default search action
Ina Schiering
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1998
- [b1]Ina Schiering:
Hierarchical accepting systems and monadic second-order logic on graphs. University of Kiel, Germany, 1998, pp. 1-177
Journal Articles
- 2024
- [j7]Ina Schiering, Michael Friedewald, Ramona Schmidt:
Datenschutz-Design-Patterns. Datenschutz und Datensicherheit (dud) 48(9): 583-588 (2024) - 2021
- [j6]Tanja Heuer, Ina Schiering, Reinhard Gerndt:
Privacy framework for context-aware robot development. Paladyn J. Behav. Robotics 12(1): 468-480 (2021) - 2020
- [j5]Nicholas Martin, Britta Alexandra Mester, Ina Schiering, Michael Friedewald, Dara Hallinan:
Datenschutz-Folgenabschätzung. Datenschutz und Datensicherheit 44(3): 149-153 (2020) - [j4]Nicholas Martin, Ina Schiering, Michael Friedewald:
Methoden der Datenschutz-Folgenabschätzung. Datenschutz und Datensicherheit 44(3): 154-160 (2020) - [j3]Ina Schiering, Britta Alexandra Mester, Michael Friedewald, Nicholas Martin:
Datenschutz-Risiken partizipativ identifizieren und analysieren. Datenschutz und Datensicherheit 44(3): 161-165 (2020) - 2019
- [j2]Michael Friedewald, Ina Schiering, Nicholas Martin:
Datenschutz-Folgenabschätzung in der Praxis. Datenschutz und Datensicherheit 43(8): 473-477 (2019) - 2014
- [j1]Reinhard Gerndt, Ina Schiering, Jens Lüssem:
Elements of Scrum in a Students Robotics Project - A Case Study. J. Autom. Mob. Robotics Intell. Syst. 8(1): 37-45 (2014)
Conference and Workshop Papers
- 2023
- [c33]Michael Pleger, Ina Schiering:
Digital Transformation in Forestry - Stakeholders and Data Collection in German Forests. GI-Jahrestagung 2023: 1245-1253 - [c32]Tom Lorenz, Linda Münch, Patrick Adair, Ina Schiering, Sandra Verena Müller:
Creating Routes for Landmark-Training with the CompanionApp: A Pilot User Study. MuC 2023: 518-523 - [c31]Ramona Schmidt, Ina Schiering:
Who Is the Attacker - Analyzing Data Protection Violations in Health Care. Privacy and Identity Management 2023: 143-157 - 2022
- [c30]Mirco Baseniak, Tom Lorenz, Ina Schiering:
Privacy Notifications for Transparency in Fitness Apps. HEALTHINF 2022: 705-710 - [c29]Tom Lorenz, Mirco Baseniak, Linda Münch, Ina Schiering, Sandra Verena Müller:
Digitization of Landmark Training for Topographical Disorientation: Opportunities of Smart Devices and Augmented Reality. HEALTHINF 2022: 727-734 - [c28]Funda Ertas-Spantgar, Jasmin Aust, Alexander Gabel, Tom Lorenz, Ina Schiering, Sandra Verena Müller:
Digital Competencies for Therapists in Rehabilitation - A Case Study. HCI (19) 2022: 185-196 - [c27]Linda Münch, Tanja Heuer, Ina Schiering, Sandra Verena Müller:
Accessibility Criteria for an Inclusive Museum for People with Learning Disabilities: A Review. HCI (8) 2022: 371-385 - 2021
- [c26]Michael Friedewald, Ina Schiering, Nicholas Martin, Dara Hallinan:
Data Protection Impact Assessments in Practice - Experiences from Case Studies. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 424-443 - [c25]Tom Lorenz, Merle Leopold, Funda Ertas, Sandra Verena Müller, Ina Schiering:
Landmark Training Based on Augmented Reality for People with Intellectual Disabilities. HCI (39) 2021: 498-505 - [c24]Ramona Schmidt, Ina Schiering:
Gamification in mHealth - Opportunities and Privacy Risks. Privacy and Identity Management 2021: 142-159 - 2020
- [c23]Alexander Gabel, Funda Ertas, Michael Pleger, Ina Schiering, Sandra Verena Müller:
Privacy-preserving Metrics for an mHealth App in the Context of Neuropsychological Studies. HEALTHINF 2020: 166-177 - [c22]Alexander Gabel, Funda Ertas, Michael Pleger, Ina Schiering, Sandra Verena Müller:
Privacy by Design for Neuropsychological Studies Based on an mHealth App. BIOSTEC (Selected Papers) 2020: 442-467 - [c21]Marvin Priedigkeit, Andreas Weich, Ina Schiering:
Learning Analytics and Privacy - Respecting Privacy in Digital Learning Scenarios. Privacy and Identity Management 2020: 134-150 - [c20]Michael Pleger, Ina Schiering:
