Refine
Year of publication
Document Type
- Conference Proceeding (50)
- Article (42)
- Bachelor Thesis (7)
- Part of a Book (2)
- Master's Thesis (2)
- Preprint (2)
- Doctoral Thesis (1)
- Report (1)
- Working Paper (1)
Language
- English (108) (remove)
Is part of the Bibliography
- no (108)
Keywords
- Serviceorientierte Architektur (9)
- Mikroservice (8)
- Computersicherheit (7)
- SOA (7)
- Agilität <Management> (6)
- Agile Softwareentwicklung (5)
- Insurance Industry (5)
- Künstliche Intelligenz (5)
- Nachhaltigkeit (5)
- Rechnernetz (5)
- Versicherungswirtschaft (5)
- Simulation (4)
- Visualisierung (4)
- Agile methods (3)
- COVID-19 (3)
- Cloud Computing (3)
- Complex Event Processing (3)
- Computersimulation (3)
- Deep learning (3)
- E-Learning (3)
- Empfehlungssystem (3)
- Information Visualization (3)
- Microservices (3)
- Network Security (3)
- Neuronales Netz (3)
- OSGi (3)
- Security (3)
- Semantic Web (3)
- Telearbeit (3)
- Virtuelle Realität (3)
- complex event processing (3)
- microservices (3)
- mobile health (3)
- AI (2)
- Agent <Informatik> (2)
- Agile software development (2)
- Akzeptanz (2)
- Benutzeroberfläche (2)
- Big Data (2)
- CEP (2)
- CI/CD (2)
- Chatbot (2)
- Consistency (2)
- Consumerization (2)
- Datenstrom (2)
- DevOps (2)
- Dienstgüte (2)
- ECA (2)
- Eindringerkennung (2)
- Ereignisgesteuerte Programmierung (2)
- ISO 9001 (2)
- Indicator Measurement (2)
- Machine Learning (2)
- Maschinelles Lernen (2)
- Maschinelles Sehen (2)
- Microservice (2)
- Microservices Architecture (2)
- Open Source (2)
- Patient (2)
- Qualität (2)
- Rendering (2)
- Resiliency (2)
- Resilienz (2)
- Service-orientation (2)
- Smart Device (2)
- Straßenverkehr (2)
- Tertiärbereich (2)
- Urban Logistics (2)
- User Interfaces (2)
- Verarbeitung komplexer Ereignisse (2)
- Versicherung (2)
- Versicherungsbetrieb (2)
- XML-Model (2)
- XML-Schema (2)
- acceptance (2)
- agile methods (2)
- agile software development (2)
- build automation (2)
- build server (2)
- digital divide (2)
- eduscrum (2)
- event-driven architecture (2)
- general practitioners (2)
- mHealth (2)
- remote work (2)
- tablet (2)
- virtual reality (2)
- 3d mapping (1)
- 4-day work week (1)
- AI influences (1)
- API (1)
- Abalone (1)
- Absolvent (1)
- Ad-hoc-Netz (1)
- Adaptive IT Infrastructure (1)
- Adaptives Verfahren (1)
- Agile Manifesto (1)
- Agile Practices (1)
- Agile Software Development (1)
- Agile education (1)
- Agile method (1)
- Agile practices (1)
- Air quality (1)
- Allgemeinarzt (1)
- AlphaGo (1)
- Alternative work schedule (1)
- Android (1)
- Angst (1)
- Anomalieerkennung (1)
- Anomaly detection (1)
- Anonymization (1)
- Antifragile (1)
- Application Programming Interface (1)
- Arbeitsablauf (1)
- Arbeitswelt (1)
- Arbeitszufriedenheit (1)
- Articial intelligence (1)
- Asymmetric encryption (1)
- Attack detection (1)
- Auswahl (1)
- Authentication (1)
- Authentifikation (1)
- Authorization (1)
- Autorisierung (1)
- BLAST algorithm (1)
- BaaS (Backend-as-a-service) (1)
- Bacterial genomics (1)
- Bankruptcy costs (1)
- Bat algorithm (1)
- Batteriefahrzeug (1)
- Battery Electric Vehicles (1)
- Bekleidungsindustrie (1)
- Benutzererlebnis (1)
- Benutzerfreundlichkeit (1)
- Beruf (1)
- Bestärkendes Lernen <Künstliche Intelligenz> (1)
- Big Data Analytics (1)
- Biometrie (1)
- Blackboard Pattern (1)
- Brettspiel (1)
- Bring Your Own Device (1)
- Business model (1)
- C-SPARQL (1)
- C2C (1)
- COBIT (1)
- CQL (1)
- Case Management (1)
- Chaos (1)
- Chaostheorie (1)
- ChatGPT (1)
- Choreography (1)
- City-Logistik (1)
- Code quality (1)
- Complex Event Processing (CEP) (1)
- Complex event processing (1)
