Refine
Year of publication
Document Type
- Conference Proceeding (68)
- Working Paper (66)
- Article (54)
- Bachelor Thesis (46)
- Report (34)
- Master's Thesis (24)
- Book (19)
- Study Thesis (10)
- Course Material (9)
- Part of a Book (6)
Is part of the Bibliography
- no (349)
Keywords
- Digitalisierung (16)
- E-Learning (16)
- Korruption (12)
- Agilität <Management> (11)
- Führung (11)
- Grader (11)
- Herbarium (11)
- Programmierung (11)
- Autobewerter (10)
- Computerunterstütztes Lernen (10)
Institute
- Fakultät IV - Wirtschaft und Informatik (349) (remove)
Microservices are meanwhile an established software engineering vehicle, which more and more companies are examining and adopting for their development work. Naturally, reference architectures based on microservices come into mind as a valuable thing to utilize. Initial results for such architectures are published in generic and in domain-specific form. Missing to the best of our knowledge however, is a domain-specific reference architecture based on microservices, which takes into account specifics of the insurance industry domain. Jointly with partners from the German insurance industry, we take initial steps to fill this gap in the present article. Thus, we aim towards a microservices-based reference software architecture for (at least German) insurance companies. As the main results of this article we thus provide an initial such reference architecture together with a deeper look into two important parts of it.
Even for the more traditional insurance industry, the Microservices Architecture (MSA) style plays an increasingly important role in provisioning insurance services. However, insurance businesses must operate legacy applications, enterprise software, and service-based applications in parallel for a more extended transition period. The ultimate goal of our ongoing research is to design a microservice reference architecture in cooperation with our industry partners from the insurance domain that provides an approach for the integration of applications from different architecture paradigms. In Germany, individual insurance services are classified as part of the critical infrastructure. Therefore, German insurance companies must comply with the Federal Office for Information Security requirements, which the Federal Supervisory Authority enforces. Additionally, insurance companies must comply with relevant laws, regulations, and standards as part of the business’s compliance requirements. Note: Since Germany is seen as relatively ’tough’ with respect to privacy and security demands, fullfilling those demands might well be suitable (if not even ’over-achieving’) for insurances in other countries as well. The question raises thus, of how insurance services can be secured in an application landscape shaped by the MSA style to comply with the architectural and security requirements depicted above. This article highlights the specific regulations, laws, and standards the insurance industry must comply with. We present initial architectural patterns to address authentication and authorization in an MSA tailored to the requirements of our insurance industry partners.
To avoid the shortcomings of traditional monolithic applications, the Microservices Architecture (MSA) style plays an increasingly important role in providing business services. This is true even for the more conventional insurance industry with its highly heterogeneous application landscape and sophisticated cross-domain business processes. Therefore, the question arises of how workflows can be implemented to grant the required flexibility and agility and, on the other hand, to exploit the potential of the MSA style. In this article, we present two different approaches – orchestration and choreography. Using an application scenario from the insurance domain, both concepts are discussed. We introduce a pattern that outlines the mapping of a workflow to a choreography.
The transfer of historically grown monolithic software architectures into modern service-oriented architectures creates a lot of loose coupling points. This can lead to an unforeseen system behavior and can significantly impede those continuous modernization processes, since it is not clear where bottlenecks in a system arise. It is therefore necessary to monitor such modernization processes with an adaptive monitoring concept in order to be able to correctly record and interpret unpredictable system dynamics. For this purpose, a general measurement methodology and a specific implementation concept are presented in this work.
Microservices is an architectural style for complex application systems, promising some crucial benefits, e.g. better maintainability, flexible scalability, and fault tolerance. For this reason microservices has attracted attention in the software development departments of different industry sectors, such as ecommerce and streaming services. On the other hand, businesses have to face great challenges, which hamper the adoption of the architectural style. For instance, data are often persisted redundantly to provide fault tolerance. But the synchronization of those data for the sake of consistency is a major challenge. Our paper presents a case study from the insurance industry which focusses consistency issues when migrating a monolithic core application towards microservices. Based on the Domain Driven Design (DDD) methodology, we derive bounded contexts and a set of microservices assigned to these contexts. We discuss four different approaches to ensure consistency and propose a best practice to identify the most appropriate approach for a given scenario. Design and implementation details and compliance issues are presented as well.
In microservice architectures, data is often hold redundantly to create an overall resilient system. Although the synchronization of this data proposes a significant challenge, not much research has been done on this topic yet. This paper shows four general approaches for assuring consistency among services and demonstrates how to identify the best solution for a given architecture. For this, a microservice architecture, which implements the functionality of a mainframe-based legacy system from the insurance industry, serves as an example.
Cloud Computing: Serverless
(2021)
A serverless architecture is a new approach to offering services over the Internet. It combines BaaS (Backend-as-a-service) and FaaS (Function-as-a-service). With the serverless architecture no own or rented infrastructures are needed anymore. In addition, the company does not have to worry about scaling any longer, as this happens automatically and immediately. Furthermore, there is no need any longer for maintenance work on the servers, as this is completely taken over by the provider. Administrators are also no longer needed for the same reason. Finally, many ready-made functions are offered, with which the development effort can be reduced. As a result, the serverless architecture is very well suited to many application scenarios, and it can save considerable costs (server costs, maintenance costs, personnel costs, electricity costs, etc.). The company only must subdivide the source code of the application and upload it to the provider’s server. The rest is done by the provider.
In this paper we describe the selection of a modern build automation tool for an industry research partner of ours, namely an insurance company. Build automation has become increasingly important over the years. Today, build automation became one of the central concepts in topics such as cloud native development based on microservices and DevOps. Since more and more products for build automation have entered the market and existing tools have changed their functional scope, there is nowadays a large number of tools on the market that differ greatly in their functional scope. Based on requirements from our partner company, a build server analysis was conducted. This paper presents our analysis requirements, a detailed look at one of the examined tools and a summarizes our comparison of all three tools from our final comparison round.
