12 research outputs found

    Trusted Computing fĂŒr adaptive AutomobilsteuergerĂ€te im Umfeld der Inter-Fahrzeug-Kommunikation

    Get PDF
    Die vorliegende Arbeit beschĂ€ftigt sich mit der Sicherheit (Security) von Automobilelektronik, speziell der Kommunikation zwischen Fahrzeugen fĂŒr Safety-Anwendungen. Hierzu wird die Absicherung der Kommunikation ĂŒber digitale Signaturen betrachtet und eine prototypische Implementierung auf rekonfigurierbarer Hardware vorgestellt. DarĂŒber hinaus wird die Absicherung der Kommunikationsplattform selbst ĂŒber die Anwendung von Trusted Computing fĂŒr rekonfigurierbare Systeme sichergestellt

    Trusted Computing fĂŒr adaptive AutomobilsteuergerĂ€te im Umfeld der Inter-Fahrzeug-Kommunikation

    Get PDF
    Die vorliegende Arbeit beschĂ€ftigt sich mit der Sicherheit (Security) von Automobilelektronik, speziell der Kommunikation zwischen Fahrzeugen fĂŒr Safety-Anwendungen. Hierzu wird die Absicherung der Kommunikation ĂŒber digitale Signaturen betrachtet und eine prototypische Implementierung auf rekonfigurierbarer Hardware vorgestellt. DarĂŒber hinaus wird die Absicherung der Kommunikationsplattform selbst ĂŒber die Anwendung von Trusted Computing fĂŒr rekonfigurierbare Systeme sichergestellt

    Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken

    Full text link
    Quantum computers could break currently used asymmetric cryptographic schemes in a few years using Shor's algorithm. They are used in numerous protocols and applications to secure authenticity as well as key agreement, and quantum-safe alternatives are urgently needed. NIST therefore initiated a standardization process. This requires intensive evaluation, also with regard to performance and integrability. Here, the integration into TLS 1.3 plays an important role, since it is used for 90% of all Internet connections. In the present work, algorithms for quantum-safe key exchange during TLS 1.3 handshake were reviewed. The focus is on the influence of dedicated network parameters such as transmission rate or packet loss in order to gain insights regarding the suitability of the algorithms under corresponding network conditions. For the implementation, a framework by Paquin et al. was extended to emulate network scenarios and capture the handshake duration for selected algorithms. It is shown that the evaluated candidates Kyber, Saber and NTRU as well as the alternative NTRU Prime have a very good overall performance and partly undercut the handshake duration of the classical ECDH. The choice of a higher security level or hybrid variants does not make a significant difference here. This is not the case with alternatives such as FrodoKEM, SIKE, HQC or BIKE, which have individual disadvantages and whose respective performance varies greatly depending on the security level and hybrid implementation. This is especially true for the data-intensive algorithm FrodoKEM. In general, the prevailing network characteristics should be taken into account when choosing scheme and variant. Further it becomes clear that the performance of the handshake is influenced by external factors such as TCP mechanisms or MTU, which could compensate for possible disadvantages due to PQC if configured appropriately.Comment: Master's thesis, 160 pages, in Germa

    Ganzheitliches Wissenschaftsmarketing: Management-, CRM- und Marketing-Strategien fĂŒr wissenschaftliche Journale und Vereine

    Get PDF
    Der Wandel der wissenschaftlichen Landschaft macht es erforderlich, dass wissenschaftliche Einrichtungen und Produkte beworben werden. Allerdings lassen sich die klassischen Marketingstrategien nicht ohne Adaption auf wissenschaftliche Produkte ĂŒbertragen. In der Dissertation wird anhand des Vorbilds von McCarthy’s Marketingmix (die 4P’s: Product, Price, Place, Promotion) eine Strategie fĂŒr erfolgreiches Wissenschaftsmarketing und -management entwickelt. Als Anwendungsfall fĂŒr die experimentellen Untersuchungen wurde das Journal Archives of Data Science (AoDS) gewĂ€hlt. Da zur Akquise und Bindung der Kunden eines wissenschaftlichen Produktes nicht die in der Wirtschaft ĂŒblichen Marketing- und CRM-Methoden genutzt werden können, wurden anhand einer Rollen-abhĂ€ngigen Motivationsanalyse zunĂ€chst QualitĂ€tsmerkmale erarbeitet, die fĂŒr die jeweilige wissenschaftliche Kundengruppe wichtig sind und die Wahrscheinlichkeit zur langfristigen Interaktion (Kundenbindung) mit dem Journal erhöhen. Es wird deutlich, dass die KundenwĂŒnsche nicht nur von der jeweiligen Rolle, die der Kunde innerhalb des Journals bekleidet (Leser, Autor, Reviewer, Editor), sondern auch stark von seiner Position in der wissenschaftlichen Welt (Karrieregrad) abhĂ€ngt. Im folgenden Teil der Arbeit wird untersucht, wie man das Produkt gemĂ€ĂŸ dieser speziellen Kundenanforderungen (QualitĂ€tsmerkmale) optimieren muss und zu diesem Zweck wird ein zweiteiliger Usability Test entwickelt. Des Weiteren wird auf rechtliche Aspekte eingegangen und gezeigt, dass sich die Vorschriften der EU-DSGVO sehr gut mit dem Grundgedanken des Permission Marketings vereinbaren lassen und es daher nicht nur rechtlich verpflichtend, sondern sogar sinnvoll ist, diese Regelungen fĂŒr die eigenen MarketingaktivitĂ€ten auf verschiedenen KommunikationskanĂ€len zu beachten. Im Rahmen dieser Analyse wurde ein mit den rechtlichen Vorschriften konformes Trackingtool entwickelt, um das Journalwachstum und den Erfolg der MarketingaktivitĂ€ten zu messen und zu analysieren (ImpactschĂ€tzung). Anschließend wird die besondere Distributionspolitik eines Open Access Journals analysiert. Die Ergebnisse zeigen, dass z.B. die Verbreitung einer Veröffentlichung durch den Autor sich positiv auf die Distribution des Artikels auswirkt und dieser somit zu seiner eigenen Kundenzufriedenheit (QualitĂ€tsmerkmal Reichweite) beitragen kann. Anhand einzelner Single Case Studies wurde evaluiert, welche KommunikationskanĂ€le sich fĂŒr das Marketing fĂŒr wissenschaftliche Produkte eignen, worauf bei der Ansprache der verschiedenen Kundengruppen geachtet werden sollte und welche Sendezeitpunkte geeignet sind. Die Experimente zeigen, dass der richtige Sendezeitpunkt und die Wahl des Kommunikationskanals stark vom Inhalt der Nachricht abhĂ€ngt und nicht mit den optimalen Werbezeitpunkten fĂŒr Konsumprodukte vergleichbar ist

    Der Beitrag bestandsbetreuender TierÀrzte in der BekÀmpfung von Infektionskrankheiten auf Herdenebene am Beispiel der Paratuberkulose des Rindes

    Get PDF
    Weltweit ist in den entwickelten LĂ€ndern eine deutliche Zunahme der HerdengrĂ¶ĂŸen in der Milchvieh- und Fleischrindhaltung zu verzeichnen, verbunden mit einem Strukturwandel von kleineren diversifizierten Betrieben hin zu grĂ¶ĂŸeren spezialisierten Produktionseinheiten. Damit ist die tierĂ€rztliche TĂ€tigkeit in Rinderherden einem Wandel von der Gemischtpraxis mit Einzeltierbehandlung zu einer spezialisierten BeratungstĂ€tigkeit in tiergesundheitlichen Fragen mit der Fehlersuche und Problembehandlung im Herdenmanagement und in der BekĂ€mpfung von Infektionskrankheiten auf Herdenebene unterworfen. Zielstellung dieser Arbeit war es, am Beispiel der Paratuberkulose zu zeigen, welche Ansatzpunkte und Strategien dem bestandsbetreuenden Tierarzt zur VerfĂŒgung stehen, um durch BeratungstĂ€tigkeit den Rinderhalter im Umgang mit dieser Krankheit zu unterstĂŒtzen, eine betriebliche Strategie zu entwickeln sowie die etablierten BekĂ€mpfungsmaßnahmen zu begleiten. Der erste Schritt in diesem Prozess ist die Feststellung, ob eine Herde von Paratuberkulose betroffen ist oder nicht. Daher war es Ziel verschiedener Studien, die Testeigenschaften neuer AnsĂ€tze zur Diagnostik auf Herdenebene zu evaluieren. Weiterhin sollte die BeeintrĂ€chtigung der allgemeinen Tiergesundheit in Folge der Paratuberkulose untersucht werden, da dies eine wichtige Motivation zur Etablierung von BekĂ€mpfungsmaßnahmen im Bestand ist und bisherige Studienergebnisse bezĂŒglich des krankheitsbedingten Einflusses auf die Milchleistung widersprĂŒchlich sind. Daher war der Einfluss der Paratuberkulose auf den Stoffwechsel der Milchkuh unter Produktionsbedingungen und auf die Milchleistung unter besonderer BerĂŒcksichtigung von Herdeneffekten zu untersuchen. Die Wirksamkeit bestimmter Maßnahmen auf den Erfolg der ParatuberkulosebekĂ€mpfung in den jeweiligen Herden ist bisher unter Feldbedingungen nicht untersucht. Letztendlich war zu zeigen, ob die Paratuberkulose aus Rinderherden verdrĂ€ngt werden kann oder nicht bzw. ob eine Senkung der IntraherdenprĂ€valenz innerhalb eines ĂŒberschaubaren Zeitraumes möglich ist. Mit den Ergebnissen dieser Studien sollten dem Rindertierarzt in der praktischen Beratung nutzbare Informationen ĂŒber einfach anwendbare Testverfahren, Argumente und AnsĂ€tze fĂŒr die BekĂ€mpfung sowie effektive Strategien an die Hand gegeben werden, um Landwirte zielorientiert beraten zu können.Dairy and beef herds are growing markedly in developed countries worldwide. Small sized diversified farms were transformed into larger scale, focused units of produc- tion. Veterinary practitioners have to deal with the transition from a mixed animal practice focused on the treatment of individual animals to a specialized consultant in animal health issues and trouble-shooting role in herd management and infectious disease control at herd level. The aim of this work was to highlight the starting points and strategies that can be utilized by bovine practitioners to support dairy and beef herds farmers in managing bovine paratuberculosis, developing a herd level control strategy and attend estab- lished control measures. The first step of this process is the diagnosis whether the herd is affected from paratuberculosis or not. Therefore, the objective of several stud- ies was to evaluate the test characteristics of new approaches for herd level diagno- sis of bovine paratuberculosis. Furthermore, the impairment of the general health status and the production level caused by paratuberculosis is of interest because this is an important driver to establish control measures and because present results re- garding the influence of the disease on milk production are conflicting. The influence of paratuberculosis on the metabolism of dairy cows in production herds and on milk production had to be investigated, with special emphasis on herd level effects. Fur- thermore, the efficacy of specific hygienic measures on the success of paratubercu- losis control at herd level is not studied under field conditions yet, and had to be elic- ited. Finally, it was to be answered whether or not paratuberculosis can be eradicated from cattle herds or within-herd prevalence can be reduced within a manageable pe- riod. The results of these studies should provide useful information regarding easy-to- use testing approaches, arguments and starting points for control activities and effec- tive strategies to bovine veterinarians for target-oriented counselling of farmers

    Generating and Managing Secure Passwords for Online Accounts

    Get PDF
    User accounts at Internet services contain a multitude of personal data such as messages, documents, pictures, and payment information. Passwords are used to protect these data from unauthorized access. User authentication based on passwords has many advantages for both users and service providers. Users can use passwords across many platforms, devices, and applications and do not need to carry an additional device. Service providers can implement password-based user authentication with little effort and operate it with low cost per user. However, passwords have a key problem: the conflict between security and ease of use. For security reasons, passwords must be attack-resistant, individual for each account, and changed on a regular basis. But, these security requirements make passwords very difficult to use. They require users to create and manage a large portfolio of passwords. This poses three problems: First, the generation of attack-resistant passwords is very difficult. Second, the memorization of many passwords is practically impossible. Third, the regular change of passwords is very time-consuming. These problems are aggravated by the different password requirements, interfaces, and procedures of services. The preservation of passwords for users such as storing passwords on user devices mitigates the memorization problem, but it raises new problems: the confidentiality, availability, recoverability, and accessibility of the preserved passwords. Despite decades of research, the problems of passwords are not solved yet. Consequently, secure passwords are not usable in practice. As a result, users select weak passwords, use them across accounts, and barely change them. In this thesis, we introduce the Password Assistance System (PAS). It makes secure passwords usable for users. This is achieved by automation and comprehensive support. PAS covers all aspects of passwords. It generates, preserves, and changes passwords for users as well as ensures the confidentiality, availability, recoverability, and accessibility of the preserved passwords. This reduces the efforts and activities of users to deal with passwords to a minimum and thus enables users to practically realize secure passwords for their online accounts for the first time. PAS is the first solution that is capable of handling the different password implementations of services. This is achieved by a standardized description of password requirements, interfaces, and procedures. Moreover, PAS is solely realized on the user-side and requires no changes on the service-side. Both features ensure the practicability of PAS and make it ready to be used. PAS solves the password generation problem by creating attack-resistant, individual, and valid passwords for users automatically. Users just need to provide the URL of a service to generate an optimal password for an account. Our uniform description of password requirements provides the information to generate passwords in accordance with the individual password requirements of services. PAS is able to generate the requirements descriptions automatically by extracting the password requirements of services from their websites. So far, this was done for 185,696 services. Moreover, PAS is equipped with an optimal password-composition rule set for the event that services do not explicitly state their password requirements, which is the usual case. By means of the optimal rule set, PAS also generates attack-resistant passwords with the best possible acceptance rate in case of unknown password requirements. PAS solves the password memorization problem by preserving passwords for users. This releases users from memorizing their passwords and facilitates to use individual passwords for accounts. PAS makes users' password portfolios available on all their devices as well as automatically synchronizes changes. PAS achieves this without storing passwords at servers so that an attacker cannot steal them from servers. Moreover, PAS provides a backup solution to recover the preserved passwords in case of loss. Users need to create backups only once and do not have to update them even when their password portfolios change. Consequently, users can keep backups completely offline at secure, different, and physically isolated locations. This minimizes the risk of compromise and loss as well as enables an emergency access to the passwords for trusted persons. Moreover, PAS has a built-in revocation mechanism. It allows users to completely invalidate devices and backups in case they lose control over them. This guarantees that no passwords can be stolen from lost user devices and backups once revoked. Users always have full control of their passwords. PAS solves the password change problem by changing passwords automatically for users. Users neither need to create new passwords nor manually log in to their accounts. Our uniform description of password interfaces and procedures provides the information to change passwords at arbitrary services. Moreover, PAS is the first solution that provides autonomous password changes. It changes passwords on a regular basis with respect to the security level of passwords as well as immediately after PAS detects a compromise of users' passwords. The practicability of PAS is demonstrated by an implementation. The individual components of PAS can be used independently, integrated into other applications, and combined to a single user application, called a password assistant. In summary, this thesis presents a solution that makes secure passwords usable. This is done by automation and comprehensive support in the generation and management of passwords

    Auf einem menschlichen Gehörmodell basierende Elektrodenstimulationsstrategie fĂŒr Cochleaimplantate

    Get PDF
    ï»żCochleaimplantate (CI), verbunden mit einer professionellen Rehabilitation, haben mehreren hunderttausenden HörgeschĂ€digten die verbale Kommunikation wieder ermöglicht. Betrachtet man jedoch die Rehabilitationserfolge, so haben CI-Systeme inzwischen ihre Grenzen erreicht. Die Tatsache, dass die meisten CI-TrĂ€ger nicht in der Lage sind, Musik zu genießen oder einer Konversation in gerĂ€uschvoller Umgebung zu folgen, zeigt, dass es noch Raum fĂŒr Verbesserungen gibt.Diese Dissertation stellt die neue CI-Signalverarbeitungsstrategie Stimulation based on Auditory Modeling (SAM) vor, die vollstĂ€ndig auf einem Computermodell des menschlichen peripheren Hörsystems beruht.Im Rahmen der vorliegenden Arbeit wurde die SAM Strategie dreifach evaluiert: mit vereinfachten Wahrnehmungsmodellen von CI-Nutzern, mit fĂŒnf CI-Nutzern, und mit 27 Normalhörenden mittels eines akustischen Modells der CI-Wahrnehmung. Die Evaluationsergebnisse wurden stets mit Ergebnissen, die durch die Verwendung der Advanced Combination Encoder (ACE) Strategie ermittelt wurden, verglichen. ACE stellt die zurzeit verbreitetste Strategie dar. Erste Simulationen zeigten, dass die SprachverstĂ€ndlichkeit mit SAM genauso gut wie mit ACE ist. Weiterhin lieferte SAM genauere binaurale Merkmale, was potentiell zu einer Verbesserung der SchallquellenlokalisierungfĂ€higkeit fĂŒhren kann. Die Simulationen zeigten ebenfalls einen erhöhten Anteil an zeitlichen Pitchinformationen, welche von SAM bereitgestellt wurden. Die Ergebnisse der nachfolgenden Pilotstudie mit fĂŒnf CI-Nutzern zeigten mehrere Vorteile von SAM auf. Erstens war eine signifikante Verbesserung der Tonhöhenunterscheidung bei Sinustönen und gesungenen Vokalen zu erkennen. Zweitens bestĂ€tigten CI-Nutzer, die kontralateral mit einem HörgerĂ€t versorgt waren, eine natĂŒrlicheren Klangeindruck. Als ein sehr bedeutender Vorteil stellte sich drittens heraus, dass sich alle Testpersonen in sehr kurzer Zeit (ca. 10 bis 30 Minuten) an SAM gewöhnen konnten. Dies ist besonders wichtig, da typischerweise Wochen oder Monate nötig sind. Tests mit Normalhörenden lieferten weitere Nachweise fĂŒr die verbesserte Tonhöhenunterscheidung mit SAM.Obwohl SAM noch keine marktreife Alternative ist, versucht sie den Weg fĂŒr zukĂŒnftige Strategien, die auf Gehörmodellen beruhen, zu ebnen und ist somit ein erfolgversprechender Kandidat fĂŒr weitere Forschungsarbeiten.Cochlear implants (CIs) combined with professional rehabilitation have enabled several hundreds of thousands of hearing-impaired individuals to re-enter the world of verbal communication. Though very successful, current CI systems seem to have reached their peak potential. The fact that most recipients claim not to enjoy listening to music and are not capable of carrying on a conversation in noisy or reverberative environments shows that there is still room for improvement.This dissertation presents a new cochlear implant signal processing strategy called Stimulation based on Auditory Modeling (SAM), which is completely based on a computational model of the human peripheral auditory system.SAM has been evaluated through simplified models of CI listeners, with five cochlear implant users, and with 27 normal-hearing subjects using an acoustic model of CI perception. Results have always been compared to those acquired using Advanced Combination Encoder (ACE), which is today’s most prevalent CI strategy. First simulations showed that speech intelligibility of CI users fitted with SAM should be just as good as that of CI listeners fitted with ACE. Furthermore, it has been shown that SAM provides more accurate binaural cues, which can potentially enhance the sound source localization ability of bilaterally fitted implantees. Simulations have also revealed an increased amount of temporal pitch information provided by SAM. The subsequent pilot study, which ran smoothly, revealed several benefits of using SAM. First, there was a significant improvement in pitch discrimination of pure tones and sung vowels. Second, CI users fitted with a contralateral hearing aid reported a more natural sound of both speech and music. Third, all subjects were accustomed to SAM in a very short period of time (in the order of 10 to 30 minutes), which is particularly important given that a successful CI strategy change typically takes weeks to months. An additional test with 27 normal-hearing listeners using an acoustic model of CI perception delivered further evidence for improved pitch discrimination ability with SAM as compared to ACE.Although SAM is not yet a market-ready alternative, it strives to pave the way for future strategies based on auditory models and it is a promising candidate for further research and investigation

    Human Practice. Digital Ecologies. Our Future. : 14. Internationale Tagung Wirtschaftsinformatik (WI 2019) : Tagungsband

    Get PDF
    Erschienen bei: universi - UniversitĂ€tsverlag Siegen. - ISBN: 978-3-96182-063-4Aus dem Inhalt: Track 1: Produktion & Cyber-Physische Systeme Requirements and a Meta Model for Exchanging Additive Manufacturing Capacities Service Systems, Smart Service Systems and Cyber- Physical Systems—What’s the difference? Towards a Unified Terminology Developing an Industrial IoT Platform – Trade-off between Horizontal and Vertical Approaches Machine Learning und Complex Event Processing: Effiziente Echtzeitauswertung am Beispiel Smart Factory Sensor retrofit for a coffee machine as condition monitoring and predictive maintenance use case Stakeholder-Analyse zum Einsatz IIoT-basierter Frischeinformationen in der Lebensmittelindustrie Towards a Framework for Predictive Maintenance Strategies in Mechanical Engineering - A Method-Oriented Literature Analysis Development of a matching platform for the requirement-oriented selection of cyber physical systems for SMEs Track 2: Logistic Analytics An Empirical Study of Customers’ Behavioral Intention to Use Ridepooling Services – An Extension of the Technology Acceptance Model Modeling Delay Propagation and Transmission in Railway Networks What is the impact of company specific adjustments on the acceptance and diffusion of logistic standards? Robust Route Planning in Intermodal Urban Traffic Track 3: Unternehmensmodellierung & Informationssystemgestaltung (Enterprise Modelling & Information Systems Design) Work System Modeling Method with Different Levels of Specificity and Rigor for Different Stakeholder Purposes Resolving Inconsistencies in Declarative Process Models based on Culpability Measurement Strategic Analysis in the Realm of Enterprise Modeling – On the Example of Blockchain-Based Initiatives for the Electricity Sector Zwischenbetriebliche Integration in der Möbelbranche: Konfigurationen und Einflussfaktoren Novices’ Quality Perceptions and the Acceptance of Process Modeling Grammars Entwicklung einer Definition fĂŒr Social Business Objects (SBO) zur Modellierung von Unternehmensinformationen Designing a Reference Model for Digital Product Configurators Terminology for Evolving Design Artifacts Business Role-Object Specification: A Language for Behavior-aware Structural Modeling of Business Objects Generating Smart Glasses-based Information Systems with BPMN4SGA: A BPMN Extension for Smart Glasses Applications Using Blockchain in Peer-to-Peer Carsharing to Build Trust in the Sharing Economy Testing in Big Data: An Architecture Pattern for a Development Environment for Innovative, Integrated and Robust Applications Track 4: Lern- und Wissensmanagement (e-Learning and Knowledge Management) eGovernment Competences revisited – A Literature Review on necessary Competences in a Digitalized Public Sector Say Hello to Your New Automated Tutor – A Structured Literature Review on Pedagogical Conversational Agents Teaching the Digital Transformation of Business Processes: Design of a Simulation Game for Information Systems Education Conceptualizing Immersion for Individual Learning in Virtual Reality Designing a Flipped Classroom Course – a Process Model The Influence of Risk-Taking on Knowledge Exchange and Combination Gamified Feedback durch Avatare im Mobile Learning Alexa, Can You Help Me Solve That Problem? - Understanding the Value of Smart Personal Assistants as Tutors for Complex Problem Tasks Track 5: Data Science & Business Analytics Matching with Bundle Preferences: Tradeoff between Fairness and Truthfulness Applied image recognition: guidelines for using deep learning models in practice Yield Prognosis for the Agrarian Management of Vineyards using Deep Learning for Object Counting Reading Between the Lines of Qualitative Data – How to Detect Hidden Structure Based on Codes Online Auctions with Dual-Threshold Algorithms: An Experimental Study and Practical Evaluation Design Features of Non-Financial Reward Programs for Online Reviews: Evaluation based on Google Maps Data Topic Embeddings – A New Approach to Classify Very Short Documents Based on Predefined Topics Leveraging Unstructured Image Data for Product Quality Improvement Decision Support for Real Estate Investors: Improving Real Estate Valuation with 3D City Models and Points of Interest Knowledge Discovery from CVs: A Topic Modeling Procedure Online Product Descriptions – Boost for your Sales? EntscheidungsunterstĂŒtzung durch historienbasierte Dienstreihenfolgeplanung mit Pattern A Semi-Automated Approach for Generating Online Review Templates Machine Learning goes Measure Management: Leveraging Anomaly Detection and Parts Search to Improve Product-Cost Optimization Bedeutung von Predictive Analytics fĂŒr den theoretischen Erkenntnisgewinn in der IS-Forschung Track 6: Digitale Transformation und Dienstleistungen Heuristic Theorizing in Software Development: Deriving Design Principles for Smart Glasses-based Systems Mirroring E-service for Brick and Mortar Retail: An Assessment and Survey Taxonomy of Digital Platforms: A Platform Architecture Perspective Value of Star Players in the Digital Age Local Shopping Platforms – Harnessing Locational Advantages for the Digital Transformation of Local Retail Outlets: A Content Analysis A Socio-Technical Approach to Manage Analytics-as-a-Service – Results of an Action Design Research Project Characterizing Approaches to Digital Transformation: Development of a Taxonomy of Digital Units Expectations vs. Reality – Benefits of Smart Services in the Field of Tension between Industry and Science Innovation Networks and Digital Innovation: How Organizations Use Innovation Networks in a Digitized Environment Characterising Social Reading