default search action
Michael Friedewald
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Ina Schiering, Michael Friedewald, Ramona Schmidt:
Datenschutz-Design-Patterns. Datenschutz und Datensicherheit (dud) 48(9): 583-588 (2024) - 2023
- [j23]Murat Karaboga, Nula Frei, Frank Ebbers, Sophia Rovelli, Michael Friedewald:
Emotions- und Krankheitserkennung mittels biometrischer Verfahren. Datenschutz und Datensicherheit (dud) 47(9): 553-559 (2023) - 2022
- [j22]Michael Friedewald, Alexander Roßnagel, Tamer Bile, Christian L. Geminn, Marit Hansen, Felix Bieker, Murat Karaboga:
Zur Einführung einer Überwachungs-Gesamtrechnung. Datenschutz und Datensicherheit 46(9): 572-577 (2022) - [c14]Murat Karaboga, Frank Ebbers, Greta Runge, Michael Friedewald:
What is There to Criticize About Voice, Speech and Face Recognition and How to Structure the Critique? Privacy and Identity Management 2022: 34-43 - [p2]Michael Friedewald, Michael Kreutzer, Marit Hansen:
Einleitung: Selbstbestimmung und Privatheit - Gestaltungsoptionen für einen europäischen Weg. Selbstbestimmung, Privatheit und Datenschutz 2022: 1-8 - [e4]Michael Friedewald, Michael Kreutzer, Marit Hansen:
Selbstbestimmung, Privatheit und Datenschutz: Gestaltungsoptionen für einen europäischen Weg. DuD-Fachbeiträge, Springer Fachmedien Wiesbaden 2022, ISBN 978-3-658-33306-5 [contents] - [e3]Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner:
Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology 644, Springer 2022, ISBN 978-3-030-99099-2 [contents] - 2021
- [c13]Michael Friedewald, Ina Schiering, Nicholas Martin, Dara Hallinan:
Data Protection Impact Assessments in Practice - Experiences from Case Studies. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 424-443 - [e2]Michael Friedewald, Stefan Schiffner, Stephan Krenn:
Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers. IFIP Advances in Information and Communication Technology 619, Springer 2021, ISBN 978-3-030-72465-8 [contents] - 2020
- [j21]Nicholas Martin, Britta Alexandra Mester, Ina Schiering, Michael Friedewald, Dara Hallinan:
Datenschutz-Folgenabschätzung. Datenschutz und Datensicherheit 44(3): 149-153 (2020) - [j20]Nicholas Martin, Ina Schiering, Michael Friedewald:
Methoden der Datenschutz-Folgenabschätzung. Datenschutz und Datensicherheit 44(3): 154-160 (2020) - [j19]Ina Schiering, Britta Alexandra Mester, Michael Friedewald, Nicholas Martin:
Datenschutz-Risiken partizipativ identifizieren und analysieren. Datenschutz und Datensicherheit 44(3): 161-165 (2020) - [e1]Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 576, Springer 2020, ISBN 978-3-030-42503-6 [contents]
2010 – 2019
- 2019
- [j18]Michael Friedewald, Ina Schiering, Nicholas Martin:
Datenschutz-Folgenabschätzung in der Praxis. Datenschutz und Datensicherheit 43(8): 473-477 (2019) - [j17]Nicholas Martin, Michael Friedewald:
Warum Unternehmen sich (nicht) an Recht und Gesetz halten. Datenschutz und Datensicherheit 43(8): 493-497 (2019) - 2017
- [c12]Felix Bieker, Nicholas Martin, Michael Friedewald, Marit Hansen:
Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool. Privacy and Identity Management 2017: 207-220 - 2016
- [c11]Felix Bieker, Michael Friedewald, Marit Hansen, Hannah Obersteller, Martin Rost:
A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation. APF 2016: 21-37 - 2015
- [c10]Michael Friedewald, Marc van Lieshout, Sven Rung:
Modelling the Relationship Between Privacy and Security Perceptions and the Acceptance of Surveillance Practices. Privacy and Identity Management 2015: 1-18 - [c9]Andreas Baur-Ahrens, Felix Bieker, Michael Friedewald, Christian L. Geminn, Marit Hansen, Murat Karaboga, Hannah Obersteller:
Smart Technologies - Workshop on Challenges and Trends for Privacy in a Hyper-connected World. Privacy and Identity Management 2015: 111-128 - 2014
- [j16]Michael Friedewald, Sebastian Wawrzyniak, Frank Pallas:
Überschussdaten in Retinabildern. Datenschutz und Datensicherheit 38(7): 482-486 (2014) - [c8]Michael Friedewald, Marc van Lieshout, Sven Rung, Merel Ooms, Jelmer Ypma:
Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model. Privacy and Identity Management 2014: 39-53 - 2013
- [j15]Dara Hallinan, Michael Friedewald, Paul de Hert:
Genetic Data and the Data Protection Regulation: Anonymity, multiple subjects, sensitivity and a prohibitionary logic regarding genetic data? Comput. Law Secur. Rev. 29(4): 317-329 (2013) - [j14]Serge Gutwirth, Michael Friedewald:
