189 research outputs found
Mobile IP movement detection optimisations in 802.11 wireless LANs
The IEEE 802.11 standard was developed to support the establishment of highly flexible wireless local area networks (wireless LANs). However, when an 802.11 mobile node moves from a wireless LAN on one IP network to a wireless LAN on a different network, an IP layer handoff occurs. During the handoff, the mobile node's IP settings must be updated in order to re-establish its IP connectivity at the new point of attachment. The Mobile IP protocol allows a mobile node to perform an IP handoff without breaking its active upper-layer sessions. Unfortunately, these handoffs introduce large latencies into a mobile node's traffic, during which packets are lost. As a result, the mobile node's upper-layer sessions and applications suffer significant disruptions due to this handoff latency. One of the main components of a Mobile IP handoff is the movement detection process, whereby a mobile node senses that it is attached to a new IP network. This procedure contributes significantly to the total Mobile IP handover latency and resulting disruption. This study investigates different mechanisms that aim to lower movement detection delays and thereby improve Mobile IP performance. These mechanisms are considered specifically within the context of 802.11 wireless LANs. In general, a mobile node detects attachment to a new network when a periodic IP level broadcast (advertisement) is received from that network. It will be shown that the elimination of this dependence on periodic advertisements, and the reliance instead on external information from the 802.11 link layer, results in both faster and more efficient movement detection. Furthermore, a hybrid system is proposed that incorporates several techniques to ensure that movement detection performs reliably within a variety of different network configurations. An evaluation framework is designed and implemented that supports the assessment of a wide range of movement detection mechanisms. This test bed allows Mobile IP handoffs to be analysed in detail, with specific focus on the movement detection process. The performance of several movement detection optimisations is compared using handoff latency and packet loss as metrics. The evaluation framework also supports real-time Voice over IP (VoIP) traffic. This is used to ascertain the effects that different movement detection techniques have on the output voice quality. These evaluations not only provide a quantitative performance analysis of these movement detection mechanisms, but also a qualitative assessment based on a VoIP application
Seamless Application Handover Across Radio Access Networks (SAHARA Net)
The explosion in mobile and data traffic in the last decade has led to a rapid proliferation in wireless networks. A plethora of wireless access technologies are available today each with a different offering. Some offer high data rates within a restricted coverage area such as 802.11 hotspots. Others, offer lower data rates but with a much wider coverage such as UMTS. This diversity can be harnessed in a way that creates a ubiquitous communications platform for the user. This is the premise of the heterogeneous networks vision/architecture: an environment where disparate technologies cooperate together and complement each other. However, there are various technical challenges in the way of such convergence. The first obstacle is enabling communication between disparate mobility protocols. Once this is achieved, the diversity of networks in itself poses a challenge for the user as to which network he connects to. This thesis answers the first question by reviewing the low-latency handover literature to identify the most credible solutions. The general consensus amongst researchers in the field has been to bridge the gap between the network and link layers so that IP protocols can react quickly to link changes. To answer the second question, this thesis defines a framework to assess handover decision algorithms based on application performance. The merit of the handover algorithmâs decision is measured by how well the application performs after handover. In order to facilitate this process, a simulation module was created within the NS2 network simulator that allows mobile devices to collect network measurements and feed that information into a decision algorithm to decide whether or not handover should be triggered. Through this evaluation process, a number of issues emerged as possible stumbling blocks. The first such issue is the inconsistency between local network conditions measured at the Access Point or Base Station, and the end to end conditions experienced by the userâs application. Another issue is the algorithmâs adaptability to user and application preferences. Personal users might be cost aware opting to trade off quality for a lower cost in certain circumstances. The Abstract IV handover algorithm must be able to accommodate such scenarios. Furthermore, algorithms must be able to adapt their decisions according to the applicationâs requirements. Using application profiles with thresholds or utility functions can result in better decisions than using absolute values. If an application is satisfied with the current network conditions, it might not be in its benefit to move to a different network even if it offered better conditions. In fact, it might suffer as a result of possible handover disruptions
MOBILITY SUPPORT ARCHITECTURES FOR NEXT-GENERATION WIRELESS NETWORKS
With the convergence of the wireless networks and the Internet and the booming
demand for multimedia applications, the next-generation (beyond the third generation, or
B3G) wireless systems are expected to be all IP-based and provide real-time and non-real-time
mobile services anywhere and anytime. Powerful and efficient mobility support is
thus the key enabler to fulfil such an attractive vision by supporting various mobility
scenarios. This thesis contributes to this interesting while challenging topic.
After a literature review on mobility support architectures and protocols, the thesis
starts presenting our contributions with a generic multi-layer mobility support framework,
which provides a general approach to meet the challenges of handling comprehensive
mobility issues. The cross-layer design methodology is introduced to coordinate the
protocol layers for optimised system design. Particularly, a flexible and efficient cross-layer
signalling scheme is proposed for interlayer interactions. The proposed generic
framework is then narrowed down with several fundamental building blocks identified to
be focused on as follows.