Die vorliegende Arbeit befasst sich mit dem Ansatz und der Bewertung originärer immaterieller Vermögensgegenstände des Anlagevermögens im handelsrechtlichen Jahresabschluss. Es handelt sich hierbei um die Untersuchung der Frage, ob die Verpflichtung zur Aktivierung oben genannter Vermögensgegenstände die Aussagekraft eines Jahresabschlusses nach HGB erhöht. Während die internationalen Rechnungslegungsstandards (IFRS) den Ansatz immaterieller Vermögensgegenstände – unabhängig davon, ob sie entgeltlich erworben oder selbst erstellt wurden – schon lange vorsehen, hat sich der Gesetzgeber in Deutschland im Rahmen des Bilanzrechtsmodernisierungsgesetzes nun auch dazu entschlossen, das HGB-Bilanzrecht u. a. in diesem Punkt den IFRS anzupassen und das bisher in § 248 Abs. 2 HGB kodifizierte Aktivierungsverbot aufzuheben. Der vom Bundesministerium der Justiz am 21. Mai 2008 veröffentlichte Gesetzentwurf dient als Grundlage der Untersuchung. Die einzelnen geplanten Änderungen wurden ausführlich betrachtet und werden je nach Bedeutung für den Ansatz und die Bewertung – mehr oder weniger stark – diskutiert. Wie sich im Verlauf dieser Arbeit zeigen wird, ist davon auszugehen, dass die zukünftig für originäre immaterielle Vermögensgegenstände geltende Aktivierungspflicht auf Grund der zu erbringenden Nachweise – ebenso wie nach IFRS – als faktisches Wahlrecht betrachtet werden kann. Somit hätte die Aufhebung des § 248 Abs. 2 HGB nur geringe Auswirkungen auf die Bilanzierung von Unternehmen. Wenn allerdings die Möglichkeit der Aktivierung in Anspruch genommen wird und relevante Angaben im Anhang gemacht werden, ist eine Erhöhung des Informationsgehaltes eines Jahresabschlusses zweifellos gegeben.
Das Forschungspapier entwirft ein Soll-Prozessmuster für die Verwaltung von Herbarbelegen im Botanischen Garten/ Botanischen Museum in Berlin-Dahlem im Rahmen des Forschungsvorhabens "Herbar Digital". Ausgangspunkt für die Erstellung des Soll- Modells sind die bereits dokumentierten Geschäftsprozesse. Die bestehenden Prozesse werden an die Ausbaustufe 1 von Herbar Digital angepasst, um die Kosten für die Digitalisierung eines Herbarbeleges zu senken. Als Grundlage für die Optimierung der Geschäftsprozesse dient die Kanban- Methode zur Ablaufsteuerung. Die Untersuchung des Wertschöpfungskettendiagramms zeigt, dass eingehende Pflanzen nach Montage im General Herbar eingelagert werden. Bei Bedarf werden die Belege zur Digitalisierung hervorgeholt, um danach wieder eingelagert oder verliehen zu werden. Werden neue Herbarbelege ohne vorherige Einlagerung digitalisiert, lassen sich Einfrier-, Ein- und Auslagerungstätigkeiten sowie Wegezeiten einsparen. Aus diesem Optimierungspotential resultiert die Soll- Modellierung der Hauptprozesse "Eingang bearbeiten" und "Herbarbeleg digitalisieren" sowie deren unterstützende Prozesse. Anschließend wird das Optimierungspotential quantifiziert. Es zeigt sich, dass 1,2 Arbeitsstellen eingespart werden können.
Das vorliegende Forschungspapier dokumentiert die Geschäftsprozesse des Botanischen Gartens/ Botanischen Museums in Berlin-Dahlem, die im Zusam-menhang mit der Digitalisierung von Herbarbelegen stehen. Eine beteiligte Organisationseinheit im Botanischen Garten/ Botanischen Mu-seum ist die Abteilung I C Herbar, das für die Verwaltung und Lagerung der Herbarbelege zuständig ist. Die Abteilung III B Biodiversitätsinformatik bearbei-tet die digitalisierten Herbarbelege weiter. Die zahlreich identifizierten Geschäftsprozesse werden zunächst in einem Wertschöpfungskettendiagramm als Einstiegs- und Überblicksmodell verdichtet. Anschließend werden die Geschäftsprozesse im Einzelnen beschrieben und mit ARIS, d. h. zusätzlich durch Software- Unterstützung, modelliert, um eine späte-re Optimierung hinsichtlich Abläufe und Kosten zu ermöglichen.
Das Konzept der Agilität stiftet insbesondere im Kontext der Softwareentwicklung einen Nutzen. Es stellt sich die Frage, wie auch die öffentliche Verwaltung agiler werden und schlussendlich davon profitieren kann. Bislang liefern nur wenige Schriften eine dedizierte Auseinandersetzung mit dem Thema der agilen Verwaltung. In dieser Arbeit wird untersucht, ob agile Softwareentwicklung Ausgangspunkt einer potenziell agilen Verwaltung in Deutschland sein kann. Im Rahmen einer theorievergleichenden Gegenüberstellung wird ein Zielbild einer agilen Verwaltung ausgehend von den Merkmalen agiler Softwareentwicklung hergeleitet. Anschließend werden mögliche Spannungslinien zwischen dem entwickelten Zielbild und dem von Max Weber beschriebenen Idealtypus einer bürokratischen Verwaltung aufgedeckt. Im Ergebnis kennzeichnet eine agile Verwaltung ein Konglomerat unterschiedlicher Merkmale, die den Dimensionen Strategie, Struktur, Prozesse, Führung, Personal und Kultur zugeordnet werden können. Die öffentliche Verwaltung wird das Konzept der Agilität nicht vollständig, im Sinne der Ausprägung aller herausgearbeiteten Merkmale, organisational etablieren können. Die wesentlichen Spannungslinien ergeben sich aus den Bürokratiemerkmalen Amtshierarchie und Regelgebundenheit. Der Idealtypus einer agilen Verwaltung kann nur insofern eine Alternative zum Idealtypus der bürokratischen Verwaltung sein, als dass diejenigen Merkmale der Bürokratie, die sich mit den wesentlichen Strukturprinzipien des deutschen Staates decken, unberührt bleiben.