Privacy Respecting Data Sharing and Communication in mHealth: A Case Study. Privacy and Identity Management 2020: 206-225 - 2019
- [c19]Charles Varlei Neu, Ina Schiering, Avelino F. Zorzo:
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks. CECC 2019: 11:1-11:6 - [c18]Kerstin Eckhardt, Ina Schiering, Alexander Gabel, Funda Ertas, Sandra Verena Müller:
Visual Programming for Assistive Technologies in Rehabilitation and Social Inclusion of People with Intellectual Disabilities. MuC 2019: 731-735 - [c17]Julia Justinger, Tanja Heuer, Ina Schiering, Reinhard Gerndt:
Forgetfulness as a feature: Imitation of Human Weaknesses for Realizing Privacy Requirements. MuC 2019: 825-830 - [c16]Tom Lorenz, Ina Schiering:
Privacy in Location-Based Services and Their Criticality Based on Usage Context. Privacy and Identity Management 2019: 462-478 - 2018
- [c15]Alexander Gabel, Ina Schiering:
Privacy Patterns for Pseudonymity. Privacy and Identity Management 2018: 155-172 - [c14]Tanja Heuer, Ina Schiering, Reinhard Gerndt:
Me and My Robot - Sharing Information with a New Friend. Privacy and Identity Management 2018: 189-204 - [c13]Alexander Gabel, Tanja Heuer, Ina Schiering, Reinhard Gerndt:
Jetson, Where Is the Ball? Using Neural Networks for Ball Detection at RoboCup 2017. RoboCup 2018: 181-192 - 2017
- [c12]Martin Böhm, Ina Schiering, Diederich Wermser:
Security of IoT Cloud Services - A User-Oriented Test Approach. CECC 2017: 115-130 - [c11]Tanja Heuer, Ina Schiering, Reinhard Gerndt:
Privacy and Socially Assistive Robots - A Meta Study. Privacy and Identity Management 2017: 265-281 - [c10]Alexander Gabel, Ina Schiering, Sandra Verena Müller, Funda Ertas:
mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies. Privacy and Identity Management 2017: 330-345 - [c9]Tanja Heuer, Ina Schiering, Reinhard Gerndt:
MuseumsBot - An Interdisciplinary Scenario in Robotics Education. RiE 2017: 141-153 - 2016
- [c8]Tanja Heuer, Ina Schiering, Frank Klawonn, Alexander Gabel, Martin Seeger:
Recognizing Time-Efficiently Local Botnet Infections - A Case Study. ARES 2016: 304-311 - 2014
- [c7]Matthias Rodeck, Caroline Voigt, Arndt Schnütgen, Ina Schiering, René Decker:
Toolgestützte Assessments zu Datenschutz und Datensicherheit in kleinen und mittelständischen Unternehmen. GI-Jahrestagung 2014: 575-586 - [c6]Jörn Kahrmann, Ina Schiering:
Patterns in Privacy - A Pattern-Based Approach for Assessments. Privacy and Identity Management 2014: 153-166 - 2013
- [c5]Saskia Viktoria Rother, Ina Schiering:
Privacy in the Life-Cycle of IT Services - An Investigation of Process Reference Models. Privacy and Identity Management 2013: 102-113 - 2011
- [c4]Ina Schiering, Jan Kretschmer:
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services. PrimeLife 2011: 88-101 - 2009
- [c3]Ina Schiering, Markus Hansen:
Multilateral Privacy in Clouds: Requirements for Use in Industry. PrimeLife 2009: 259-265 - 1997
- [c2]Ina Schiering:
A Hierarchical Approach to Monadic Second-Order Logic over Graphs. CSL 1997: 424-440 - 1995
- [c1]Ina Schiering, Wolfgang Thomas:
Counter-Free Automata, First-Order Logic and Star-Free Expressions. Developments in Language Theory 1995: 166-175
Editorship
- 2024
- [e3]Felix Bieker, Silvia De Conca, Nils Gruschka, Meiko Jensen, Ina Schiering:
Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 695, Springer 2024, ISBN 978-3-031-57977-6 [contents] - 2023
- [e2]Felix Bieker, Joachim Meyer, Sebastian Pape, Ina Schiering, Andreas Weich:
Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings. IFIP Advances in Information and Communication Technology 671, Springer 2023, ISBN 978-3-031-31970-9 [contents] - 2022
- [e1]Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner:
Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology 644, Springer 2022, ISBN 978-3-030-99099-2 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint