Abstract is missing.
- Response and Cultural Biases in Information Security Policy Compliance ResearchSebastian Kurowski, Fabina Dietrich. 13-24 [doi]
- Harmonizing Delegation Data FormatsGeorg Wagner, Olamide Omolola, Stefan More. 25-34 [doi]
- Password AssistanceMoritz Horsch, Johannes Braun 0001, Johannes A. Buchmann. 35-48 [doi]
- An explorative approach on the impact of external and organizational events on information securityIlirjana Ajazaj, Sebastian Kurowski. 49-62 [doi]
- Towards secure and standard-compliant implementations of the PSD2 DirectiveTobias Wich, Daniel Nemmert, Detlef Hühnlein. 63-80 [doi]
- A Mechanism for Discovery and Verification of Trust Scheme Memberships: The Lightest Reference ArchitectureHeiko Roßnagel. 81-92 [doi]
- Privacy dark patterns in identity managementLothar Fritsch. 93-104 [doi]
- Towards Privacy-Preserving and User-Centric Identity Management as a ServicePritam Dash, Christof Rabensteiner, Felix Hörandner, Simon Roth. 105-116 [doi]
- Derived Partial Identities Generated from App PermissionsLothar Fritsch, Nurul Momen. 117-130 [doi]
- A service for the preservation of evidence and data - a key for a trustworthy & sustainable electronic businessSteffen Schwalm. 131-144 [doi]
- Design and Implementation Aspects of Mobile Derived IdentitiesDaniel Träder, Alexander Zeier, Andreas Heinemann. 147-152 [doi]
- A meta-heuristic for access control test data creation in access control model testingMatthias Winterstetter, Sebastian Kurowski. 153-158 [doi]
- Open ecosystem platforms for assistants and IoT-devices: a look into corporate practiceNicolas Fähnrich, Michael Kubach. 159-166 [doi]
- A Semantic Data Model for the Development of Secure and Valuable SoftwareAndrea Horch, Uwe Laufs, Rachelle Sellung. 167-174 [doi]
- Towards a Smart Assistant for Enterprise Availability ManagementUwe Laufs, Heiko Roßnagel. 175-180 [doi]
- A Comparison of Payment Schemes for the IoTJens-Matthias Bohli, Aljoscha Dietrich, Ronald Petrlic, Christoph Sorge. 181-186 [doi]