- Compliance (1)
- Computer Graphics (1)
- Computer Vision (1)
- Computer simulation (1)
- Computergrafik (1)
- Context Awareness (1)
- Context-aware recommender systems (1)
- Continuous Delivery (1)
- Corporate Credit Risk (1)
- Cross-holdings (1)
- Crowdshipping (1)
- Crowdsourcing (1)
- Customer channel (1)
- Cyber Insurance (1)
- Cyber Risks (1)
- Cyber-Versicherung (1)
- Cyberattacke (1)
- Damage claims (1)
- Data Cubes (1)
- Data Management (1)
- Datenwürfel (1)
- Decision Support (1)
- Decision Support Tool (1)
- Deep Learning (1)
- Delphi (1)
- Delphi method characteristics (1)
- Delphi method variants (1)
- Depression (1)
- Design Science (1)
- Designwissenschaft <Informatik> (1)
- Diffusion Models (1)
- Distributed file systems (1)
- Docker (1)
- Domain Driven Design (DDD) (1)
- Dyadisches Gitter (1)
- Dünnes Gitter (1)
- E-Assessment (1)
- E-Grocery (1)
- E-Health (1)
- EPN (1)
- Echtzeitsimulation (1)
- Education (1)
- Eilzustellung (1)
- Eingebettetes System (1)
- Elektromobilität (1)
- Enduser Device (1)
- Energieerzeugung (1)
- Entrepreneurship (1)
- Entscheidungsunterstützungssystem (1)
- Erfolgsfaktor (1)
- Evaluation (1)
- Event Admin (EA) (1)
- Event Processing Network (1)
- Event Processing Network Model (1)
- Event monitoring (1)
- Explainability (1)
- Explainable anomaly detection (1)
- FaaS (Function-as-a-service) (1)
- Fault tolerance (1)
- Fernunterricht (1)
- Financial contagion (1)
- Financial network (1)
- Finanzplanung (1)
- Fire sales (1)
- Framework (1)
- Framework <Informatik> (1)
- Freiluftsport (1)
- Function as a Service (1)
- GAN (1)
- GPT-3 (1)
- Generative Adversarial Network (1)
- Genetic algorithms (1)
- Genetischer Algorithmus (1)
- Genomic databases (1)
- Geschlechtsunterschied (1)
- Geschäftsmodell (1)
- Gesichtserkennung (1)
- Graph embeddings (1)
- Graphische Benutzeroberfläche (1)
- Green Tourism (1)
- Hadoop (1)
- Hausarzt (1)
- Hochschullehre (1)
- IDS (1)
- ISO 27 K (1)
- ISO 27000 (1)
- ISO 27001 (1)
- ISO 27002 (1)
- ISO 9001 6.1 (1)
- ISO/IEC 27000 (1)
- IT Risk (1)
- IT Risk Management (1)
- IT Security Risk (1)
- IT Sicherheit (1)
- IT security (1)
- Idiosyncratic Risk (1)
- Information systems research (1)
- Informationstechnik (1)
- Insurance (1)
- Integrated Management (1)
- Intelligent Transport Systems (ITS) (1)
- Intelligent control (1)
- Intelligentes Stromnetz (1)
- Internationalisierung (1)
- Istio (1)
- JFLAP (1)
- Kardiovaskuläre Krankheit (1)
- Knowledge graphs (1)
- Kontextbezogenes System (1)
- Kontinuierliche Integration (1)
- Kreditrisiko (1)
- Kubernetes (1)
- LON-CAPA (1)
- Lean Management (1)
- Lebensmittel (1)
- Leistungskennzahl (1)
- Lernsoftware (1)
- Lieferservice (1)
- LightSabre (1)
- Literaturbericht (1)
- Location-based systems (1)
- Luftqualität (1)
- Lymphknoten (1)
- MANET (1)
- Machine-to-Machine-Kommunikation (1)
- Magnetometer (1)
- Management (1)
- MapReduce (1)
- MapReduce algorithm (1)
- Maps (1)
- Marketing (1)
- Marketingstrategie (1)
- Marktpotenzial (1)
- Masterstudium (1)
- Metagenomics (1)
- Metakognitive Therapie (1)
- Mikro-Kraft-Wärme-Kopplung (1)
- Mobile (1)
- Mobile Applications (1)
- Mobile Device (1)
- Mobile Device Management (1)
- Multidimensional Analysis (1)
- Multidimensional analysis (1)
- Music recommender (1)
- Musik (1)
- Nagios (1)
- Neural controls (1)
- Neural networks (1)
- Neural-network models (1)
- Nichtlineare Dynamik (1)
- NoSQL databases. (1)
- Nonlinear Dynamics (1)
- Normality model (1)
- Notfallmedizin (1)
- OECD datasets (1)
- Offenes Kommunikationssystem (1)
- Online services (1)
- Online-Dienst (1)
- Ontologies (1)
- Open systems (1)
