4Cloud / [ed] Massimo Felici, Carmen Fernández-Gago, Cham: Springer, 2015, p. 81-113Chapter in book (Refereed)
    Abstract [en]

    This paper elaborates HCI (Human-Computer Interaction) requirementsfor making cloud data protection tools comprehensible and trustworthy.The requirements and corresponding user interface design principles are derivedfrom our research and review work conducted to address in particular the followingHCI challenges: How can the users be guided to better comprehend theflow and traces of data on the Internet and in the cloud? How can individual endusers be supported to do better informed decisions on how their data can be usedby cloud providers or others? How can the legal privacy principle of transparencyand accountability be enforced by the user interfaces of cloud inspectiontools? How can the user interfaces help users to reassess their trust/distrust inservices? The research methods that we have used comprise stakeholderworkshops, focus groups, controlled experiments, usability tests as well as literatureand law reviews. The derived requirements and principles are groupedinto the following functional categories: (1) ex-ante transparency, (2) exercisingdata subject rights, (3) obtaining consent, (4) privacy preference management,(5) privacy policy management, (6) ex-post transparency, (7) audit configuration,(8) access control management, and (9) privacy risk assessment. This broadcategorization makes our results accessible and applicable for any developerwithin the field of usable privacy and transparency-enhancing technologies forcloud service chains.

  • 289. Friman, Y.
    et al.
    Johansson-Hidén, Birgitta
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    En processorienterad tandhygienistutbildning integrerad i Folktandvårdens verksamhet: Utvärdering av en uppdragsutbildning2002Report (Other academic)
  • 290. Friman, Y.
    et al.
    Johansson-Hidén, Birgitta
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    En processorienterad utbildning integrerad i Folktandvårdens verksamhet. Utvärdering av en uppdragsutbildning. Beställd av Karlstads universitet och Folktandvården i Värmland2002Report (Other academic)
  • 291. Fulscher, M. P.
    et al.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Roos, B. O.
    Towards an accurate molecular orbital theory for excited states: The azabenzenes1992In: Journal of Physical Chemistry, 96:9204Article in journal (Refereed)
  • 292. Galera, F.
    et al.
    Ruiz, P.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Security Extensions to MMARP Through Cryptographically Generated Addresses2005Conference paper (Refereed)
  • 293. Ganchev, Ivan
    et al.
    Curado, MarilliaKassler, AndreasKarlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wireless Networking for Moving Objects: Protocols, Architectures, Tools, Services and Applications2014Collection (editor) (Refereed)
  • 294. Garcia, J
    et al.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Efficent Image Transfer for Wireless Networks2000Conference paper (Refereed)
  • 295.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Application and Transport Layer Flexibility - An Image Transfer Example2002Report (Other academic)
  • 296.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Explicit and Implicit Loss Notification for Error-prone Links2003Conference paper (Refereed)
    Abstract [en]

    In certain wireless environments the common transport protocol assumption that all packet losses are due to congestion may not hold true. If transport protocols react identically to both congestion and non-congestion related losses, performance will degrade. To avoid this performance problem, transport protocols must be able to differentiate between losses that are due to congestion and losses that are due to wireless link errors. Various loss differentiation techniques exist, some based on the sender side and some on the receiver side. If the loss differentiation is performed at the receiver, loss notification is needed to inform the sender of the loss cause. The sender use the loss notification information to adapt its retransmission and congestion avoidance behavior. The work in this paper examines the effectiveness of two different notification schemes that are to be used in conjunction with receiver based loss differentiation. The first scheme uses a TCP option to explicitly convey the a loss counter and the sequence number of the last corrupted packet. The second scheme uses the generation of additional dup-acks as a way to implicitly influence the retransmission and congestion behavior of the sender. The advantage of the second scheme is that it requires no changes at the sender side TCP implementation. However, since the second scheme can not change the basic loss behavior of halving the congestion window of TCP, its performance is reduced in relation to the first scheme. This paper provides a description of the design of these two loss notification schemes. Additionally, an experimental evaluation is presented, based on a FreeBSD kernel implementation of the two notification schemes in conjunction with checksum based loss differentiation

  • 297.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    FIVES and P2P-based Intelligence Gathering2009Conference paper (Other (popular science, discussion, etc.))
  • 298.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    FIVES D1.4: Annual report2010Report (Refereed)
  • 299.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Improving Performance in Heterogeneous Networks: A Transport Layer Centered Approach2005Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The evolution of computer communications and the Internet has led to the emergence of a large number of communication technologies with widely different capabilities and characteristics. While this multitude of technologies provides a wide array of possibilities it also creates a complex and heterogeneous environment for higher-layer communication protocols. Specific link technologies, as well as overall network heterogeneity, can hamper user-perceived performance or impede end-to-end throughput. In this thesis we examine two transport layer centered approaches to improve performance.



    The first approach addresses the decrease in user satisfaction that occurs when web waiting times become too long. Increased transport layer flexibility with regards to reliability, together with error-resilient image coding, is used to enable a new trade-off. The user is given the possibility to reduce waiting times, at the expense of image fidelity. An experimental examination of this new functionality is provided, with a focus on image-coding aspects. The results show that reduced waiting times can be achieved, and user studies indicate the usefulness of this new trade-off.



    The second approach concerns the throughput degradations that can occur as a consequence of link and transport layer interactions. An experimental evaluation of the GSM environment shows that when negative interactions do occur, they are coupled to large variability in link layer round-trip times rather than simply to poor radio conditions. Another type of interaction can occur for link layers which expose higher layers to residual bit errors. Residual bit-errors create an ambiguity problem for congestion controlled transport layer protocols which cannot correctly determine the cause for a loss. This ambiguity leads to an unnecessary throughput degradation. To mitigate this degradation, loss differentiation and notification mechanisms are proposed and experimentally evaluated from both performance and fairness perspectives. The results show that considerable performance improvements can be realized. However, there are also fairness implications that need to be taken into account since the same mechanisms that improve performance may also lead to unfairness towards flows that do not employ loss differentiation.

  • 300.
    Garcia, Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    JPEG Transcoding - Efficiency and Robustness Aspects2002Report (Other academic)
3456789 251 - 300 of 887
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf