Achtung:

Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

Info-Icon This content is not available in English

Photo: Universität Paderborn, Besim Mazhiqi

Ausgewählte Publikationen des Departments Wirtschaftsinformatik

Beverungen, D., Breidbach, C.F., Poeppelbuss, J., Tuunainen, V.K. (2019). Smart service systems: An interdisciplinary perspective. Information Systems Journal.
Gutt, D., Neumann, J., Zimmermann, S., Kundisch, D., Chen, J. (2019). Design of Review Systems – A Strategic Instrument to shape Online Reviewing Behavior and Economic Outcomes. Journal of Strategic Information Systems, 28 (2), 104-117.

Rauchecker, G., Schryen, G. (2019), An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response, European Journal of Operational Research (EJOR), Vol. 272, Issue 1, pp. 352-363.

Trier, M.; Khan, G. (2019): Assessing the long-term Fragmentation and Coherence of Information Systems Research with a Longitudinal Multi-Network Analysis, European Journal of IS.
Zimmermann, S., Herrmann, P., Kundisch, D. Nault, B. (2018). Decomposing the Variance of Consumer Ratings and the Impact on Price and Demand. Information Systems Research, 29 (4), 984-1002.
Müller, O., Fay, M., & vom Brocke, J. (2018). The Effect of Big Data and Analytics on Firm Performance: An Econometric Analysis Considering Industry Characteristics. Journal of Management Information Systems, 35 (2), 488--509.
Trier, M.: (2018) Knowledge Transfer via Social Media Platforms – Uncertainty Factors as a Management Opportunity. (in German): HMD Journal 2018.

Klör, B., Monhof, M., Beverungen, D., & Bräuer, S. (2017). Design and Evaluation of a Model-Driven Decision Support System for Repurposing Electric Vehicle Batteries. In: European Journal of Information Systems (EJIS), forthcoming.

Beverungen, D., Müller, O., Matzner, M., Mendling, J., vom Brocke, J. (2017). Conceptualizing Smart Service Systems. Electronic Markets, 29(1), pp. 7–18.
Müller, O., Simons, A., & Weinmann, M. (2017). Beyond crowd judgments: Data-driven estimation of market value in association football. European Journal of Operational Research, 263 (2), 611--624.

Scholz, M., Dorner, V., Schryen, G., Benlian, A. (2017), A configuration-based recommender system for supporting e-commerce decisions, European Journal of Operational Research (EJOR), Vol. 259, Issue 1, pp. 205-215.

Müller, O., Junglas, I., vom Brocke, J., & Debortoli, S. (2016). Utilizing big data analytics for information systems research: Challenges, promises and guidelines. European Journal of Information Systems, 25 (4), 289--302.
Herrmann, P., Kundisch, D., Rahman, M. (2015). Beating Irrationality: Does Delegating to IT Alleviate the Sunk Cost Effect?. Management Science, 61 (4), 831-850.
Trier, M., Richter, A., (2015): The Deep Structure of Organizational Online Networking – an Actor-oriented Case Study. Information Systems Journal, Vol. 25, No. 5, 2015, p. 465-488.
Behrendt, S.; Richter, A.; Trier, M. (2014-2015): Mixed methods analysis of enterprise social net-works. Computer Networks, Vol. 75, No. Part B, 2014, p. 560–577 (IF 1.23, Computer Science).

Schryen, G. (2013), Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there, European Journal of Information Systems (EJIS), Vol. 22, No. 2, pp. 139-169

Trier, M. (2007): Virtual Knowledge Communities - IT-supported Visualization and Analysis. VDM, Saarbruecken, 2007, ISBN: 978-3836415408.

 

Artikel in Zeitschriften


Open list in Research Information System

Decision Support for Disaster Relief: Coordinating Spontaneous Volunteers

M. Sperling, G. Schryen, European Journal of Operational Research (EJOR) (2022), 299(2), pp. 690 - 705


Procrastination in the Looking Glass of Self-Awareness: Can Gamified Self-Monitoring Reduce Academic Procrastination?

K. Klingsiek, T. John, D. Kundisch, die hochschullehre (2022), 8(5), pp. 61 - 76


“What’s the Point of the Task?” Exploring the Influence of Task Meaning on Creativity in Crowdsourcing

T. Görzen, International Journal of Innovation Management (2021), 25(1)

DOI


Affordance-Experimentation: Eine Fallstudie zur Entwicklung von Virtual-Reality-Anwendungsfällen im Unternehmenskontext

J. Fromm, E. Slawinski, M. Mirbabaie, HMD Praxis der Wirtschaftsinformatik (2021)

<jats:title>Zusammenfassung</jats:title><jats:p>Durch technologische Fortschritte in den letzten Jahren ist Virtual Reality erschwinglicher und benutzerfreundlicher geworden, sodass Unternehmen die Einführung der Technologie verstärkt in Betracht ziehen. Ihren Aufschwung erlebte die Technologie jedoch durch die Unterhaltungs- und Spieleindustrie, weshalb sich für Unternehmen die Frage nach sinnvollen Anwendungsfällen stellt. Nach der Affordance-Experimentation-Actualization-Theorie ist insbesondere bei neu aufkommenden Technologien eine Experimentierphase notwendig, um Handlungsmöglichkeiten aufzudecken und daraus Anwendungsfälle zu generieren. Dieser Artikel präsentiert die Ergebnisse einer Fallstudie in einem Unternehmen, das sich während der Studie in der Experimentierphase befand. Durch Interviews mit acht Beschäftigten und einem Vertriebspartner konnten drei Handlungsmöglichkeiten für Virtual Reality im Unternehmenskontext und eine zuvor nicht bekannte Aktivität der Experimentierphase identifiziert werden. Damit erweitert die Studie bisherige Forschung zur Experimentierphase und zeigt Unterschiede im Vergleich zu anderen innovativen Technologien auf, die in vorherigen Studien untersucht wurden. Für Unternehmen bietet die Studie wertvolle Einblicke in die erfolgreiche Gestaltung der Experimentierphase als Vorbereitung auf die Implementierung.</jats:p>


Affording Technology in Crisis Situations: The Occurrence of Rumor Sense-Making Processes

M. Mirbabaie, S. Stieglitz, I. Amojo, Journal of Database Management (2021)


An update for taxonomy designers: Methodological guidance from information systems research

D. Kundisch, J. Muntermann, A.M. Oberländer, D. Rau, M. Röglinger, T. Schoormann, D. Szopinski, Business & Information Systems Engineering (2021)


Artificial intelligence in disease diagnostics: A critical review and classification on the current state of research guiding future direction

M. Mirbabaie, S. Stieglitz, N.R.J. Frick, Health and Technology (2021), pp. 693-731

The diagnosis of diseases is decisive for planning proper treatment and ensuring the well-being of patients. Human error hinders accurate diagnostics, as interpreting medical information is a complex and cognitively challenging task. The application of artificial intelligence (AI) can improve the level of diagnostic accuracy and efficiency. While the current literature has examined various approaches to diagnosing various diseases, an overview of fields in which AI has been applied, including their performance aiming to identify emergent digitalized healthcare services, has not yet been adequately realized in extant research. By conducting a critical review, we portray the AI landscape in diagnostics and provide a snapshot to guide future research. This paper extends academia by proposing a research agenda. Practitioners understand the extent to which AI improves diagnostics and how healthcare benefits from it. However, several issues need to be addressed before successful application of AI in disease diagnostics can be achieved.</jats:p>


Artificial intelligence in hospitals: providing a status quo of ethical considerations in academia to guide future research

M. Mirbabaie, L. Hofeditz, N.R.J. Frick, S. Stieglitz, AI & SOCIETY (2021)

<jats:title>Abstract</jats:title><jats:p>The application of artificial intelligence (AI) in hospitals yields many advantages but also confronts healthcare with ethical questions and challenges. While various disciplines have conducted specific research on the ethical considerations of AI in hospitals, the literature still requires a holistic overview. By conducting a systematic discourse approach highlighted by expert interviews with healthcare specialists, we identified the status quo of interdisciplinary research in academia on ethical considerations and dimensions of AI in hospitals. We found 15 fundamental manuscripts by constructing a citation network for the ethical discourse, and we extracted actionable principles and their relationships. We provide an agenda to guide academia, framed under the principles of biomedical ethics. We provide an understanding of the current ethical discourse of AI in clinical environments, identify where further research is pressingly needed, and discuss additional research questions that should be addressed. We also guide practitioners to acknowledge AI-related benefits in hospitals and to understand the related ethical concerns.</jats:p>


Ausgestaltungs- und Anwendungspotenziale von Virtual und Augmented Reality Technologien im Kontext von Coworking Spaces

M. Mirbabaie, L. Hofeditz, L. Schmid, HMD Praxis der Wirtschaftsinformatik (2021)

<jats:title>Zusammenfassung</jats:title><jats:p>Coworking Spaces (CSPs) sind geteilte Arbeitsplätze für Selbstständige, Freelancer*innen, Mikrounternehmen und Startups, die Isolation entgegenwirken und zum interdisziplinären Wissensaustausch anregen können. Jedoch existieren auch Barrieren, die Nutzer*innen davon abhalten, zu anderen Coworker*innen Kontakt aufzunehmen, da oft unklar ist, wann und ob jemand zum kreativen Austausch oder zum Anbieten von Hilfe bereit ist. Durch die Covid-19 Pandemie wurde die Unsicherheit bei der gegenseitigen Kontaktaufnahme noch weiter erschwert und viele CSPs mussten zeitweise schließen. Um Barrieren bei der Kontaktaufnahme zu reduzieren und die interdisziplinäre Zusammenarbeit zu fördern, können Informations- und Kommunikationstechnologien eingesetzt werden. Virtual Reality (VR) und Augmented Reality (AR) sind Technologien, die sich durch einen besonders hohen Grad an Immersion und sozialer Präsenz auszeichnen. Deshalb zeigen wir in diesem Beitrag, wie VR- und AR-Technologien gezielt eingesetzt werden können, um den interdisziplinären Wissensaustausch und Zusammenarbeit sowohl in CSPs als auch ortsunabhängig zu fördern. Dazu präsentieren wir positive Effekte, die durch den Einsatz einer der beiden Technologien im Zusammenhang mit CSPs erzielt werden können und leiten konkrete Gestaltungsempfehlungen für Anwendungsentwickler*innen, Unternehmen sowie Betreiber*innen von CSPs ab. Diese Gestaltungsempfehlungen basieren sowohl auf den neuesten Erkenntnissen aus der Fachliteratur als auch auf Interviews mit Expert*innen aus Forschung und Praxis mit Erfahrung im Bereich CSPs, VR und AR. Unsere Anwendungsszenarien können Entwickler*innen, Unternehmen und Betreiber*innen von CSPs als Grundlage dienen, vom Einsatz beider Technologien zu profitieren.</jats:p>


Classifying the Ideational Impact of Information Systems Review Articles: A Content-Enriched Deep Learning Approach

J. Prester, G. Wagner, G. Schryen, N.R. Hassan, Decision Support Systems (2021), 140, pp. 113432

Ideational impact refers to the uptake of a paper's ideas and concepts by subsequent research. It is defined in stark contrast to total citation impact, a measure predominantly used in research evaluation that assumes that all citations are equal. Understanding ideational impact is critical for evaluating research impact and understanding how scientific disciplines build a cumulative tradition. Research has only recently developed automated citation classification techniques to distinguish between different types of citations and generally does not emphasize the conceptual content of the citations and its ideational impact. To address this problem, we develop Deep Content-enriched Ideational Impact Classification (Deep-CENIC) as the first automated approach for ideational impact classification to support researchers' literature search practices. We evaluate Deep-CENIC on 1,256 papers citing 24 information systems review articles from the IT business value domain. We show that Deep-CENIC significantly outperforms state-of-the-art benchmark models. We contribute to information systems research by operationalizing the concept of ideational impact, designing a recommender system for academic papers based on deep learning techniques, and empirically exploring the ideational impact of the IT business value domain.


Digital Nudging in Social Media Disaster Communication

M. Mirbabaie, C. Ehnis, S. Stieglitz, D. Bunker, T. Rose, Information Systems Frontiers (2021)


Drei Strategien zur Etablierung digitaler Plattformen in der Industrie

H. Lüttenberg, D. Beverungen, M. Poniatowski, D. Kundisch, N. Wünderlich, Wirtschaftsinformatik & Management (2021), 13(2), pp. 120-131


Driving Digital Transformation During a Pandemic: Study of Virtual Collaboration in a German Hospital

M. Mirbabaie, S. Stieglitz, N. Frick, H. Möllmann, Journal of Medical Internet Research Medical Informatics (2021)


Dynamics of convergence behaviour in social media crisis communication – a complexity perspective

M. Mirbabaie, S. Stieglitz, F. Brünker, Information Technology & People (2021)

DOI


Dynamics of Convergence Behaviour in Social Media Crisis Communication – A Complexity Perspective on Peoples’ Behaviour

M. Mirbabaie, S. Stieglitz, F. Brünker, Information Technology & People (2021)


Ethical Management of Artificial Intelligence

A. Brendel, M. Mirbabaie, T. Lembcke, L. Hofeditz, Sustainability (2021)


Exploring the Scientific Impact of Information Systems Design Science Research

G. Wagner, J. Prester, G. Schryen, Communications of the Association for Information Systems (2021), 48(1), 37


Hybrid Intelligence in Hospitals: Towards a Research Agenda for Collaboration and Team-Building

M. Mirbabaie, S. Stieglitz, N. Frick, Electronic Markets (2021)


Maneuvering through the stormy seas of digital transformation: the impact of empowering leadership on the AI readiness of enterprises

N.R.J. Frick, M. Mirbabaie, S. Stieglitz, J. Salomon, Journal of Decision Systems (2021), pp. 1-24

DOI


Study on Sensitivity of Electric Bus Systems under Simultaneous Optimization of Charging Infrastructure and Vehicle Schedules

M. Stumpe, D. Rößler, G. Schryen, N. Kliewer, EURO Journal on Transportation and Logistics (2021)


The Development of Connective Action during Social Movements on Social Media

M. Mirbabaie, F. Brünker, M. Wischnewski, J. Meinert, ACM Transactions on Social Computing (2021)


Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers

D. Beverungen, D. Kundisch, N. Wünderlich, Journal of Service Management (2021), 32(4), pp. 507-532


Understanding Collaboration with Virtual Assistants – The Role of Social Identity and Extended Self

M. Mirbabaie, S. Stieglitz, F. Brünker, L. Hofeditz, B. Ross, N. Frick, Business & Information Systems Engineering (2021)


Understanding Collaboration with Virtual Assistants – The Role of Social Identity and the Extended Self

M. Mirbabaie, S. Stieglitz, F. Brünker, L. Hofeditz, B. Ross, N.R.J. Frick, Business & Information Systems Engineering (2021), pp. 21-37

<jats:title>Abstract</jats:title><jats:p>Organizations introduce virtual assistants (VAs) to support employees with work-related tasks. VAs can increase the success of teamwork and thus become an integral part of the daily work life. However, the effect of VAs on virtual teams remains unclear. While social identity theory describes the identification of employees with team members and the continued existence of a group identity, the concept of the extended self refers to the incorporation of possessions into one’s sense of self. This raises the question of which approach applies to VAs as teammates. The article extends the IS literature by examining the impact of VAs on individuals and teams and updates the knowledge on social identity and the extended self by deploying VAs in a collaborative setting. Using a laboratory experiment with N = 50, two groups were compared in solving a task, where one group was assisted by a VA, while the other was supported by a person. Results highlight that employees who identify VAs as part of their extended self are more likely to identify with team members and vice versa. The two aspects are thus combined into the proposed construct of virtually extended identification explaining the relationships of collaboration with VAs. This study contributes to the understanding on the influence of the extended self and social identity on collaboration with VAs. Practitioners are able to assess how VAs improve collaboration and teamwork in mixed teams in organizations.</jats:p>


Which Factors Affect the Scientific Impact of Review Papers in IS Research? A Scientometric Study

G. Wagner, J. Prester, M. Roche, G. Schryen, A. Benlian, G. Paré, M. Templier, Information & Management (2021), pp. 103427

Review papers are essential for knowledge development in IS. While some are cited twice a day, others accumulate single digit citations over a decade. The magnitude of these differences prompts us to analyze what distinguishes those reviews that have proven to be integral to scientific progress from those that might be considered less impactful. Our results highlight differences between reviews aimed at describing, understanding, explaining, and theory testing. Beyond the control variables, they demonstrate the importance of methodological transparency and the development of research agendas. These insights inform all stakeholders involved in the development and publication of review papers.


A Case for a New IT Ecosystem: On-The-Fly Computing

H. Karl, D. Kundisch, F. Meyer auf der Heide, H. Wehrheim, Business & Information Systems Engineering (2020), 62(6), pp. 467-481

DOI


A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field

G. Schryen, G. Wagner, A. Benlian, G. Paré, Communications of the AIS (2020), 46(7), pp. 134-186

Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1) derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge building activities to achieve their goals with respect to theory.


Against All Odds: Tentative Steps Toward Efficient Information Sharing in Groups

D. Schlangenotto, W. Schnedler, R. Vadovic, Games (2020), 11(3), pp. 1-24


Forecasting IT Security Vulnerabilities - An Empirical Analysis

E. Yasasin, J. Prester, G. Wagner, G. Schryen, Computers & Security (2020), 88(January)

Today, organizations must deal with a plethora of IT security threats and to ensure smooth and uninterrupted business operations, firms are challenged to predict the volume of IT security vulnerabilities and allocate resources for fixing them. This challenge requires decision makers to assess which system or software packages are prone to vulnerabilities, how many post-release vulnerabilities can be expected to occur during a certain period of time, and what impact exploits might have. Substantial research has been dedicated to techniques that analyze source code and detect security vulnerabilities. However, only limited research has focused on forecasting security vulnerabilities that are detected and reported after the release of software. To address this shortcoming, we apply established methodologies which are capable of forecasting events exhibiting specific time series characteristics of security vulnerabilities, i.e., rareness of occurrence, volatility, non-stationarity, and seasonality. Based on a dataset taken from the National Vulnerability Database (NVD), we use the Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) to measure the forecasting accuracy of single, double, and triple exponential smoothing methodologies, Croston's methodology, ARIMA, and a neural network-based approach. We analyze the impact of the applied forecasting methodology on the prediction accuracy with regard to its robustness along the dimensions of the examined system and software package "operating systems", "browsers" and "office solutions" and the applied metrics. To the best of our knowledge, this study is the first to analyze the effect of forecasting methodologies and to apply metrics that are suitable in this context. Our results show that the optimal forecasting methodology depends on the software or system package, as some methodologies perform poorly in the context of IT security vulnerabilities, that absolute metrics can cover the actual prediction error precisely, and that the prediction accuracy is robust within the two applied forecasting-error metrics.


Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty

D. Gutt, T. von Rechenberg, D. Kundisch, Journal of Business Research (2020), 106, pp. 277-287

DOI


High Performance Business Computing

G. Schryen, N. Kliewer, A. Fink, Business & Information Systems Engineering (2020)


Integrating Management Science into the HPC Research Ecosystem

G. Schryen, Communications of the ACM (2020), 63(9), pp. 35 - 37


Interview with Utz-Uwe Haus on “High Performance Computing in Economic Environments: Opportunities and Challenges"

G. Schryen, N. Kliewer, A. Fink, Business & Information Systems Engineering (2020), 62(01/2020), pp. 21 - 23

This interview is part of the special issue (01/2020) on “High Performance Business Computing” to be published in the journal Business & Information Systems Engineering. The interviewee Utz-Uwe Haus is Senior Research Engineer @ CRAY European Research Lab (CERL)). A bio of him is included at the end of the interview.


Parallel computational optimization in operations research: A new integrative framework, literature review and research directions

G. Schryen, European Journal of Operational Research (2020), 287(1), pp. 1 - 18


Seven Paradoxes of Business Process Management in a Hyper-Connected World

D. Beverungen, J.C.A.M. Buijs, J. Becker, C. Di Ciccio, W.M.P. van der Aalst, C. Bartelheimer, J. vom Brocke, M. Comuzzi, K. Kraume, H. Leopold, M. Matzner, J. Mendling, N. Ogonek, T. Post, M. Resinas, K. Revoredo, A. del-Río-Ortega, M. La Rosa, F.M. Santoro, A. Solti, M. Song, A. Stein, M. Stierle, V. Wolf, Business & Information Systems Engineering (2020)

DOI


Seven Paradoxes of Business Process Management in a Hyper-Connected World

D. Beverungen, J.C.A.M. Buijs, J. Becker, C. Di Ciccio, W.M.P. van der Aalst, C. Bartelheimer, J. vom Brocke, M. Comuzzi, K. Kraume, H. Leopold, M. Matzner, J. Mendling, N. Ogonek, T. Post, M. Resinas, K. Revoredo, A. del-Río-Ortega, M. La Rosa, F.M. Santoro, A. Solti, M. Song, A. Stein, M. Stierle, V. Wolf, Business & Information Systems Engineering (2020)

DOI


Social media in times of crisis: Learning from Hurricane Harvey for the coronavirus disease 2019 pandemic response

M. Mirbabaie, D. Bunker, S. Stieglitz, J. Marx, C. Ehnis, Journal of Information Technology (2020), pp. 195-213

<jats:p> In recent times societal crises such as the coronavirus disease 2019 outbreak have given rise to a tension between formal ‘command and control’ and informal social media activated self-organising information and communication systems that are utilised for crisis management decision-making. Social media distrust affects the dissemination of disaster information as it entails shifts in media perception and participation but also changes in the way individuals and organisations make sense of information in critical situations. So far, a little considered notion in this domain is the concept of sense-giving. Originating from organisational theory, it is used to explain the mechanisms behind intentional information provision that fosters collective meaning creation. In our study, we seek to understand the potential impact of sense-giving from Twitter crisis communication generated during the Hurricane Harvey disaster event. Social network and content analyses performed with a dataset of 9,414,463 tweets yielded insights into how sense-giving occurs during a large-scale disaster event. Theoretically, we specified (1) perpetual sense-giving, which relies primarily on topical authority and frequency; as well as (2) intermittent sense-giving, which occurs from high value of message content and leverage of popularity, that is, retweets. Our findings emphasise the importance of information-rich actors in communication networks and the leverage of their influence in crises such as coronavirus disease 2019 to reduce social media distrust and facilitate sense-making. </jats:p>


Software tools for business model innovation: Current state and future challenges

D. Szopinski, T. Schoormann, T. John, R. Knackstedt, D. Kundisch, Electronic Markets (2020), 30(3), pp. 469-494


Technologie Pivots – Warum und wie digitale Startups ihr Technologiedesign umfassend anpassen

N. Bohn, D. Kundisch, Wirtschaftsinformatik & Management (2020), 12(4), pp. 290-297


Three Layers of Abstraction—A Conceptual Framework for Theorizing digital Multi-Sided Platforms

M. Poniatowski, H. Lüttenberg, D. Beverungen, D. Kundisch, Information Systems and e-Business Management, Special Issue on Platform Business Models and Platform Strategies (2020)


Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements

E. Szubartowicz, G. Schryen, Journal of Information System Security (2020), 16(1), pp. 3 - 31

Timing plays a crucial role in the context of information security investments. We regard timing in two dimensions, namely the time of announcement in relation to the time of investment and the time of announcement in relation to the time of a fundamental security incident. The financial value of information security investments is assessed by examining the relationship between the investment announcements and their stock market reaction focusing on the two time dimensions. Using an event study methodology, we found that both dimensions influence the stock market return of the investing organization. Our results indicate that (1) after fundamental security incidents in a given industry, the stock price will react more positively to a firm’s announcement of actual information security investments than to announcements of the intention to invest; (2) the stock price will react more positively to a firm’s announcements of the intention to invest after the fundamental security incident compared to before; and (3) the stock price will react more positively to a firm’s announcements of actual information security investments after the fundamental security incident compared to before. Overall, the lowest abnormal return can be expected when the intention to invest is announced before a fundamental information security incident and the highest return when actual investing after a fundamental information security incident in the respective industry.