As widely adopted, we assume that the IP-based access networks are organised into
administrative domains, which are inter-connected through a global IP-based wired core
network. For a mobile user who roams from one domain to another, macro (inter-domain)
mobility management should be in place for global location tracking and effective handoff
support for both real-time and non-real-lime applications. Mobile IP (MIP) and the Session
Initiation Protocol (SIP) are being adopted as the two dominant standard-based macro-mobility
architectures, each of which has mobility entities and messages in its own right.
The work explores the joint optimisations and interactions of MIP and SIP when utilising
the complementary power of both protocols. Two distinctive integrated MIP-SIP
architectures are designed and evaluated, compared with their hybrid alternatives and other
approaches. The overall analytical and simulation results shown significant performance
improvements in terms of cost-efficiency, among other metrics.
Subsequently, for the micro (intra-domain) mobility scenario where a mobile user
moves across IP subnets within a domain, a micro mobility management architecture is
needed to support fast handoffs and constrain signalling messaging loads incurred by intra-domain
movements within the domain. The Hierarchical MIPv6 (HMIPv6) and the Fast
Handovers for MIPv6 (FMIPv6) protocols are selected to fulfil the design requirements.
The work proposes enhancements to these protocols and combines them in an optimised
way. resulting in notably improved performances in contrast to a number of alternative
approaches
Mobility management in IP-Based Networks
Mobile communication networks experience a tremendous development clearly
evident from the wide variety of new applications way beyond classical
phone services. The tremendous success of the Internet along with the
demand for always-on connectivity has triggered the development of All-IP
mobile communication networks. Deploying these networks requires, however,
overcoming many challenges. One of the main challenges is how to manage the
mobility between cells connecting through an IP core in a way that
satisfies real-time requirements. This challenge is the focus of this
dissertation. This dissertation delivers an in-depth analysis of the
mobility management issue in IP-based mobile communication networks. The
advantages and disadvantages of various concepts for mobility management in
different layers of the TCP/IP protocol stack are investigated. In
addition, a classification and brief description of well-known mobility
approaches for each layer are provided. The analysis concludes that network
layer mobility management solutions seem to be best suited to satisfy the
requirements of future All-IP networks. The dissertation, therefore,
provides a comprehensive review of network layer mobility management
protocols along with a discussion of their pros and cons. Analyses of
previous work in this area show that the proposed techniques attempt to
improve the performance by making constraints either on access networks
(e.g. requiring a hierarchical topology, introducing of intermediate nodes,
etc.) or mobile terminals (e.g. undertaking many measurements, location
tracking, etc.). Therefore, a new technique is required that completes
handoffs quickly without affecting the end-to-end performance of ongoing
applications. In addition, it should place restrictions neither on access
networks nor on mobiles. To meet these requirements, a new solution named
Mobile IP Fast Authentication protocol (MIFA) is proposed. MIFA provides
seamless mobility and advances the state of the art. It utilizes the fact
that mobiles movements are limited to a small set of neighboring subnets.
Thus, contacting these neighbors and providing them in advance with
sufficient data related to the mobiles enable them to fast re-authenticate
the mobiles after the handoff. The dissertation specifies the proposal for
both IPv4 and IPv6. The specification of MIFA considers including many
error recovery mechanisms to cover the most likely failures. Security
considerations are studied carefully as well. MIFA does not make any
restrictions on the network topology. It makes use of layer 2 information
to optimize the performance and works well even if such information is not
available.In order to analyze our new proposal in comparison to a wide
range of well-known mobility management protocols, this dissertation
proposes a generic mathematical model that supports the evaluation of
figures such as average handoff latency, average number of dropped packets,
location update cost and packet delivery cost. The generic model considers
dropped control messages and takes different network topologies and
mobility scenarios into account. This dissertation also validates the
generic mathematical model by comparing its results to simulation results
as well as results of real testbeds under the same assumptions. The
validation proves that the generic model delivers an accurate evaluation of
the performance in low-loaded networks. The accuracy of the model remains
acceptable even under high loads. The validation also shows that simulation
results lie in a range of 23 %, while results of real testbeds lie in a
range of 30 % of the generic model?s results. To simplify the analysis
using the generic mathematical model, 4 new tools are developed in the
scope of this work. They automate the parameterization of mobility
protocols, network topologies and mobility scenarios. This dissertation
also evaluates the new proposal in comparison to well-known approaches
(e.g. Mobile IP, Handoff-Aware Wireless Access Internet Infrastructure
(HAWAII), etc.) by means of the generic mathematical model as well as
simulation studies modeled in the Network Simulator 2. The evaluation shows
that MIFA is a very fast protocol. It outperforms all studied protocols
with respect to the handoff latency and number of dropped packets per
handoff. MIFA is suitable for low as well as high speeds. Moreover, there
is no significant impact of the network topology on its performance. A main
advantage of MIFA is its robustness against the dropping of control
messages. It remains able to achieve seamless handoffs even if a dropping
occurs. The performance improvement is achieved, however, at the cost of
introducing new control messages mainly to distribute data concerning
mobile terminals to neighbor subnets. This results in more location update
cost than that resulting from the other mobility management protocols
studied. Due to excluding any constraints on the network topology, MIFA
generates the same packet delivery cost as Mobile IP and less than other
protocols.An additional focus of this dissertation is the development of an
adaptive eLearning environment that personalizes eLearning contents
conveying the topics of this dissertation depending on users?
characteristics. The goal is to allow researchers to quickly become
involved in research on mobility management, while learners such as
students are able to gain information on the topics without excess detail.
Analyses of existing eLearning environments show a lack of adaptivity
support. Existing environments focus mainly on adapting either the
navigation or the presentation of contents depending on one or more
selected users? characteristics. There is no environment that supports both
simultaneously. In addition, many user characteristics are disregarded
during the adaptivity process. Thus, there is a need to develop a new
adaptive eLearning environment able to eliminate these drawbacks. This
dissertation, therefore, designs a new Metadata-driven Adaptive eLearning
Environment (MAeLE). MAeLE generates personalized eLearning courses along
with building an adequate navigation at run-time. Adaptivity depends mainly
on providing contents with their describing metadata, which are stored in a
separate database, thus enabling reusing of eLearning contents. The
relation between the metadata that describe contents and those describing
learners are defined accurately, which enables a dynamic building of
personalized courses at run-time. A prototype for MAeLE is provided in this
dissertation as well
Localisation en intérieur et gestion de la mobilité dans les réseaux sans fils hétérogÚnes émergents
Au cours des derniĂšres dĂ©cennies, nous avons Ă©tĂ© tĂ©moins d'une Ă©volution considĂ©rable dans l'informatique mobile, rĂ©seau sans fil et des appareils portatifs. Dans les rĂ©seaux de communication Ă venir, les utilisateurs devraient ĂȘtre encore plus mobiles exigeant une connectivitĂ© omniprĂ©sente Ă diffĂ©rentes applications qui seront de prĂ©fĂ©rence au courant de leur contexte. Certes, les informations de localisation dans le cadre de leur contexte est d'une importance primordiale Ă la fois la demande et les perspectives du rĂ©seau. Depuis l'application ou de point de vue utilisateur, la fourniture de services peut mettre Ă jour si l'adaptation au contexte de l'utilisateur est activĂ©e. Du point de vue du rĂ©seau, des fonctionnalitĂ©s telles que le routage, la gestion de transfert, l'allocation des ressources et d'autres peuvent Ă©galement bĂ©nĂ©ficier si l'emplacement de l'utilisateur peuvent ĂȘtre suivis ou mĂȘme prĂ©dit. Dans ce contexte, nous nous concentrons notre attention sur la localisation Ă l'intĂ©rieur et de la prĂ©vision transfert qui sont des composants indispensables Ă la rĂ©ussite ultime de l'Ăšre de la communication omniprĂ©sente envisagĂ©. Alors que les systĂšmes de positionnement en plein air ont dĂ©jĂ prouvĂ© leur potentiel dans un large Ă©ventail d'applications commerciales, le chemin vers un systĂšme de localisation Ă l'intĂ©rieur de succĂšs est reconnu pour ĂȘtre beaucoup plus difficile, principalement en raison des caractĂ©ristiques difficiles Ă l'intĂ©rieur et l'exigence d'une plus grande prĂ©cision. De mĂȘme, la gestion de transfert dans le futur des rĂ©seaux hĂ©tĂ©rogĂšnes sans fil est beaucoup plus difficile que dans les rĂ©seaux traditionnels homogĂšnes. RĂ©gimes de procĂ©dure de transfert doit ĂȘtre sans faille pour la rĂ©union strictes de qualitĂ© de service (QoS) des applications futures et fonctionnel malgrĂ© la diversitĂ© des caractĂ©ristiques de fonctionnement des diffĂ©rentes technologies. En outre, les dĂ©cisions transfert devraient ĂȘtre suffisamment souples pour tenir compte des prĂ©fĂ©rences utilisateur d'un large Ă©ventail de critĂšres proposĂ©s par toutes les technologies. L'objectif principal de cette thĂšse est de mettre au point prĂ©cis, l'heure et l'emplacement de puissance et de systĂšmes efficaces de gestion de transfert afin de mieux satisfaire applications sensibles au contexte et mobiles. Pour obtenir une localisation Ă l'intĂ©rieur, le potentiel de rĂ©seau local sans fil (WLAN) et Radio Frequency Identification (RFID) que l'emplacement autonome technologies de dĂ©tection sont d'abord Ă©tudiĂ©s par des essais plusieurs algorithmes et paramĂštres dans un banc d'essai expĂ©rimental rĂ©el ou par de nombreuses simulations, alors que leurs lacunes sont Ă©galement Ă©tĂ© identifiĂ©s. Leur intĂ©gration dans une architecture commune est alors proposĂ©e afin de combiner leurs principaux avantages et surmonter leurs limitations. La supĂ©rioritĂ© des performances du systĂšme de synergie sur le stand alone homologues est validĂ©e par une analyse approfondie. En ce qui concerne la tĂąche de gestion transfert, nous repĂ©rer que la sensibilitĂ© au contexte peut aussi amĂ©liorer la fonctionnalitĂ© du rĂ©seau. En consĂ©quence, deux de tels systĂšmes qui utilisent l'information