A case study on the implementation of the right of access in privacy dashboards J Tolsdorf, M Fischer, L Lo Iacono Annual Privacy Forum, 23-46, 2021 | 22 | 2021 |
Privacy Considerations for Risk-Based Authentication Systems S Wiefling, J Tolsdorf, L Lo Iacono 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2021 | 13 | 2021 |
Exploring mental models of the right to informational self-determination of office workers in Germany J Tolsdorf, F Dehling, D Reinhardt, LL Iacono Proceedings on Privacy Enhancing Technologies, 2021 | 13 | 2021 |
Data cart – designing a tool for the GDPR-compliant handling of personal data by employees J Tolsdorf, F Dehling, L Lo Iacono Behaviour & Information Technology 41 (10), 2070-2105, 2022 | 9 | 2022 |
Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose J Tolsdorf, D Reinhardt, L Lo Iacono Proceedings on Privacy Enhancing Technologies 2022 (2), 68-94, 2022 | 7 | 2022 |
Privatheit am Arbeitsplatz: Transparenz und Selbstbestimmung bei Arbeit 4.0 J Tolsdorf, CK Bosse, A Dietrich, D Feth, H Schmitt Datenschutz und Datensicherheit-DuD 44 (3), 176-181, 2020 | 7 | 2020 |
In our employer we trust: mental models of office workers’ privacy perceptions J Tolsdorf, F Dehling International Conference on Financial Cryptography and Data Security, 122-136, 2020 | 7 | 2020 |
On the security expressiveness of rest-based api definition languages HV Nguyen, J Tolsdorf, L Lo Iacono Trust, Privacy and Security in Digital Business: 14th International …, 2017 | 7 | 2017 |
Components and architecture for the implementation of technology-driven employee data protection F Dehling, D Feth, S Polst, B Steffes, J Tolsdorf Trust, Privacy and Security in Digital Business: 18th International …, 2021 | 6 | 2021 |
Classification of Android App Permissions: Tell me What app you are and I Tell you What you are Allowed to do N Gruschka, L Lo Iacono, J Tolsdorf ECCWS 2018 17th European Conference on Cyber Warfare and Security, Academic …, 2018 | 4 | 2018 |
Achieving Usable Security and Privacy Through Human-Centered Design EC Groen, D Feth, S Polst, J Tolsdorf, S Wiefling, L Lo Iacono, H Schmitt Human Factors in Privacy Research, 83-113, 2023 | 3 | 2023 |
Benutzerfreundlicher datenschutz in cloud-basierten office-paketen J Tolsdorf, F Dehling, D Feth Datenschutz und Datensicherheit-dud 45 (1), 33-39, 2021 | 3 | 2021 |
Vision: Shred If Insecure–Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces J Tolsdorf, L Lo Iacono 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 3 | 2020 |
Data Protection Officers’ Perspectives on Privacy Challenges in Digital Ecosystems S Wiefling, J Tolsdorf, L Lo Iacono European Symposium on Research in Computer Security, 228-247, 2022 | 2 | 2022 |
Verarbeitung von Beschäftigtendaten: –Sichtweisen und Wünsche von Beschäftigten S Polst, J Tolsdorf, F Dehling, D Feth Datenschutz und Datensicherheit-DuD 45, 19-22, 2021 | 2 | 2021 |
Take back control! the use of mental models to develop privacy dashboards J Tolsdorf, F Dehling, L Lo Iacono ITG News 8 (3-4), 15-20, 2020 | 2 | 2020 |
Beschäftigtendatenschutz: Rechtliche Anforderungen und Technische Lösungskonzepte CK Bosse, A Dietrich, P Kelbert, H Küchler, H Schmitt, J Tolsdorf, ... Conference volume of the 23rd Edition of the Conference International Legal …, 2020 | 2 | 2020 |
Investigation of Information Privacy in Employment: Fundamental Knowledge and Practical Solutions for the Human-Centered Design of Measures to Preserve the Right to … J Tolsdorf | 1 | 2022 |
Classification of Android App Permissions N Gruschka, LL Iacono, J Tolsdorf | 1 | 2018 |
Data Cart: A Privacy Pattern for Personal Data Management in Organizations J Tolsdorf, L Lo Iacono Human Factors in Privacy Research, 353-378, 2023 | | 2023 |