• Deutsch
Login

Open Access

  • Home
  • Search
  • Browse
  • Publish
  • FAQ

Refine

Author

  • Fritsch, Lothar (7)
  • Bergmann, Lothar (1)
  • Diekstra, Meta H. (1)
  • Fritsch, Achim (1)
  • Gauler, Thomas (1)
  • Guchelaar, Henk-Jan (1)
  • Hahn, Patrick (1)
  • Hatamian, Majid (1)
  • Hauser, Stefan (1)
  • Houtsma, Danny (1)
+ more

Year of publication

  • 2005 (4)
  • 2006 (1)
  • 2007 (1)
  • 2017 (1)
  • 2019 (1)

Document Type

  • Report (4)
  • Article (2)
  • Conference Proceeding (2)

Language

  • English (7)
  • German (1)

Has Fulltext

  • yes (8)

Is part of the Bibliography

  • no (8)

Keywords

  • Datenschutz (5)
  • Datenschutz / Kontrolle (2)
  • Identität (2)
  • Ortung (2)
  • Privacy (2)
  • Privatsphäre (2)
  • Adoptionsfaktoren (1)
  • Assurance (1)
  • Bildnisschutz (1)
  • Cameras (1)
+ more

Institute

  • Wirtschaftswissenschaften (5)
  • Informatik (2)
  • Erziehungswissenschaften (1)
  • Medizin (1)

