Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Journal of cybersecurity (Oxford), 2020-01, Vol.6 (1)
2020
Link zum Volltext

ON CYBERSECURITY
Journal of international affairs (New York), 2018-03, Vol.71 (2), p.121-124
2018
Link zum Volltext

Berkeley technology law journal, 2021-04, Vol.36 (1), p.469
2021
Link zum Volltext

EDUCAUSE review, 2008-03, Vol.43 (2), p.12
2008
Link zum Volltext

Open Access
Protecting privacy and liberty
Nature (London), 2001-10, Vol.413 (6858), p.773-773
2001
Link zum Volltext

Security Needs
Secrets and Lies, 2015, p.59-81
2015
Link zum Volltext

The Future of Incident Response
IEEE security & privacy, 2014-09, Vol.12 (5), p.96-96
2014

A Taxonomy of Social Networking Data
IEEE security & privacy, 2010-07, Vol.8 (4), p.88-88
2010

Metadata = Surveillance
IEEE security & privacy, 2014-03, Vol.12 (2), p.84-84
2014

Open Access
Trust in Man/Machine Security Systems
IEEE security & privacy, 2013-09, Vol.11 (5), p.96-96
2013

Empathy and Security
IEEE security & privacy, 2011-09, Vol.9 (5), p.88-88
2011

Security and Function Creep
IEEE security & privacy, 2010-01, Vol.8 (1), p.88-88
2010


IEEE security & privacy, 2007-05, Vol.5 (3), p.88-88
2007

Macworld (San Francisco, Calif.), 1995-11, Vol.12 (11), p.112
1995
Link zum Volltext

Computerworld, 1993-05, Vol.27 (22), p.33-33
1993
Link zum Volltext

Risks of third-party data
Communications of the ACM, 2005-05, Vol.48 (5), p.136-136
2005
Link zum Volltext

Detecting Cheaters
IEEE security & privacy, 2011-03, Vol.9 (2), p.96-96
2011

Architecture of Privacy
IEEE security & privacy, 2009-01, Vol.7 (1), p.88-88
2009

IEEE technology & society magazine, 2015-09, Vol.34 (3), p.39-40
2015

The Death of the Security Industry
IEEE security & privacy, 2007-11, Vol.5 (6), p.88-88
2007

Open Access
Unnoticed Consent [Last Word]
IEEE security & privacy, 2018-11, Vol.16 (6), p.80-79
2018

University Networks and Data Security
IEEE security & privacy, 2006-09, Vol.4 (5), p.88-88
2006

The Zotob Storm
IEEE security & privacy, 2005-11, Vol.3 (6), p.96-96
2005

Open Access
Customers, passwords, and Web sites
IEEE security & privacy, 2004-07, Vol.2 (4), p.88
2004
Aktive Filter
ThemaPrivacy