What Are We Talking About When We Talk About Technology Pivots? – A Delphi Study

N. Bohn, D. Kundisch, Information & Management (2020), 57(6), 103319


When are researchers willing to share their data? – Impacts of values and uncertainty on open data in higher education

S. Stieglitz, K. Wilms, M. Mirbabaie, L. Hofeditz, B. Brenger, A. López, S. Rehwald, PLOS ONE (2020), e0234172

DOI


‘Breaking’ News: Uncovering Sense-Breaking Patterns in Social Media Crisis Communication during the 2017 Manchester Bombing

M. Mirbabaie, J. Marx, Behaviour & Information Technology (2019)


‘Silence’ as a Strategy during a Corporate Crisis - The Case of Volkswagen’s ‘Dieselgate’

S. Stieglitz, M. Mirbabaie, T. Kroll, J. Marx, Internet Research (2019)


An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response

G. Rauchecker, G. Schryen, European Journal of Operational Research (2019), 272(1), pp. 352 - 363

In disaster operations management, a challenging task for rescue organizations occurs when they have to assign and schedule their rescue units to emerging incidents under time pressure in order to reduce the overall resulting harm. Of particular importance in practical scenarios is the need to consider collaboration of rescue units. This task has hardly been addressed in the literature. We contribute to both modeling and solving this problem by (1) conceptualizing the situation as a type of scheduling problem, (2) modeling it as a binary linear minimization problem, (3) suggesting a branch-and-price algorithm, which can serve as both an exact and heuristic solution procedure, and (4) conducting computational experiments - including a sensitivity analysis of the effects of exogenous model parameters on execution times and objective value improvements over a heuristic suggested in the literature - for different practical disaster scenarios. The results of our computational experiments show that most problem instances of practically feasible size can be solved to optimality within ten minutes. Furthermore, even when our algorithm is terminated once the first feasible solution has been found, this solution is in almost all cases competitive to the optimal solution and substantially better than the solution obtained by the best known algorithm from the literature. This performance of our branch-and-price algorithm enables rescue organizations to apply our procedure in practice, even when the time for decision making is limited to a few minutes. By addressing a very general type of scheduling problem, our approach applies to various scheduling situations.


Assessing the long-term fragmentation of information systems research with a longitudinal multi-network analysis

G.F. Khan, M. Trier, European Journal of Information Systems (2019), 28(4), pp. 370-393

DOI


Crowd-Driven Competitive Intelligence: Understanding the Relationship between Local Market Competition and Online Rating Distributions

D. Gutt, P. Herrmann, M. Rahman, Information Systems Research (2019), 30(3), pp. 980-994


Design of Review Systems – A Strategic Instrument to shape Online Reviewing Behavior and Economic Outcomes

D. Gutt, J. Neumann, S. Zimmermann, D. Kundisch, J. Chen, Journal of Strategic Information Systems (2019), 28(2), pp. 104-117


High-Performance Business Computing – Parallel Algorithms and Implementations for Solving Problems in Operations Research and Data Analysis

G. Schryen, N. Kliewer, R. Borndörfer, T. Koch, OR News (2019), 65, pp. 34-35


Smart service systems: An interdisciplinary perspective

D. Beverungen, C.F. Breidbach, J. Poeppelbuss, V.K. Tuunainen, Information Systems Journal (2019)

DOI


Squaring the circle: Business model teaching in large classroom settings

D. Szopinski, Journal of Business Models (2019), 7(3), pp. 90-100

Business model innovation is typically taught in small seminars at universities. Teaching this intrinsically task-oriented subject to a large number of students is a challenge. In this paper we address this challenge by proposing an experiential and interactive approach to teaching business models in a large classroom setting.


Transactions for trading used electric vehicle batteries: theoretical underpinning and information systems design principles

S. Bräuer, F. Plenter, B. Klör, M. Monhof, D. Beverungen, J. Becker, Business Research (2019)

DOI


Using High Performance Computing for Unrelated Parallel Machine Scheduling with Sequence-Dependent Setup Times: Development and Computational Evaluation of a Parallel Branch-and-Price Algorithm

G. Rauchecker, G. Schryen, Computers & Operations Research (2019)(104), pp. 338-357

Scheduling problems are essential for decision making in many academic disciplines, including operations management, computer science, and information systems. Since many scheduling problems are NP-hard in the strong sense, there is only limited research on exact algorithms and how their efficiency scales when implemented on parallel computing architectures. We address this gap by (1) adapting an exact branch-and-price algorithm to a parallel machine scheduling problem on unrelated machines with sequence- and machine-dependent setup times, (2) parallelizing the adapted algorithm by implementing a distributed-memory parallelization with a master/worker approach, and (3) conducting extensive computational experiments using up to 960 MPI processes on a modern high performance computing cluster. With our experiments, we show that the efficiency of our parallelization approach can lead to superlinear speedup but can vary substantially between instances. We further show that the wall time of serial execution can be substantially reduced through our parallelization, in some cases from 94 hours to less than six minutes when our algorithm is executed on 960 processes.


Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication

M. Mirbabaie, D. Bunker, S. Stieglitz, Information Systems Frontiers (2019)


Decomposing the Variance of Consumer Ratings and the Impact on Price and Demand

S. Zimmermann , P. Herrmann, D. Kundisch, B. Nault, Information Systems Research (2018), 29(4), pp. 984-1002

Consumer ratings play a decisive role in purchases by online shoppers. Although the effect of the average and the number of consumer ratings on future product pricing and demand have been studied with some conclusive results, the effects of the variance of these ratings are less well understood. We develop a model which considers durable goods that are characterized by three types of attributes: search attributes, experience attributes, and transformed attributes the latter are conventional experience attributes that are transformed by consumer ratings into attributes that can be searched. Using informed search attributes to refer to the combination of search attributes and transformed attributes, we consider two sources of variance of consumer ratings: taste differences about informed search attributes and quality differences in the form of product failure representing experience attributes. We find that (i) optimal price increases and demand decreases in variance caused by informed search attributes, (ii) optimal price and demand decrease in variance caused by experience attributes, and (iii) by holding the average rating as well as the total variance constant, for products with low total variance price and demand increase in the relative share of variance caused by informed search attributes. Counter to intuition, we demonstrate that risk averse consumers may prefer a higher priced product with a higher variance in ratings when deciding between two similar products with the same average rating. Finally, our model provides a theoretical explanation for the empirically observed j-shaped distribution of consumer ratings in e-commerce that differs from established explanations.


Einsatz von Spielmechaniken und Bots zur Moderation von Kreativitätsprozessen in Unternehmen

M. Mirbabaie, S. Stieglitz, J. Priesmeyer, M. Kindel, HMD Praxis der Wirtschaftsinformatik (2018), pp. 147-159

DOI


Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics

S.. Stieglitz, C. Meske, B. Ross, M. Mirbabaie, Information Systems Frontiers (2018)


Hospital-wide Process-oriented Organization of Care: The Case of Turku University Central Hospital

R. Suomi, O. Müller, J. vom Brocke, Journal of Information Technology Theory and Application (2018), 19(4), pp. 3


Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning

E. Weishäupl, E. Yasasin, G. Schryen, Computers & Security (2018), 77, pp. 807 - 823

The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. While the academic literature has provided valuable insights into these issues, there is a lack of empirical contributions. To address this lack, we conduct a theory-based exploratory multiple case study. Our case study reveals that (1) firms? investments in information security are largely driven by external environmental and industry-related factors, (2) firms do not implement standardized decision processes, (3) the security process is perceived to impact the business process in a disturbing way, (4) both the implementation of evaluation processes and the application of metrics are hardly existent and (5) learning activities mainly occur at an ad-hoc basis.


Interaction and Influence on Twitter: Comparing the discourse relationships between user types on five topics

S. Kapidzic, C. Neuberger, S. Stieglitz, M. Mirbabaie, Digital Journalism (2018), pp. 251-272

DOI


Is Paid Search Overrated? When Bricks-and-Mortar-Only Retailers Should Not Use Paid Search

D. Schlangenotto, D. Kundisch, N. Wünderlich, Electronic Markets (2018), 28(4), pp. 407-421


Platform Launch Strategies

C. Stummer, D. Kundisch, R. Decker, Business & Information Systems Engineering (2018)


Recombinant Service Systems Engineering

D. Beverungen, H. Lüttenberg, V. Wolf, Business & Information Systems Engineering (2018), 60(5), pp. 377-391

DOI


Social Media Analytics - Challenges in Topic Discovery, Data Collection, and Data Preparation

S. Stieglitz, M. Mirbabaie, B. Ross, C. Neuberger, International Journal of Information Management (2018), pp. 156-168


Social Positions and Collective Sense-making in Crisis Communication

S. Stieglitz, M. Mirbabaie, M. Milde, International Journal of Human-Computer Interaction (2018)


Understanding Sense-Making on Social Media during Crises: Categorization of Sense-Making Barriers and Strategies

S. Stieglitz, M. Mirbabaie, J. Fromm, International Journal of Information Systems for Crisis Response and Management (2018)


Wissensarbeit mit Social Media Plattformen – Unsicherheitsfaktoren als Managementansatz

M. Trier, HMD Praxis der Wirtschaftsinformatik (2018), 55(4), pp. 714-724

DOI


A configuration-based recommender system for supporting e-commerce decisions

M. Scholz, V. Dorner, G. Schryen, A. Benlian, European Journal of Operational Research (2017), 259(1), pp. 205 - 215

Multi-attribute value theory (MAVT)-based recommender systems have been proposed for dealing with issues of existing recommender systems, such as the cold-start problem and changing preferences. However, as we argue in this paper, existing MAVT-based methods for measuring attribute importance weights do not fit the shopping tasks for which recommender systems are typically used. These methods assume well-trained decision makers who are willing to invest time and cognitive effort, and who are familiar with the attributes describing the available alternatives and the ranges of these attribute levels. Yet, recommender systems are most often used by consumers who are usually not familiar with the available attributes and ranges and who wish to save time and effort. Against this background, we develop a new method, based on a product configuration process, which is tailored to the characteristics of these particular decision makers. We empirically compare our method to SWING, ranking-based conjoint analysis and TRADEOFF in a between-subjects laboratory experiment with 153 participants. Results indicate that our proposed method performs better than TRADEOFF and CONJOINT and at least as well as SWING in terms of recommendation accuracy, better than SWING and TRADEOFF and at least as well as CONJOINT in terms of cognitive load, and that participants were faster with our method than with any other method. We conclude that our method is a promising option to help support consumers' decision processes in e-commerce shopping tasks.


An open-data approach for quantifying the potential of taxi ridesharing

B. Barann, D. Beverungen, O. Müller, Decision Support Systems (2017), pp. 86--95

Taxi ridesharing1 (TRS) is an advanced form of urban transportation that matches separate ride requests with similar spatio-temporal characteristics to a jointly used taxi. As collaborative consumption, TRS saves customers money, enables taxi companies to economize use of their resources, and lowers greenhouse gas emissions. We develop a one-to-one TRS approach that matches rides with similar start and end points. We evaluate our approach by analyzing an open dataset of > 5 million taxi trajectories in New York City. Our empirical analysis reveals that the proposed approach matches up to 48.34% of all taxi rides, saving 2,892,036 km of travel distance, 231,362.89 l of gas, and 532,134.64 kg of CO2 emissions per week. Compared to many-to-many TRS approaches, our approach is competitive, simpler to implement and operate, and poses less rigid assumptions on data availability and customer acceptance.


