{"id":"https://openalex.org/W2978334761","doi":"https://doi.org/10.18420/muc2018-ws08-0538","title":"4. Usable Security und Privacy Workshop","display_name":"4. Usable Security und Privacy Workshop","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2978334761","doi":"https://doi.org/10.18420/muc2018-ws08-0538","mag":"2978334761"},"language":"de","primary_location":{"id":"doi:10.18420/muc2018-ws08-0538","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2018-ws08-0538","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/muc2018-ws08-0538","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037591969","display_name":"Luigi Lo Iacono","orcid":"https://orcid.org/0000-0002-7863-0622"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lo Iacono, Luigi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047937469","display_name":"Hartmut Schmitt","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schmitt, Hartmut","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5073567373","display_name":"Andreas Heinemann","orcid":"https://orcid.org/0000-0003-0240-399X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Heinemann, Andreas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037591969"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45482416,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13459","display_name":"Public Administration and Political Analysis","score":0.9520000219345093,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9196000099182129,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.6056630611419678},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.543862521648407},{"id":"https://openalex.org/keywords/humanities","display_name":"Humanities","score":0.40516185760498047},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.24592462182044983},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.24087554216384888},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12400472164154053}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.6056630611419678},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.543862521648407},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.40516185760498047},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.24592462182044983},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.24087554216384888},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12400472164154053}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/muc2018-ws08-0538","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2018-ws08-0538","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/muc2018-ws08-0538","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2018-ws08-0538","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"Fortf\u00fchrung":[1],"zu":[2],"den":[3,96],"drei":[4,13],"erfolgreichen":[5],"\u201eUsable":[6],"Security":[7,36],"und":[8,26,40,48,61,87,108,122,126],"Privacy\u201c":[9],"Workshops":[10],"der":[11,23,124],"letzten":[12],"Jahre,":[14],"sollen":[15],"in":[16,76],"einem":[17],"vierten":[18],"ganzt\u00e4tigen":[19],"wissenschaftlichen":[20],"Workshop":[21,69,93,101],"auf":[22,32],"diesj\u00e4hrigen":[24],"Mensch":[25,125],"Computer":[27,127],"sechs":[28],"bis":[29],"acht":[30],"Arbeiten":[31],"dem":[33,68,77,85],"Gebiet":[34],"Usable":[35],"and":[37],"Privacy":[38],"vorgestellt":[39],"diskutiert":[41],"werden.":[42],"Vorgesehen":[43],"sind":[44],"Beitr\u00e4ge":[45,115],"aus":[46,80],"Forschung":[47],"Praxis,":[49],"die":[50,106,111],"neue":[51],"nutzerzentrierte":[52],"Ans\u00e4tze":[53],"aber":[54],"auch":[55],"praxisrelevante":[56],"L\u00f6sungen":[57],"zur":[58,112],"nutzerzentrierten":[59],"Entwicklung":[60],"Ausgestaltung":[62],"von":[63,95],"digitalen":[64],"Schutzmechanismen":[65],"thematisieren.":[66],"Mit":[67],"soll":[70],"das":[71],"etablierte":[72],"Forum":[73],"weiterentwickelt":[74],"werden,":[75],"sich":[78],"Experten":[79],"unterschiedlichen":[81],"Dom\u00e4nen,":[82],"z.":[83],"B.":[84],"Usability-Engineering":[86],"Security-Engineering,":[88],"transdisziplin\u00e4r":[89],"austauschen":[90],"k\u00f6nnen.":[91],"Der":[92],"wird":[94],"Organisatoren":[97],"als":[98],"klassischer":[99],"wissenschaftlicher":[100],"ausgestaltet.":[102],"Ein":[103],"Programmkomitee":[104],"bewertet":[105],"Einreichungen":[107],"w\u00e4hlt":[109],"daraus":[110],"Pr\u00e4sentation":[113],"akzeptierten":[114],"aus.":[116],"Diese":[117],"werden":[118],"zudem":[119],"im":[120],"Poster-":[121],"Workshopband":[123],"2018":[128],"ver\u00f6ffentlicht.":[129]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2019-10-10T00:00:00"}
