{"id":"https://openalex.org/W6887960772","doi":"https://doi.org/10.18420/muc2022-mci-ws10-275","title":"Eine Klassifikation sicherheitskritischer UX-Design-Patterns","display_name":"Eine Klassifikation sicherheitskritischer UX-Design-Patterns","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6887960772","doi":"https://doi.org/10.18420/muc2022-mci-ws10-275"},"language":"de","primary_location":{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:137331","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/view/person/Buhleier=3ALaura=3A=3A.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/muc2022-mci-ws10-275","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Buhleier, Laura","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Buhleier, Laura","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Linsner, Sebastian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Linsner, Sebastian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Steinbrink, Enno","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Steinbrink, Enno","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Reuter, Christian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reuter, Christian","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22374853,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3736000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3736000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.09719999879598618,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.065700002014637,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/life-style","display_name":"Life style","score":0.1467999964952469},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.13689999282360077}],"concepts":[{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.4480000138282776},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.23469999432563782},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22869999706745148},{"id":"https://openalex.org/C29456083","wikidata":"https://www.wikidata.org/wiki/Q1221899","display_name":"Gynecology","level":1,"score":0.22130000591278076},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.19779999554157257},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17739999294281006},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.14990000426769257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.14749999344348907},{"id":"https://openalex.org/C2987512134","wikidata":"https://www.wikidata.org/wiki/Q346799","display_name":"Life style","level":2,"score":0.1467999964952469},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.13689999282360077}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:137331","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/view/person/Buhleier=3ALaura=3A=3A.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},{"id":"doi:10.18420/muc2022-mci-ws10-275","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2022-mci-ws10-275","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/muc2022-mci-ws10-275","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2022-mci-ws10-275","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"User":[0,60],"Experience":[1],"ist":[2,132],"von":[3,29,89,156,170],"zunehmender":[4],"Relevanz":[5],"f\u00fcr":[6,22,56,109,164],"die":[7,23,45,62,76,91,98,114,144,161],"Entwicklung":[8,169],"digitaler":[9],"Designentscheidungen":[10,74],"und":[11,25,50,125,151,158,167],"hat":[12],"somit":[13],"weitgehende":[14],"Auswirkungen":[15],"auf":[16],"das":[17,133],"Nutzerverhalten.":[18],"Dass":[19],"dies":[20],"besonders":[21],"Sicherheit":[24],"Vertraulichkeit":[26],"nicht":[27,116],"nur":[28],"Vorteil":[30],"sein":[31],"kann,":[32,37],"sondern":[33],"Nutzer*innen":[34,84],"negativ":[35],"beeinflussen":[36],"wird":[38,105,142],"in":[39,106],"dieser":[40,107,135],"Arbeit":[41,108,136],"ersichtlich.":[42],"Betrachtetwerden":[43],"daf\u00fcr":[44],"Themengebiete":[46],"Anti-Patterns,":[47],"Grey":[48,103],"Patterns":[49,104,112],"Dark-Patterns.":[51],"Anti-Patterns":[52,157],"bezeichnen":[53],"wiederkehrende":[54],"L\u00f6sungen":[55],"ein":[57,137,152],"Konzept":[58],"eines":[59],"Interfaces,":[61],"trotz":[63],"guter":[64],"Intention":[65],"ungew\u00fcnschte":[66],"Nebeneffekte":[67],"oder":[68,79],"Konsequenzen":[69],"haben.":[70],"Dark-Patterns":[71,94,159],"dagegen":[72],"stellen":[73],"dar,":[75],"durch":[77,143],"T\u00e4uschung":[78],"Ausnutzung":[80],"psychischen":[81],"Drucks":[82],"versuchen":[83],"zu":[85,87,128],"Handlungen":[86],"verleiten,":[88],"denen":[90],"Ersteller*innen":[92],"des":[93],"mehr":[95],"profitieren":[96],"als":[97,162],"Anwender*":[99],"innen.":[100],"Der":[101],"Begriff":[102],"alle":[110],"Design":[111],"genutzt,":[113],"sich":[115],"direkt":[117],"zuordnen":[118],"lassen.":[119],"Da":[120],"es":[121],"bisher":[122],"kaum":[123],"vergleichendeWerke":[124],"keinen":[126],"Konsens":[127],"diesen":[129],"Themengebieten":[130],"gibt,":[131],"Ziel":[134],"grundlegendes":[138],"Modell":[139],"aufzustellen.":[140],"Dabei":[141],"Untersuchung":[145],"bestehender":[146],"Literatur":[147],"eine":[148],"zusammenfassende":[149],"Taxonomie":[150],"Vorgehen":[153],"zur":[154,168],"Unterscheidung":[155],"erarbeitet,":[160],"Grundlage":[163],"weitere":[165],"Arbeiten":[166],"Gegenma\u00dfnahmen":[171],"genutzt":[172],"werden":[173],"k\u00f6nnen.":[174]},"counts_by_year":[],"updated_date":"2026-02-26T08:16:20.718346","created_date":"2025-10-10T00:00:00"}