Platforms— A Taxonomy-Based Approach to Structure the Field Less Complex than Expected – What Really Drives IT Consulting Value Modularity Canvas – A Framework for Visualizing Potentials of Service Modularity Towards a Conceptualization of Capabilities for Innovating Business Models in the Industrial Internet of Things A Taxonomy of Barriers to Digital Transformation Ambidexterity in Service Innovation Research: A Systematic Literature Review Design and success factors of an online solution for cross-pillar pension information Track 7: IT-Management und -Strategie A Frugal Support Structure for New Software Implementations in SMEs How to Structure a Company-wide Adoption of Big Data Analytics The Changing Roles of Innovation Actors and Organizational Antecedents in the Digital Age Bewertung des Kundennutzens von Chatbots fĂŒr den Einsatz im Servicedesk Understanding the Benefits of Agile Software Development in Regulated Environments Are Employees Following the Rules? On the Effectiveness of IT Consumerization Policies Agile and Attached: The Impact of Agile Practices on Agile Team Members’ Affective Organisational Commitment The Complexity Trap – Limits of IT Flexibility for Supporting Organizational Agility in Decentralized Organizations Platform Openness: A Systematic Literature Review and Avenues for Future Research Competence, Fashion and the Case of Blockchain The Digital Platform Otto.de: A Case Study of Growth, Complexity, and Generativity Track 8: eHealth & alternde Gesellschaft Security and Privacy of Personal Health Records in Cloud Computing Environments – An Experimental Exploration of the Impact of Storage Solutions and Data Breaches Patientenintegration durch Pfadsysteme Digitalisierung in der StressprĂ€vention – eine qualitative Interviewstudie zu Nutzenpotenzialen User Dynamics in Mental Health Forums – A Sentiment Analysis Perspective Intent and the Use of Wearables in the Workplace – A Model Development Understanding Patient Pathways in the Context of Integrated Health Care Services - Implications from a Scoping Review Understanding the Habitual Use of Wearable Activity Trackers On the Fit in Fitness Apps: Studying the Interaction of Motivational Affordances and Users’ Goal Orientations in Affecting the Benefits Gained Gamification in Health Behavior Change Support Systems - A Synthesis of Unintended Side Effects Investigating the Influence of Information Incongruity on Trust-Relations within Trilateral Healthcare Settings Track 9: Krisen- und KontinuitĂ€tsmanagement Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation Analyzing the Potential of Graphical Building Information for Fire Emergency Responses: Findings from a Controlled Experiment Track 10: Human-Computer Interaction Towards a Taxonomy of Platforms for Conversational Agent Design Measuring Service Encounter Satisfaction with Customer Service Chatbots using Sentiment Analysis Self-Tracking and Gamification: Analyzing the Interplay of Motivations, Usage and Motivation Fulfillment Erfolgsfaktoren von Augmented-Reality-Applikationen: Analyse von Nutzerrezensionen mit dem Review-Mining-Verfahren Designing Dynamic Decision Support for Electronic Requirements Negotiations Who is Stressed by Using ICTs? A Qualitative Comparison Analysis with the Big Five Personality Traits to Understand Technostress Walking the Middle Path: How Medium Trade-Off Exposure Leads to Higher Consumer Satisfaction in Recommender Agents Theory-Based Affordances of Utilitarian, Hedonic and Dual-Purposed Technologies: A Literature Review Eliciting Customer Preferences for Shopping Companion Apps: A Service Quality Approach The Role of Early User Participation in Discovering Software – A Case Study from the Context of Smart Glasses The Fluidity of the Self-Concept as a Framework to Explain the Motivation to Play Video Games Heart over Heels? An Empirical Analysis of the Relationship between Emotions and Review Helpfulness for Experience and Credence Goods Track 11: Information Security and Information Privacy Unfolding Concerns about Augmented Reality Technologies: A Qualitative Analysis of User Perceptions To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context Understanding Data Protection Regulations from a Data Management Perspective: A Capability-Based Approach to EU-GDPR On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market What is Your Selfie Worth? A Field Study on Individuals’ Valuation of Personal Data Justification of Mass Surveillance: A Quantitative Study An Exploratory Study of Risk Perception for Data Disclosure to a Network of Firms Track 12: Umweltinformatik und nachhaltiges Wirtschaften KommunikationsfĂ€den im Nadelöhr – Fachliche Prozessmodellierung der Nachhaltigkeitskommunikation am Kapitalmarkt Potentiale und Herausforderungen der Materialflusskostenrechnung Computing Incentives for User-Based Relocation in Carsharing Sustainability’s Coming Home: Preliminary Design Principles for the Sustainable Smart District Substitution of hazardous chemical substances using Deep Learning and t-SNE A Hierarchy of DSMLs in Support of Product Life-Cycle Assessment A Survey of Smart Energy Services for Private Households Door-to-Door Mobility Integrators as Keystone Organizations of Smart Ecosystems: Resources and Value Co-Creation – A Literature Review Ein EntscheidungsunterstĂŒtzungssystem zur ökonomischen Bewertung von Mieterstrom auf Basis der Clusteranalyse Discovering Blockchain for Sustainable Product-Service Systems to enhance the Circular Economy Digitale RĂŒckverfolgbarkeit von Lebensmitteln: Eine verbraucherinformatische Studie Umweltbewusstsein durch audiovisuelles Content Marketing? Eine experimentelle Untersuchung zur Konsumentenbewertung nachhaltiger Smartphones Towards Predictive Energy Management in Information Systems: A Research