TY - CHAP A1 - Fabian, Benjamin A1 - Bender, Benedict A1 - Weimann, Lars T1 - E-Mail tracking in online marketing BT - Methods, Detection, and Usage T2 - Proceedings of the 12th International Conference on Wirtschaftsinformatik N2 - E-Mail tracking uses personalized links and pictures for gathering information on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing purposes. On the other hand, privacy and security requirements of customers could be violated by tracking. This paper examines how e-mail tracking works, how it can be detected automatically, and to what extent it is used in German e-commerce. We develop a detection model and software tool in order to collect and analyze more than 600 newsletter e-mails from companies of several different industries. The results show that the usage of e-mail tracking in Germany is prevalent but also varies depending on the industry. KW - E-Mail Tracking KW - Online Marketing KW - Privacy Y1 - 2015 UR - https://aisel.aisnet.org/wi2015/74 SN - 978-3-00-049184-9 IS - 74 PB - Associations for Information Systems AIS CY - Atlanta ER - TY - CHAP A1 - Bender, Benedict A1 - Grum, Marcus T1 - Entwicklung eines Architekturkonzepts zum flexiblen Einsatz von Analytics T2 - Proceedings INFORMATIK - Jahrestagung der Gesellschaft für Informatik e.V. ; Lecture Notes in Informatics (LNI) N2 - Die optimale Dimensionierung von IT-Hardware stellt Entscheider aufgrund der stetigen Weiterentwicklung zunehmend vor Herausforderungen. Dies gilt im Speziellen auch für Analytics-Infrastrukturen, die zunehmend auch neue Software zur Analyse von Daten einsetzen, welche in den Ressourcenanforderungen stark variieren. Damit eine flexible und gleichzeitig effiziente Gestaltung von Analytics-Infrastrukturen erreicht werden kann, wird ein dynamisch arbeitendes Architekturkonzept vorgeschlagen, das Aufgaben auf Basis einer systemspezifischen Entscheidungsmaxime mit Hilfe einer Eskalationsmatrix verteilt und hierfür Aufgabencharakteristiken sowie verfügbare Hardwareausstattungen entsprechend ihrer Auslastung berücksichtigt. KW - Analytics KW - Architekturkonzept KW - Cyber-Phsysische Systeme KW - Cloud KW - Internet of Things Y1 - 2016 UR - https://dl.gi.de/handle/20.500.12116/1189 IS - P259 SP - 815 EP - 824 PB - Gesellschaft für Informatik e.V. CY - Bonn ER - TY - CHAP A1 - Gronau, Norbert A1 - Grum, Marcus A1 - Bender, Benedict T1 - Determining the optimal level of autonomy in cyber-physical production systems T2 - IEEE 14th International Conference on Industrial Informatics (INDIN) N2 - Traditional production systems are enhanced by cyber-physical systems (CPS) and Internet of Things. A kind of next generation systems, those cyber-physical production systems (CPPS) are able to raise the level of autonomy of its production components. To find the optimal degree of autonomy in a given context, a research approach is formulated using a simulation concept. Based on requirements and assumptions, a cyber-physical market is modeled and qualitative hypotheses are formulated, which will be verified with the help of the CPPS of a hybrid simulation environment. KW - cyber-physical systems KW - hybrid simulation KW - Internet of Things KW - manufacturing systems KW - production engineering computing KW - cyber-physical production systems Y1 - 2017 U6 - https://doi.org/10.1109/INDIN.2016.7819367 SP - 1293 EP - 1299 PB - IEEE CY - New York ER - TY - CHAP A1 - Bender, Benedict A1 - Fabian, Benjamin A1 - Lessmann, Stefan A1 - Haupt, Johannes T1 - E-Mail Tracking BT - status quo and novel countermeasures T2 - Proceedings of the 37th International Conference on Information Systems (ICIS) N2 - E-mail advertisement, as one instrument in the marketing mix, allows companies to collect fine-grained behavioural data about individual users’ e-mail reading habits realised through sophisticated tracking mechanisms. Such tracking can be harmful for user privacy and security. This problem is especially severe since e-mail tracking techniques gather data without user consent. Striving to increase privacy and security in e-mail communication, the paper makes three contributions. First, a large database of newsletter e-mails is developed. This data facilitates investigating the prevalence of e- mail tracking among 300 global enterprises from Germany, the United Kingdom and the United States. Second, countermeasures are developed for automatically identifying and blocking e-mail tracking mechanisms