About
29
Publications
4,064
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
143
Citations
Publications
Publications (29)
Users should always play a central role in the development of (software) solutions. The human-centered design (HCD) process in the ISO 9241-210 standard proposes a procedure for systematically involving users. However, due to its abstraction level, the HCD process provides little guidance for how it should be implemented in practice. In this chapte...
Many approaches, methods, and tools aim to support companies in the implementation of the European General Data Protection Regulation (GDPR). However, their focus is primarily on protecting the privacy of external data subjects (e.g., customers), whereas the privacy of employees tends to be disregarded. In order to provide employees with more trans...
Insgesamt wurden im Rahmen des Innovationsprogramms »Digitale Zukunftskommunen@bw« 30 Vernetzungsveranstaltungen unter Beteiligung von 59 Kommunal- und Kreisverwaltungen sowie Verbünden durchgeführt. Dabei wurden
auch die Einwohner:innen der Kommunen und Landkreise berücksichtigt und über die Ereignisse und Entwicklungen ihrer Verwaltungen informie...
Climate change is one of today’s big topics, so climate-friendly mobility habits are needed. The digital transformation, another mega-trend, can support changing these habits. One step in the change process is the establishment of a positive attitude towards novel mobility measures such as the reduction of parking spaces. In this paper, we present...
The digital transformation supports many cities on the way to becoming smarter cities, enabling them to enhance digital processes, care about climate-friendly goals, or improve the quality of life of their citizens. However, such changes usually take place step by step and not in a big-bang approach. In order for the direction of the digital transf...
Zusammenfassung
Beschäftigte haben unterschiedliche Auffassungen davon, wie ihre Daten verarbeitet werden und welchen Einfluss sie selbst darauf haben. Ihre Sicht auf die Datenverarbeitung, ihre Einflussmöglichkeiten auf diese und ihre Bedürfnisse hinsichtlich des Schutzes ihrer Privatsphäre am Arbeitsplatz werden in diesem Beitrag vorgestellt. Der...
Facilitated meetings are an established practice for the requirements engineering activities elicitation and validation. Focus groups are one well-known technique to implement this practice. Several researchers already reported the successful use of vision videos to stimulate active discussions among the participants of on-site focus groups, e.g.,...
[Context and motivation] Digitalization is increasingly influencing cities as they evolve into Smart Cities. However, involving citizens in order to develop digital solutions that address real needs of users is a challenging task. In the Smart City project “EnStadt:Pfaff”, concepts are to be developed to encourage residents of a city district to pa...
Security mechanisms are nowadays part of almost every software. At the same time, they are typically sociotechnical and require involvement of end users to be effective. The usability of security measures is thus an essential factor. Despite this importance, this aspect often does not receive the necessary attention, for example due to short resour...
Security and privacy are considered important by most users. However, formulating their own abstract data protection requirements is already a challenge for them. The mapping of these requirements to concrete setting options in an application is even more challenging-partially because the user interfaces for data protection settings are not tailore...
In the city of Kaiserslautern, an urban district is being built, that aims to be climate-neutral. To achieve this aim, innovative concepts and technologies for energy generation and mobility services are to be applied. For the mobility concept, we needed personas as inhabitants and stakeholders are not living there yet. Since we could not find a pe...
Online reviews about products and services, such as reviews in stores, are a valuable source of information for customers. Unfortunately, reviews are contaminated by fake reviews, which may lead to wrong conclusions when including them in the analyses of user feedback. As these fake reviews are not marked as advertisement, they might lead to wrong...
As work becomes increasingly digital, companies store and process more personally identifiable information of their employees. This is typically beneficial for both employees and employers, who take advantage of simplified digital work processes and tools. The problem is that there is typically no opt-out option for employees, and employers can mis...
Privacy becomes more and more important for users of digital services. Recent studies show that users are concerned about having too little control over their personal data. However, if users get more possibilities for self-determining the privacy effecting their personal data, it must be guaranteed that the resulting privacy requirements are corre...
When analyzing textual user feedback, the challenge today is that automation is only possible in a non-satisfactory way due to the limitations of understanding natural language. However, manual evaluation is not possible for products with a large amount of user feedback, as this is neither efficient nor effective. Internet texts are full of emojis....
When analyzing textual user feedback, the challenge today is that automation is only possible in a non-satisfactory way due to the limitations of understanding natural language. However, manual evaluation is not possible for products with a large amount of user feedback, as this is neither efficient nor effective. Internet texts are full of emojis....
Data protection is becoming increasingly important for users of digital services. Recent studies show that users are concerned about having too little control over their personal data. However, users also complain that current interfaces for specifying privacy and security settings are too time-consuming and complicated. Therefore, we first identif...
Most usability evaluation methods (UEM) and heuristics, such as Nielsen's heuristics, are tailored to usability professionals. However, these experts are rare and expensive. Thus, we empirically evaluated whether the web usability inspection technique based on design perspectives (WDP) can achieve equally valuable results while being less dependent...
Datenschutzerklärungen sind häufig schwer zu finden und zu verstehen. Daher lesen viele Nutzer sie nur teilweise oder gar nicht. Kontextuelle Datenschutzerklärungen verfolgen einen alternativen Ansatz. Hier werden Datenschutzinformationen für den Nutzungskontext maßgeschneidert und nur die jeweils relevanten Informationen angezeigt. In dieser Arbei...
Privacy is a vital aspect of IT systems and services, and it is demanded from users and by law. Thus, most data-processing services provide interfaces for users to support transparency (e.g., privacy notices) and self-determination(e.g., privacy settings). In this paper, we present evidence that users do not make use of these privacy interfaces—alt...
The growing interest of the requirements engineering (RE) community to elicit user requirements from large amounts of available online user feedback about software-intensive products resulted in identification of such data as a sensible source of user requirements. Some researchers proposed automation approaches for extracting the requirements from...
The growing interest of the requirements engineering (RE) community to elicit user requirements from large amounts of available online user feedback about software-intensive products resulted in identification of such data as a sensible source of user requirements. Some researchers proposed automation approaches for extracting the requirements from...
Security, privacy and usability are vital quality attributes of IT systems and services. Users and legal authorities demand that systems are secure and preserve privacy. At the same time, security and privacy mechanisms should not complicate workflows and must be transparent for the user. In order to master this challenge, a close involvement of th...