Abstract is missing.
- Introduction and Preface1-5 [doi]
- Interaction Patterns for Regulatory Compliance in Federated LearningMahdi Sellami, Tomas Bueno Momcilovic, Peter Kuhn, Dian Balta. 6-18 [doi]
- A User-centric View on Data Breach Response ExpectationsFelix Hillmann, Tim Klauenberg, Lennart Schroeder, Till Ole Diesterhöft. 19-37 [doi]
- Integrating IT Security Aspects into Business Process Models: A Taxonomy of BPMN ExtensionsLeonard Nake. 38-48 [doi]
- From Pixels to Generalization: Ensuring Information Security and Model Performance with Design Principles for Synthetic Image Data in Deep LearningMartin Böhmer. 49-61 [doi]
- Privacy-Enhancing Technologies in the Process of Data Privacy Compliance: An Educational PerspectiveAlexandra Klymenko, Stephen Meisenbacher, Florian Messmer, Florian Matthes. 62-69 [doi]
- Nudging Towards Compliance? Assessing the Impact of Nudging Strategies on Information Security Policy AdherenceTheresa Pfaff. 70-76 [doi]
- How to Foster Compliance in Non-Integrated IT-Landscapes? The Case of Manual Medical Data TransfersGilbert Georg Hövel, Tizian Matschak. 77-84 [doi]
- The Structure of Data Privacy ComplianceAlexandra Klymenko, Stephen Meisenbacher, Florian Matthes. 85-91 [doi]