Conceptualizing smart service systems

D. Beverungen, O. Müller, M. Matzner, J. Mendling, J. vom Brocke, Electronic Markets (2017), pp. 7-18

DOI


Decomposing the Variance of Consumer Ratings and the Impact on Price and Demand

S. Zimmermann, P. Herrmann, D. Kundisch, B. Nault, Information Systems Research (2017)


Design and Evaluation of a Model-Driven Decision Support System for Repurposing Electric Vehicle Batteries

B. Klör, M. Monhof, D. Beverungen, S. Bräuer, European Journal of Information Systems (EJIS) (2017), pp. 1--19

DOI


Does the Framing of Progress Towards Virtual Rewards Matter? Empirical Evidence from an Online Community

D. Kundisch, T. von Rechenberg, Business & Information Systems Engineering (2017), 59(4), pp. 207-222


Ensembles of Context and Form for Repurposing Electric Vehicle Batteries: An Exploratory Study

D. Beverungen, S. Bräuer, F. Plenter, B. Klör, M. Monhof, Computer Science --- Research and Development (2017)(1-2), pp. 195--209

DOI


High-Performance Business Computing - Effizienzsteigerung durch Parallelisierung

G. Schryen, D. Hristova, Smart Data Radar (Deutsche Bank) (2017)


Information systems for smart services

D. Beverungen, M. Matzner, C. Janiesch, Information Systems and E-Business Management (2017), pp. 781–787

Digital interactions among businesses and consumers through powerful information systems and omnipresent connected devices establish today’s networked society. In this light, Service Science continues to take root as a research discipline that focuses on the integration of (digital) resources by service providers and service customers for value co-creation in service systems. Rapid advances in information technology allow for designing novel information systems that enable entirely new configurations of service systems. In turn, Service Science also leaves its mark on the design, adoption, and use of information systems and technology. With this special issue, we compile a set of timely papers that investigate selected facets of the complex interplay between information technology, information systems, and Service Science to design innovative IT artifacts for smart service. This editorial opens this special issue by elaborating on our understanding of smart service.<br


Interaktive, digitale Einkaufserlebnisse in Innenstädten

J. Hendrik Betzing, D. Beverungen, J. Becker, M. Matzner, G. Schmitz, C. Bartelheimer, C.I. Berendes, M. Braun, A. Gadeib, M.{. Hoffen}, C. Schallenberg, HMD Praxis der Wirtschaftsinformatik (2017)(5), pp. 659--671

DOI


Is it Worth the Effort? - A Decision Model to Evaluate Resource Interactions in IS Project Portfolios

C. Meier, D. Kundisch, J. Willeke, Business & Information Systems Engineering (2017), 59(2), pp. 81-95


Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?

G. Schryen, A. Benlian, F. Rowe, G. Shirley, K. Larsen, S. Petter, G. Par{\'e}, G. Wagner, S. Haag, E. Yasasin, Communications of the AIS (2017), 40, pp. 557 - 569

Literature reviews (LRs) are recognized for their increasing impact in the information systems literature. Methodologists have drawn attention to the question of how we can leverage the value of LRs to preserve and generate knowledge. The panelists who participated in the discussion of ?Standalone Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?? at ICIS 2016 in Dublin acknowledged this significant issue and debated a) what the IS field can learn from other fields and where IS-specific challenges occur, b) how the IS field should move forward to foster the genre of LRs, and c) what best practices are to train doctoral IS students in publishing LRs. This article reports the key takeaways of this panel discussion. Guidance for IS scholars is provided on how to conduct LRs that contribute to the cumulative knowledge development within and across the IS field to best prepare the next generation of IS scholars.


Sense-Making in Social Media During Extreme Events

S. Stieglitz, D. Bunker, M. Mirbabaie, C. Ehnis, Journal of Contingencies and Crisis Management (2017), pp. 4-15

DOI


Webbasierte Classroom Response Systeme in der Hochschullehre - Eine designbasierte Fallstudie zur Unterstützung von Lehr-/Lernprozessen aus Studierendensicht

A. Zoyke, M. Beutner, P. Herrmann, D. Kundisch, J. Magenheim, J. Neugebauer, Das Hochschulwesen (2017), 65(1+2), pp. 48-52


Development of two novel face-recognition CAPTCHAs: a security and usability study

G. Schryen, G. Wagner, A. Schlegel, Computers & Security (2016), 60(July), pp. 95-116

CAPTCHAs are challenge-response tests that aim at preventing unwanted machines, including bots, from accessing web services while providing easy access for humans. Recent advances in artificial-intelligence based attacks show that the level of security provided by many state-of-the-art text-based CAPTCHAs is declining. At the same time, techniques for distorting and obscuring the text, which are used to maintain the level of security, make text-based CAPTCHAs diffcult to solve for humans, and thereby further degrade usability. The need for developing alternative types of CAPTCHAs which improve both, the current security and usability levels, has been emphasized by several researchers. With this study, we contribute to research through (1) the development of two new face recognition CAPTCHAs (Farett-Gender and Farett-Gender&Age), (2) the security analysis of both procedures, and (3) the provision of empirical evidence that one of the suggested CAPTCHAs (Farett-Gender) is similar to Google's reCAPTCHA and better than KCAPTCHA concerning effectiveness (error rates), superior to both regarding learnability and satisfaction but not effciency.


Dokumentenorientierte NoSQL-Datenbanken in skalierbaren Webanwendungen - Eine Analyse am Beispiel von MongoDB und der Webanwendung PINGO

C. Bach, D. Kundisch, J. Neumann, D. Schlangenotto, M. Whittaker, HMD Praxis der Wirtschaftsinformatik (2016), 53(4), pp. 486-498


Goals as Reference Points: Empirical Evidence from a Virtual Reward System

T. von Rechenberg, D. Gutt, D. Kundisch, Decision Analysis (2016)(2), pp. 153--171

Heath et al. (1999) propose a prospect theory model for goal behavior. Their analytical model is based on the assumption that goals inherit the main properties of the prospect theory value function, i.e., reference point dependence, loss aversion, and diminishing sensitivity. We investigate whether these main properties transfer to goal behavior in the field. We take user activity data from a gamified Question & Answer community and analyze how users adjust their contribution behavior in the days surrounding goal achievement, where goals are represented by badges. We find that users gradually increase their performance in the days prior to earning a badge, with performance peaking on the day of the promotion. In subsequent days, user performance gradually diminishes again, with the decline being strongest on the day immediately following the badge achievement. These findings reflect the characteristic S-shape of the prospect theory value function which is convex below the reference point and concave above it. Employing the target-based approach, we can interpret the value function as a cumulative density function of a unimodal probability distribution. Our results suggest that it is more likely that active members of the community focus on the next badge relative to the status already achieved, as their next goal and are less likely to focus on more remote (higher-ranked) badges. Our results thus support the transferability of the main properties of the prospect theory value function to goal behavior in the field and suggest a distinct shape of the value function around goals.


Intelligent work preparation in the cloud

G. Rehage, F.. Isenberg, R. Reisch, .J. Weber, .B. Jurke, .P. Pruschek, wt workshop technology online (2016)(1 / 2-2016), pp. 077-082


Projekt KUBAS: Koordination ungebundener Vor-Ort-Helfer

G. Rauchecker, G. Schryen, Im Einsatz (2016), 23, pp. 44-46


An approach for deadlock Prevention in decentralized controlled pre-­storage zones with dynamic behavior and time windows

.L. Kopecki, International Journal of Materials, Mechanics and Manufacturing (2015), 4(3), pp. 208-213


Analyzing Supply Chain Nodes in Heterogeneous Environments Based on Transaction Data with Respect to Independent Item Behavior

S. Lauck, S.. Boxnick, .L. Kopecki, International Journal of Advances in Computer Science & Its Applications - IJCSIA (2015), 5(1), pp. 41-45


IT-Sicherheit: Ökonomisch Planen und Bewerten

G. Schryen, E. Weishäupl, Managementkompass (2015)(2), pp. 17-18


Potenzialbeurteilung neuer Technologien im Prozesscontrolling

J. vom Brocke, O. Müller, S. Debortoli, N. Reuter, Controlling (2015), 26(2), pp. 83-89

DOI


Resource Planning in Disaster Response - Decision Support Models and Methodologies

G. Schryen, G. Rauchecker, M. Comes, Business & Information Systems Engineering (BISE) (2015), 57(4), pp. 243-259


Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty

T. Püschel, G. Schryen, D. Hristova, D. Neumann, European Journal of Operational Research (2015), 244(2), pp. 637-647

Cloud computing promises the flexible delivery of computing services in a pay-as-you-go manner. It allows customers to easily scale their infrastructure and save on the overall cost of operation. However Cloud service offerings can only thrive if customers are satisfied with service performance. Allow-ing instantaneous access and flexible scaling while maintaining the service levels and offering competitive prices poses a significant challenge to Cloud Computing providers. Furthermore services will remain available in the long run only if this business generates a stable revenue stream. To address these challenges we introduce novel policy-based service admission control mod-els that aim at maximizing the revenue of Cloud providers while taking in-formational uncertainty regarding resource requirements into account. Our evaluation shows that policy-based approaches statistically significantly out-perform first come first serve approaches, which are still state of the art. Furthermore the results give insights in how and to what extent uncertainty has a negative impact on revenue.


The Complexities of Self-Tracking - An Inquiry into User Reactions and Goal Attainment

M. Sjjklint, I.D. Constantiou, M. Trier, SSRN Electronic Journal (2015)

DOI


The Satisfied Patient 2.0: Analysis of anonymous doctor ratings to gain insight into patient sentimen

M. Geierhos, S. Schulze, ForschungsForum Paderborn (2015), 18, pp. 14-19


The satisfied patient 2.0: Analysis of anonymous doctor reviews to generate a patient mood

M. Geierhos, S. Schulze, ForschungsForum Paderborn (2015), 18, pp. 14-19


Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research

G. Schryen, Communications of the AIS (2015), 37(Art 12), pp. 286-325


Analyzing Cost and Risk Interaction Effects in IT Project Portfolios

B. Heinrich, D. Kundisch, S. Zimmermann, BIT - Banking and Information Technology (2014), 15(2), pp. 8-20


Beating Irrationality: Does Delegating to IT Alleviate the Sunk Cost Effect?

P. Herrmann, D. Kundisch, M. Rahman, Management Science (2014), 64(4), pp. 831-850


Business Models - An Information Systems Research Agenda

D. Veit, E. Clemons, A. Benlian, P. Buxmann, T. Hess, D. Kundisch, J. Leimeister, P. Loos, M. Spann, Business & Information Systems Engineering (2014), 6(1), pp. 45-53


Max number of publications reached - all publications can be found in our Research Infomation System.

Open list in Research Information System

Konferenzbeiträge


Open list in Research Information System

Buy, Sell, or Hold? Information Extraction from Stock Analyst Reports

Y.S. Lee, M. Geierhos, Springer, 2011, pp. 173–184


Using Sentiment Analysis on Local Up-to-the-Minute News: An Integrated Approach

J. Kersting, M. Geierhos, in: Proceedings of the 23rd International Conference on Information and Software Technologies, Communications in Computer and Information Science, Springer International Publishing, 2017, pp. 528-538


"I Can Simply…"? Theorizing Simplicity as a Design Principle and Usage Factor

M. Trier, A. Richter, Association for Information Systems. AIS Electronic Library (AISeL), 2013

The usage of social software to support collaboration and knowledge management in corporate intranets is a pervasive topic in practice and research. However, there remain many open research questions concerning its socio-technical system design. To address this gap and to contribute to a deeper understanding of the role and success of corporate social software, we first identify and conceptualize simplicity as an influential design principle and usage factor. We propose a theoretical framework that helps us to empirically study the role of simplicity based on six case vignettes of corporate social software implementation and use. From the theoretical basis and the empirical analysis we develop a series of theoretical propositions and discuss implications for IS design and adoption.