- OpenStack (1)
- Opportunity Management (1)
- Optische Zeichenerkennung (1)
- Orchestration (1)
- Outdoor (1)
- PageRank (1)
- Paket (1)
- Pathologie (1)
- Pathology (1)
- Personennahverkehr (1)
- Physically Based Rendering (1)
- Policy Evaluation (1)
- Portable Micro-CHP Unit (1)
- Pregel (1)
- Privacy by Design (1)
- Problemorientiertes Lernen (1)
- Processes (1)
- Prognose (1)
- Projektmanagement (1)
- Prostatakrebs (1)
- Prozessmanagement (1)
- Prüfstand (1)
- Pseudonymization (1)
- Psychische Gesundheit (1)
- Psychokardiologie (1)
- QM (1)
- Quality Management (1)
- Quality assessment (1)
- Quality of Service (1)
- Quality of Service (QoS) (1)
- Quality perception (1)
- Qualitätsmanagement (1)
- Quellcode (1)
- REST <Informatik> (1)
- RESTful (1)
- RFID (1)
- Real-Time Rendering (1)
- Real-time Collaboration (1)
- Real-time simulation (1)
- Recommender System (1)
- Recommender systems (1)
- Reference Architecture (1)
- Referenzmodell (1)
- Reinforcement Learning (1)
- Remote work (1)
- Rendering (computer graphics) (1)
- Representational State Transfer (1)
- Richardson Maturity Model (1)
- Risiko (1)
- Risikomanagement (1)
- Risk Management (1)
- Robotics (1)
- Robotik (1)
- Rule learning (1)
- RuleCore (1)
- SEM (1)
- SIEM (1)
- SOA co-existence (1)
- SOAP (1)
- SPION (1)
- SUMO (Simulation of Urban MObility) (1)
- Scaling Law (1)
- Schadensersatzanspruch (1)
- Schwarmintelligenz (1)
- Scientific Visualization (1)
- Scrum <Vorgehensmodell> (1)
- Semantic Web Technologies (1)
- Semi-structured interviews (1)
- Sensor (1)
- Sensorsystem (1)
- Sentinel-Lymphknoten (1)
- Sequence alignment (1)
- Serverless Computing (1)
- Service Lifecycle (1)
- Service Management (1)
- Service Mesh (1)
- Service Monitoring (1)
- Service Orientation (1)
- Service Registry (1)
- Service Repository (1)
- Service Semantics (1)
- Shortest Path (1)
- Simulation Modeling (1)
- Situation Awareness (1)
- Skalierungsgesetz (1)
- Smart Buildings (1)
- Smart Grid (1)
- Smartphone (1)
- Social entrepreneurship (1)
- Software Architecture (1)
- Software Engineering (1)
- Software development (1)
- Softwarearchitektur (1)
- Softwareentwicklung (1)
- Softwarewerkzeug (1)
- Sonnenfinsternis (1)
- Source code properties (1)
- Spheres (1)
- Standortbezogener Dienst (1)
- Stochastic Modeling (1)
- Stochastischer Prozess (1)
- Strategie (1)
- Streaming <Kommunikationstechnik> (1)
- Strukturgleichungsmodell (1)
- Super Resolution (1)
- Supply Chain Management (1)
- Supply Chains (1)
- Sustainability (1)
- Sustainable Tourism (1)
- Sustainable development (1)
- Swarm Intelligence (1)
- Swarm algorithm (1)
- Synchronisierung (1)
- Synchronization (1)
- Systematic Risk (1)
- Systemic risk (1)
- Tactile map (1)
- Taxonomie (1)
- Taxonomy (1)
- Technology acceptance (1)
- Tertiary study (1)
- Test Bench (1)
- Theoretische Informatik (1)
- Tourism (1)
- Tourismusmarketing (1)
- Traffic Prediction (1)
- Traffic Simulation (1)
- Twitter <Softwareplattform> (1)
- Twitter analysis (1)
- Unternehmen (1)
- Usability Testing (1)
- User Generated Content (1)
- Verkehrsleitsystem (1)
- Verteiltes System (1)
- Videospiel (1)
- Viertagewoche (1)
- Virtual reality (1)
- Virtuelles Laboratorium (1)
- Visual Analytics (1)
- Visualization (1)
- WS-Security (1)
- Web service (1)
- Web services (1)
- Wind power plant (1)
- Windkraftwerk (1)
- Wissensgraph (1)
- Word Counting (1)
- Workflow (1)
- XML (1)
- Zentriertes Interview (1)
- ad-hoc networks (1)
- adaptive methods (1)
- aerospace engineering (1)
- agent-based simulation (1)
- agents (1)
- agile education (1)
- anaphylaxis (1)
- anxiety (1)
- architecture (1)
- asynchronous messaging (1)
- cardiovascular disease (1)
- cashing (1)
- class room (1)
- cloud computing (1)
- clustering on countries (1)
- collaborative coordination (1)
- complex event processing (CEP) (1)
- covid 19 (1)
- credit risk (1)
- data mapping (1)
- data protection (1)
- data stream learning (1)
- data stream processing (1)
- depression (1)
- digital intervention (1)
- digital twins (1)
- distance learning (1)
- distributed environments (1)
- distributed evacuation coordination (1)
- distributed systems (1)
- dyadic grid (1)
- e-learning (1)
- e-mobility (1)
- eduDScloud (1)
- educational virtual realities (1)
- eigenface (1)
- emergency medicine (1)
- enterprise apps (1)
- evacuation guidance (1)
- evaluation (1)
- event models (1)
- events (1)
- face recognition (1)
- financial planning (1)
- forecasting models on countries (1)
- game analysis (1)
- gender (1)
- generic interface (1)
- graduate (1)
- graphical user interface (1)
- head-mounted display (1)
- health care (1)
- higher education (1)
- immersive media (1)
- information system (1)
- integrated passenger and freight transport (1)
- key performance indicators (1)
- large language model (1)
- large scale systems (1)
- lidar (1)
- literature review (1)
- load balancing (1)
- lymphadenectomy (1)
- machine learning (1)
- machine-to-machine communication (1)
- magnetometer (1)
- management (1)
- market-based coordination (1)
- matrix calulations (1)
- mental health (1)
- metacognitive therapy (1)
- multi-dimensional data (1)
- multiagent systems (1)
- ontology (1)
- open source (1)
- patients (1)
- pmCHP (1)
- point clouds (1)
- position paper (1)
- presence experience (1)
- privacy (1)
- private cloud (1)
- problem based learning (1)
- professional life (1)
- prostate cancer (1)
- psychocardiology (1)
- real-time routing (1)
- recommender systems (1)
- reliable message delivery (1)
- rural transport simulation (1)
- scaling (1)
- security (1)
- semantic knowledge (1)
- semantic web application (1)
- semistructured interview (1)
- sentiment dictionaries (1)
- sentinel lymph node dissection (1)
- serverless architecture (1)
- serverless functions (1)
- service models (1)
- service-orientation (1)
- shopping cart system (1)
- simulation training (1)
- situation aware routing (1)
- situation-awareness (1)
- smart buildings (1)
- smart cities (1)
- smartphone (1)
- solid waste management (1)
- sparse grid (1)
- stereo vision (1)
- student project (1)
- superparamagnetic iron oxide nanoparticles (1)
- survey (1)
- sustainability (1)
- system integration (1)
- systematic literature review (1)
- taxonomy (1)
- teaching entrepreneurship (1)
- text mining (1)
- tool evaluation (1)
- training effectiveness (1)
- underprivileged adolescents (1)
- user experience (1)
- user generated content (1)
- user training (1)
- virtual distance teaching (1)
- virtual emergency scenario (1)
- virtual lab (1)
- virtual patient simulation (1)
- visual delegates (1)
- visual perception (1)
- web services (1)
- work satisfaction (1)
- work-life balance (1)
- working life (1)
- workload decomposition (1)
- Ökotourismus (1)
- Übung (1)
Institute
- Fakultät IV - Wirtschaft und Informatik (108) (remove)
In the last years generative models have gained large public attention due to their high level of quality in generated images. In short, generative models learn a distribution from a finite number of samples and are able then to generate infinite other samples. This can be applied to image data. In the past generative models have not been able to generate realistic images, but nowadays the results are almost indistinguishable from real images.
This work provides a comparative study of three generative models: Variational Autoencoder (VAE), Generative Adversarial Network (GAN) and Diffusion Models (DM). The goal is not to provide a definitive ranking indicating which one of them is the best, but to qualitatively and where possible quantitively decide which model is good with respect to a given criterion. Such criteria include realism, generalization and diversity, sampling, training difficulty, parameter efficiency, interpolating and inpainting capabilities, semantic editing as well as implementation difficulty. After a brief introduction of how each model works on the inside, they are compared against each other. The provided images help to see the differences among the models with respect to each criterion.
To give a short outlook on the results of the comparison of the three models, DMs generate most realistic images. They seem to generalize best and have a high variation among the generated images. However, they are based on an iterative process, which makes them the slowest of the three models in terms of sample generation time. On the other hand, GANs and VAEs generate their samples using one single forward-pass. The images generated by GANs are comparable to the DM and the images from VAEs are blurry, which makes them less desirable in comparison to GANs or DMs. However, both the VAE and the GAN, stand out from the DMs with respect to the interpolations and semantic editing, as they have a latent space, which makes space-walks possible and the changes are not as chaotic as in the case of DMs. Furthermore, concept-vectors can be found, which transform a given image along a given feature while leaving other features and structures mostly unchanged, which is difficult to archive with DMs.
In this paper, we consider the route coordination problem in emergency evacuation of large smart buildings. The building evacuation time is crucial in saving lives in emergency situations caused by imminent natural or man-made threats and disasters. Conventional approaches to evacuation route coordination are static and predefined. They rely on evacuation plans present only at a limited number of building locations and possibly a trained evacuation personnel to resolve unexpected contingencies. Smart buildings today are equipped with sensory infrastructure that can be used for an autonomous situation-aware evacuation guidance optimized in real time. A system providing such a guidance can help in avoiding additional evacuation casualties due to the flaws of the conventional evacuation approaches. Such a system should be robust and scalable to dynamically adapt to the number of evacuees and the size and safety conditions of a building. In this respect, we propose a distributed route recommender architecture for situation-aware evacuation guidance in smart buildings and describe its key modules in detail. We give an example of its functioning dynamics on a use case.
The transfer of historically grown monolithic software architectures into modern service-oriented architectures creates a lot of loose coupling points. This can lead to an unforeseen system behavior and can significantly impede those continuous modernization processes, since it is not clear where bottlenecks in a system arise. It is therefore necessary to monitor such modernization processes with an adaptive monitoring concept to be able to correctly record and interpret unpredictable system dynamics. This contribution presents a generic QoS measurement framework for service-based systems. The framework consists of an XML-based specification for the measurement to be performed – the Information Model (IM) – and the QoS System, which provides an execution platform for the IM. The framework will be applied to a standard business process of the German insurance industry, and the concepts of the IM and their mapping to artifacts of the QoS System will be presented. Furtherm ore, design and implementation of the QoS System’s parser and generator module and the generated artifacts are explained in detail, e.g., event model, agents, measurement module and analyzer module.
The transfer of historically grown monolithic software architectures into modern service-oriented architectures creates a lot of loose coupling points. This can lead to an unforeseen system behavior and can significantly impede those continuous modernization processes, since it is not clear where bottlenecks in a system arise. It is therefore necessary to monitor such modernization processes with an adaptive monitoring concept in order to be able to correctly record and interpret unpredictable system dynamics. For this purpose, a general measurement methodology and a specific implementation concept are presented in this work.
A Look at Service Meshes
(2021)
Service meshes can be seen as an infrastructure layer for microservice-based applications that are specifically suited for distributed application architectures. It is the goal to introduce the concept of service meshes and its use for microservices with the example of an open source service mesh called Istio. This paper gives an introduction into the service mesh concept and its relation to microservices. It also gives an overview of selected features provided by Istio as relevant to the above concept and provides a small sample setup that demonstrates the core features.
The Gravitational Search Algorithm is a swarm-based optimization metaheuristic that has been successfully applied to many problems. However, to date little analytical work has been done on this topic.
