{"id":"https://openalex.org/W2548041751","doi":"https://doi.org/10.18420/muc2016-ws03-0000","title":"Usable Security and Privacy: Ans\u00e4tze und L\u00f6sungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen","display_name":"Usable Security and Privacy: Ans\u00e4tze und L\u00f6sungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2548041751","doi":"https://doi.org/10.18420/muc2016-ws03-0000","mag":"2548041751"},"language":"de","primary_location":{"id":"doi:10.18420/muc2016-ws03-0000","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2016-ws03-0000","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/muc2016-ws03-0000","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037591969","display_name":"Luigi Lo Iacono","orcid":"https://orcid.org/0000-0002-7863-0622"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Iacono, Luigi Lo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5047937469","display_name":"Hartmut Schmitt","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schmitt, Hartmut","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037591969"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12885","display_name":"Digital Innovation in Industries","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.6055628061294556},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.4619003236293793},{"id":"https://openalex.org/keywords/humanities","display_name":"Humanities","score":0.38910961151123047},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.34044623374938965},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.25104421377182007},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.2087951898574829},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11578318476676941}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.6055628061294556},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.4619003236293793},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.38910961151123047},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.34044623374938965},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.25104421377182007},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.2087951898574829},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11578318476676941}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/muc2016-ws03-0000","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2016-ws03-0000","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.18420/muc2016-ws03-0000","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2016-ws03-0000","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"Fortf\u00fchrung":[1],"zum":[2,11],"erfolgreichen":[3],"Auftaktworkshop":[4],"\u201eUsable":[5],"Security":[6,39],"and":[7,40],"Privacy:":[8],"Nutzerzentrierte":[9],"L\u00f6sungsans\u00e4tze":[10],"Schutz":[12],"sensibler":[13],"Daten\u201c":[14],"auf":[15,27,35],"der":[16,28],"Mensch":[17,30],"und":[18,31,43,51,64,89,111],"Computer":[19,32],"2015":[20],"werden":[21],"in":[22,78],"einem":[23],"zweiten":[24],"wissenschaftlichen":[25],"Workshop":[26,72,95,103],"diesj\u00e4hrigen":[29],"vier":[33],"Arbeiten":[34],"dem":[36,71,79,87],"Gebiet":[37],"Usable":[38],"Privacy":[41],"vorgestellt":[42],"diskutiert.":[44],"Das":[45],"Programm":[46],"bilden":[47],"Beitr\u00e4ge":[48,117],"aus":[49,82],"Forschung":[50],"Praxis,":[52],"die":[53,108,113],"neue":[54],"nutzerzentrierte":[55],"Ans\u00e4tze,":[56],"aber":[57],"auch":[58],"praxisrelevante":[59],"L\u00f6sungen":[60],"zur":[61,114],"nutzerzentrierten":[62],"Entwicklung":[63],"Ausgestaltung":[65],"von":[66,97],"digitalen":[67],"Schutzmechanismen":[68],"thematisieren.":[69],"Mit":[70],"wird":[73,96],"das":[74],"etablierte":[75],"Forum":[76],"weiterentwickelt,":[77],"sich":[80],"Experten":[81],"unterschiedlichen":[83],"Dom\u00e4nen,":[84],"z.":[85],"B.":[86],"Usability-Engineering":[88],"Security-Engineering,":[90],"transdisziplin\u00e4r":[91],"austauschen":[92],"k\u00f6nnen.":[93],"Der":[94],"den":[98],"Organisatoren":[99],"als":[100],"klassischer":[101],"wissenschaftlicher":[102],"ausgestaltet.":[104],"Ein":[105],"Programmkomitee":[106],"hat":[107],"Einreichungen":[109],"bewertet":[110],"daraus":[112],"Pr\u00e4sentation":[115],"akzeptierten":[116],"ausgew\u00e4hlt.":[118]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