Emergent technologies and the transformations of privacy and data protection. Comput. Law Secur. Rev. 29(5): 477-479 (2013) - [p1]Rachel L. Finn, David Wright, Michael Friedewald:
Seven Types of Privacy. European Data Protection 2013: 3-32 - 2012
- [j13]Dara Hallinan, Michael Friedewald, Paul McCarthy:
Citizens' perceptions of data protection and privacy in Europe. Comput. Law Secur. Rev. 28(3): 263-272 (2012) - 2011
- [j12]David Wright, Raphaël Gellert, Serge Gutwirth, Michael Friedewald:
Minimizing Technology Ricks with PIAs, Precaution, and Participation. IEEE Technol. Soc. Mag. 30(4): 47-54 (2011) - [j11]Michael Friedewald, Oliver Raabe:
Ubiquitous computing: An overview of technology impacts. Telematics Informatics 28(2): 55-65 (2011) - 2010
- [b3]Michael Friedewald, Oliver Raabe, Peter Georgieff, Daniel J. Koch, Peter Neuhäusler:
Ubiquitäres Computing - das Internet der Dinge: Grundlagen, Anwendungen, Folgen. Studien des Büros für Technikfolgen-Abschätzung beim Deutschen Bundestag 31, Edition sigma 2010, ISBN 978-3-8360-8131-3, pp. 1-300 - [j10]David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul de Hert, Kush Wadhwa, Didier Bigo:
Sorting out smart surveillance. Comput. Law Secur. Rev. 26(4): 343-354 (2010) - [c7]Philip Schütz, Michael Friedewald:
Privacy: What Are We Actually Talking About? - A Multidisciplinary Approach. PrimeLife 2010: 1-14
2000 – 2009
- 2009
- [b2]Michael Friedewald:
Der Computer als Werkzeug und Medium - die geistigen und technischen Wurzeln des Personal Computers (2. korr. Aufl.). Aachener Beiträge zur Wissenschafts- und Technikgeschichte des 20. Jahrhunderts 3, Verlag für Geschichte der Naturwissenschaften und der Technik 2009, pp. 1-503 - [j9]David Wright, Serge Gutwirth, Michael Friedewald, Paul de Hert, Marc Langheinrich, Anna Moscibroda:
Privacy, trust and policy-making: Challenges and responses. Comput. Law Secur. Rev. 25(1): 69-83 (2009) - 2008
- [j8]David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta:
The illusion of security. Commun. ACM 51(3): 56-63 (2008) - 2007
- [j7]Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright:
Privacy, identity and security in ambient intelligence: A scenario analysis. Telematics Informatics 24(1): 15-29 (2007) - 2006
- [c6]Elena Vildjiounaite, Petteri Alahuhta, Pasi Ahonen, David Wright, Michael Friedewald:
Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications. IWUC 2006: 49-61 - [c5]Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright:
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. SPC 2006: 119-133 - 2005
- [j6]Michael Friedewald, Olivier Da Costa, Yves Punie, Petteri Alahuhta, Sirkka Heinonen:
Perspectives of ambient intelligence in the home environment. Telematics Informatics 22(3): 221-238 (2005) - [c4]Michael Friedewald:
Ambient Intelligence: Auf dem Weg zur Mensch-Computer-Symbiose? GI Jahrestagung (1) 2005: 222-226 - [c3]Michael Friedewald:
Safeguards in a World of Ambient Intelligence. SPC 2005: 63-69 - 2003
- [j5]Michael Friedewald:
Ein Computer für Kinder jeden Alters: Alan Kay und die Ursprünge grafischer Benutzungsoberflächen. i-com 2(2): 38-42 (2003) - [j4]Michael Friedewald, Knut Blind, Jakob Edler:
Innovation und intellektuelles Eigentum: Wer nutzt und wem nützen Softwarepatente? Prax. Inf.verarb. Kommun. 26(2): 102-109 (2003) - [c2]Michael Friedewald:
Offene Systeme in der Frühphase des Internet. GI Jahrestagung (2) 2003: 115-120 - 2002
- [j3]Michael Friedewald, Knut Blind, Jakob Edler:
Die Innovationstätigkeit der deutschen Softwareindustrie. Wirtschaftsinf. 44(2): 151-161 (2002) - 2001
- [j2]Michael Friedewald, H. Dieter Rombach, Petra Stahl, Manfred Broy, Susanne Hartkopf, Simone Kimpeler, Kirstin Kohler, Robert Wucher, Peter Zoche:
Softwareentwicklung in Deutschland, Eine Bestandsaufnahme. Inform. Spektrum 24(2): 81-90 (2001) - [c1]Knut Blind, Jakob Edler, Michael Friedewald:
Wer braucht eigentlich Software-Patente? Ergebnisse einer empirischen Untersuchung. GI Jahrestagung (2) 2001: 1046-1053
1990 – 1999
- 1999
- [b1]Michael Friedewald:
Der Computer als Werkzeug und Medium: die geistigen und technischen Wurzeln des Personal Computers. RWTH Aachen University, Germany, Verlag für Geschichte der Naturwissenschaft und der Technik 1999, ISBN 978-3-928186-47-6, pp. 1-497 - 1998
- [j1]Michael Friedewald:
Die veränderliche Ökonomie des Computers: Von Groschs Gesetz zum PC. Inform. Spektrum 21(2): 80-83 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint