{"id":"https://openalex.org/W6963555833","doi":"https://doi.org/10.18420/muc2020-ws119","title":"6. Usable Security und Privacy Workshop","display_name":"6. Usable Security und Privacy Workshop","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W6963555833","doi":"https://doi.org/10.18420/muc2020-ws119"},"language":"de","primary_location":{"id":"pmh:oai:publica.fraunhofer.de:publica/501129","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/501129","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/muc2020-ws119","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Lo Iacono, Luigi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lo Iacono, Luigi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Schmitt, Hartmut","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schmitt, Hartmut","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Polst, Svenja","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Polst, Svenja","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Heinemann, Andreas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Heinemann, Andreas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3810275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10017","display_name":"Geology and Paleoclimatology Research","score":0.39629998803138733,"subfield":{"id":"https://openalex.org/subfields/1902","display_name":"Atmospheric Science"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10017","display_name":"Geology and Paleoclimatology Research","score":0.39629998803138733,"subfield":{"id":"https://openalex.org/subfields/1902","display_name":"Atmospheric Science"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11643","display_name":"Building materials and conservation","score":0.11460000276565552,"subfield":{"id":"https://openalex.org/subfields/1904","display_name":"Earth-Surface Processes"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11879","display_name":"Protist diversity and phylogeny","score":0.050999999046325684,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.6022999882698059},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3481000065803528},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.29019999504089355},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2621999979019165}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.6022999882698059},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.5102999806404114},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.38839998841285706},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.35920000076293945},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3125},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3073999881744385},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.3050000071525574},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.29019999504089355},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2621999979019165}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:publica.fraunhofer.de:publica/501129","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/501129","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/502315","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/502315","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"},{"id":"doi:10.18420/muc2020-ws119","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2020-ws119","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/muc2020-ws119","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2020-ws119","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Usable":[0,53],"Security":[1,54],"und":[2,17,39,48,55,68,82,96,119,136,151],"Privacy":[3,56],"hat":[4],"sich":[5,87],"als":[6,110],"Forschungsfeld":[7],"etabliert,":[8],"ebenso":[9],"wie":[10],"der":[11,15,19,134],"entsprechende":[12],"Workshop":[13,36,76,102,112],"auf":[14,50,148],"Mensch":[16,135],"Computer,":[18],"2020":[20,138],"zum":[21,107],"sechsten":[22],"Mal":[23],"stattfinden":[24],"soll.":[25],"Wie":[26],"in":[27,33,85,131],"den":[28,105,132],"vergangenen":[29],"f\u00fcnf":[30],"Jahren":[31],"sind":[32],"einem":[34],"ganzt\u00e4tigen":[35],"die":[37,58,117,122],"Pr\u00e4sentation":[38,124],"Diskussion":[40],"von":[41,70,104],"vier":[42],"bis":[43],"sechs":[44],"Beitr\u00e4gen":[45],"aus":[46,89],"Forschung":[47],"Praxis":[49],"dem":[51,75,86,94],"Gebiet":[52],"vorgesehen,":[57],"neue":[59],"Ans\u00e4tze,":[60],"aber":[61],"auch":[62],"praxisrelevante":[63],"L\u00f6sungen":[64],"zur":[65,123],"nutzerzentrierten":[66],"Entwicklung":[67],"Ausgestaltung":[69],"digitalen":[71],"Schutzmechanismen":[72],"thematisieren.":[73],"Mit":[74],"soll":[77,143],"das":[78],"etablierte":[79],"Forum":[80],"fortgef\u00fchrt":[81],"weiterentwickelt":[83],"werden,":[84],"Expert*innen":[88],"unterschiedlichen":[90],"Dom\u00e4nen,":[91],"z.":[92],"B.":[93],"Usability-Engineering":[95],"Security-Engineering,":[97],"transdisziplin\u00e4r":[98],"austauschen":[99],"k\u00f6nnen.":[100],"Der":[101],"wird":[103],"Organisator*innen":[106],"einen":[108],"Teil":[109,142],"wissenschaftlicher":[111],"ausgestaltet.":[113],"Ein":[114],"Programmkomitee":[115],"bewertet":[116],"Einreichungen":[118],"w\u00e4hlt":[120],"daraus":[121],"akzeptierten":[125],"Beitr\u00e4ge":[126],"aus.":[127],"Diese":[128],"werden":[129],"zudem":[130],"Proceedings":[133],"Computer":[137],"ver\u00f6ffentlicht.":[139],"Zum":[140],"anderen":[141],"w\u00e4hrend":[144],"des":[145],"Workshops":[146],"interaktiv":[147],"aktuelle":[149],"Entwicklungen":[150],"Themen":[152],"eingegangen":[153],"werden.":[154]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