Nachhaltiges Anforderungsmanagement mit externen IT-Dienstleistern in der öffentlichen Verwaltung
(2023)
Kontext: Der Einfluss der Organisationskultur und -struktur auf das Outsourcing von IT-Prozessen in der öffentlichen Verwaltung wird untersucht.
Zielsetzung: Es wird die Wirkung der kulturellen und strukturellen Besonderheiten der öffentlichen Verwaltung auf die Zusammenarbeit mit externen IT-Dienstleistern erforscht. Ziel ist die Entwicklung eines nachhaltigen, zukunftswirksamen Konzepts des Anforderungsmanagements.
Methode: Expert*inneninterviews mit einer anschließenden qualitativen Inhaltsanalyse nach der Methodik von Gläser und Laudel werden durchgeführt.
Ergebnisse: Die Struktur der öffentlichen Verwaltung ist stark fragmentiert; die Kultur geprägt von Risikoaversion und bürokratischem Handeln.
Konklusion: Eine Kombination aus Kommunikations-, Wissens- und Beziehungsmanagement ermöglicht ein nachhaltiges Anforderungsmanagement.
We present an approach towards a data acquisition system for digital twins that uses a 5G net- work for data transmission and localization. The current hardware setup, which utilizes stereo vision and LiDAR for 3D mapping, is explained together with two recorded point cloud data sets. Furthermore, a resulting digital twin comprised of voxelized point cloud data is shown. Ideas for future applications and challenges regarding the system are discussed and an outlook on further development is given.
Metriken und Leistungskennzahlen zur Steuerung eines Startups mit einem Abonnement-Geschäftsmodell
(2017)
Diese Ausarbeitung schlüsselt wesentliche Metriken und Kennzahlen für Startups mit Abonnement-Geschäftsmodellen auf. Der Schwerpunkt liegt auf der Erklärung von Kennzahlen, welche innerhalb von neu gegründeten Startups mit einem Abonnement-Geschäftsmodell Anwendung finden sollten. Nach Einführung in die terminologischen Grundlagen, also nachdem die Begriffe Startup, Abonnement-Geschäftsmodelle und die Grundlagen von Kennzahlen erklärt wurden, werden zahlreiche Kennzahlen wie beispielsweise Average Revenue per User, Customer Churn Rate oder Customer Lifetime Value im Detail erklärt und anhand von Beispielrechnungen nahegebracht.
The digital transformation with its new technologies and customer expectation has a significant effect on the customer channels in the insurance industry. The objective of this study is the identification of enabling and hindering factors for the adoption of online claim notification services that are an important part of the customer experience in insurance. For this purpose, we conducted a quantitative cross-sectional survey based on the exemplary scenario of car insurance in Germany and analyzed the data via structural equation modeling (SEM). The findings show that, besides classical technology acceptance factors such as perceived usefulness and ease of use, digital mindset and status quo behavior play a role: acceptance of digital innovations, lacking endurance as well as lacking frustration tolerance with the status quo lead to a higher intention for use. Moreover, the results are strongly moderated by the severity of the damage event—an insurance-specific factor that is sparsely considered so far. The latter discovery implies that customers prefer a communication channel choice based on the individual circumstances of the claim.
In this paper we describe the selection of a modern build automation tool for an industry research partner of ours, namely an insurance company. Build automation has become increasingly important over the years. Today, build automation became one of the central concepts in topics such as cloud native development based on microservices and DevOps. Since more and more products for build automation have entered the market and existing tools have changed their functional scope, there is nowadays a large number of tools on the market that differ greatly in their functional scope. Based on requirements from our partner company, a build server analysis was conducted. This paper presents our analysis requirements, a detailed look at one of the examined tools and a summarized comparison of two tools.
Background:
Many patients with cardiovascular disease also show a high comorbidity of mental disorders, especially such as anxiety and depression. This is, in turn, associated with a decrease in the quality of life. Psychocardiological treatment options are currently limited. Hence, there is a need for novel and accessible psychological help. Recently, we demonstrated that a brief face-to-face metacognitive therapy (MCT) based intervention is promising in treating anxiety and depression. Here, we aim to translate the face-to-face approach into digital application and explore the feasibility of this approach.
Methods:
We translated a validated brief psychocardiological intervention into a novel non-blended web app. The data of 18 patients suffering from various cardiac conditions but without diagnosed mental illness were analyzed after using the web app over a two-week period in a feasibility trial. The aim was whether a nonblended web app based MCT approach is feasible in the group of cardiovascular patients with cardiovascular disease.
Results:
Overall, patients were able to use the web app and rated it as satisfactory and beneficial. In addition, there was first indication that using the app improved the cardiac patients’ subjectively perceived health and reduced their anxiety. Therefore, the approach seems feasible for a future randomized controlled trial.
Conclusion:
Applying a metacognitive-based brief intervention via a nonblended web app seems to show good acceptance and feasibility in a small target group of patients with CVD. Future studies should further develop, improve and validate digital psychotherapy approaches, especially in patient groups with a lack of access to standard psychotherapeutic care.
