Norwegian version
Lothar Fritsch

Lothar Fritsch

About

I'm Professor of Applied Cybersecurity. Areas of interest are information privacy, identity management, cyberwar, privacy technology, privacy risk assessment, and general cybersecurity topics.
I teach in many areas of computer science, amonge others Internet of Things, network security and Privacy by Design. I supervise bachelor and master thesis projects, in collaboration with industry, associations and public organizations.

Read the blog about information security and privacy in education and research at OsloMET: https://uni.oslomet.no/SecurityPrivacyTechnology/

Until my recent five years of work from Sweden turn up in the Cristin database, you can refer to my profile on Google Scholar ( https://scholar.google.com ) or use the Swedish DIVA system ( http://kau.diva-portal.org/ ) for an overview over my research activities.

Scientific publications

Fritsch, Lothar; Mecaliff, Marie; Opdal, Kathinka W.; Rundgreen, Mathias; Sachse, Toril S. (2022). Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks. Roßnagel, Heiko; Schunk, Christian H.; Mödersheim, Sebastian (Ed.). Open Identity Summit 2022, LNI Volume P325. chapter 1. p. 15-26. Gesellschaft für Informatik.
https://dl.gi.de/handle/20.500.12116/38696

Naser Jaber, Aws; Fritsch, Lothar; Haugerud, Hårek (2022). Improving Phishing Detection with the Grey Wolf Optimizer. 2022 International Conference on Electronics, Information, and Communication (ICEIC 2022). Vitenskapelig koneranseartikkel. IEEE.
https://ieeexplore.ieee.org/document/9748592

Nordin, Anna; Ängeby, Karin; Fritsch, Lothar (2022). Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management. Ur Rehman, Masood; Zoha, Ahmed (Ed.). Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. 16th EAI International Conference, BODYNETS 2021, Virtual Event, October 25-26, 2021, Proceedings. chapter.
https://link.springer.com/chapter/10.1007/978-3-03...

Alzarqawee, Aws Naser Jaber; Fritsch, Lothar (2021). COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks. Jiamset, Keerapat; Kamolphiwong, Sinchai; Pongbangpho, Supakorn; Cheawsuwan, Thitirath (Ed.). 25th International Computer Science and Engineering Conference (ICSEC). chapter. p. 434-442. IEEE.
https://ieeexplore.ieee.org/abstract/document/9684...

Bisztray, Tamas; Gruschka, Nils; Bourlai, Thirimachos; Fritsch, Lothar (2021). Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks. Brömme, Arslan; Busch, Christoph; Damer, Naser; Dantcheva, Antitza; Gomez-Barrero, Marta; Raja, Kiran; Rathgeb, Christian; Sequeira, Ana F.; Uhl, Andreas (Ed.). Proceedings of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG2021). KAPITTEL. p. 81-90. Gesellschaft für Informatik.
https://dl.gi.de/handle/20.500.12116/37475

Zibuschka, Jan; Fritsch, Lothar (2021). Mapping Identity Management in Data Lakes. Roßnagel, Heiko; Schunk, Christian; Mödersheim, Sebastian (Ed.). Open Identity Summit 2021 Proceedings. KAPITTEL. Gesellschaft für Informatik.
https://dl.gi.de/handle/20.500.12116/36485

Fritsch, Lothar; Gruschka, Nils (2021). Extraction and Accumulation of Identity Attributes from the Internet of Things. Roßnagel, Heiko; Schunk, Christian; Mödersheim, Sebastian (Ed.). Open Identity Summit 2021 Proceedings. Kapittel. Gesellschaft für Informatik.
http://hdl.handle.net/10852/92569

Hatamian, Majid; Wairimu, Samuel; Momen, Nurul; Fritsch, Lothar (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering . Vol. 26.

Bisztray, Tamas; Gruschka, Nils; Mavroeidis, Vasileios; Fritsch, Lothar (2020). Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian; Hühnlein, Detlef (Ed.). Open Identity Summit 2020. Paper. p. 185-192. Gesellschaft für Informatik.

Momen, Nurul; Fritsch, Lothar (2020). App-generated digital identities extracted through Android permission-based data access - a survey of app privacy. Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). artikkel. p. 15-28. Springer Berlin/Heidelberg.
https://dl.gi.de/handle/20.500.12116/31778

Momen, Nurul; Hatamian, Majid; Fritsch, Lothar (2019). Did App Privacy Improve After the GDPR?. IEEE Security and Privacy .

Fritsch, Lothar (2018). How Big Data helps SDN with data protection and privacy. Taheri, Javid (Ed.). Big Data and Software Defined Networks. Chapter 16. p. 339-351.
https://www.theiet.org/resources/books/computing/b...

Schulz, Trenton; Fritsch, Lothar (2014). Accessibility and Inclusion Requirements for Future e-Identity Solutions. Miesenberger, Klaus; Fels, Deborah; Archambault, Dominique; Peňáz, Petr; Zagler, Wolfgang (Ed.). Computers Helping People with Special Needs - Proceedings of the 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014; Bind 2. Springer Lecture Notes on Computer Science (LNCS) 8648. Chapter. p. 316-323. Springer.