obtenue Ă partir des systĂšmes de localisation sont proposĂ©es. Le premier schĂ©ma repose sur un dĂ©ploiement tag RFID, comme notre architecture de positionnement RFID, et en suivant la scĂšne WLAN analyse du concept de positionnement, prĂ©dit l'emplacement rĂ©seau de la prochaine couche, c'est Ă dire le prochain point de fixation sur le rĂ©seau. Le second rĂ©gime repose sur une approche intĂ©grĂ©e RFID et sans fil de capteur / actionneur Network (WSAN) de dĂ©ploiement pour la localisation des utilisateurs physiques et par la suite pour prĂ©dire la prochaine leur point de transfert Ă deux couches de liaison et le rĂ©seau. Etre indĂ©pendant de la technologie d'accĂšs sans fil principe sous-jacent, les deux rĂ©gimes peuvent ĂȘtre facilement mises en Ćuvre dans des rĂ©seaux hĂ©tĂ©rogĂšnes [...]Over the last few decades, we have been witnessing a tremendous evolution in mobile computing, wireless networking and hand-held devices. In the future communication networks, users are anticipated to become even more mobile demanding for ubiquitous connectivity to different applications which will be preferably aware of their context. Admittedly, location information as part of their context is of paramount importance from both application and network perspectives. From application or user point of view, service provision can upgrade if adaptation to the user's context is enabled. From network point of view, functionalities such as routing, handoff management, resource allocation and others can also benefit if user's location can be tracked or even predicted. Within this context, we focus our attention on indoor localization and handoff prediction which are indispensable components towards the ultimate success of the envisioned pervasive communication era. While outdoor positioning systems have already proven their potential in a wide range of commercial applications, the path towards a successful indoor location system is recognized to be much more difficult, mainly due to the harsh indoor characteristics and requirement for higher accuracy. Similarly, handoff management in the future heterogeneous wireless networks is much more challenging than in traditional homogeneous networks. Handoff schemes must be seamless for meeting strict Quality of Service (QoS) requirements of the future applications and functional despite the diversity of operation features of the different technologies. In addition, handoff decisions should be flexible enough to accommodate user preferences from a wide range of criteria offered by all technologies. The main objective of this thesis is to devise accurate, time and power efficient location and handoff management systems in order to satisfy better context-aware and mobile applications. For indoor localization, the potential of Wireless Local Area Network (WLAN) and Radio Frequency Identification (RFID) technologies as standalone location sensing technologies are first studied by testing several algorithms and metrics in a real experimental testbed or by extensive simulations, while their shortcomings are also identified. Their integration in a common architecture is then proposed in order to combine their key benefits and overcome their limitations. The performance superiority of the synergetic system over the stand alone counterparts is validated via extensive analysis. Regarding the handoff management task, we pinpoint that context awareness can also enhance the network functionality. Consequently, two such schemes which utilize information obtained from localization systems are proposed. The first scheme relies on a RFID tag deployment, alike our RFID positioning architecture, and by following the WLAN scene analysis positioning concept, predicts the next network layer location, i.e. the next point of attachment to the network. The second scheme relies on an integrated RFID and Wireless Sensor/Actuator Network (WSAN) deployment for tracking the users' physical location and subsequently for predicting next their handoff point at both link and network layers. Being independent of the underlying principle wireless access technology, both schemes can be easily implemented in heterogeneous networks. Performance evaluation results demonstrate the advantages of the proposed schemes over the standard protocols regarding prediction accuracy, time latency and energy savingsEVRY-INT (912282302) / SudocSudocFranceF
Money & Trust in Digital Society, Bitcoin and Stablecoins in ML enabled Metaverse Telecollaboration
We present a state of the art and positioning book, about Digital society
tools, namely; Web3, Bitcoin, Metaverse, AI/ML, accessibility, safeguarding and
telecollaboration. A high level overview of Web3 technologies leads to a
