default search action
Tobias Dehling
Person information
- affiliation: Karlsruhe Institute of Technology, Institute of Applied Informatics and Formal Description Methods, Germany
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Tobias Dehling, Ali Sunyaev:
A Design Theory for Transparency of Information Privacy Practices. Inf. Syst. Res. 35(3): 956-977 (2024) - 2023
- [j4]Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi:
The Future of Enterprise Information Systems. Bus. Inf. Syst. Eng. 65(6): 731-751 (2023) - [i4]Tobias Dehling, Ali Sunyaev:
A design theory for transparency of information privacy practices. CoRR abs/2307.02665 (2023) - 2022
- [p1]Jan Bartsch, Tobias Dehling, Florian Lauf, Sven Meister, Ali Sunyaev:
Let the Computer Say NO! The Neglected Potential of Policy Definition Languages for Data Sovereignty. Selbstbestimmung, Privatheit und Datenschutz 2022: 449-468 - 2021
- [j3]Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev:
Trade-offs between Distributed Ledger Technology Characteristics. ACM Comput. Surv. 53(2): 42:1-42:37 (2021) - [c18]Imrana Abdullahi, Tobias Dehling, Felix Kluge, Bjoern M. Eskofier, Ali Sunyaev:
Online at Will: A Novel Protocol for Mutual Authentication in Peer-to-Peer Networks for Patient-Centered Health Care Information Systems. HICSS 2021: 1-10 - [i3]Olga Labazova, Erol Kazan, Tobias Dehling, Tuure Tuunanen, Ali Sunyaev:
Managing Blockchain Systems and Applications: A Process Model for Blockchain Configurations. CoRR abs/2105.02118 (2021) - [i2]Felix Morsbach, Tobias Dehling, Ali Sunyaev:
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design. CoRR abs/2111.14924 (2021)
2010 – 2019
- 2019
- [c17]Thomas Brüggemann, Tobias Dehling, Ali Sunyaev:
No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications. HICSS 2019: 1-10 - [c16]Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev:
What Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs. HICSS 2019: 1-10 - [c15]Olga Labazova, Tobias Dehling, Ali Sunyaev:
From Hype to Reality: A Taxonomy of Blockchain Applications. HICSS 2019: 1-10 - [c14]Tobias Dehling, Yuchen Zhang, Ali Sunyaev:
Consumer Perceptions of Online Behavioral Advertising. CBI (1) 2019: 345-354 - [i1]Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev:
Mind the Gap: Trade-Offs between Distributed Ledger Technology Characteristics. CoRR abs/1906.00861 (2019) - 2018
- [c13]Anton Grube, Tobias Dehling, Kristina Klein, Ali Sunyaev:
Promoting Use of Patient-Centered Health IT: Assessment and Ranking of Incentive Mechanisms. HICSS 2018: 1-10 - [c12]Theresa Kromat, Tobias Dehling, Reinhold Haux, Christoph Peters, Bernhard Sick, Sven Tomforde, Klaus-Hendrik Wolf, Ali Sunyaev:
Gestaltungsraum für proaktive Smart Homes zur Gesundheitsförderung. MKWI 2018: 695-707 - 2017
- [c11]Anton Grube, Tobias Dehling, Ali Sunyaev:
How Do Patients Expect Apps to Provide Drug Information? HICSS 2017: 1-10 - [c10]Klaus-Hendrik Wolf, Tobias Dehling, Reinhold Haux, Bernhard Sick, Ali Sunyaev, Sven Tomforde:
On Methodological and Technological Challenges for Proactive Health Management in Smart Homes. ICIMTH 2017: 209-212 - 2016
- [c9]Thomas Brüggemann, Joel Hansen, Tobias Dehling, Ali Sunyaev:
An Information Privacy Risk Index for mHealth Apps. APF 2016: 190-201 - [c8]Scott Thiebes, Tobias Dehling, Ali Sunyaev:
One Size does not Fit All: Information Security and Information Privacy for genomic Cloud Services. ECIS 2016: Research-in-Progress Paper 75 - 2015
- [j2]Ali Sunyaev, Tobias Dehling, Patrick L. Taylor, Kenneth D. Mandl:
Availability and quality of mobile health app privacy policies. J. Am. Medical Informatics Assoc. 22(e1): e28-e33 (2015) - 2014
- [j1]Tobias Dehling, Ali Sunyaev:
Secure provision of patient-centered health information technology services in public networks - leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron. Mark. 24(2): 89-99 (2014) - [c7]Manuel Schmidt-Kraepelin, Tobias Dehling, Ali Sunyaev:
Usability of Patient-Centered Health IT: Mixed-Methods Usability Study of ePill. eHealth 2014: 32-39 - [c6]Tobias Dehling, Ali Sunyaev:
Information Security and Privacy of Patient-Centered Health IT Services: What Needs to Be Done? HICSS 2014: 2984-2993 - [c5]Till Blesik, Tobias Dehling, Ali Sunyaev:
Improving Comprehensibility of Medical Information - Proof-of-Concept for PatientInformation Leaflets. MKWI 2014: 665-677 - 2013
- [c4]Tobias Dehling, Ali Sunyaev:
Improved Medication Compliance Through Health IT: Design and Mixed Methods Evaluation of the Application ePill. ICIS 2013 - 2012
- [c3]Tobias Dehling, Ali Sunyaev:
Architecture and Design of a Patient-Friendly eHealth Web Application: Patient Information Leaflets and Supplementary Services. AMCIS 2012 - [c2]Tobias Dehling, Ali Sunyaev:
Domain-Specific Languages and Digital PreservationSupporting Knowledge-Management. MKWI 2012: 1273-1284 - [c1]Tobias Dehling, Ali Sunyaev:
Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure. HealthSec 2012
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint