Refine
Year of publication
Document Type
- Article (54) (remove)
Has Fulltext
- yes (54)
Is part of the Bibliography
- no (54)
Keywords
- OSGi (3)
- SOA (3)
- complex event processing (3)
- mobile health (3)
- Akzeptanz (2)
- Arbeitsqualität (2)
- CEP (2)
- Computersicherheit (2)
- ECA (2)
- Empfehlungssystem (2)
- Ereignisgesteuerte Programmierung (2)
- Otto (GmbH & Co KG) (2)
- Patient (2)
- Security (2)
- Serviceorientierte Architektur (2)
- Smart Device (2)
- Telearbeit (2)
- Verarbeitung komplexer Ereignisse (2)
- Versicherung (2)
- Virtuelle Realität (2)
- acceptance (2)
- digital divide (2)
- event-driven architecture (2)
- general practitioners (2)
- mHealth (2)
- tablet (2)
- Abschlussarbeit (1)
- Ad-hoc-Netz (1)
- Adaptives Verfahren (1)
- Agent <Informatik> (1)
- Agile Softwareentwicklung (1)
- Agile software development (1)
- Allgemeinarzt (1)
- Android (1)
- Angst (1)
- Arbeitsbelastung (1)
- Arbeitsklima (1)
- Arbeitswelt (1)
- Arbeitszufriedenheit (1)
- BLAST algorithm (1)
- Bacterial genomics (1)
- Bankruptcy costs (1)
- Bat algorithm (1)
- Berufsleben (1)
- Berufsziel (1)
- Berufszufriedenheit (1)
- Betriebsorganisation (1)
- Biometrie (1)
- Business Plan (1)
- Business model (1)
- CI/CD (1)
- COBIT (1)
- CRM in Hochschulen (1)
- Checkliste (1)
- Code quality (1)
- Complex Event Processing (CEP) (1)
- Complex event processing (1)
- Compliance (1)
- Consumerization (1)
- Context-aware recommender systems (1)
- Continuous Delivery (1)
- Cross-holdings (1)
- Crowdsourcing (1)
- Customer channel (1)
- Cyber Insurance (1)
- Cyber Risks (1)
- Cyber-Versicherung (1)
- Damage claims (1)
- Datenstrom (1)
- Delphi (1)
- Delphi method characteristics (1)
- Delphi method variants (1)
- Depression (1)
- Design Thinking (1)
- DevOps (1)
- Dienstgüte (1)
- Distributed file systems (1)
- Dyadisches Gitter (1)
- Dünnes Gitter (1)
- E-Health (1)
- E-Learning (1)
- Echtzeitsimulation (1)
- Eindringerkennung (1)
- Eingebettetes System (1)
- Einzelfertigung (1)
- Endredaktion (1)
- Entrepreneurship (1)
- Event Admin (EA) (1)
- Event monitoring (1)
- Explainability (1)
- Fault tolerance (1)
- Fehlerverhütung (1)
- Financial contagion (1)
- Financial network (1)
- Finanzplanung (1)
- Fire sales (1)
- Frauenquote (1)
- Gender Mainstreaming (1)
- Genomic databases (1)
- Geschäftsmodell (1)
- Gesichtserkennung (1)
- Gleichberechtigung (1)
- Graph embeddings (1)
- Gute Arbeit (1)
- Hausarzt (1)
- Hochschullehre (1)
- IDS (1)
- ISO 27 K (1)
- ISO 27000 (1)
- ISO 27001 (1)
- ISO 27002 (1)
- ISO/IEC 27000 (1)
- IT Risk (1)
- IT Risk Management (1)
- IT Security Risk (1)
- Idiosyncratic Risk (1)
- Indicator Measurement (1)
- Information systems research (1)
- Instrument (1)
- Insurance (1)
- Internationalisierung (1)
- Kardiovaskuläre Krankheit (1)
- Knowledge graphs (1)
- Kontextfaktor (1)
- Kontinuierliche Integration (1)
- Kreatives Denken (1)
- Kreativität (1)
- Künstliche Intelligenz (1)
- LightSabre (1)
- Liquidität (1)
- Liquiditätsplan (1)
- Liquiditätsplanung (1)
- Location-based systems (1)
- Lymphknoten (1)
- MANET (1)
- Machine-to-Machine-Kommunikation (1)
- Magnetometer (1)
- Management (1)
- MapReduce algorithm (1)
- Maps (1)
- Metagenomics (1)
- Metakognitive Therapie (1)
- Mobile Applications (1)
- Mobile Device (1)
- Music recommender (1)
- Musik (1)
- Neuronales Netz (1)
- NoSQL databases. (1)
- Notfallmedizin (1)
- OECD datasets (1)
- Offenes Kommunikationssystem (1)
- Online services (1)
- Online-Dienst (1)
- Online-Portal (1)
- Ontologies (1)
- Open Source (1)
- Open systems (1)
- Optimalliquidität (1)
- PC-gestützt (1)
- Plan (1)
- Problemlösen (1)
- Prostatakrebs (1)
- Prüfungsangst (1)
- Psychische Gesundheit (1)
- Psychokardiologie (1)
- Psychologie (1)
- Quality of Service (QoS) (1)
- Quality perception (1)
- Qualität (1)
- Quellcode (1)
- Quotierung (1)
- Rationalität (1)
- Real-time simulation (1)
- Recommender systems (1)
- Remote work (1)
- Rendering (1)
- Rendering (computer graphics) (1)
- Risiko (1)
- Rule learning (1)
- SEM (1)
- SIEM (1)
- SOAP (1)
- SPION (1)
- Schadensersatzanspruch (1)
- Semantic Web (1)
- Semi-structured interviews (1)
- Sensor (1)
- Sensorsystem (1)
- Sentinel-Lymphknoten (1)
- Sequence alignment (1)
- Service Lifecycle (1)
- Service Management (1)
- Service Monitoring (1)
- Service Registry (1)
- Service Repository (1)
- Service Semantics (1)
- Service-orientation (1)
- Simulation (1)
- Smartphone (1)
- Soft Skills (1)
- Software Engineering (1)
- Software development (1)
- Soll-Ist-Vergleich (1)
- Sonnenfinsternis (1)
- Source code properties (1)
- Spheres (1)
- Standortbezogener Dienst (1)
- Strategie (1)
- Streaming <Kommunikationstechnik> (1)
- Strukturgleichungsmodell (1)
- Studienarbeit (1)
- Studiengangfinder (1)
- Swarm algorithm (1)
- Systematic Risk (1)
- Systemic risk (1)
- Taxonomy (1)
- Technology acceptance (1)
- Unternehmen (1)
- Unternehmensgründung (1)
- Versicherungsbetrieb (1)
- Verwaltung (1)
- Virtual reality (1)
- WS-Security (1)
- Web service (1)
- Web services (1)
- Web-Portal (1)
- Wirtschaftsinformatik (1)
- Wissensgraph (1)
- Work quality (1)
- Workload (1)
- XML-Model (1)
- XML-Schema (1)
- Zentriertes Interview (1)
- Zufriedenheit (1)
- ad-hoc networks (1)
- adaptive methods (1)
- agents (1)
- anaphylaxis (1)
- anxiety (1)
- architecture (1)
- asynchronous messaging (1)
- build automation (1)
- build server (1)
- cardiovascular disease (1)
- cashing (1)
- cloud computing (1)
- clustering on countries (1)
- collaborative coordination (1)
- complex event processing (CEP) (1)
- creativity (1)
- data protection (1)
- data stream learning (1)
- depression (1)
- digital intervention (1)
- distributed environments (1)
- distributed evacuation coordination (1)
- dyadic grid (1)
- e-learning (1)
- educational virtual realities (1)
- eigenface (1)
- emergency medicine (1)
- enterprise apps (1)
- evacuation guidance (1)
- evaluation (1)
- event models (1)
- events (1)
- examination (1)
- face recognition (1)
- fear (1)
- financial planning (1)
- forecasting models on countries (1)
- head-mounted display (1)
- health care (1)
- immersive media (1)
- kreativität (1)
- large scale systems (1)
- load balancing (1)
- lymphadenectomy (1)
- machine learning (1)
- machine-to-machine communication (1)
- magnetometer (1)
- market-based coordination (1)
- mental health (1)
- metacognitive therapy (1)
- multi-dimensional data (1)
- multiagent systems (1)
- ontology (1)
- patients (1)
- presence experience (1)
- privacy (1)
- prostate cancer (1)
- psychocardiology (1)
- rationalität (1)
- real-time routing (1)
- reliable message delivery (1)
- rollierend (1)
- security (1)
- semantic web application (1)
- sentinel lymph node dissection (1)
- shopping cart system (1)
- simulation training (1)
- situation aware routing (1)
- smart cities (1)
- smartphone (1)
- solid waste management (1)
- sparse grid (1)
- student project (1)
- superparamagnetic iron oxide nanoparticles (1)
- teaching entrepreneurship (1)
- training effectiveness (1)
- underprivileged adolescents (1)
- user training (1)
- vermeidbare Fehler (1)
- virtual emergency scenario (1)
- virtual patient simulation (1)
- virtual reality (1)
- web services (1)
- Übung (1)
Institute
- Fakultät IV - Wirtschaft und Informatik (54) (remove)
Delphi is a frequently used research method in the information systems (IS) field. The last fifteen years have seen many variants of the Delphi Method proposed and used in IS research. However, these variants do not seem to be properly derived; while all variants share certain characteristics, their reasoning for differentiation inconsistently varies. It seems that researchers tend to create “new” Delphi Method variants, although the underlying modification of the Delphi Method is, in fact, minor. This leads to a heterogeneity of Delphi Method variants and undermines scientific rigor when using Delphi. The study addresses this deficit and (1) identifies different variants of Delphi and determines their characteristics, (2) critically reflects to what extent a clear distinction between these variants exists, (3) shows the clearly distinguishable Delphi Method variants and their characteristics, (4) develops a proposed taxonomy of Delphi Method variants, and (5) evaluates and applies this taxonomy. The proposed taxonomy helps clearly differentiate Delphi Method variants and enhances methodological rigor when using the Delphi Method.
In this article, we present the software architecture of a new generation of advisory systems using Intelligent Agent and Semantic Web technologies. Multi-agent systems provide a well-suited paradigm to implement negotiation processes in a consultancy situation. Software agents act as clients and advisors, using their knowledge to assist human users. In the presented architecture, the domain knowledge is modeled semantically by means of XML-based ontology languages such as OWL. Using an inference engine, the agents reason, based on their knowledge to make decisions or proposals. The agent knowledge consists of different types of data: on the one hand, private data, which has to be protected against unauthorized access; and on the other hand, publicly accessible knowledge spread over different Web sites. As in a real consultancy, an agent only reveals sensitive private data, if they are indispensable for finding a solution. In addition, depending on the actual consultancy situation, each agent dynamically expands its knowledge base by accessing OWL knowledge sources from the Internet. Due to the standardization of OWL, knowledge models easily can be shared and accessed via the Internet. The usefulness of our approach is proved by the implementation of an advisory system in the Semantic E-learning Agent (SEA) project, whose objective is to develop virtual student advisers that render support to university students in order to successfully organize and perform their studies.
In service-oriented architectures the management of services is a crucial task during all stages of IT operations. Based on a case study performed for a group of finance companies the different aspects of service management are presented. First, the paper discusses how services must be described for management purposes. In particular, a special emphasis is placed on the integration of legacy/non web services. Secondly, the service lifecycle that underlies service management is presented. Especially, the relation to SOA governance and an appropriate tool support by registry repositories is outlined.
In this paper, we consider the route coordination problem in emergency evacuation of large smart buildings. The building evacuation time is crucial in saving lives in emergency situations caused by imminent natural or man-made threats and disasters. Conventional approaches to evacuation route coordination are static and predefined. They rely on evacuation plans present only at a limited number of building locations and possibly a trained evacuation personnel to resolve unexpected contingencies. Smart buildings today are equipped with sensory infrastructure that can be used for an autonomous situation-aware evacuation guidance optimized in real time. A system providing such a guidance can help in avoiding additional evacuation casualties due to the flaws of the conventional evacuation approaches. Such a system should be robust and scalable to dynamically adapt to the number of evacuees and the size and safety conditions of a building. In this respect, we propose a distributed route recommender architecture for situation-aware evacuation guidance in smart buildings and describe its key modules in detail. We give an example of its functioning dynamics on a use case.
The objective of this student project was for the students to develop, conduct, and supervise a training course for basic work place applications (word processing and business graphics). Students were responsible for the planning, organizing and the teaching of the course. As participants, underprivileged adolescents took part in order to learn the handling of IT applications and therefore, improve their job skills and have a better chance to get into employment. Therefore the adolescents do the role of trainees at the course. Our students worked with a population that is continually overlooked by the field.
As a result, the students trained to design and implement training courses, exercised to manage projects and increased their social responsibility and awareness concerning the way of life and living conditions of other young people. The underprivileged adolescents learned to use important business applications and increased their job skills and job chances. The overall design of our concept required extensive resources to supervise and to steer the students and the adolescents. The lecturers had to teach and to counsel the students and had to be on “stand-by” just in case they were needed to solve critical situations between the two groups of young people.
Eine Unternehmensgründung ist ein komplexes Vorhaben, dessen Risiken soweit wie möglich vermieden bzw. minimiert werden sollten. Dabei hilft eine sorgfältige Planung und Vorbereitung. Der Gründungsprozess lässt sich — von der Prüfung der Grundvoraussetzungen über den Business Plan, die Vorbereitung der Gründung sowie deren Realisierung bis zur Stabilisierung des Unternehmens — in fünf Phasen einteilen.
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.
OSGi in Cloud Environments
(2013)
This article discusses event monitoring options for heterogeneous event sources as they are given in nowadays heterogeneous distributed information systems. It follows the central assumption, that a fully generic event monitoring solution cannot provide complete support for event monitoring; instead, event source specific semantics such as certain event types or support for certain event monitoring techniques have to be taken into account. Following from this, the core result of the work presented here is the extension of a configurable event monitoring (Web) service for a variety of event sources. A service approach allows us to trade genericity for the exploitation of source specific characteristics. It thus delivers results for the areas of SOA, Web services, CEP and EDA.