description of blockchain, and the Bitcoin network is specifically selected for
detailed examination. Suitable components of the extended Bitcoin ecosystem are
described in more depth. Other mechanisms for native digital value transfer are
described, with a focus on `money'. Metaverse technology is over-viewed,
primarily from the perspective of Bitcoin and extended reality. Bitcoin is
selected as the best contender for value transfer in metaverses because of it's
free and open source nature, and network effect. Challenges and risks of this
approach are identified. A cloud deployable virtual machine based technology
stack deployment guide with a focus on cybersecurity best practice can be
downloaded from GitHub to experiment with the technologies. This deployable lab
is designed to inform development of secure value transaction, for small and
medium sized companies
A review of the Siyakhula Living Labâs network solution for Internet in marginalized communities
Changes within Information and Communication Technology (ICT) over the past decade required a review of the network layer component deployed in the Siyakhula Living Lab (SLL), a long-term joint venture between the Telkom Centres of Excellence hosted at University of Fort Hare and Rhodes University in South Africa. The SLL overall solution for the sustainable internet in poor communities consists of three main components â the computing infrastructure layer, the network layer, and the e-services layer. At the core of the network layer is the concept of BI, a high-speed local area network realized through easy-to deploy wireless technologies that establish point-to-multipoint connections among schools within a limited geographical area. Schools within the broadband island become then Digital Access Nodes (DANs), with computing infrastructure that provides access to the network. The review, reported in this thesis, aimed at determining whether the model for the network layer was still able to meet the needs of marginalized communities in South Africa, given the recent changes in ICT. The research work used the living lab methodology â a grassroots, user-driven approach that emphasizes co-creation between the beneficiaries and external entities (researchers, industry partners and the government) - to do viability tests on the solution for the network component. The viability tests included lab and field experiments, to produce the qualitative and quantitative data needed to propose an updated blueprint. The results of the review found that the network topology used in the SLLâs network, the BI, is still viable, while WiMAX is now outdated. Also, the in-network web cache, Squid, is no longer effective, given the switch to HTTPS and the pervasive presence of advertising. The solution to the first issue is outdoor Wi-Fi, a proven solution easily deployable in grass-roots fashion. The second issue can be mitigated by leveraging Squidâs âbumpingâ and splicing features; deploying a browser extension to make picture download optional; and using Pihole, a DNS sinkhole. Hopefully, the revised solution could become a component of South African Governmentâs broadband plan, âSA Connectâ.Thesis (MSc) -- Faculty of Science, Computer Science, 202
Human Practice. Digital Ecologies. Our Future. : 14. Internationale Tagung Wirtschaftsinformatik (WI 2019) : Tagungsband
Erschienen bei: universi - UniversitÀtsverlag Siegen. - ISBN: 978-3-96182-063-4Aus dem Inhalt:
Track 1: Produktion & Cyber-Physische Systeme
Requirements and a Meta Model for Exchanging Additive Manufacturing Capacities
Service Systems, Smart Service Systems and Cyber- Physical SystemsâWhatâs the difference? Towards a Unified Terminology
Developing an Industrial IoT Platform â Trade-off between Horizontal and Vertical Approaches
Machine Learning und Complex Event Processing: Effiziente Echtzeitauswertung am Beispiel Smart Factory
Sensor retrofit for a coffee machine as condition monitoring and predictive maintenance use case
Stakeholder-Analyse zum Einsatz IIoT-basierter Frischeinformationen in der Lebensmittelindustrie
Towards a Framework for Predictive Maintenance Strategies in Mechanical Engineering - A Method-Oriented Literature Analysis
Development of a matching platform for the requirement-oriented selection of cyber physical systems for SMEs
Track 2: Logistic Analytics
An Empirical Study of Customersâ Behavioral Intention to Use Ridepooling Services â An Extension of the Technology Acceptance Model
Modeling Delay Propagation and Transmission in Railway Networks
What is the impact of company specific adjustments on the acceptance and diffusion of logistic standards?