Dramatic increases in the number of cyber security attacks and breaches toward businesses and organizations have been experienced in recent years. The negative impacts of these breaches not only cause the stealing and compromising of sensitive information, malfunctioning of network devices, disruption of everyday operations, financial damage to the attacked business or organization itself, but also may navigate to peer businesses/organizations in the same industry. Therefore, prevention and early detection of these attacks play a significant role in the continuity of operations in IT-dependent organizations. At the same time detection of various types of attacks has become extremely difficult as attacks get more sophisticated, distributed and enabled by Artificial Intelligence (AI). Detection and handling of these attacks require sophisticated intrusion detection systems which run on powerful hardware and are administered by highly experienced security staff. Yet, these resources are costly to employ, especially for small and medium-sized enterprises (SMEs). To address these issues, we developed an architecture -within the GLACIER project- that can be realized as an in-house operated Security Information Event Management (SIEM) system for SMEs. It is affordable for SMEs as it is solely based on free and open-source components and thus does not require any licensing fees. Moreover, it is a Self-Contained System (SCS) and does not require too much management effort. It requires short configuration and learning phases after which it can be self-contained as long as the monitored infrastructure is stable (apart from a reaction to the generated alerts which may be outsourced to a service provider in SMEs, if necessary). Another main benefit of this system is to supply data to advanced detection algorithms, such as multidimensional analysis algorithms, in addition to traditional SIEMspecific tasks like data collection, normalization, enrichment, and storage. It supports the application of novel methods to detect security-related anomalies. The most distinct feature of this system that differentiates it from similar solutions in the market is its user feedback capability. Detected anomalies are displayed in a Graphical User Interface (GUI) to the security staff who are allowed to give feedback for anomalies. Subsequently, this feedback is utilized to fine-tune the anomaly detection algorithm. In addition, this GUI also provides access to network actors for quick incident responses. The system in general is suitable for both Information Technology (IT) and Operational Technology (OT) environments, while the detection algorithm must be specifically trained for each of these environments individually.
Data Mining Verfahren
(2008)
Der vorliegende Forschungsbericht dokumentiert Ergebnisse, die in der Abteilung Informatik der Fakultät Wirtschaft und Informatik der Fachhochschule Hannover im Sommersemesters 2007 im Rahmen eines von der Forschungskommission genehmigten Forschungssemesters vom Autor erarbeitet wurden. Der Bericht stellt die wichtigsten Verfahren aus dem Gebiet des Data Minings vor, diskutiert auf der Basis von selbst programmierten Beispielen die Eignung der verschiedenen Verfahren für die entsprechenden Anwendungsgebiete und vergleicht die speziellen Eigenschaften der entsprechenden Algorithmen.
Die computergestützte Erkennung von Personen basiert auf der quantitativen Feststellung einer möglichst weitgehenden Übereinstimmung zwischen einer gespeicherten Graphik und dem momentan erfassten Kamerabild. Der vorliegende Forschungsbericht beschreibt ein solches Erkennungssystem, das auf der optimalen Kombination unterschiedlicher, sich gegenseitig ergänzender Erkennungsverfahren beruht. Im Zentrum des Erkennungssystems arbeitet als wesentliche Komponente ein neuronales Netz.
Für das digitale Flugführungssystem des Versuchsflugzeugs HFB 320 wurde am Institut für Flugführung der DFVLR in Braunschweig eine Betriebsart zum automatischen zeitgenauen Fliegen im Flughafen-Nahbereich entwickelt und im Flugversuch erprobt. Der Bericht enthält die Beschreibung der eingesetzten Algorithmen zur Berechnung 4-dimensionaler Flugbahnen unter Berücksichtigung der momentanen Windsituation. Es werden verschiedene Verfahren zur Messung, Filterung und Vorhersage des Windvektors entwickelt und an Hand von Flugversuchsergebnissen diskutiert.
Report of a research project of the Fachhochschule Hannover, University of Applied Sciences and Arts, Department of Information Technologies. Automatic face recognition increases the security standards at public places and border checkpoints. The picture inside the identification documents could widely differ from the face, that is scanned under random lighting conditions and for unknown poses. The paper describes an optimal combination of three key algorithms of object recognition, that are able to perform in real time. The camera scan is processed by a recurrent neural network, by a Eigenfaces (PCA) method and by a least squares matching algorithm. Several examples demonstrate the achieved robustness and high recognition rate.
Autonomous mobile six-legged robots are able to demonstrate the potential of intelligent control systems based on recurrent neural networks. The robots evaluate only two forward and two backward looking infrared sensor signals. Fast converging genetic training algorithms are applied to train the robots to move straight in six directions. The robots performed successfully within an obstacle environment and there could be observed a never trained useful interaction between each of the single robots. The paper describes the robot systems and presents the test results. Video clips are downloadable under www.inform.fh-hannover.de/download/lechner.php. Held on IFAC International Conference on Intelligent Control Systems and Signal Processing (ICONS 2003, April 2003, Portugal).
Zeitarbeit ist eine Boombranche. Zeitarbeit ist prekäre Beschäftigung. Mit Zeitarbeit wird Missbrauch getrieben. Zeitarbeit ist wichtig. Jeder, der die öffentliche Diskussion verfolgt, hat einen dieser Sätze schon einmal gehört. Wir reden über Zeitarbeit, wie über die Frage, ob Entlohnung gut oder schlecht ist. Vergessen wird dabei oft, dass Zeitarbeit nicht gleich Zeitarbeit ist, sondern sich Motive und Einsatz der Zeitarbeit von Unternehmen zu Unternehmen deutlich unterscheiden können. So kann ein Personaldienstleister Hausfrauen an eine Versicherung vermitteln, um dort für die Reinigung und Sauberkeit der Büros zu sorgen. Ebenso kann ein Ingenieurbüro eigene Mitarbeiter an eine Kraftwerksfirma verleihen, um hochspezielle Projektaufgaben an einem Solarkraftwerk zu verrichten.
Und genau darum geht es, wenn wir die Zukunft der Zeitarbeit gestalten wollen: herauszufinden, unter welchen Bedingungen und für welche Zwecke Zeitarbeit in Unternehmen eingesetzt wird und was ihre Nutzung fördert bzw. behindert. Um darauf eine Antwort zu haben, muss man zunächst die Verschiedenartigkeit der Zeitarbeit anerkennen. Im Anschluss daran muss man herausfinden, welchen Typ Zeitarbeit man in einem bestimmten Unternehmen vor sich hat, wovon dieser beeinflusst wird und was man anders oder besser machen kann. Es geht in diesem Beitrag also zuallererst darum, Motive der Zeitarbeitsnutzung herauszuarbeiten und zu untersuchen, wie sie zu verschiedenen Formen des Zeitarbeitseinsatzes in Unternehmen führen.