Proposal A Web Browser-Based Application for Processing and Analyzing Material Flow Models using the MFCA Methodology Track 13: Digital Work - Social, mobile, smart On Conversational Agents in Information Systems Research: Analyzing the Past to Guide Future Work The Potential of Augmented Reality for Improving Occupational First Aid Prevent a Vicious Circle! The Role of Organizational IT-Capability in Attracting IT-affine Applicants Good, Bad, or Both? Conceptualization and Measurement of Ambivalent User Attitudes Towards AI A Case Study on Cross-Hierarchical Communication in Digital Work Environments ‘Show Me Your People Skills’ - Employing CEO Branding for Corporate Reputation Management in Social Media A Multiorganisational Study of the Drivers and Barriers of Enterprise Collaboration Systems-Enabled Change The More the Merrier? The Effect of Size of Core Team Subgroups on Success of Open Source Projects The Impact of Anthropomorphic and Functional Chatbot Design Features in Enterprise Collaboration Systems on User Acceptance Digital Feedback for Digital Work? Affordances and Constraints of a Feedback App at InsurCorp The Effect of Marker-less Augmented Reality on Task and Learning Performance Antecedents for Cyberloafing – A Literature Review Internal Crowd Work as a Source of Empowerment - An Empirical Analysis of the Perception of Employees in a Crowdtesting Project Track 14: GeschĂ€ftsmodelle und digitales Unternehmertum Dividing the ICO Jungle: Extracting and Evaluating Design Archetypes Capturing Value from Data: Exploring Factors Influencing Revenue Model Design for Data-Driven Services Understanding the Role of Data for Innovating Business Models: A System Dynamics Perspective Business Model Innovation and Stakeholder: Exploring Mechanisms and Outcomes of Value Creation and Destruction Business Models for Internet of Things Platforms: Empirical Development of a Taxonomy and Archetypes Revitalizing established Industrial Companies: State of the Art and Success Principles of Digital Corporate Incubators When 1+1 is Greater than 2: Concurrence of Additional Digital and Established Business Models within Companies Special Track 1: Student Track Investigating Personalized Price Discrimination of Textile-, Electronics- and General Stores in German Online Retail From Facets to a Universal Definition – An Analysis of IoT Usage in Retail Is the Technostress Creators Inventory Still an Up-To-Date Measurement Instrument? Results of a Large-Scale Interview Study Application of Media Synchronicity Theory to Creative Tasks in Virtual Teams Using the Example of Design Thinking TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter Application of Process Mining Techniques to Support Maintenance-Related Objectives How Voice Can Change Customer Satisfaction: A Comparative Analysis between E-Commerce and Voice Commerce Business Process Compliance and Blockchain: How Does the Ethereum Blockchain Address Challenges of Business Process Compliance? Improving Business Model Configuration through a Question-based Approach The Influence of Situational Factors and Gamification on Intrinsic Motivation and Learning Evaluation von ITSM-Tools fĂŒr Integration und Management von Cloud-Diensten am Beispiel von ServiceNow How Software Promotes the Integration of Sustainability in Business Process Management Criteria Catalog for Industrial IoT Platforms from the Perspective of the Machine Tool Industry Special Track 3: Demos & Prototyping Privacy-friendly User Location Tracking with Smart Devices: The BeaT Prototype Application-oriented robotics in nursing homes Augmented Reality for Set-up Processe Mixed Reality for supporting Remote-Meetings Gamification zur Motivationssteigerung von Werkern bei der Betriebsdatenerfassung Automatically Extracting and Analyzing Customer Needs from Twitter: A “Needmining” Prototype GaNEsHA: Opportunities for Sustainable Transportation in Smart Cities TUCANA: A platform for using local processing power of edge devices for building data-driven services Demonstrator zur Beschreibung und Visualisierung einer kritischen Infrastruktur Entwicklung einer alltagsnahen persuasiven App zur Bewegungsmotivation fĂŒr Ă€ltere Nutzerinnen und Nutzer A browser-based modeling tool for studying the learning of conceptual modeling based on a multi-modal data collection approach Exergames & Dementia: An interactive System for People with Dementia and their Care-Network Workshops Workshop Ethics and Morality in Business Informatics (Workshop Ethik und Moral in der Wirtschaftsinformatik – EMoWI’19) Model-Based Compliance in Information Systems - Foundations, Case Description and Data Set of the MobIS-Challenge for Students and Doctoral Candidates Report of the Workshop on Concepts and Methods of Identifying Digital Potentials in Information Management Control of Systemic Risks in Global Networks - A Grand Challenge to Information Systems Research Die Mitarbeiter von morgen - Kompetenzen kĂŒnftiger Mitarbeiter im Bereich Business Analytics Digitaler Konsum: Herausforderungen und Chancen der Verbraucherinformati

    Multikonferenz Wirtschaftsinformatik (MKWI) 2016: Technische UniversitÀt Ilmenau, 09. - 11. MÀrz 2016; Band I

    Get PDF
    Übersicht der Teilkonferenzen Band I: ‱ 11. Konferenz MobilitĂ€t und Digitalisierung (MMS 2016) ‱ Automated Process und Service Management ‱ Business Intelligence, Analytics und Big Data ‱ Computational Mobility, Transportation and Logistics ‱ CSCW & Social Computing ‱ Cyber-Physische Systeme und digitale Wertschöpfungsnetzwerke ‱ Digitalisierung und Privacy ‱ e-Commerce und e-Business ‱ E-Government – Informations- und Kommunikationstechnologien im öffentlichen Sektor ‱ E-Learning und Lern-Service-Engineering – Entwicklung, Einsatz und Evaluation technikgestĂŒtzter Lehr-/Lernprozess
    corecore