Robust Route Planning in Intermodal Urban Traffic
Track 3: Unternehmensmodellierung & Informationssystemgestaltung (Enterprise Modelling & Information Systems Design)
Work System Modeling Method with Different Levels of Specificity and Rigor for Different Stakeholder Purposes
Resolving Inconsistencies in Declarative Process Models based on Culpability Measurement
Strategic Analysis in the Realm of Enterprise Modeling â On the Example of Blockchain-Based Initiatives for the Electricity Sector
Zwischenbetriebliche Integration in der Möbelbranche: Konfigurationen und Einflussfaktoren
Novicesâ Quality Perceptions and the Acceptance of Process Modeling Grammars
Entwicklung einer Definition fĂŒr Social Business Objects (SBO) zur Modellierung von Unternehmensinformationen
Designing a Reference Model for Digital Product Configurators
Terminology for Evolving Design Artifacts
Business Role-Object Specification: A Language for Behavior-aware Structural Modeling of Business Objects
Generating Smart Glasses-based Information Systems with BPMN4SGA: A BPMN Extension for Smart Glasses Applications
Using Blockchain in Peer-to-Peer Carsharing to Build Trust in the Sharing Economy
Testing in Big Data: An Architecture Pattern for a Development Environment for Innovative, Integrated and Robust Applications
Track 4: Lern- und Wissensmanagement (e-Learning and Knowledge Management)
eGovernment Competences revisited â A Literature Review on necessary Competences in a Digitalized Public Sector
Say Hello to Your New Automated Tutor â A Structured Literature Review on Pedagogical Conversational Agents
Teaching the Digital Transformation of Business Processes: Design of a Simulation Game for Information Systems Education
Conceptualizing Immersion for Individual Learning in Virtual Reality
Designing a Flipped Classroom Course â a Process Model
The Influence of Risk-Taking on Knowledge Exchange and Combination
Gamified Feedback durch Avatare im Mobile Learning
Alexa, Can You Help Me Solve That Problem? - Understanding the Value of Smart Personal Assistants as Tutors for Complex Problem Tasks
Track 5: Data Science & Business Analytics
Matching with Bundle Preferences: Tradeoff between Fairness and Truthfulness
Applied image recognition: guidelines for using deep learning models in practice
Yield Prognosis for the Agrarian Management of Vineyards using Deep Learning for Object Counting
Reading Between the Lines of Qualitative Data â How to Detect Hidden Structure Based on Codes
Online Auctions with Dual-Threshold Algorithms: An Experimental Study and Practical Evaluation
Design Features of Non-Financial Reward Programs for Online Reviews: Evaluation based on Google Maps Data
Topic Embeddings â A New Approach to Classify Very Short Documents Based on Predefined Topics
Leveraging Unstructured Image Data for Product Quality Improvement
Decision Support for Real Estate Investors: Improving Real Estate Valuation with 3D City Models and Points of Interest
Knowledge Discovery from CVs: A Topic Modeling Procedure
Online Product Descriptions â Boost for your Sales?
EntscheidungsunterstĂŒtzung durch historienbasierte Dienstreihenfolgeplanung mit Pattern
A Semi-Automated Approach for Generating Online Review Templates
Machine Learning goes Measure Management: Leveraging Anomaly Detection and Parts Search to Improve Product-Cost Optimization
Bedeutung von Predictive Analytics fĂŒr den theoretischen Erkenntnisgewinn in der IS-Forschung
Track 6: Digitale Transformation und Dienstleistungen
Heuristic Theorizing in Software Development: Deriving Design Principles for Smart Glasses-based Systems
Mirroring E-service for Brick and Mortar Retail: An Assessment and Survey
Taxonomy of Digital Platforms: A Platform Architecture Perspective
Value of Star Players in the Digital Age
Local Shopping Platforms â Harnessing Locational Advantages for the Digital Transformation of Local Retail Outlets: A Content Analysis
A Socio-Technical Approach to Manage Analytics-as-a-Service â Results of an Action Design Research Project
Characterizing Approaches to Digital Transformation: Development of a Taxonomy of Digital Units
Expectations vs. Reality â Benefits of Smart Services in the Field of Tension between Industry and Science
Innovation Networks and Digital Innovation: How Organizations Use Innovation Networks in a Digitized Environment
Characterising Social Reading Platformsâ A Taxonomy-Based Approach to Structure the Field
Less Complex than Expected â What Really Drives IT Consulting Value
Modularity Canvas â A Framework for Visualizing Potentials of Service Modularity
Towards a Conceptualization of Capabilities for Innovating Business Models in the Industrial Internet of Things
A Taxonomy of Barriers to Digital Transformation
Ambidexterity in Service Innovation Research: A Systematic Literature Review
Design and success factors of an online solution for cross-pillar pension information
Track 7: IT-Management und -Strategie
A Frugal Support Structure for New Software Implementations in SMEs
How to Structure a Company-wide Adoption of Big Data Analytics
