@article{SchraderHennigThurau, author = {Schrader, Ulf and Hennig-Thurau, Thorsten}, title = {VHB-JOURQUAL2: Method, Results, and Implications of the German Academic Association for Business Research's Journal Ranking}, series = {Business Research}, journal = {Business Research}, doi = {10.1007/BF03342710}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170426-31628}, pages = {180 -- 204}, abstract = {VHB-JOURQUAL represents the official journal ranking of the German Academic Association for Business Research. Since its introduction in 2003, the ranking has become the most influential journal evaluation approach in German-speaking countries, impacting several key managerial decisions of German, Austrian, and Swiss business schools. This article reports the methodological approach of the ranking's second edition. It also presents the main results and additional analyses on the validity of the rating and the underlying decision processes of the respondents. Selected implications for researchers and higher-education institutions are discussed.}, subject = {Rating}, language = {en} } @article{TatliLucks, author = {Tatli, Emin Islam and Lucks, Stefan}, title = {Mobile Identity Management Revisited}, series = {Electronic Notes in Theoretical Computer Science}, journal = {Electronic Notes in Theoretical Computer Science}, doi = {10.1016/j.entcs.2009.07.044}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170426-31640}, pages = {125 -- 137}, abstract = {Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware mobile applications (e.g. restaurant finder, friend finder, indoor and outdoor navigation, etc.) have gained quite big interest in the business and IT world. Considering sensitive static personal information (e.g. name, address, phone number, etc.) and also dynamic personal information (e.g. current location, velocity in car, current status, etc.), mobile identity management is required to help mobile users to safeguard their personal data. In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences, etc.) of mobile identity management}, subject = {Privatsph{\"a}re}, language = {en} }