Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Futures: Inclusive, Intelligent, Sustainable The 2020 Manifesto for Web Science, , , , , , , and . Dagstuhl Manifestos, (2021)Ethically Intelligent? A Framework for Exploring Human Resource Management Challenges of Intelligent Working Environments., and . ISAmI, volume 219 of Advances in Intelligent Systems and Computing, page 213-219. Springer, (2013)"i always feel it must be great to be a hacker!": the role of interdisciplinary work in social media research., and . WebSci, page 91-98. ACM, (2014)Social Media Monitoring of the Campaigns for the 2013 German Bundestag Elections on Facebook and Twitter., , , , , , , , , and 3 other author(s). CoRR, (2013)Bias in Data-driven AI Systems - An Introductory Survey., , , , , , , , , and 13 other author(s). CoRR, (2020)First-time Security Audits as a Turning Point?: Challenges for Security Practices in an Industry Software Development Team., , , and . CHI Extended Abstracts, page 1288-1294. ACM, (2016)An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to Assets., , and . NSPW, page 69-82. ACM, (2014)Legally Bound? Data Protection Legislation and Research Practice., and . IASSIST Conference, IASSIST, (2013)Under Lock and Key? Setting up a Secure Data Center at GESIS in Germany., and . IASSIST Conference, IASSIST, (2013)Achieving real data security via community self-enforcement., and . IASSIST Conference, IASSIST, (2013)