The Changing Roles of Innovation Actors and Organizational Antecedents in the Digital Age
Bewertung des Kundennutzens von Chatbots fĂŒr den Einsatz im Servicedesk
Understanding the Benefits of Agile Software Development in Regulated Environments
Are Employees Following the Rules? On the Effectiveness of IT Consumerization Policies
Agile and Attached: The Impact of Agile Practices on Agile Team Membersâ Affective Organisational Commitment
The Complexity Trap â Limits of IT Flexibility for Supporting Organizational Agility in Decentralized Organizations
Platform Openness: A Systematic Literature Review and Avenues for Future Research
Competence, Fashion and the Case of Blockchain
The Digital Platform Otto.de: A Case Study of Growth, Complexity, and Generativity
Track 8: eHealth & alternde Gesellschaft
Security and Privacy of Personal Health Records in Cloud Computing Environments â An Experimental Exploration of the Impact of Storage Solutions and Data Breaches
Patientenintegration durch Pfadsysteme
Digitalisierung in der StressprĂ€vention â eine qualitative Interviewstudie zu Nutzenpotenzialen
User Dynamics in Mental Health Forums â A Sentiment Analysis Perspective
Intent and the Use of Wearables in the Workplace â A Model Development
Understanding Patient Pathways in the Context of Integrated Health Care Services - Implications from a Scoping Review
Understanding the Habitual Use of Wearable Activity Trackers
On the Fit in Fitness Apps: Studying the Interaction of Motivational Affordances and Usersâ Goal Orientations in Affecting the Benefits Gained
Gamification in Health Behavior Change Support Systems - A Synthesis of Unintended Side Effects
Investigating the Influence of Information Incongruity on Trust-Relations within Trilateral Healthcare Settings
Track 9: Krisen- und KontinuitÀtsmanagement
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Fake News Perception in Germany: A Representative Study of Peopleâs Attitudes and Approaches to Counteract Disinformation
Analyzing the Potential of Graphical Building Information for Fire Emergency Responses: Findings from a Controlled Experiment
Track 10: Human-Computer Interaction
Towards a Taxonomy of Platforms for Conversational Agent Design
Measuring Service Encounter Satisfaction with Customer Service Chatbots using Sentiment Analysis
Self-Tracking and Gamification: Analyzing the Interplay of Motivations, Usage and Motivation Fulfillment
Erfolgsfaktoren von Augmented-Reality-Applikationen: Analyse von Nutzerrezensionen mit dem Review-Mining-Verfahren
Designing Dynamic Decision Support for Electronic Requirements Negotiations
Who is Stressed by Using ICTs? A Qualitative Comparison Analysis with the Big Five Personality Traits to Understand Technostress
Walking the Middle Path: How Medium Trade-Off Exposure Leads to Higher Consumer Satisfaction in Recommender Agents
Theory-Based Affordances of Utilitarian, Hedonic and Dual-Purposed Technologies: A Literature Review
Eliciting Customer Preferences for Shopping Companion Apps: A Service Quality Approach
The Role of Early User Participation in Discovering Software â A Case Study from the Context of Smart Glasses
The Fluidity of the Self-Concept as a Framework to Explain the Motivation to Play Video Games
Heart over Heels? An Empirical Analysis of the Relationship between Emotions and Review Helpfulness for Experience and Credence Goods
Track 11: Information Security and Information Privacy
Unfolding Concerns about Augmented Reality Technologies: A Qualitative Analysis of User Perceptions
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context
Understanding Data Protection Regulations from a Data Management Perspective: A Capability-Based Approach to EU-GDPR
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market
What is Your Selfie Worth? A Field Study on Individualsâ Valuation of Personal Data
Justification of Mass Surveillance: A Quantitative Study
An Exploratory Study of Risk Perception for Data Disclosure to a Network of Firms
Track 12: Umweltinformatik und nachhaltiges Wirtschaften
KommunikationsfĂ€den im Nadelöhr â Fachliche Prozessmodellierung der Nachhaltigkeitskommunikation am Kapitalmarkt
Potentiale und Herausforderungen der Materialflusskostenrechnung
Computing Incentives for User-Based Relocation in Carsharing
Sustainabilityâs Coming Home: Preliminary Design Principles for the Sustainable Smart District
Substitution of hazardous chemical substances using Deep Learning and t-SNE
A Hierarchy of DSMLs in Support of Product Life-Cycle Assessment
A Survey of Smart Energy Services for Private Households
Door-to-Door Mobility Integrators as Keystone Organizations of Smart Ecosystems: Resources and Value Co-Creation â A Literature Review
Ein EntscheidungsunterstĂŒtzungssystem zur ökonomischen Bewertung von Mieterstrom auf Basis der Clusteranalyse
Discovering Blockchain for Sustainable Product-Service Systems to enhance the Circular Economy
Digitale RĂŒckverfolgbarkeit von Lebensmitteln: Eine verbraucherinformatische Studie
Umweltbewusstsein durch audiovisuelles Content Marketing? Eine experimentelle Untersuchung zur Konsumentenbewertung nachhaltiger Smartphones
