Norwegian version
Lothar Fritsch

Lothar Fritsch

About

I'm Professor of Applied Cybersecurity. Areas of interest are information privacy, identity management, cyberwar, privacy technology, privacy risk assessment, and general cybersecurity topics.

Until my recent five years of work from Sweden turn up in the Cristin database, you can refer to my profile on Google Scholar ( https://scholar.google.com ) or use the Swedish DIVA system ( http://kau.diva-portal.org/ ) for an overview over my research activities.

Scientific publications

Hatamian, Majid; Wairimu, Samuel; Momen, Nurul; Fritsch, Lothar (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering .

Bisztray, Tamas; Gruschka, Nils; Mavroeidis, Vasileios; Fritsch, Lothar (2020). Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian; Hühnlein, Detlef (Ed.). Open Identity Summit 2020. Paper. p. 185-192. Gesellschaft für Informatik.

Momen, Nurul; Fritsch, Lothar (2020). App-generated digital identities extracted through Android permission-based data access - a survey of app privacy. Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). artikkel. p. 15-28. Springer Berlin/Heidelberg.
https://dl.gi.de/handle/20.500.12116/31778

Momen, Nurul; Hatamian, Majid; Fritsch, Lothar (2019). Did App Privacy Improve After the GDPR?. IEEE Security and Privacy .

Fritsch, Lothar (2018). How Big Data helps SDN with data protection and privacy. Taheri, Javid (Ed.). Big Data and Software Defined Networks. Chapter 16. p. 339-351.
https://www.theiet.org/resources/books/computing/b...

Schulz, Trenton; Fritsch, Lothar (2014). Accessibility and Inclusion Requirements for Future e-Identity Solutions. Miesenberger, Klaus; Fels, Deborah; Archambault, Dominique; Peňáz, Petr; Zagler, Wolfgang (Ed.). Computers Helping People with Special Needs - Proceedings of the 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014; Bind 2. Springer Lecture Notes on Computer Science (LNCS) 8648. Chapter. p. 316-323. Springer.

Schulz, Trenton; Fritsch, Lothar (2013). Identifying Trust Strategies in the Internet of Things. Schulz, Trenton (Ed.). Proceedings of the User-Centered Trust in Interactive Systems Workshop: a Workshop from NordiCHI 2012. 5. p. 19-23.
http://publications.nr.no/1363960061/NR-Report-102...

Paintsil, Ebenezer; Fritsch, Lothar (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. Furnell, Steven; Lambrinoudakis, Costas; Lopez, Javier (Ed.). Trust, Privacy, and Security in Digital Business. article. p. 48-61. Springer.
http://dx.doi.org/10.1007/978-3-642-40343-9_5

Røssvoll, Till Halbach; Fritsch, Lothar (2013). Trustworthy and Inclusive Identity Management for Applications in Social Media. Kurosu, Masaaki (Ed.). Human-Computer Interaction. Users and Contexts of Use. Lecture Notes in Computer Science. p. 68-77. Springer.
http://dx.doi.org/10.1007/978-3-642-39265-8_8

Røssvoll, Till Halbach; Fritsch, Lothar (2013). Reducing the User Burden of Identity Management: A Prototype Based Case Study for a Social-Media Payment Application. Miller, Leslie (Ed.). ACHI 2013, The Sixth International Conference on Advances in Computer-Human Interactions. ACHI 14: SOCIAL ASPECTS OF HUMAN-COMPUTER INTERACTION. p. 364-370.
http://www.iaria.org/conferences2013/ACHI13.html





These publications are obtained from Cristin. The list may be incomplete