Konzeption und Realisierung einer Anwendung zur Erstellung und Verwaltung von Server-Konfigurationen
(2021)
Die vorliegende Bachelorarbeit behandelt die Konzeption und Realisierung einer Anwendung zur Erstellung und Verwaltung von Server-Konfigurationen der Firma Hacon. Hierzu werden im Rahmen einer Anforderungsanalyse der Ist- und Soll-Zustand ermittelt sowie generelle Design-Prinzipien und Usability-Ziele aufgestellt. Nach der Auswahl der Architektur werden wesentliche Funktionalitäten der Anwendung umgesetzt und zuletzt die aufgestellten Anforderungen und Ziele mithilfe eines Usability-Tests evaluiert.
Background: Virtual reality (VR) is increasingly used as simulation technology in emergency medicine education and training, in particular for training nontechnical skills. Experimental studies comparing teaching and learning in VR with traditional training media often demonstrate the equivalence or even superiority regarding particular variables of learning or training effectiveness.
Objective: In the EPICSAVE (Enhanced Paramedic Vocational Training with Serious Games and Virtual Environments) project, a highly immersive room-scaled multi-user 3-dimensional VR simulation environment was developed. In this feasibility study, we wanted to gain initial insights into the training effectiveness and media use factors influencing learning and training in VR.
Methods: The virtual emergency scenario was anaphylaxis grade III with shock, swelling of the upper and lower respiratory tract, as well as skin symptoms in a 5-year-old girl (virtual patient) visiting an indoor family amusement park with her grandfather (virtual agent). A cross-sectional, one-group pretest and posttest design was used to evaluate the training effectiveness and quality of the training execution. The sample included 18 active emergency physicians.
Results: The 18 participants rated the VR simulation training positive in terms of training effectiveness and quality of the training execution. A strong, significant correlation (r=.53, P=.01) between experiencing presence and assessing training effectiveness was observed. Perceived limitations in usability and a relatively high extraneous cognitive load reduced this positive effect.
Conclusions: The training within the virtual simulation environment was rated as an effective educational approach. Specific media use factors appear to modulate training effectiveness (ie, improvement through “experience of presence” or reduction through perceived limitations in usability). These factors should be specific targets in the further development of this VR simulation training.
In diesem Beitrag wird diskutiert, wie Korruption oder korruptionsnahes Verhalten in der Sozialen Arbeit wahrgenommen und bewertet wird. Dabei liegt der Fokus auf dem Unterschied zwischen Studiengängen der Sozialen Arbeit sowie Wirtschafts- und Verwaltungsstudiengängen. Geprüft wird, ob korruptionsnahe Handlungen von Studierenden der Sozialen Arbeit anders wahrgenommen werden als von Studierenden anderer Studiengänge. Diese Frage rekurriert auf den hohen ethischen Anspruch der Profession. Dahinter steckt die implizite Annahme, dass Studierende der Sozialen Arbeit durch ihre Profession und die damit zusammenhängende Grundhaltung „etwas Gutes tun zu wollen“ vor Korruption möglicherweise geschützt sind. Basierend auf den Ergebnissen der Forschungsprojekte Subjektive Sicherheit – Einflussfaktoren auf Korruptionsschwellen (Litzcke et al. 2010) und Korruption und unethisches Handeln in Berufsfeldern der Sozialen Arbeit (Linssen/Kammigan, 2014) wurden diese Fragen empirisch überprüft und ausgewertet. Die Ergebnisse lassen Rückschlüsse auf besondere Risiken zu, denen Fachkräfte der Sozialen Arbeit gegenüberstehen. Des Weiteren ergeben sich Rückschlüsse hinsichtlich möglicher Präventionsstrategien zur Bekämpfung von Korruption im Arbeitsfeld Soziale Arbeit.
Das Berufsbild von Sozialarbeitern beinhaltet viele Anforderungen, zentral sind dabei Sprach- und Lesekompetenzen. Der vorliegende Beitrag stellt die Ergebnisse einer explorativen Studie zu Sprachkompetenzen (i.S. von Wortschatz) und Lesekompetenzen (i.S. von Lesegeschwindigkeit und Leseverständnis) von Studierenden der Sozialen Arbeit dar und zeigt auf, das hier Verbesserungsbedarf besteht, wenn Studierende optimal auf Ihren späteren Beruf vorbereitet werden sollen. Auch wird ein Vergleich zu anderen Studiengängen gezogen, wo sich ähnliche Bedarfslagen zeigen.
Am Ende des Beitrags findet sich ein Kommentar zur (Nicht-)Veröffentlichung der Studienergebnisse.
In this paper, we consider the route coordination problem in emergency evacuation of large smart buildings. The building evacuation time is crucial in saving lives in emergency situations caused by imminent natural or man-made threats and disasters. Conventional approaches to evacuation route coordination are static and predefined. They rely on evacuation plans present only at a limited number of building locations and possibly a trained evacuation personnel to resolve unexpected contingencies. Smart buildings today are equipped with sensory infrastructure that can be used for an autonomous situation-aware evacuation guidance optimized in real time. A system providing such a guidance can help in avoiding additional evacuation casualties due to the flaws of the conventional evacuation approaches. Such a system should be robust and scalable to dynamically adapt to the number of evacuees and the size and safety conditions of a building. In this respect, we propose a distributed route recommender architecture for situation-aware evacuation guidance in smart buildings and describe its key modules in detail. We give an example of its functioning dynamics on a use case.