"Is it really fake? – Towards an Understanding of Fake News in Social Media Communication"

J. Meinert, M. Mirbabaie, S. Dungs, A. Aker, in: 20th International Conference on Human-Computer Interaction, Social Computing and Social Media, Springer, 2018


”Sorry, Too Much Information” Designing Online Review Systems that Support Information Search and Processing

K. Kutzner, M. Stadtländer, J. Seutter, D. Kundisch, R. Knackstedt, in: Proceedings of the 29th European Conference on Information Systems (ECIS), 2021


"Timing is Everything" — An Empirical Analysis of the Timing of Online Review Elicitation

M. Poniatowski, J. Seutter, D. Kundisch, in: Proceedings of the 42nd International Conference on Information Systems (ICIS), 2021


"What is it Good for - Absolutely Nothing?" Exploring the Influence of Task Meaning on Creativity in Crowdsourcing

T. Görzen, in: Proceedings of the 38th International Conference on Information Systems (ICIS), 2017


#IronyOff – Understanding the Usage of Irony on Twitter during a Corporate Crisis

M. Mirbabaie, S. Stieglitz, M. Ruiz Eiro, in: Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017


‘Conspiracy Machines’ - The Role of Social Bots during the COVID-19 ‘Infodemic’

J. Marx, F. Brünker, M. Mirbabaie, E. Hochstrate, in: Proceedings of the 31st Australasian Conference on Information Systems, 2020


'Show Me Your People Skills' - Employing CEO Branding for Corporate Reputation Management in Social Media

M. Mirbabaie, J. Marx, S. Stieglitz, in: Proceedings of the 14th International Conference on Wirtschaftsinformatik, 2019


‘The Tireless Selling-Machine’ – Commercial Deployment of Social Bots during Black Friday Season on Twitter

F. Brünker, J. Marx, B. Ross, M. Mirbabaie, S. Stieglitz, in: Proceedings of the 15. Internationaler Kongress Für Wirtschaftsinformatik, 2020


A Comparison of Multi-View Learning Strategies for Satellite Image-based Real Estate Appraisal

J. Kucklick, O. Müller, in: The AAAI-21 Workshop on Knowledge Discovery from Unstructured Data in Financial Services, 2021


A Comparison of the Usage of Different Approaches for the Management of Plant Engineering Projects

A. Akbulut, C. Laroque, S. Wenzel, .U. Jessen, in: Proceedings of the 2015 Winter Simulation Conference, IEEE Press, 2015

Customized planning, engineering and construction of one-of-a-kind products (like wind energy, biogas or power plants) are complex and contain a lot of risks and temporal uncertainties, e.g. of logistics and project schedules. Therefore the management of this kind of projects has to be supported by adequate methods for the estimation of project risks and uncertainties. Based on the results of the joint research project simject of the Universities of Paderborn and Kassel, which aims at the development of a demonstrator for simulation-based and logistic-integrated project planning and scheduling, this paper discusses the usage of different approaches for supporting project management of plant engineering projects. After a short introduction and description of the approaches to be compared a wind energy plant as evaluation model as well as the application of the different methods are presented. Additionally, the usage of the approaches is compared and the advantages and disadvantages are pointed out.


A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors

G. Schryen, in: 5th International Conference on IT Security Incident Management \& IT Forensics, 2009

While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments is still weak. Addressing this research gap, this paper presents a comprehensive empirical investigation of the patching behavior of software vendors/communities of widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. As the value of any empirical study relies on the quality of data available, this paper also discusses in detail data issues, explains to what extent the empirical analysis can be based on vulnerability data contained in the NIST National Vulnerability Database, and shows how data on vulnerability patches was collected by the author to support this study. The results of the analysis suggest that it is not the particular software development style that determines patching behavior, but rather the policy of the particular software vendor.


A Cross-Level Approach To Planning Changeability in Distribution Systems

K. Klingebiel, M. Winkler, A.. Klaas, C. Laroque, in: Proceedings of the 2012 Emerging M&S Applications in Industry & Academia Symposium, Spring Simulation Multiconference, 2012


A Data Mining Approach to Support a Data-Driven Scheduling System for Air Cargo Terminals

S. Boxnick, S. Lauck, J. Weber, in: Proceedings of the IEEE Asia-Pacific World Congress on Computer Science and Engineering 2014 (APWC on CSE 2014), 2014, pp. 180-187



A Decision Support System for IT Security Incident Management

G. Rauchecker, E. Yasasin, G. Schryen, in: 11th International Conference on Trust, Privacy, and Security in Digital Business (TRUSTBUS), 2014


A decision-theoretic foundation of IS business value research

G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010

Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. Three research tasks are essential requisites on the path towards addressing this criticism: the synthesis of knowledge, the identification of lack of knowledge, and the proposition of paths for closing knowledge gaps. This paper considers each of these tasks by a) synthesizing key research findings based on a comprehensive literature review, b) identifying and unfolding key limitations of current research, and c) applying a decision-theoretic perspective, which opens new horizons to IS business value research and shows paths for overcoming the limitations. The adoption of this perspective results in a decision-theoretic foundation of IS business value research and includes the proposition of a consistent terminology and a research model that frames further research.


A design research study on enhancing creativity-The case of developing product-service bundles

F. Müller-Wienbergen, S. Seidel, O. Müller, R. Knackstedt, J. Becker, in: European Conference on Information Systems, 2009


A Domain-Specific Modeling Language for Electric Vehicle Batteries

B. Klör, S. Bräuer, D. Beverungen, M. Monhof, in: Proceedings of the 12. International Conference on Wirtschaftsinformatik 2015 (WI 2015), 2015, pp. 1038--1054


A formal approach towards assessing the effectiveness of anti-spam procedures

G. Schryen, in: 39th Annual Hawaii International Conference on System Sciences, 2006

Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by deploying complementary anti-spam approaches. However, if we are to avert the danger of losing the Internet email service as a valuable, free, and worldwide medium of open communication, anti-spam activities should be performed more systematically than is done in current, mainly heuristic, anti-spam approaches. A formal framework within which the modes of spam delivery, anti-spam approaches, and their effectiveness can be investigated, may encourage a shift in methodology and pave the way for new, holistic anti-spam approaches. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton, and draws on automata theory to formally derive the modes of spam delivery possible. Finally the effectiveness of anti-spam approaches in terms of coverage of spamming modes is assessed.


A formal approach towards measuring trust in distributed systems

G. Schryen, M. Volkamer, S. Ries, in: Proceedings of the 26th Annual ACM Symposium on Applied Computing, 2011


A Framework for Design Research in the Service Science Discipline

J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuß, in: Americas Conference on Information Systems, 2009


A Fuzzy Model for IT Security Investments

G. Schryen, in: Sicherheit 2010 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin, Gesellschaft für Informatik, 2010, pp. 289-304

This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed model is complementary to robabilistic approaches and useful in situations where probabilistic information is either unavailable or not appropriate to reliably predict future conditions. We ?rst present the speci?cation of a formal security language that allows to specify under which conditions a distributed system is protected against security violations. We show that each term of the security language can be transformed into an equivalent propositional logic term. Then we use propositional logic terms to de?ne a fuzzy set based decision model. This optimization model incorporates uncertainty with regard to the impact of investments on the achieved security levels of components of the distributed system. The model also accounts for budget and security constraints, in order to be applicable in practice.


A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems

E. Yasasin, G. Rauchecker, J. Prester, G. Schryen, in: 1st Workshop on Security in highly connected IT systems (SHCIS 14), 2014


A gender perspective on business process management competences offered on professional online social networks

E. Gorbacheva, A. Stein, T. Schmiedel, O. Müller, in: European Conference on Information Systems, 2015

DOI


A Homeowner’s Guide to Airbnb: Theory and Empirical Evidence for Optimal Pricing Conditional on Online Ratings

J. Neumann, D. Gutt, in: Proceedings of the 25th Conference on Information Systems (ECIS), 2017

Optimal price setting in peer-to-peer markets featuring online ratings requires incorporating interactions between prices and ratings. Additionally, recent literature reports that online ratings in peer-to-peer markets tend to be inflated overall, undermining the reliability of online ratings as a quality signal. This study proposes a two-period model for optimal price setting that takes (potentially inflated) ratings into account. Our theoretical findings suggest that sellers in the medium-quality segment have an incentive to lower first-period prices to monetize on increased second-period ratings and that the possibility on monetizing on second-period ratings depends on the reliability of the rating system. Additionally, we find that total profits and prices increase with online ratings and additional quality signals. Empirically, conducting Difference-in-Difference regressions on a comprehensive panel data set from Airbnb, we can validate that price increases lead to lower ratings, and we find empirical support for the prediction that additional quality signals increase prices. Our work comes with substantial implications for sellers in peer-to-peer markets looking for an optimal price setting strategy. Moreover, we argue that our theoretical finding on the weights between online ratings and additional quality signals translates to conventional online markets.


A Market for Trading Used Electric Vehicle Batteries — Theoretical Foundations and Information Systems

B. Klör, D. Beverungen, S.. Bräuer, F. Plenter, M. Monhof, in: Proceedings of the Twenty-Third European Conference on Information Systems (ECIS 2015), 2015



A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory

E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information Systems, 2015

The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples.



A new Perspective on Resource Interactions in IT/IS Project Portfolio Selection

D. Kundisch, C. Meier, in: Proceedings of the European Conference on Information Systems (ECIS), 2011


A Procedure Model for Enhancing Ideation in the Collaborative Development of Business Ecosystems

C. Vorbohle, S. Gottschalk, D. Kundisch, G. Engels, N. Wünderlich, in: Tagungsband der contribution at: 17. Internationale Tagung Wirtschaftsinformatik 2022 (WI), 2021


A Renaissance of Context in Design Science Research

P. zur Heiden, D. Beverungen, in: Proceedings of the 55th Hawaii International Conference on System Sciences, 2022



A Rollercoaster of Emotions – A Semantic Analysis of Fundraising Campaigns over the Course of the COVID-19 Pandemic

N. Grieger, J. Seutter, D. Kundisch, in: Proceedings of the 28th Americas Conference on Information Systems (AMCIS), 2022


A Semi-Automated Approach for Generating Online Review Templates,

M. Poniatowski, J. Neumann, T. Görzen, D. Kundisch, in: Wirtschaftsinformatik Proceedings 2019, 2019


A Sequential Model for Global Spam-Classifying Processes

W. Burkart, S. Etschberger, C. Klein, D. Kundisch, in: Proceedings of the International Conference on Information Systems (ICIS), 2010


A Social Media Customer Service

M. Geierhos, Y.S. Lee, J. Schuster, D.. Kobothanass, M. Bargel, ACM, 2011


A Systematic Review of Empirical Affordance Studies: Recommendations for Affordance Research in Information Systems

J. Fromm, M. Mirbabaie, S. Stieglitz, in: Proceedings of the Twenty-Eight European Conference on Information Systems, 2020



A Technical Concept for Plant Engineering by Simulation-Based and Logistic-Integrated Project Management

T. Gutfeld, U. Jessen, S. Wenzel, C. Laroque, J. Weber, in: Proceedings of the 2014 Winter Simulation Conference, IEEE, 2014


A Variability Model for Store-oriented Software Ecosystems: An Enterprise Perspective

B. Jazayeri, O. Zimmermann, G. Engels, D. Kundisch, in: Proceedings of the 15th International Conference on Service Oriented Computing (ICSOC), Springer, 2017

Pioneers of today’s software industry like Salesforce and Apple have established successful ecosystems around their software platforms. Architectural knowledge of the existing ecosystems is implicit and fragmented among online documentation. In protection of intellectual property, existing documentation hardly reveals influential business strategies that affect the ecosystem structure. Thus, other platform providers can hardly learn from the existing ecosystems in order to systematically make reasonable design decisions with respect to their business strategies to create their own ecosystems. In this paper, we identify a variability model for architectural design decisions of a store-oriented software ecosystem product line from an enterprise perspective, comprising business, application, and infrastructure views. We derive the variability model from fragmentary material of existing ecosystems and a rigorous literature review using a research method based on the design science paradigm. To show its validity, we describe real-world ecosystems from diverse domains using the variability model. This knowledge helps platform providers to develop customized ecosystems or to recreate existing designs in a systematic way. This, in turn, contributes to an increase in designer and developer productivity.


Achieving More by Paying Less? How Bricks-and-Mortar Retailers Can Benefit by Bidding Less Aggressively in Paid Search

D. Schlangenotto, D. Kundisch, D. Gutt, in: Proceedings of the 38th International Conference on Information Systems (ICIS), Seoul, South Korea, 2017

Current research on paid search highlights its ability to enhance both online and offline conversions. Yet, research investigating the impact of placing paid search ads on less prominent positions on subsequent consumer behavior is limited to the online environment. This paper presents a field experiment using differences-in-differences analysis to investigate whether the targeting of a less prominent ad position can be beneficial for bricks-and-mortar retailers. Results indicate that paid search advertising budgets could be allocated more efficiently by targeting less prominent ad positions, thus allowing bricks-and-mortar retailers with a limited marketing budget to increase the reach of their marketing campaign, attract more consumers to their website and achieve an overall increase in conversions. Furthermore, the pay-per-click billing mechanism allows advertisers to increase their marketing reach at no additional cost. Consequently, bricks-and-mortar retailers should consider targeting less prominent ad positions to reduce advertising costs while simultaneously enhancing advertising benefits.


