TY - CHAP A1 - Apelojg, Benjamin T1 - Teachers do not make mistakes? BT - two exploratives case studies ; Relationships between biographical aspects, thinking, behavioral patterns and experiences in classes ; First results of a qualitative study on the aspect of dealing with mistakes T2 - ATLAS.ti User Conference 2015 N2 - This article provides some insights into the complex relationships between thinking and behavioral patterns, bio­ graphical aspects and teaching style. The data was analyzed in the Grounded Theory tradition and with the help of ATLAS.ti. The results presented here offer preliminary findings only since the research is still ongoing. The focus is on the ways teachers deal with mistakes. Based on two case examples, it will be shown how the fear of making mistakes can lead to teacher-centered lessons, and thereby limiting pupils' possibilities to learn autonomously. KW - Umgang mit Fehlern KW - Didaktik KW - persönliche Entwicklung KW - Lernen KW - Auswirkungen auf Schüler KW - Dealing with mistakes KW - personal development KW - learning KW - teaching KW - effects on pupils KW - ATLAS.t Y1 - 2016 SN - 978-3-7983-2822-8 U6 - https://doi.org/10.14279/depositonce-5159 SP - 1 EP - 9 PB - Universitätsverlag der TU-Berlin CY - Berlin ER - TY - CHAP A1 - Bender, Benedict A1 - Fabian, Benjamin A1 - Lessmann, Stefan A1 - Haupt, Johannes T1 - E-Mail Tracking BT - status quo and novel countermeasures T2 - Proceedings of the 37th International Conference on Information Systems (ICIS) N2 - E-mail advertisement, as one instrument in the marketing mix, allows companies to collect fine-grained behavioural data about individual users’ e-mail reading habits realised through sophisticated tracking mechanisms. Such tracking can be harmful for user privacy and security. This problem is especially severe since e-mail tracking techniques gather data without user consent. Striving to increase privacy and security in e-mail communication, the paper makes three contributions. First, a large database of newsletter e-mails is developed. This data facilitates investigating the prevalence of e- mail tracking among 300 global enterprises from Germany, the United Kingdom and the United States. Second, countermeasures are developed for automatically identifying and blocking e-mail tracking mechanisms without impeding the user experience. The approach consists of identifying important tracking descriptors and creating a neural network-based detection model. Last, the effectiveness of the proposed approach is established by means of empirical experimentation. The results suggest a classification accuracy of 99.99%. KW - E-Mail Tracking KW - Countermeasures KW - Privacy KW - Security KW - Machine Learning Y1 - 2016 UR - https://aisel.aisnet.org/icis2016/ISSecurity/Presentations/13/ ER - TY - CHAP A1 - Glaschke, Christian A1 - Gronau, Norbert A1 - Bender, Benedict T1 - Cross-System Process Mining using RFID Technology T2 - Proceedings of the Sixth International Symposium on Business Modeling and Software Design - BMSD N2 - In times of digitalization, the collection and modeling of business processes is still a challenge for companies. The demand for trustworthy process models that reflect the actual execution steps therefore increases. The respective kinds of processes significantly determine both, business process analysis and the conception of future target processes and they are the starting point for any kind of change initiatives. Existing approaches to model as-is processes, like process mining, are exclusively focused on reconstruction. Therefore, transactional protocols and limited data from a single application system are used. Heterogeneous application landscapes and business processes that are executed across multiple application systems, on the contrary, are one of the main challenges in process mining research. Using RFID technology is hence one approach to close the existing gap between different application systems. This paper focuses on methods for data collection from real world objects via RFID technology and possible combinations with application data (process mining) in order to realize a cross system mining approach. KW - Process Mining KW - RFID KW - Production KW - Cross-System Y1 - 2016 SN - 978-989-758-190-8 U6 - https://doi.org/10.5220/0006223501790186 SP - 179 EP - 186 PB - SCITEPRESS - Science and Technology Publications CY - Setúbal ER - TY - CHAP A1 - Gronau, Norbert A1 - Grum, Marcus A1 - Bender, Benedict T1 - Determining the optimal level of autonomy in cyber-physical production systems T2 - IEEE 14th International Conference