Schulz, Trenton; Fritsch, Lothar (2013). Identifying Trust Strategies in the Internet of Things. Schulz, Trenton (Ed.). Proceedings of the User-Centered Trust in Interactive Systems Workshop: a Workshop from NordiCHI 2012. 5. p. 19-23.
http://publications.nr.no/1363960061/NR-Report-102...

Paintsil, Ebenezer; Fritsch, Lothar (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. Furnell, Steven; Lambrinoudakis, Costas; Lopez, Javier (Ed.). Trust, Privacy, and Security in Digital Business. article. p. 48-61. Springer.
http://dx.doi.org/10.1007/978-3-642-40343-9_5

Røssvoll, Till Halbach; Fritsch, Lothar (2013). Trustworthy and Inclusive Identity Management for Applications in Social Media. Kurosu, Masaaki (Ed.). Human-Computer Interaction. Users and Contexts of Use. Lecture Notes in Computer Science. p. 68-77. Springer.
http://dx.doi.org/10.1007/978-3-642-39265-8_8

Røssvoll, Till Halbach; Fritsch, Lothar (2013). Reducing the User Burden of Identity Management: A Prototype Based Case Study for a Social-Media Payment Application. Miller, Leslie (Ed.). ACHI 2013, The Sixth International Conference on Advances in Computer-Human Interactions. ACHI 14: SOCIAL ASPECTS OF HUMAN-COMPUTER INTERACTION. p. 364-370.
http://www.iaria.org/conferences2013/ACHI13.html

Paintsil, Ebenezer; Fritsch, Lothar (2013). Executable Model-Based Risk Assessment Method for Identity Management Systems. Fischer-Hübner, Simone; Leeuw, Elisabeth de; Mitchell, Chris (Ed.). Policies and Research in Identity Management. Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Panel Session – Risk Management of Identity Management. p. 97-99. Springer.
http://dx.doi.org/10.1007/978-3-642-37282-7_8

Fritsch, Lothar; Groven, Arne-Kristian; Schulz, Trenton (2012). On the Internet of Things, Trust is Relative. Communications in Computer and Information Science . Vol. 277.

Zibuschka, Jan; Fritsch, Lothar (2012). A hybrid approach for highly available & secure storage of pseudo-SSO credentials. Jøsang, Audun; Carlsson, Bengt (Ed.). Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings. Network Security. p. 169-183. Springer.
http://link.springer.com/chapter/10.1007/978-3-642...

Kohlweiss, Markulf; Fritsch, Lothar (2012). Privatsphäre trotz intelligenter Zähler. digma - Zeitschrift für Datenrecht und Informationssicherheit . Vol. 12.

Paintsil, Ebenezer; Fritsch, Lothar (2011). Taxonomy of Privacy and Security Risks Contributing Factors. Fischer-Hübner, Simone; Duquenoy, Penny; Hansen, Marit; Leenes, Ronald; Zhang, Ge (Ed.). Privacy and Identity Management for Life. 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. Chapter. p. 52-63. Springer.

Paintsil, Ebenezer; Fritsch, Lothar (2011). A Taxonomy of Privacy and Security Risks Contributing Factors. IFIP Advances in Information and Communication Technology . Vol. 352.

Paintsil, Ebenezer; Fritsch, Lothar (2011). Towards Legal Privacy Risk Assessment Automation in Social Media. INFORMATIK 2011 - Informatik schafft Communities. Kapitel. p. 411- Gesellschaft für Informatik.

Fritsch, Lothar (2011). Security and privacy engineering for corporate use of social community platforms. INFORMATIK 2011 - Informatik schafft Communities. Kapitel. p. 416- Gesellschaft für Informatik.

Scherner, Tobias; Fritsch, Lothar (2011). Technology Assurance. Digital Privacy. chapter. p. 597-608. Springer.
http://dx.doi.org/10.1007/978-3-642-19050-6_21

Solheim, Ivar; Dale, Øystein; Fritsch, Lothar; Røssvoll, Till Halbach; Holmqvist, Knut; Tjøstheim, Ingvar (2010). Search and navigation as retrieval strategies in large photo collections. Doherty, Aiden R.; Gurrin, Cathal; Jones, Gareth J.F.; Smeaton, Alan F. (Ed.). Proceedings of the Information Access for Personal Media Archives Workshop (IAPMA2010). Chapter.
http://publications.nr.no/5265/Solheim_-_Search_an...

Jøsang, Audun; Fritsch, Lothar; Mahler, Tobias (2010). Privacy Policy Referencing. Lecture Notes in Computer Science (LNCS) . Vol. 6264.

Fritsch, Lothar; Fuglerud, Kristin Skeide; Solheim, Ivar (2010). Towards Inclusive Identity Management. Identity in the Information Society . Vol. 3.
http://www.springerlink.com/content/x85883158t1176...

de Leeuw, Elisabeth; Fischer-Hübner, Simone; Fritsch, Lothar (2010). Second IFIP WG 11.6 Working Conference, IDMAN 2010. ISBN: 978-3-642-17302-8. 145 p. Springer.





These publications are obtained from Cristin. The list may be incomplete