Achieving More by Paying Less? How Retailers can Benefit by Bidding Less Aggressively in Paid Search Auctions

D. Schlangenotto, D. Kundisch, in: Proceedings of the 24th European Conference on Information Systems (ECIS), 2017


Achieving more by saying less? On the Moderating Effect of Information Cues in Paid Search

D. Schlangenotto, D. Kundisch, in: Proceedings of the 50th annual Hawaii International Conference on System Sciences (HICSS), Waikoloa Village, HI, USA, 2017

Research on ad copy design is well-studied in the context of offline marketing. However, researchers have only recently started to investigate ad copies in the context of paid search, and have not yet explored the potential of information cues to enhance customers’ search process. In this paper we analyze the impact of an information cue on user behavior in ad copies. Contrary to prevalent advice, results suggest that reducing the number of words in an ad is not always beneficial. Users act quite differently (and unexpectedly) in response to an information cue depending on their search phrases. In turn, practitioners could leverage the observed moderating effect of an information cue to enhance paid search success. Furthermore, having detected deviating user behavior in terms of clicks and conversions, we provide first indicative evidence of a self-selection mechanism at play when paid search users respond to differently phrased ad copies.


Active Business Model Development Tools: Design Requirements

D. Szopinski, in: Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST), 2020


Algorithms for Max-Min Share Fair Allocation of Indivisible Chores

H. Aziz, G. Rauchecker, G. Schryen, T. Walsh, in: Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17), 2017, pp. 1-7

We consider Max-min Share (MmS) fair allocations of indivisible chores (items with negative utilities). We show that allocation of chores and classical allocation of goods (items with positive utilities) have some fundamental connections but also differences which prevent a straightforward application of algorithms for goods in the chores setting and viceversa. We prove that an MmS allocation does not need to exist for chores and computing an MmS allocation - if it exists - is strongly NP-hard. In view of these non-existence and complexity results, we present a polynomial-time 2-approximation algorithm for MmS fairness for chores. We then introduce a new fairness concept called optimal MmS that represents the best possible allocation in terms of MmS that is guaranteed to exist. We use connections to parallel machine scheduling to give (1) a polynomial-time approximation scheme for computing an optimal MmS allocation when the number of agents is fixed and (2) an effective and efficient heuristic with an ex-post worst-case analysis.


All Things Considered? – Technology Design Decision-making Characteristics in Digital Startups

N. Bohn, D. Kundisch, in: Proceedings of the 40th International Conference on Information Systems (ICIS), 2019


Ambidexterity in Service Innovation Research: A Systematic Literature Review

V. Wolf, in: Proceedings of the 14th International Conference on Wirtschaftsinformatik, 2019

Increased interconnectedness of multiple actors and digital resources in service eco-systems offer new opportunities for service innovation. In digitally transforming eco-systems, organizations need to explore and exploit innovation simultaneously, which is defined as ambidexterity. However, research on ambidextrous service innovation is scarce. We provide a systematic literature review based on the concepts of ambidexterity, offering two contributions. First, research strands are disconnected, emphasizing either exploration or exploitation of service innovation, despite an organizations’ need to accelerate innovation cycles of exploring and exploiting services. Second, a new framework for ambidextrous service innovation is provided, inspired by the dynamism and generative mechanisms of the ontologically related concept of organizational routines. The framework adopts the perspective of a mutually constitutive relationship between exploring new and exploiting current resources, activities, and knowledge. The findings remedy the scattered literature through a coherent perspective on service innovation that responds to organizations’ needs and guides future research.


An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness

G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010

Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research.


An Automatic Approach for Parameter Optimization of Material Flow Simulation Models based on Particle Swarm Optimization

C.. Laroque, .J. Pater, 2012, pp. 50-57

The analysis of production systems by the use of discrete, event-based simulation is widely used and accepted as decision support method. It aims either at the comparison of competitive designs or the identification of a “best possible” configuration of the simulation model. Here, combinatorial techniques of simulation and optimization methods support the user in finding optimal solutions, which typically result in long computation times and though often prohibit a practical application in today’s industry. This paper presents a fast converging procedure as a combination of a swarm heuristic, namely the particle swarm optimization, and the material flow simulation to close this gap. Faster convergence is realized by a specific extension of classic PSO implementations. First results show the applicability with a simulation reference model.


An e-mail honeypot addressing spammers' behavior in collecting and applying addresses

G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37-41

Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.


An Easy Extendable Modeling Framework for Discrete Event Simulation Models and their Visualization

H. Renken, C. Laroque, M. Fischer, in: Proceedings of The 25th European Simulation and Modelling Conference - ESM’2011, 2011


An Evolutionary Approach on Multi-objective Scheduling for Evolving Manufacturing Systems

B. Kl{\"o}pper, J.. Pater, W. Dangelmaier, in: Proceedings of the 47th Annual Hawaii International Conference on System Sciences, Computer Society Press, 2014

New paradigms for designing manufacturing systems, such as adaptive and service-oriented manufacturing systems or self-optimizing resources, introduce new degrees of freedom into manufacturing control. These paradigms lead to the research question how human decision makers can be enabled to exploit the high adaptability of the new manufacturing systems in accordance to the current requirements arising from quickly changing market requirements and demand for sustainable manufacturing. This contribution extends a scheduling model for self-optimizing and service-oriented manufacturing systems through the consideration of alternative resources and introduces a multi-objective scheduling concept based on evolutionary algorithms in combination with a new optimized type of crossover operator.


An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model

N. Bohn, D. Kundisch, in: Proceedings of the 39th International Conference on Information Systems (ICIS), 2018


An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model

N. Bohn, D. Kundisch, in: Proceedings of the 39th International Conference on Information Systems (ICIS), 2018


An ontology-based natural language service discovery engine--design and experimental evaluation

J. Becker, O. Müller, M. Woditsch, in: European Conference on Information Systems, 2010


An ontology-based service discovery approach for the provisioning of product-service bundles

R. Knackstedt, D. Kuropka, O. Müller, A. Polyvyanyy, in: European Conference on Information Systems, 2008


Analyzing Risk Interaction Effects among IT Projects based on Modern Portfolio Theory

B. Heinrich, D. Kundisch, S. Zimmermann, in: Tagungsband der Multikonferenz Wirtschaftsinformatik 2014 (MKWI), Universität Paderborn, 2014, pp. 1392-1403


Analyzing Supply Chain nodes in Heterogeneous Environments based on Transaction Data with Respect to Independent item Behavior

S. Lauck, S. Boxnick, .L. Kopecki, in: Proceedings of the 2nd International Conference on Advances in Computing, Electronics and Communication (ACEC-2014), 2014, pp. 142-146



Anwendungsszenarien als Werkzeug zur (V) Ermittlung des Nutzens von corporate social software

M. Trier, A. Richter, S. Mörl, M. Koch, in: 10th International Conference on Wirtschaftsinformatik, 2011


Anwendungsszenarien als Werkzeug zur (V)Ermittlung des Nutzens von Corporate Social Software

A. Richter, S. Mörl, M. Trier, M. Koch, 2011, pp. 1104-1113


Applying GPU Programming to Obtain Average AS/RS Performance in Optimal Zoned Aisles

S. Lauck, S. Boxnick, L. Kopecki, in: Proceedings of the IEEE Asia-Pacific World Congress on Computer Science and Engineering 2014 (APWC on CSE 2014), 2014, pp. 276-284


Applying heuristic methods for job scheduling in storage markets

J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010

In double-sided markets for computing resources an optimal allocation schedule among job offers and requests subject to relevant capacity constraints can be determined. With increasing storage demands and emerging storage services the question how to schedule storage jobs becomes more and more interesting. Since such scheduling problems are often in the class NP-complete an exact computation is not feasible in practice. On the other hand an approximation to the optimal solution can easily be found by means of using heuristics. The problem with this attempt is that the suggested solution may not be exactly optimal and is thus less satisfying. Considering the two above mentioned solution approaches one can clearly find a trade-off between the optimality of the solution and the efficiency to get to a solution at all. This work proposes to apply and combine heuristics in optimization to gain from both of their benefits while reducing the problematic aspects. Following this method it is assumed to get closer to the optimal solution in a shorter time compared to a full optimization.


Applying Simulation and Mathematical Programming on a Business Case Analysis for Setting up a Spare Part Logistics in the Construction Supply Industry

.W.. Dangelmaier, C. Laroque, R. Delius, J. Streichhan, in: Proceedings of The Third International Conference on Advances, Xpert Publishing Services, 2011, pp. 162-168

This paper describes how methods and techniques from different fields of research can be combined to evaluate cost-intensive and business-critical decisions regarding future market development. In their concrete application a leading company from the construction supply industry has to make a decision on setting up of a spare part logistic. Three future alternatives (negative, constant, positive market growth) on market trends are simulated with a Monte Carlo simulation by considering a given demand history and possible locations for storage facilities were isolated by applying the Steiner-Weber method. Finally solving a mixed-integer formulation of the Uncapacitated-Facility-Location-Problem gives information on opening/closing new/existing storage facilities by minimizing all relevant costs. The results of this approach, containing information about a cost-based evaluation of all business related decision criteria, were examined with a sensitivity analysis.


Approaches for Business Model Representation: An Overview

D. Kundisch, T. John, J. Honnacker, C. Meier, in: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI), 2012


Armed for the spam battle - a technological and organizational infrastructure framework

G. Schryen, in: 40th Annual Hawaii International Conference on System Sciences, 2007

Spamming remains a form of Internet abuse, which burdens the Internet infrastructure, is generally regarded as an annoyance, and is said to cause economic harm to the tune of about several billion US\$ per year. Many technological, organizational, and legislative anti-spam measures have already been proposed and implemented, but have not led to any substantial decrease in the number of spam e-mails. We propose here a new infrastructure framework that combines several anti-spam measures in a framework that features both a technological and an organizational facet. The key element of our infrastructure is a new organizational unit that reliably and transparently limits he number of e-mails that can be sent per day and per account. This paper first gives an overview of the framework, then it provides technological and organizational details of the infrastructure, the deployment of which depends to a large degree on its acceptance and propagation by the ICANN, the ISOC, and by large e-mail service providers. Finally, the paper discusses the limitations and drawbacks of the proposed framework.


Assumptions in Service Research --- A Multi-Theoretical Perspective on the Development of Standards for the Integration of Goods and Services

J. Becker, D. Beverungen, N. Blinn, M. Nüttgens, in: XX. International RESER Conference, 2010


Asynchronous Optimization Techniques for Distributed Computing Applications

R.. Reisch, J. Weber, C. Laroque, C. Schr{\"o}der, in: Proceedings of the 2015 Spring Simulation Multi-Conference, SCS (Society for Modeling & Simulation International), 2015


Augmented reality for teaching and learning--a literature review on theoretical and empirical foundations

P. Sommerauer, O. Müller, in: European Conference on Information Systems, 2018


Außerbörslicher Emittentenhandel: Handelsplatzwahl von Online-Investoren

D. Kundisch, T. Stuber, in: Wirtschaftsinformatik 2007 - eOrganisation: Service-, Prozess-, Market-Engineering, Universitätsverlag, 2007, pp. 651-668


Automated Model Verification using an Equivalence Test on a Reference Mode

A. Akbulut, .S.. Abke, .C. Laroque, in: Proceedings of the 2017 Winter Simulation Conference , Institute of Electrical and Electronics Engineers, Inc., 2017


Automated Negotiations Under Uncertain Preferences

F. Lang, G. Schryen, A. Fink, in: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 2011


Automatisierte Modellverifikation mithilfe einer Äquivalenzprüfung an einem Referenzmodell

A. Akbulut, C. Laroque, .W. Dangelmaier, Kassel University Press, 2017, pp. 189 - 198


Bank controlling using Basel II-data: Are internal approaches dispensable?