Für die Studiengang-Auswahl existiert eine Reihe i. d. R. Fragebogen-gestützter Online-Studiengangfinder. Eine Analyse zeigte Optimierungspotenziale: Studienangebote sind meist auf ein Bundesland oder eine Hochschule beschränkt oder, allgemein beschrieben, die individuelle Studiengang-Auswahl ist nur mit Unschärfen möglich. Letzteres wirkt sich z. B. bei Bindestrich-Studiengängen (z. B. Wirtschaftsingenieurwesen) aus, die je nach Hochschule inhaltlich variieren können. Hier setzt das Portal an. Ziele sind: Bereitstellung der in der Sprachwelt Studieninteressierter gehaltenen Fragebögen, Möglichkeit für Hochschulen/Einrichtungen, Studiengänge bereitzustellen.
Im Rahmen der Globalisierung und des daraus resultierenden Wettbewerbs ist es für ein Unternehmen von zentraler Bedeutung, Wissen über die Wettbewerbssituation zu erhalten. Nicht nur zur Erschließung neuer Märkte, sondern auch zur Sicherung der Unternehmensexistenz ist eine Wettbewerbsanalyse unabdingbar. Konkurrenz- bzw. Wettbewerbsforschung wird überwiegend als „Competitive Intelligence“ bezeichnet. In diesem Sinne beschäftigt sich die vorliegende Bachelorarbeit mit einem Bereich von Competitive Intelligence. Nach der theoretischen Einführung in das Thema werden die Ergebnisse von neun Experteninterviews sowie einer schriftlichen Expertenbefragung innerhalb des Unternehmens erläutert. Die Experteninterviews und -befragungen zum Thema Competitive Intelligence dienten zur Entwicklung eines neuen Wettbewerbsanalysekonzeptes. Die Experteninterviews zeigten, dass in dem Unternehmen kein einheitliches Wettbewerbsanalysesystem existiert und Analysen lediglich ab hoc getätigt werden. Zusätzlich wird ein Länderranking vorgestellt, das zur Analyse europäischer Länder für das Unternehmen entwickelt wurde. Die Ergebnisse zeigten, dass Dänemark und Italien für eine Ausweitung der Exportgeschäfte bedeutend sind. Der neu entwickelte Mitbewerberbewertungsbogen wurde auf Grundlage dieser Ergebnisse für Dänemark und Italien getestet.
Since textual user generated content from social media platforms contains valuable information for decision support and especially corporate credit risk analysis, automated approaches for text classification such as the application of sentiment dictionaries and machine learning algorithms have received great attention in recent user generated content based research endeavors. While machine learning algorithms require individual training data sets for varying sources, sentiment dictionaries can be applied to texts immediately, whereby domain specific dictionaries attain better results than domain independent word lists. We evaluate by means of a literature review how sentiment dictionaries can be constructed for specific domains and languages. Then, we construct nine versions of German sentiment dictionaries relying on a process model which we developed based on the literature review. We apply the dictionaries to a manually classified German language data set from Twitter in which hints for financial (in)stability of companies have been proven. Based on their classification accuracy, we rank the dictionaries and verify their ranking by utilizing Mc Nemar’s test for significance. Our results indicate, that the significantly best dictionary is based on the German language dictionary SentiWortschatz and an extension approach by use of the lexical-semantic database GermaNet. It achieves a classification accuracy of 59,19 % in the underlying three-case-scenario, in which the Tweets are labelled as negative, neutral or positive. A random classification would attain an accuracy of 33,3 % in the same scenario and hence, automated coding by use of the sentiment dictionaries can lead to a reduction of manual efforts. Our process model can be adopted by other researchers when constructing sentiment dictionaries for various domains and languages. Furthermore, our established dictionaries can be used by practitioners especially in the domain of corporate credit risk analysis for automated text classification which has been conducted manually to a great extent up to today.
During the Corona-Pandemic, information (e.g. from the analysis of balance sheets and payment behavior) traditionally used for corporate credit risk analysis became less valuable because it represents only past circumstances. Therefore, the use of currently published data from social media platforms, which have shown to contain valuable information regarding the financial stability of companies, should be evaluated. In this data e. g. additional information from disappointed employees or customers can be present. In order to analyze in how far this data can improve the information base for corporate credit risk assessment, Twitter data regarding the ten greatest insolvencies of German companies in 2020 and solvent counterparts is analyzed in this paper. The results from t-tests show, that sentiment before the insolvencies is significantly worse than in the comparison group which is in alignment with previously conducted research endeavors. Furthermore, companies can be classified as prospectively solvent or insolvent with up to 70% accuracy by applying the k-nearest-neighbor algorithm to monthly aggregated sentiment scores. No significant differences in the number of Tweets for both groups can be proven, which is in contrast to findings from studies which were conducted before the Corona-Pandemic. The results can be utilized by practitioners and scientists in order to improve decision support systems in the domain of corporate credit risk analysis. From a scientific point of view, the results show, that the information asymmetry between lenders and borrowers in credit relationships, which are principals and agents according to the principal-agent-theory, can be reduced based on user generated content from social media platforms. In future studies, it should be evaluated in how far the data can be integrated in established processes for credit decision making. Furthermore, additional social media platforms as well as samples of companies should be analyzed. Lastly, the authenticity of user generated contend should be taken into account in order to ensure, that credit decisions rely on truthful information only.
Der vorliegende Artikel beschreibt die Ergebnisse einer Studie zur Sicherheit von Web-Servern niedersächsischer Unternehmen aus dem Raum Hannover. Untersucht wurden vier Unternehmensgruppen, die sich aus Mitgliedern von Unternehmensverbänden und berufsständischen Körperschaften zusammensetzen. Insgesamt werden mehr als 1800 Unternehmen betrachtet. Als Indikator für die IT-Sicherheit wurden vier Sicherheitslücken herangezogen, die leicht überprüft werden können, ohne die Web-Server in ihrem Betrieb zu beeinträchtigen.
