Denis Feth
YOU?
Author Swipe
View article: Concepts for Data Sovereignty in Digital Value Chains: Data Cockpits—Data Usage Control—Data Trustees
Concepts for Data Sovereignty in Digital Value Chains: Data Cockpits—Data Usage Control—Data Trustees Open
Digital value chains require the exchange of data. This data is always sensitive in one way or another—whether due to data protection, trade secret protection, or the very individual protection needs of data providers and data consumers al…
View article: Achieving Usable Security and Privacy Through Human-Centered Design
Achieving Usable Security and Privacy Through Human-Centered Design Open
Users should always play a central role in the development of (software) solutions. The human-centered design (HCD) process in the ISO 9241-210 standard proposes a procedure for systematically involving users. However, due to its abstracti…
View article: Generic Consents in Digital Ecosystems: Legal, Psychological, and Technical Perspectives
Generic Consents in Digital Ecosystems: Legal, Psychological, and Technical Perspectives Open
Consent is an important authorization basis for the processing of personal data. According to the General Data Protection Regulation (GDPR), consents must be as specific and unambiguous as possible. In practice, however, this leads to user…
View article: Challenges, Conflicts, and Solution Strategies for the Introduction of Corporate Data Protection Measures
Challenges, Conflicts, and Solution Strategies for the Introduction of Corporate Data Protection Measures Open
As the digital transformation of the economy relies on the processing of personal data, employee data protection is an important prerequisite. When implementing data protection, there is typically a discussion of technical and organization…
View article: Privacy ad Absurdum - How Workplace Privacy Dashboards Compromise Privacy
Privacy ad Absurdum - How Workplace Privacy Dashboards Compromise Privacy Open
In times of data-driven business, privacy and data protection are gaining importance. Users and legal bodies require the implementation of privacy-enhancing and transparencyenhancing technologies, such as privacy dashboards. Even though pr…
View article: Heuristics and Models for Evaluating the Usability of Security Measures
Heuristics and Models for Evaluating the Usability of Security Measures Open
Security mechanisms are nowadays part of almost every software. At the same time, they are typically sociotechnical and require involvement of end users to be effective. The usability of security measures is thus an essential factor. Despi…
View article: Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms
Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms Open
However, formulating their own abstract data protection requirements is already a challenge for them. The mapping of these requirements to concrete setting options in an application is even more challenging—partially because the user inter…
View article: WDP vs. Nielsen’s Heuristics: A Comparison
WDP vs. Nielsen’s Heuristics: A Comparison Open
Most usability evaluation methods (UEM) and heuristics, such as Nielsen’s heuristics, are tailored to usability professionals. However, these experts are rare and expensive. Thus, we empirically evaluated whether the web usability inspecti…
View article: Transparency through Contextual Privacy Statements
Transparency through Contextual Privacy Statements Open
Privacy policies are the state of the practice technique to achieve data transparency. However, they have a variety of issues in practice: They are presented in a non-prominent way, are typically quite lengthy, and not written in the users…
View article: Usable Security Policy Specification
Usable Security Policy Specification Open
Security policies determine which security requirements have to be met in a domain and how they are implemented organizationally and/or technically. However, their specification at run-time poses a challenge for policy authors (e.g., IT ad…