D. Kundisch, F. Loehner, D. Rudolph, M. Steudner, C. Weiss, in: 2007 Enterprise Risk Management Symposium Monograph, 2007


Because your taxonomy is worth it: Towards a framework for taxonomy evaluation

D. Szopinski, T. Schoormann, D. Kundisch, in: Proceedings of the 27th European Conference on Information Systems (ECIS), 2019


Behavioral Mechanisms Prompted by Badges: The Goal-Gradient Hypothesis

T. Mutter, D. Kundisch, in: Proceedings of the International Conference on Information Systems (ICIS), 2014


Behavioral Mechanisms Prompted by Virtual Rewards: The Small-Area Hypothesis

T. Mutter, D. Kundisch, in: Proceedings of the 23rd European Conference on Information Systems (ECIS), 2015


Bepreisungsansätze für verstopfte UMTS Mobilfunknetzwerke

D. Kundisch, A. Schell, Köllen Druck + Verlag, 2003, pp. 102-116


Beratungsqualität von Finanzdienstleistern am Beispiel von Online-Immobilienfinanzierungen mit KFW Darlehen

D. Kundisch, in: E-Commerce: Netze, Märkte, Technologien, 2002, pp. 159-179


Beschreib mir deine Wohnung und ich sag dir wer du bist - Eine explorative Analyse von Gastgeberpersönlichkeiten auf Airbnb

M. Müller, D. Gutt, J. Neumann, in: Multikonferenz Wirtschaftsinformatik (MKWI) 2018, 2018


Bitte stimmen Sie jetzt ab! - Ein Erfahrungsbericht über das Audience Response System PINGO

D. Kundisch, J. Neumann, D. Schlangenotto, in: Proceedings der 15. e-Learning Fachtagung Informatik (DELFI 2017), 2017


BlogForever: From web archiving to blog archiving

H. Kalb, P. Lazaridou, V. Banos, N. Kasioumis, M. Trier, in: INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt, Gesellschaft für Informatik e.V., 2013, pp. 536-549


Blogs as Objects of Preservation: Advancing the Discussion on Significant Properties

K. Stepanyan, G. Gkotsis, H. Kalb, Y. Kim, A.I.. Cristea, M. Joy, M. Trier, S. Ross, in: iPress 2012, University of Toronto Press, 2012, pp. 218-224

challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building on the existing InSPECT framework and improving its capabilities of working with complex/compound objects like blogs. The modifications enable a more thorough analysis of object structures, accentuate the differences and similarities between the framework’s two streams of analysis (i.e. Object and Stakeholder analysis) and, subsequently, improve the final reformulation of the properties. To demonstrate the applicability of the modified framework, thepaper presents a use case of a blog preservation initiative that is informed by stakeholder interviews and evaluation of structural and technological foundations of blogs. It concludes by discussing the limitations of the approach and suggesting directions for future research.


Business activity management for service networks in cloud environments

C. Janiesch, R. Fischer, M. Matzner, O. Müller, in: Workshop on Middleware for Service Oriented Computing, 2012, pp. 1 - 6

DOI


BUSINESS INTELLIGENCE & ANALYTICS COST ACCOUNTING: AN ACTION DESIGN RESEARCH APPROACH

R. Grytz, A. Krohn-Grimberghe, O. Müller, in: European Conference on Information Systems, 2020



Business Model Representation Incorporating Real Options: An Extension of e3-value

D. Kundisch, T. John, in: Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), 2012


Buyer Search Behavior on an Electronic Commodity Market: Consumer's Decision for a Sequential or Simultaneous Search Method

D. Kundisch, in: Proceedings of the International Conference on Electronic Commerce 2000 (ICEC), 2000, pp. 88-93


Can Experience be Trusted? Investigating the Effect of Experience on Decision Biases in Crowdworking Platforms

T. Görzen, in: Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), 2019


Can stimuli improve business model idea generation? Developing software-based tools for business model innovation

D. Szopinski, in: Proceedings of the ACM Creativity & Cognition, 2019

A business model describes the mechanisms whereby a firm creates, delivers, and captures value. Following the steadily growing interest in business model innovation, software tools have shown great potential in supporting business model development and innovation. Yet, understanding the cognitive processes involved in the generation of business model ideas is an aspect of software design-knowledge that has so far been neglected. To investigate whether providing stimuli – in this case, brainstorming questions – can enhance individual creativity in this context, we conduct an exploratory experiment with over 100 participants. Our study is the first to systematically investigate the process of idea generation using a software-based business model development tool with stimuli. Our preliminary findings have the potential to support the future development of business model development tools and to refine the research design used to evaluate such tools.


Can the Crowd Substitute Experts in Evaluation of Creative Ideas? An Experimental Study Using Business Models

T. Görzen, D. Kundisch, in: Proceedings of the 22nd Americas' Conference on Information Systems (AMCIS), 2016


Can the Crowd Substitute Experts in Evaluation of Creative Jobs? The Case of Business Models

T. Görzen, D. Kundisch, in: Proceedings of the 24th European Conference on Information Systems (ECIS), 2016


Capabilities for Ambidextrous Innovation of Digital Service

V. Wolf, H. Lüttenberg, in: Proceedings of the 15th International Conference on Wirtschaftsinformatik, 2020


Capitalizing on Social Media Analysis --- Insights from an Online Review on Business Models

A. Malsbender, D. Beverungen, M. Voigt, J. Becker, in: Proceedings of the Americas Conference on Information Systems (AMCIS2013), 2013


Cascaded Heterogeneous Simulations for Analysis of Mechatronic Systems in Large Scale Transportation Scenarios

.B.. Hassan, H.. Wassmann, A. Klaas, J.H. Kessler, in: Proceedings of the 2012 Emerging M&S Applications in Industry & Academia Symposium, Spring Simulation Multiconference,, 2012


Challenge Accepted! - The Impcat of Goal Achievement on Subsequent User Effort and Implications of a Goal's Difficulty

T. von Rechenberg, D. Gutt, in: Proceedings of the 24th Conference on Information Systems (ECIS), Istanbul, 2016

We empirically investigate the impact of successful goal achievement on future effort to attain the next goal in a recurring goal framework. We use data from a popular German Question & Answer community where goals are represented in the form of badges. In particular, our analysis of this data hinges on the fact, that in this Question & Answer community, badges in a hierarchical badge system are in-creasingly challenging to attain up to a certain badge. After this certain badge, the difficulty level sud-denly drops and remains constant throughout up to the last badge in the hierarchy. Our findings indi-cate that after successful badge achievement users increase their subsequent effort to attain the next badge, but only as long as badges represent a challenge to the user. According to our analysis, we identify self-learning to be the key driver of this behavior.


Max number of publications reached - all publications can be found in our Research Infomation System.

Open list in Research Information System

Monographien


Open list in Research Information System

Vermarktung hybrider Leistungsbündel

M. Weddeling, M. Steiner, O. Müller, R. Knackstedt, J. Becker, K. Backhaus, D. Beverungen, M. Frohs, Springer Berlin Heidelberg, 2010

DOI


Anti-Spam Measures: Analysis and Design

G. Schryen, Springer, 2007



Online Marktforschung im Mittelstand: Analyse von Konsumentenverhalten in 3D-Internet-Welten

G. Schryen, J. Herstell, M. Schoenen, Deutscher Universitäts-Verlag, 2003



Open list in Research Information System

Herausgegebene Bände


Open list in Research Information System

Tagungsband MKWI 2014 - Multikonferenz Wirtschaftsinformatik

D. Kundisch, L. Suhl, L. Beckmann. Tagungsband MKWI 2014 - Multikonferenz Wirtschaftsinformatik. 2014.


Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry

D. Kundisch, D. Veit, T. Weitzel, C. Weinhardt. Proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry. 2009.


Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik

H. Krallmann, M. Schönherr, M. Trier. Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik. 2007.


Open list in Research Information System

Buchkapitel in Herausgeberbänden


Open list in Research Information System

Feeless Micropayments and Their Impact on Business Models

M. Klein, D. Kundisch, C. Stummer, in: Handbuch Digitalisierung, Vahle, 2022


Exploiting Counterfactuals for Scalable Stochastic Optimization

S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science, 2019

DOI


Digitale Transformation von Dienstleistungssystemen

D. Beverungen, V. Wolf, C. Bartelheimer, in: Service Business Development, Springer Fachmedien Wiesbaden, 2018, pp. 395-422

DOI


Heuristics and Simulation for Water Tank Optimization

C. Hallmann, S.C. Burmeister, M. Wissing, L. Suhl, in: Communications in Computer and Information Science, 2018

DOI


Model Generator for Water Distribution Systems

C. Hallmann, S. Kuhlemann, in: Operations Research Proceedings, 2018

DOI


Service (Systems) Engineering für die Produktion

H. Lüttenberg, V. Wolf, D. Beverungen, in: Service Engineering, Springer Fachmedien Wiesbaden, 2018, pp. 31-49

DOI


The Quality of Tweets and the Adoption of Journalistic Norms

S. Kapidzic, C. Neuberger, S. Stieglitz, M. Mirbabaie, in: Trust in Media and Journalism: Empirical perspectives on ethics, norms, impacts and populism in Europe, Springer, 2018

DOI


End-of-Life Solutions für eCar-Batterien --- Entwicklung hybrider Leistungsbündel und Informationssysteme zur Entscheidungsunterstützung (EOL-IS)

J. Becker, M. Monhof, D. Beverungen, S. Bräuer, B. Klör, F. Plenter, in: Dienstleistungen als Erfolgsfaktor für Elektromobilität. Ergebnisse aus dem Förderschwerpunkt “Dienstleistungsinnovationen für Elektromobilität”, 2017, pp. 24--29


Guesswork? Resolving Vagueness in User-Generated Software Requirements

M. Geierhos, .F.S. Baeumer , in: Partiality and Underspecification in Information, Languages, and Knowledge, Cambridge Scholars Publishing, 2017, pp. 65-108


Informationsmodellierung in Dienstleistungssystemen

D. Beverungen, M.. Matzner, in: Handbuch Dienstleistungsmanagement, Verlag Franz Vahlen, 2017, pp. S. 519–536


Simulating Storage Policies for an Automated Grid-Based Warehouse System

M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in Computer Science, 2017

DOI


Was bedeutet die Transformation der Märkte im digitalen Zeitalter? Ökonomische Grundlagen

D. Kundisch, D. Gutt, in: Digitale Ökonomie - Wie verändern sich die Märkte?, 2017


Crawler (focused / not focused)

M. Geierhos, in: Encyclopedia {\ "a} the business informatics , 9th ed., GITO-Verlag, 2016



Running Out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions

F.S. Baeumer, M. Geierhos, in: Proceedings of the 22nd Conference on Information and Software Technologies (ICIST 2016), Springer International Publishing, 2016, pp. 549-558


Sentiment analysis

M. Geierhos, in: Encyclopedia {\ "a} the business informatics, 9th ed., GITO-Verlag, 2016


Text Mining

M. Geierhos, in: Encyclopedia {\ "a} the business informatics , 9th ed., GITO-Verlag, 2016


Time models for the classification and identification of production events

W. Dangelmaier, in: Megatrend digitization - potentials of work and company organization, GITO mbH, 2016, pp. 27-69


Webmonitoring

M. Geierhos, in: Encyclopedia {\ "a} the business informatics, 9th ed., GITO-Verlag, 2016


Wie verhalten sich Aktion{\"a}re bei Unternehmenszusammenschl{\"u}ssen? Modellierung sprachlicher Muster zur Analyse treibender Faktoren bei der Berichterstattung

S.C.. Stotz, M. Geierhos, in: DHd 2016: Modellierung - Vernetzung - Visualisierung. Die Digital Humanities als f{\"a}cher{\"u}bergreifendes Forschungsparadigma. Konferenzabstracts, Universit{\"a}t Leipzig, 2016, pp. 378-381


A System for Uncovering Latent Connectivity of Health Care Providers in Online Reviews

F.S. Baeumer, M. Geierhos, S. Schulze, in: Information and Software Technologies: 21th International Conference, ICIST 2015, Druskininkai, Lithuania, October 15-16, 2015, Proceedings,1st ed., Springer International Publishing, 2015, pp. 3-15


Filtering Reviews by Random Individual Error

M. Geierhos, .F.S.. Baeumer, S. Sabine, S. Valentina, in: Current Approaches in Applied Artificial Intelligence, Lecture Notes in Computer Science, Springer International Publishing Switzerland, 2015, pp. 305-315


Prescriptive Analytics for Planning Research-Performance Strategy

C. Minhee, J. Weber, .S.. Song, H. Jung, M. Lee, in: Computer Science and Its Applications - Ubiquitous Information Technologies, Springer Berlin/Heidelberg, 2015, pp. 1123-1129