Die Ergebnisse sind ernüchternd: Viele Unternehmen setzen keine Verschlüsselung ein oder die Web-Server-Software ist nicht auf dem neusten Stand. Bei ungefähr jedem dritten Unternehmen, welches Verschlüsselung einsetzt, enthält die Software seit mehr als einem Jahr bekannte Schwachstellen und sollte umgehend aktualisiert werden. Dies zeigt, dass das IT-Sicherheitsmanagement in vielen Unternehmen mangelhaft ist.
Die neuen Medien haben in der Sozialwirtschaft Einzug gehalten: Immer mehr Menschen informieren sich online über Träger, Einrichtungen und Dienste. Moderne Instrumente der Marktkommunikation sind eine wichtige Säule im Kontakt mit Kunden, Mitarbeitenden, Medien, aber auch Ehrenamtlichen und Förderern.
Für die Übermittlung personenbezogener Daten ist eine verschlüsselte Übertragung unverzichtbar und seit Jahren etabliert. Durch die erhöhte Datenschutz-Sensibilität gewinnt der vertrauliche Zugriff über https auf die Websites von Sozialunternehmen an Bedeutung. Sobald über Kontaktformulare oder etwa Bewerberportale der Austausch personenbezogener Daten angeboten wird, ist mit Einführung des IT-Sicherheitsgesetzes im Juli 2015 eine SSL-Verschlüsselung zur Pflicht geworden.
Die nachfolgende Studie beleuchtet den aktuellen Umsetzungsgrad zur Sicherheit von Web-Server in der Sozialwirtschaft. Es wird dargestellt, in welchem Umfang heute https-basierte Zugriffe auf die Internetseiten von Sozialunternehmen möglich sind. Darüber hinaus werden mögliche Probleme in der technischen Implementierung überprüft und ausgewertet.
Research into new forms of care for complex chronic diseases requires substantial efforts in the collection, storage, and analysis of medical data. Additionally, providing practical support for those who coordinate the actual care management process within a diversified network of regional service providers is also necessary. For instance, for stroke units, rehabilitation partners, ambulatory actors, as well as health insurance funds. In this paper, we propose the concept of comprehensive and practical receiver-oriented encryption (ROE) as a guiding principle for such data-intensive, research-oriented case management systems, and
illustrate our concept with the example of the IT infrastructure of the project STROKE OWL.
Visual effects and elements in video games and interactive virtual environments can be applied to transfer (or delegate) non-visual perceptions (e.g. proprioception, presence, pain) to players and users, thus increasing perceptual diversity via the visual modality. Such elements or efects are referred to as visual delegates (VDs). Current fndings on the experiences that VDs can elicit relate to specifc VDs, not to VDs in general. Deductive and comprehensive VD evaluation frameworks are lacking. We analyzed VDs in video games to generalize VDs in terms of their visual properties. We conducted a systematic paper analysis to explore player and user experiences observed in association with specifc VDs in user studies. We conducted semi-structured interviews with expert players to determine their preferences and the impact of VD properties. The resulting VD framework (VD-frame) contributes to a more strategic approach to identifying the impact of VDs on player and user experiences.
In der Arbeit wird untersucht, wie Aufgaben im pathologischen Kontext automatisiert bewertet und für die Lernenden lernförderliches Feedback generiert werden kann. Dafür wurde eine Lernsoftware entwickelt, welche das Erstellen und automatisierte Bewerten der Aufgaben ermöglicht. Das Feedback informiert die Lernenden nicht nur darüber, ob eine Aufgabe richtig oder falsch gelöst worden ist, sondern unterstützt auch bei der Findung der richtigen Lösung. Hierzu wurde untersucht, wie das Feedback in einer Lernsoftware aufgebaut sein muss, um den Lernerfolg zu fördern. Auf dieser Grundlage wurden mit den Stakeholdern der Medizinischen Hochschule Hannover die Anforderungen an die Lernsoftware definiert und umgesetzt.
Pathologists need to identify abnormal changes in tissue. With the developing digitalization, the used tissue slides are stored digitally. This enables pathologists to annotate the region of interest with the support of software tools. PathoLearn is a web-based learning platform explicitly developed for the teacher-student scenario, where the goal is that students learn to identify potential abnormal changes. Artificial intelligence (AI) and machine learning (ML) have become very important in medicine. Many health sectors already utilize AI and ML. This will only increase in the future, also in the field of pathology. Therefore, it is important to teach students the fundamentals and concepts of AI and ML early in their studies. Additionally, creating and training AI generally requires knowledge of programming and technical details. This thesis evaluates how this boundary can be overcome by comparing existing end-to-end AI platforms and teaching tools for AI. It was shown that a visual programming editor offers a fitting abstraction for creating neural networks without programming. This was extended with real-time collaboration to enable students to work in groups. Additionally, an automatic training feature was implemented, removing the necessity to know technical details about training neural networks.
Agile methods require constant optimization of one’s approach and leading to the adaptation of agile practices. These practices are also adapted when introducing them to companies and their software development teams due to organizational constraints. As a consequence of the widespread use of agile methods, we notice a high variety of their elements:
Practices, roles, and artifacts. This multitude of agile practices, artifacts, and roles results in an unsystematic mixture. It leads to several questions: When is a practice a practice, and when is it a method or technique? This paper presents the tree of agile elements, a taxonomy of agile methods, based on the literature and guidelines of widely used agile methods. We describe a taxonomy of agile methods using terms and concepts of software engineering, in particular software process models. We aim to enable agile elements to be delimited, which should help companies, agile teams, and the research community gain a basic understanding of the interrelationships and dependencies of individual components of agile methods.
Context: Companies adapt agile methods, practices or artifacts for their use in practice since more than two decades. This adaptions result in a wide variety of described agile practices. For instance, the Agile Alliance lists 75 different practices in its Agile Glossary. This situation may lead to misunderstandings, as agile practices with similar names can be interpreted and used differently.
Objective: This paper synthesize an integrated list of agile practices, both from primary and secondary sources.