Towards Predictive Energy Management in Information Systems: A Research Proposal
A Web Browser-Based Application for Processing and Analyzing Material Flow Models using the MFCA Methodology
Track 13: Digital Work - Social, mobile, smart
On Conversational Agents in Information Systems Research: Analyzing the Past to Guide Future Work
The Potential of Augmented Reality for Improving Occupational First Aid
Prevent a Vicious Circle! The Role of Organizational IT-Capability in Attracting IT-affine Applicants
Good, Bad, or Both? Conceptualization and Measurement of Ambivalent User Attitudes Towards AI
A Case Study on Cross-Hierarchical Communication in Digital Work Environments
âShow Me Your People Skillsâ - Employing CEO Branding for Corporate Reputation Management in Social Media
A Multiorganisational Study of the Drivers and Barriers of Enterprise Collaboration Systems-Enabled Change
The More the Merrier? The Effect of Size of Core Team Subgroups on Success of Open Source Projects
The Impact of Anthropomorphic and Functional Chatbot Design Features in Enterprise Collaboration Systems on User Acceptance
Digital Feedback for Digital Work? Affordances and Constraints of a Feedback App at InsurCorp
The Effect of Marker-less Augmented Reality on Task and Learning Performance
Antecedents for Cyberloafing â A Literature Review
Internal Crowd Work as a Source of Empowerment - An Empirical Analysis of the Perception of Employees in a Crowdtesting Project
Track 14: GeschÀftsmodelle und digitales Unternehmertum
Dividing the ICO Jungle: Extracting and Evaluating Design Archetypes
Capturing Value from Data: Exploring Factors Influencing Revenue Model Design for Data-Driven Services
Understanding the Role of Data for Innovating Business Models: A System Dynamics Perspective
Business Model Innovation and Stakeholder: Exploring Mechanisms and Outcomes of Value Creation and Destruction
Business Models for Internet of Things Platforms: Empirical Development of a Taxonomy and Archetypes
Revitalizing established Industrial Companies: State of the Art and Success Principles of Digital Corporate Incubators
When 1+1 is Greater than 2: Concurrence of Additional Digital and Established Business Models within Companies
Special Track 1: Student Track
Investigating Personalized Price Discrimination of Textile-, Electronics- and General Stores in German Online Retail
From Facets to a Universal Definition â An Analysis of IoT Usage in Retail
Is the Technostress Creators Inventory Still an Up-To-Date Measurement Instrument? Results of a Large-Scale Interview Study
Application of Media Synchronicity Theory to Creative Tasks in Virtual Teams Using the Example of Design Thinking
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Application of Process Mining Techniques to Support Maintenance-Related Objectives
How Voice Can Change Customer Satisfaction: A Comparative Analysis between E-Commerce and Voice Commerce
Business Process Compliance and Blockchain: How Does the Ethereum Blockchain Address Challenges of Business Process Compliance?
Improving Business Model Configuration through a Question-based Approach
The Influence of Situational Factors and Gamification on Intrinsic Motivation and Learning
Evaluation von ITSM-Tools fĂŒr Integration und Management von Cloud-Diensten am Beispiel von ServiceNow
How Software Promotes the Integration of Sustainability in Business Process Management
Criteria Catalog for Industrial IoT Platforms from the Perspective of the Machine Tool Industry
Special Track 3: Demos & Prototyping
Privacy-friendly User Location Tracking with Smart Devices: The BeaT Prototype
Application-oriented robotics in nursing homes
Augmented Reality for Set-up Processe
Mixed Reality for supporting Remote-Meetings
Gamification zur Motivationssteigerung von Werkern bei der Betriebsdatenerfassung
Automatically Extracting and Analyzing Customer Needs from Twitter: A âNeedminingâ Prototype
GaNEsHA: Opportunities for Sustainable Transportation in Smart Cities
TUCANA: A platform for using local processing power of edge devices for building data-driven services
Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur
Entwicklung einer alltagsnahen persuasiven App zur Bewegungsmotivation fĂŒr Ă€ltere Nutzerinnen und Nutzer
A browser-based modeling tool for studying the learning of conceptual modeling based on a multi-modal data collection approach
Exergames & Dementia: An interactive System for People with Dementia and their Care-Network
Workshops
Workshop Ethics and Morality in Business Informatics (Workshop Ethik und Moral in der Wirtschaftsinformatik â EMoWIâ19)
Model-Based Compliance in Information Systems - Foundations, Case Description and Data Set of the MobIS-Challenge for Students and Doctoral Candidates
Report of the Workshop on Concepts and Methods of Identifying Digital Potentials in Information Management
Control of Systemic Risks in Global Networks - A Grand Challenge to Information Systems Research
Die Mitarbeiter von morgen - Kompetenzen kĂŒnftiger Mitarbeiter im Bereich Business Analytics
Digitaler Konsum: Herausforderungen und Chancen der Verbraucherinformati
- âŠ