on Industrial Informatics (INDIN) N2 - Traditional production systems are enhanced by cyber-physical systems (CPS) and Internet of Things. A kind of next generation systems, those cyber-physical production systems (CPPS) are able to raise the level of autonomy of its production components. To find the optimal degree of autonomy in a given context, a research approach is formulated using a simulation concept. Based on requirements and assumptions, a cyber-physical market is modeled and qualitative hypotheses are formulated, which will be verified with the help of the CPPS of a hybrid simulation environment. KW - cyber-physical systems KW - hybrid simulation KW - Internet of Things KW - manufacturing systems KW - production engineering computing KW - cyber-physical production systems Y1 - 2017 U6 - https://doi.org/10.1109/INDIN.2016.7819367 SP - 1293 EP - 1299 PB - IEEE CY - New York ER - TY - CHAP A1 - Kiy, Alexander A1 - Lucke, Ulrike T1 - Technical Approaches for Personal Learning Environments BT - Identifying Archetypes from a Literature Review T2 - 2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT) N2 - The term Personal Learning Environment (PLE) is associated with the desire to put the learner in control of his own learning process, so that he is able to set and accomplish the desired learning goals at the right time with the learning environment chosen by him. Gradually, such a learning environment includes several digital content, services and tools. It is thus summarized as the Virtual Learning Environment (VLE). Even though the construction of an individual PLE is a complex task, several approaches to support this process already exist. They mostly occur under the umbrella term PLE or with little accentuations like iPLE, which especially live within the context of institutions. This paper sums up the variety of attempts and technical approaches to establish a PLE and suggests a categorization for them. Y1 - 2016 U6 - https://doi.org/10.1109/icalt.2016.122 ER - TY - CHAP ED - Meinel, Christoph ED - Polze, Andreas ED - Oswald, Gerhard ED - Strotmann, Rolf ED - Seibold, Ulrich ED - Schulzki, Bernhard T1 - HPI Future SOC Lab BT - Proceedings 2016 N2 - The “HPI Future SOC Lab” is a cooperation of the Hasso Plattner Institute (HPI) and industrial partners. Its mission is to enable and promote exchange and interaction between the research community and the industrial partners. The HPI Future SOC Lab provides researchers with free of charge access to a complete infrastructure of state of the art hard and software. This infrastructure includes components, which might be too expensive for an ordinary research environment, such as servers with up to 64 cores and 2 TB main memory. The offerings address researchers particularly from but not limited to the areas of computer science and business information systems. Main areas of research include cloud computing, parallelization, and In-Memory technologies. This technical report presents results of research projects executed in 2016. Selected projects have presented their results on April 5th and November 3th 2016 at the Future SOC Lab Day events. N2 - Das Future SOC Lab am HPI ist eine Kooperation des Hasso-Plattner-Instituts mit verschiedenen Industriepartnern. Seine Aufgabe ist die Ermöglichung und Förderung des Austausches zwischen Forschungsgemeinschaft und Industrie. Am Lab wird interessierten Wissenschaftlern eine Infrastruktur von neuester Hard- und Software kostenfrei für Forschungszwecke zur Verfügung gestellt. Dazu zählen teilweise noch nicht am Markt verfügbare Technologien, die im normalen Hochschulbereich in der Regel nicht zu finanzieren wären, bspw. Server mit bis zu 64 Cores und 2 TB Hauptspeicher. Diese Angebote richten sich insbesondere an Wissenschaftler in den Gebieten Informatik und Wirtschaftsinformatik. Einige der Schwerpunkte sind Cloud Computing, Parallelisierung und In-Memory Technologien. In diesem Technischen Bericht werden die Ergebnisse der Forschungsprojekte des Jahres 2016 vorgestellt. Ausgewählte Projekte stellten ihre Ergebnisse am 5. April 2016 und 3. November 2016 im Rahmen der Future SOC Lab Tag Veranstaltungen vor. KW - Future SOC Lab KW - research projects KW - multicore architectures KW - In-Memory technology KW - cloud computing KW - machine learning KW - artifical intelligence KW - Future SOC Lab KW - Forschungsprojekte KW - Multicore Architekturen KW - In-Memory Technologie KW - Cloud Computing KW - maschinelles Lernen KW - künstliche Intelligenz Y1 - 2016 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:kobv:517-opus4-406787 ER -