This paper performs a mathematical analysis of the formulae underlying the Gravitational Search Algorithm. From this analysis, it derives key properties of the algorithm's expected behavior and recommendations for parameter selection. It then confirms through empirical examination that these recommendations are sound.
Dramatic increases in the number of cyber security attacks and breaches toward businesses and organizations have been experienced in recent years. The negative impacts of these breaches not only cause the stealing and compromising of sensitive information, malfunctioning of network devices, disruption of everyday operations, financial damage to the attacked business or organization itself, but also may navigate to peer businesses/organizations in the same industry. Therefore, prevention and early detection of these attacks play a significant role in the continuity of operations in IT-dependent organizations. At the same time detection of various types of attacks has become extremely difficult as attacks get more sophisticated, distributed and enabled by Artificial Intelligence (AI). Detection and handling of these attacks require sophisticated intrusion detection systems which run on powerful hardware and are administered by highly experienced security staff. Yet, these resources are costly to employ, especially for small and medium-sized enterprises (SMEs). To address these issues, we developed an architecture -within the GLACIER project- that can be realized as an in-house operated Security Information Event Management (SIEM) system for SMEs. It is affordable for SMEs as it is solely based on free and open-source components and thus does not require any licensing fees. Moreover, it is a Self-Contained System (SCS) and does not require too much management effort. It requires short configuration and learning phases after which it can be self-contained as long as the monitored infrastructure is stable (apart from a reaction to the generated alerts which may be outsourced to a service provider in SMEs, if necessary). Another main benefit of this system is to supply data to advanced detection algorithms, such as multidimensional analysis algorithms, in addition to traditional SIEMspecific tasks like data collection, normalization, enrichment, and storage. It supports the application of novel methods to detect security-related anomalies. The most distinct feature of this system that differentiates it from similar solutions in the market is its user feedback capability. Detected anomalies are displayed in a Graphical User Interface (GUI) to the security staff who are allowed to give feedback for anomalies. Subsequently, this feedback is utilized to fine-tune the anomaly detection algorithm. In addition, this GUI also provides access to network actors for quick incident responses. The system in general is suitable for both Information Technology (IT) and Operational Technology (OT) environments, while the detection algorithm must be specifically trained for each of these environments individually.
The objective of this student project was for the students to develop, conduct, and supervise a training course for basic work place applications (word processing and business graphics). Students were responsible for the planning, organizing and the teaching of the course. As participants, underprivileged adolescents took part in order to learn the handling of IT applications and therefore, improve their job skills and have a better chance to get into employment. Therefore the adolescents do the role of trainees at the course. Our students worked with a population that is continually overlooked by the field.
As a result, the students trained to design and implement training courses, exercised to manage projects and increased their social responsibility and awareness concerning the way of life and living conditions of other young people. The underprivileged adolescents learned to use important business applications and increased their job skills and job chances. The overall design of our concept required extensive resources to supervise and to steer the students and the adolescents. The lecturers had to teach and to counsel the students and had to be on “stand-by” just in case they were needed to solve critical situations between the two groups of young people.
Intrusion detection systems and other network security components detect security-relevant events based on policies consisting of rules. If an event turns out as a false alarm, the corresponding policy has to be adjusted in order to reduce the number of false positives. Modified policies, however, need to be tested before going into productive use. We present a visual analysis tool for the evaluation of security events and related policies which integrates data from different sources using the IF-MAP specification and provides a “what-if” simulation for testing modified policies on past network dynamics. In this paper, we will describe the design and outcome of a user study that will help us to evaluate our visual analysis tool.
The digital transformation with its new technologies and customer expectation has a significant effect on the customer channels in the insurance industry. The objective of this study is the identification of enabling and hindering factors for the adoption of online claim notification services that are an important part of the customer experience in insurance. For this purpose, we conducted a quantitative cross-sectional survey based on the exemplary scenario of car insurance in Germany and analyzed the data via structural equation modeling (SEM). The findings show that, besides classical technology acceptance factors such as perceived usefulness and ease of use, digital mindset and status quo behavior play a role: acceptance of digital innovations, lacking endurance as well as lacking frustration tolerance with the status quo lead to a higher intention for use. Moreover, the results are strongly moderated by the severity of the damage event—an insurance-specific factor that is sparsely considered so far. The latter discovery implies that customers prefer a communication channel choice based on the individual circumstances of the claim.