Method: We performed a tertiary study to identify existing overviews and lists of agile practices in the literature. We identified 876 studies, of which 37 were included.
Results: The results of our paper show that certain agile practices are listed and used more often in existing studies. Our integrated list of agile practices comprises 38 entries structured in five categories. Conclusion: The high number of agile practices and thus, the wide variety increased steadily over the past decades due to the adaption of agile methods. Based on our findings, we present a comprehensive overview of agile practices. The research community benefits from our integrated list of agile practices as a potential basis for future research. Also, practitioners benefit from our findings, as the structured overview of agile practices provides the opportunity to select or adapt practices for their specific needs.
This Innovative Practice Full Paper presents our learnings of the process to perform a Master of Science class with eduScrum integrating real world problems as projects. We prepared, performed, and evaluated an agile educational concept for the new Master of Science program Digital Transformation organized and provided by the department of business computing at the University of Applied Sciences and Arts - Hochschule Hannover in Germany. The course deals with innovative methodologies of agile project management and is attended by 25 students. We performed the class due the summer term in 2019 and 2020 as a teaching pair. The eduScrum method has been used in different educational contexts, including higher education. During the approach preparation, we decided to use challenges, problems, or questions from the industry. Thus, we acquired four companies and prepared in coordination with them dedicated project descriptions. Each project description was refined in the form of a backlog (list of requirements). We divided the class into four eduScrum teams, one team for each project. The subdivision of the class was done randomly.
Since we wanted to integrate realistic projects into industry partners’ implementation, we decided to adapt the eduScrum approach. The eduScrum teams were challenged with different projects, e.g., analyzing a dedicated phenomenon in a real project or creating a theoretical model for a company’s new project management approach. We present our experiences of the whole process to prepare, perform and evaluate an agile educational approach combined with projects from practice. We found, that the students value the agile method using real world problems. However, the results are mainly based on the summer term 2019, this paper also includes our learnings from virtual distance teaching during the Covid 19 pandemic in summer term 2020. The paper contributes to the distribution of methods for higher education teaching in the classroom and distance learning.
In 2020, the world changed due to the Covid 19 pandemic. Containment measures to reduce the spread of the virus were planned and implemented by many countries and companies. Worldwide, companies sent their employees to work from home. This change has led to significant challenges in teams that were co-located before the pandemic. Agile software development teams were affected by this switch, as agile methods focus on communication and collaboration. Research results have already been published on the challenges of switching to remote work and the effects on agile software development teams. This article presents a systematic literature review. We identified 12 relevant papers for our studies and analyzed them on detail. The results provide an overview how agile software development teams reacted to the switch to remote work, e.g., which agile practices they adapted. We also gained insights on the changes of the performance of agile software development teams and social effects on agile software development teams during the pandemic.
Companies worldwide have enabled their employees to work remotely as a consequence of the Covid 19 pandemic. Software development is a human-centered discipline and thrives on teamwork. Agile methods are focusing on several social aspects of software development. Software development teams in Germany were mainly co-located before the pandemic. This paper aims to validate the findings of existing studies by expanding on an existing multiple-case study. Therefore, we collected data by conducting semi-structured interviews, observing agile practices, and viewing project documents in three cases. Based on the results, we can confirm the following findings: 1) The teams rapidly adapted the agile practices and roles, 2) communication is more objective within the teams, 3) decreased social exchange between team members, 4) the expectation of a combined approach of remote and onsite work after the pandemic, 5) stable or increased (perceived) performance and 6) stable or increased well-being of team members.
Social skills are essential for a successful understanding of agile methods in software development. Several studies highlight the opportunities and advantages of integrating real-world projects and problems while collaborating with companies into higher education using agile methods. This integration comes with several opportunities and advantages for both the students and the company. The students are able to interact with real-world software development teams, analyze and understand their challenges and identify possible measures to tackle them. However, the integration of real-world problems and companies is complex and may come with a high effort in terms of coordination and preparation of the course. The challenges related to the interaction and communication with students are increased by virtual distance teaching during the Covid-19 pandemic as direct contact with students is missing. Also, we do not know how problem-based learning in virtual distance teaching is valued by the students. This paper presents our adapted eduScrum approach and learning outcome of integrating experiments with real-world software development teams from two companies into a Master of Science course organized in virtual distance teaching. The evaluation shows that students value analyzing real-world problems using agile methods. They highlight the interaction with real-world software development teams. Also, the students appreciate the organization of the course using an iterative approach with eduScrum. Based on our findings, we present four recommendations for the integration of agile methods and real world problems into higher education in virtual distance teaching settings. The results of our paper contribute to the practitioner and researcher/lecturer community, as we provide valuable insights how to fill the gap between practice and higher education in virtual distance settings.
On November 30th, 2022, OpenAI released the large language model ChatGPT, an extension of GPT-3. The AI chatbot provides real-time communication in response to users’ requests. The quality of ChatGPT’s natural speaking answers marks a major shift in how we will use AI-generated information in our day-to-day lives. For a software engineering student, the use cases for ChatGPT are manifold: assessment preparation, translation, and creation of specified source code, to name a few. It can even handle more complex aspects of scientific writing, such as summarizing literature and paraphrasing text. Hence, this position paper addresses the need for discussion of potential approaches for integrating ChatGPT into higher education. Therefore, we focus on articles that address the effects of ChatGPT on higher education in the areas of software engineering and scientific writing. As ChatGPT was only recently released, there have been no peer-reviewed articles on the subject. Thus, we performed a structured grey literature review using Google Scholar to identify preprints of primary studies. In total, five out of 55 preprints are used for our analysis. Furthermore, we held informal discussions and talks with other lecturers and researchers and took into account the authors’ test results from using ChatGPT. We present five challenges and three opportunities for the higher education context that emerge from the release of ChatGPT. The main contribution of this paper is a proposal for how to integrate ChatGPT into higher education in four main areas.