8 search hits

  • 1 to 8
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
Economic location-based services, privacy and the relationship to identity (2005)
Fritsch, Lothar
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed. Thus, internet-based systems will continuously collect and process the location in relationship to a personal context of an identified customer. One of the challenges in designing LBS infrastructures is the concurrent design for economic infrastructures and the preservation of privacy of the subjects whose location is tracked. This presentation will explain typical LBS scenarios, the resulting new privacy challenges and user requirements and raises economic questions about privacy-design. The topics will be connected to “mobile identity” to derive what particular identity management issues can be found in LBS.
Mind your step! : How profiling location reveals your identity - and how you prepare for it (2006)
Fritsch, Lothar
Location-based services (LBS) are services that position your mobile phone to provide some context-based service for you. Some of these services – called ‘location tracking’ applications - need frequent updates of the current position to decide whether a service should be initiated. Thus, internet-based systems will continuously collect and process the location in relationship to a personal context of an identified customer. This paper will present the concept of location as part of a person’s identity. I will conceptualize location in information systems and relate it to concepts like privacy, geographical information systems and surveillance. The talk will present how the knowledge of a person's private life and identity can be enhanced with data mining technologies on location profiles and movement patterns. Finally, some first concepts about protecting location information.
Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process (2007)
Scherner, Tobias ; Fritsch, Lothar
This paper documents the experiences of assurance evaluation during the early stage of a large software development project. This project researches, contracts and integrates privacy-respecting software to business environments. While assurance evaluation with ISO 15408 Common Criteria (CC) within the certification schemes is done after a system has been completed, our approach executes evaluation during the early phases of the software life cycle. The promise is to increase quality and to reduce testing and fault removal costs for later phases of the development process. First results from the still-ongoing project suggests that the Common Criteria can define a framework for assurance evaluation in ongoing development projects.
WiFi hot spot superdistribution : a profit scheme for WiFi access distribution (2005)
Fritsch, Lothar
The wide-area deployment of WiFi hot spots challenges IP access providers. While new profit models are sought after by them, profitability as well as logistics for large-scale deployment of 802.11 wireless technology are still to be proven. Expenditure for hardware, locations, maintenance, connectivity, marketing, billing and customer care must be considered. Even for large carriers with infrastructure, the deployment of a large-scale WiFi infrastructure may be risky. This paper proposes a multi-level scheme for hot spot distribution and customer acquisition that reduces financial risk, cost of marketing and cost of maintenance for the large-scale deployment of WiFi hot spots.
Studie zur Akzeptanzanalyse von Location-based Services (2005)
Hahn, Patrick ; Fritsch, Lothar
Diese Studie untersuchte die relevanten Eigenschaften von Location-based Services, welche von prospektiven Nutzern erwartet werden, um mit der Nutzung dieser neuen Dienste zu beginnen. Dabei modellieren wir die Einflußfaktoren nach der Theorie der Diffusion von Innovationen und überprüfen diese durch eine empirische Befragung. Die Ergebnisse sind im folgenden Text dargestellt. Die wesentlichen Ergebnisse waren: • Die individuelle Nützlichkeit eines Angebots ist der stärkste Einflußfaktor auf die Adoption. • Überzeugende Datenschutzkonzepte stehen an zweiter Stelle. • Benutzerergonomie bei der Dienstenutzung sowie die leichte Verständlichkeit und Kommunizierbarkeit der Dienste und ihrer Anwendung sind wesentlich. Eine Einführung in die Diffusionstheorie und weitere Details zur Studie finden Sie im Text.
Personal rights management (PRM) : enabling privacy rights in digital online media content (2005)
Fritsch, Lothar ; Kursawe, Klaus
With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who now have the means to take and distribute pictures of one’s face at no risk and little cost in any situation in public and private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual’s private life to the public in unpreceeded ways. Social and legal measures are increasingly taken to deal with this problem. In practice however, they lack efficiency, as they are hard to enforce in practice. In this paper, we discuss a supportive infrastructure aiming for the distribution channel; as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action.
Did app privacy improve after the GDPR? (2019)
Momen, Nurul ; Hatamian, Majid ; Fritsch, Lothar
What are the effects of the GDPR on consumer apps? This article presents an analysis of app behavior before and after the regulatory change in data protection in Europe. Based on long-term data collection, we present differences in app permission use and expressed user concerns and discuss their implications. In May 2018, the General Data Protection Regulation (GDPR) changed the data protection obligations of the information industry with the European Union users substantially. One should expect to find changes in code, program behavior and data collection activities. To investigate this expectation, we analyzed data about Android apps request and use of permissions to access sensitive group of data on smartphones, and collected user reviews. Our data shows an overall reduction of both permissions used and of expressed user concern. However, in some areas apps have increased access or user complaints while in addition, many apps carry with them several unused access privileges.
Population modeling integrating pharmacokinetics, pharmacodynamics, pharmacogenetics, and clinical outcome in patients with sunitinib‐treated cancer (2017)
Diekstra, Meta H. ; Fritsch, Achim ; Kanefendt, Friederike ; Swen, Jesse Joachim ; Moes, Dirk Jan A. R. ; Sörgel, Fritz ; Kinzig, Martina ; Stelzer, Christoph ; Schindele, Daniel ; Gauler, Thomas ; Hauser, Stefan ; Houtsma, Danny ; Roessler, Max ; Moritz, Berta ; Mross, Klaus ; Bergmann, Lothar ; Oosterwijk, Egbert ; Kiemeney, Lambertus Adrianus ; Guchelaar, Henk-Jan ; Jaehde, Ulrich
The tyrosine kinase inhibitor sunitinib is used as first‐line therapy in patients with metastasized renal cell carcinoma (mRCC), given in fixed‐dose regimens despite its high variability in pharmacokinetics (PKs). Interindividual variability of drug exposure may be responsible for differences in response. Therefore, dosing strategies based on pharmacokinetic/pharmacodynamic (PK/PD) models may be useful to optimize treatment. Plasma concentrations of sunitinib, its active metabolite SU12662, and the soluble vascular endothelial growth factor receptors sVEGFR‐2 and sVEGFR‐3, were measured in 26 patients with mRCC within the EuroTARGET project and 21 patients with metastasized colorectal cancer (mCRC) from the C‐II‐005 study. Based on these observations, PK/PD models with potential influence of genetic predictors were developed and linked to time‐to‐event (TTE) models. Baseline sVEGFR‐2 levels were associated with clinical outcome in patients with mRCC, whereas active drug PKs seemed to be more predictive in patients with mCRC. The models provide the basis of PK/PD‐guided strategies for the individualization of anti‐angiogenic therapies.
  • 1 to 8

OPUS4 Logo

  • Contact
  • Imprint
  • Sitelinks