Business Intelligence 2.0

S. Behrendt, A. Richter, S. Schäfer, M. Trier, in: Vernetzte Organisation, De Gruyter, 2014, pp. 318-329


Communication roles in public events: a case study on Twitter communications

M. Mirbabaie, C. Ehnis, S. Stieglitz, D. Bunker, in: Information systems and global assemblages: (re)configuring actors, artefacts, organizations: IFIP WG 8.2 Working Conference on Information Systems, Springer, 2014, pp. 207-218


Development of the RailCab Vehicle

K. Fla{\ss}kamp, .S.. Gr{\"o}sbrink, P. Hartmann, C. Heinzemann, B. Kleinjohann, L. Kleinjohann, .M. Kr{\"u}ger, .S. Ober-Bl{\"o}baum, C.. Priesterjahn, C. Rasche, W. Sch{\"a}fer, D.. Steenken, A. Tr{\"a}chtler, H. Wehrheim, S. Ziegert, in: Dependability of Self-Optimizing Mechatronic Systems, Springer-Verlag, Heidelberg, Germany, 2014, pp. 184-190


Effizienzmessung industrieller Dienstleistungen mittels Data Envelopment Analysis (ServDEA)

K. Backhaus, J. Becker, D. Beverungen, D. Breuker, O. Bröker, P. Alexander Brüne, H. Dietrich, R. Knackstedt, H. Peter Rauer, F. Reichle, R. Wilken, in: Produktivität von Dienstleistungen, 2014, pp. 53--133

DOI


Handbuch für offene gesellschaftliche Innovation

C. Raffl, J. Lucke, O. Müller, H. Zimmermann, J. Vom Brocke, in: TOGI-Schriftenreihe, ePubli GmbH, 2014


Towards a Local Grammar-based Persondata Generator for Wikipedia Biographies

M. Geierhos, in: Penser le Lexique-Grammaire, Honoré Champion, 2014, pp. 411-420


Current challenges in process simulation - sketch of a solution approach based on model-driven software development

W. Dangelmaier, C. Laroque, in: Production in Germany - Competitiveness in the 21st Century, GITO-Verlag, 2013


Softwaregestützte Konstruktion von Produktivitätsmodellen im Facility Management

J. Becker, T. Bernhold, D. Beverungen, N. Kaling, R. Knackstedt, L. Vanessa, H. Peter Rauer, in: Dienstleistungsmodellierung 2012: Product-Service Systems und Produktivität, 2013, pp. 208--226

DOI


A Method for Selectively Designing Modeling Languages for Product-Service Systems

J. Becker, D. Beverungen, R. Knackstedt, in: Modeling for Decision Support in Network-Based Services: The Application of Quantitative Modeling to Service Science, 2012, pp. 87--117


Ansätze zur methodischen Unterstützung der Konstruktion von Produktivitätsmodellen für die Data Envelopment Analysis --- Entwicklung eines Softwareprototypen zur Umsetzung und Evaluation

J. Becker, R. Knackstedt, D. Beverungen, H. Dietrich, D. Breuker, H. Peter Rauer, in: Service Engineering --- Management, 2012, pp. 127--139


IT-Projektportfolios mit Projektabhängigkeiten wertorientiert gestalten

S. Zimmermann, B. Heinrich, D. Kundisch, in: Organisation des IT-Projekt- und IT-Projektportfoliomanagements, 2012


Product-Service System Approaches

D. Beverungen, M. Matzner, O. Müller, J. Becker, in: Handbook of Service Description, 2012, pp. 19--44

DOI


Dynamische Analyse von Netzwerken elektronischer Kommunikation. Kann der Zentralität getraut werden?

M. Trier, A. Bobrik, in: Netzwerkanalyse und Netzwerktheorie, 2011

DOI


Engineering, Sales, and Delivery of Modular Value Bundles --- A Framework for Configurative Modeling

J. Becker, D. Beverungen, R. Knackstedt, A. Stein, in: Implementing International Services: A tailorable method for market assessment, modularization, and process transfer, 2011, pp. 399--424


Integrierte Informationslogistik in der hybriden Wertschöpfung

J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuß, in: Mit Dienstleistungen die Zukunft gestalten: Impulse aus Forschung und Praxis. Beiträge der 8. Dienstleistungstagung des BMBF, 2011, pp. 247--255


Analyzing the Dynamics of Community Formation Using Brokering Activities

M. Trier, A. Bobrik, in: Communities and Technologies 2007, 2010

DOI


E-Services im Handel --- Auffindung und Dokumentation von Potenzialen zur Digitalisierung von Dienstleistungen für Hersteller und Kunden

D. Beverungen, R. Knackstedt, A. Winkelmann, in: Vertriebsinformationssysteme --- Standardisierung, Individualisierung, Hybridisierung und Internetisierung, 2010, pp. 177--193

DOI


Online-Produktkonfiguratoren – Status quo und Entwicklungsperspektiven

J. Becker, R. Knackstedt, O. Müller, A. Benölken, O. Schmitt, M. Thillainathan, A. Schulke, in: Vertriebsinformationssysteme, Springer-Verlag, 2010, pp. 85 - 104

DOI


Struktur und Dynamik in der Netzwerkanalyse

M. Trier, in: Handbuch Netzwerkforschung, 2010

DOI


TCO-as-a-Service --- Servicebasierte Lebenszyklusrechnung für hybride Leistungsbündel

J. Becker, D. Beverungen, R. Knackstedt, O. Müller, S. Müller, in: Vertriebsinformationssysteme --- Standardisierung, Individualisierung, Hybridisierung und Internetisierung, 2010, pp. 161--174

DOI


Towards a Systematic Approach for Capturing Knowledge-Intensive Business Processes

M. Trier, C. Müller, in: Practical Aspects of Knowledge Management, 2010

DOI


Comparing Architectural Styles for Service-Oriented Architectures – a REST vs. SOAP Case Study

J. Becker, M. Matzner, O. Müller, in: Information Systems Development, Springer, 2009, pp. 207-215

DOI


Technical Analysis as a Method of Risk Management

G. Dorfleitner, C. Klein, D. Kundisch, in: Monetary Growth: Trends, Impacts and Policies, Nova Science Publishers, 2009


Konzeption einer Modellierungssprache zur softwarewerkzeugunterstützten Modellierung, Konfiguration und Bewertung hybrider Leistungsbündel

J. Becker, D. Beverungen, R. Knackstedt, O. Müller, in: Dienstleistungsmodellierung --- Methoden, Werkzeuge und Branchenlösungen, 2008, pp. 53--70


Ordnungsrahmen für die hybride Wertschöpfung

J. Becker, D. Beverungen, R. Knackstedt, C. Glauner, M. Stypmann, C. Rosenkranz, R. Schmitt, S. Hatfield, G. Schmitz, S. Eberhardt, M. Dietz, O. Thomas, P. Walter, H. Lönngren, J. Leimeister, in: Dienstleistungsmodellierung --- Methoden, Werkzeuge und Branchenlösungen, 2008, pp. 109--128

DOI


SCORM (Shared Content Object Reference Model)

M. Trier, in: Enzyklopädie der Wirtschaftsinformatik – Online-Lexikon, 2nd ed., Oldenbourg, 2008


Serviceorientierte Informationssystemarchitekturen zur Integration von Produktion und Dienstleistung am Beispiel des WEEE-Recycling

R. Knackstedt, O. Müller, in: Wertschöpfungsnetzwerke, Physica-Verlag HD, 2008, pp. 235-252

DOI


Stammdatenkonzept für elektronische Verkaufsförderungsaktionen im Wertschöpfungsdreieck Hersteller, Händler und Kunde

J. Becker, A. Winkelmann, D. Beverungen, C. Janiesch, in: Wertschöpfungsnetzwerke: Konzepte für das Netzwerkmanagement und Potenziale aktueller Informationstechnologien, 2008, pp. 193--208


Systemanalyse

H. Krallmann, M. Trier, in: Enzyklopädie der Wirtschaftsinformatik – Online-Lexikon, 2nd ed., Oldenbourg, 2008


Wertschöpfungsnetzwerke von Produzenten und Dienstleistern als Option zur Organisation der Erstellung hybrider Leistungsbündel

J. Becker, D. Beverungen, R. Knackstedt, in: Wertschöpfungsnetzwerke --- Konzepte für das Netzwerkmanagement und Potenziale aktueller Informationstechnologien, 2008, pp. 3--31

DOI


Workflow-Modellierung

H. Krallmann, M. Trier, in: Enzyklopädie der Wirtschaftsinformatik – Online-Lexikon, 2nd ed., Oldenbourg, 2008


Zahlungsbereitschaften für Geschäftsmodelle produktbegleitender Dienstleistungen --- Wirtschaftlichkeit bei der Vermarktung hybrider Produkte

K. Backhaus, J. Becker, D. Beverungen, R. Knackstedt, M. Weddeling, in: Technologie und Dienstleistung: Innovationen in Forschung, Wissenschaft und Unternehmen Beiträge der 7. Dienstleistungstagung des BMBF, 2008, pp. 383--391


A Scalable and Flexible Infrastructure Framework For Addressing Spam

G. Schryen, in: Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research, ICFAI University Press, 2007, pp. 55-64


Approaches Addressing Spam

G. Schryen, in: Spam: An Introduction, ICFAI University Press, 2007, pp. 41-57


Content und Kommunikation: Von der Dichotomie zur Kombination

M. Trier, in: Content Engineering, GITO Verlag, 2007, pp. 33-52


IT-gestützte Visualisierung und Analyse von virtuellen Kontaktnetzwerken - Anwendungsfelder, Methodik und Vorteile

A. Bobrik, M. Trier, in: Analyse sozialer Netzwerke und Social Software - Grundlagen und Anwendungsbeispiele, Gito Verlag, 2007


Location Based Services

G. Schryen, in: Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Interest-Verlag, 2007


Modellüberblick

A. Bobrik, M. Trier, in: Systemanalyse im Unternehmen – Prozessorientierte Methoden in der Wirtschaftsinformatik, 5th ed., Oldenbourg Verlag, 2007


Projektmanagement

H. Frank, M. Trier, in: Systemanalyse im Unternehmen – Prozessorientierte Methoden in der Wirtschaftsinformatik, 5th ed., Oldenbourg Verlag, 2007


Spam-Emails

G. Schryen, in: Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Edition 02/2007, Interest-Verlag, 2007


Systemanalyse

H. Krallmann, M. Trier, in: Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik, 5th ed., Oldenbourg Verlag, 2007


Systemanalyse im Wissensmanagement

M. Trier, A. Bobrik, in: Systemanalyse im Unternehmen - Prozessorientierte Methoden der Wirtschaftsinformatik, 5th ed., Oldenbourg Verlag, 2007


Systemanalyse zur Verbesserung von Geschäftsprozessen

S. Aier, N. Haarlaender, in: Systemanalyse im Unternehmen : Prozessorientierte Methoden der Wirtschaftsinformatik, Oldenbourg, 2007, pp. 229-248


Systemtheorie und Modell

M. Trier, A. Bobrik, N. Neumann, B. Wyssussek, in: Systemanalyse im Unternehmen – Prozessorientierte Methoden in der Wirtschaftsinformatik, 5th ed., Oldenbourg Verlag, 2007




Netzwerkorientiertes Wissensmanagement und seine Unterstützung durch Softwarewerkzeuge

H. Krallmann, M. Trier, in: Strategisches Wertschöpfungsmanagement in dynamischer Umwelt: Festschrift für Erich Zahn,1st ed., Lang, Peter Frankfurt, 2005


Process-Oriented Production of Learning Units for Sustainable E-Learning Offerings

C. Müller, M. Trier, M.A. Herzog, in: E-Learning, 2005

DOI


Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz?

G. Schryen, in: Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung, KOPAED-Verlag, 2004, pp. 45-51


E-Democracy: Internet Voting

G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2, IADIS Press, 2003, pp. 1017-1021

Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out.


Wissensmanagement

M.. Schoenherr, M. Trier, in: Systemanalyse im Unternehmen , 4th ed., R. Oldenbourg, 2002


Open list in Research Information System

The University for the Information Society