without impeding the user experience. The approach consists of identifying important tracking descriptors and creating a neural network-based detection model. Last, the effectiveness of the proposed approach is established by means of empirical experimentation. The results suggest a classification accuracy of 99.99%. KW - E-Mail Tracking KW - Countermeasures KW - Privacy KW - Security KW - Machine Learning Y1 - 2016 UR - https://aisel.aisnet.org/icis2016/ISSecurity/Presentations/13/ ER - TY - CHAP A1 - Glaschke, Christian A1 - Gronau, Norbert A1 - Bender, Benedict T1 - Cross-System Process Mining using RFID Technology T2 - Proceedings of the Sixth International Symposium on Business Modeling and Software Design - BMSD N2 - In times of digitalization, the collection and modeling of business processes is still a challenge for companies. The demand for trustworthy process models that reflect the actual execution steps therefore increases. The respective kinds of processes significantly determine both, business process analysis and the conception of future target processes and they are the starting point for any kind of change initiatives. Existing approaches to model as-is processes, like process mining, are exclusively focused on reconstruction. Therefore, transactional protocols and limited data from a single application system are used. Heterogeneous application landscapes and business processes that are executed across multiple application systems, on the contrary, are one of the main challenges in process mining research. Using RFID technology is hence one approach to close the existing gap between different application systems. This paper focuses on methods for data collection from real world objects via RFID technology and possible combinations with application data (process mining) in order to realize a cross system mining approach. KW - Process Mining KW - RFID KW - Production KW - Cross-System Y1 - 2016 SN - 978-989-758-190-8 U6 - https://doi.org/10.5220/0006223501790186 SP - 179 EP - 186 PB - SCITEPRESS - Science and Technology Publications CY - Setúbal ER - TY - CHAP A1 - Grum, Marcus A1 - Bender, Benedict A1 - Alfa, Attahiru S. T1 - The construction of a common objective function for analytical infrastructures T2 - 2017 International Conference on Engineering, Technology and Innovation (ICE/ITMC) N2 - The paper deals with the increasing growth of embedded systems and their role within structures similar to the Internet (Internet of Things) as those that provide calculating power and are more or less appropriate for analytical tasks. Faced with the example of a cyber-physical manufacturing system, a common objective function is developed with the intention to measure efficient task processing within analytical infrastructures. A first validation is realized on base of an expert panel. KW - Analytic Infrastructures KW - Cyber-Physical Manufacturing Systems KW - Measuring Efficient Task Processing Y1 - 2018 U6 - https://doi.org/10.1109/ICE.2017.8279892 SP - 219 EP - 225 PB - IEEE CY - New York ER - TY - CHAP A1 - Bender, Benedict A1 - Gronau, Norbert T1 - Coring on Digital Platforms BT - Fundamentals and Examples from the Mobile Device Sector T2 - Proceedings of the 38th International Conference on Information Systems (ICIS) N2 - Today’s mobile devices are part of powerful business ecosystems, which usually involve digital platforms. To better understand the complex phenomenon of coring and related dynamics, this paper presents a case study comparing iMessage as part of Apple’s iOS and WhatsApp. Specifically, it investigates activities regarding platform coring, as the integration of several functionalities provided by third-party applications in the platform core. The paper makes three contributions. First, a systematization of coring activities is developed. Coring modes are differentiated by the amount of coring and application maintenance. Second, the case study revealed that the phenomenon of platform coring is present on digital platforms for mobile devices. Third, the fundamentals of coring are discussed as a first step towards theoretical development. Even though coring constitutes a potential threat for third-party developers regarding their functional differentiation, an idea of what a beneficial partnership incorporating coring activities could look like is developed here. KW - Coring KW - Digital Platforms KW - Digital Marketplaces KW - Mobile Software Ecosystems Y1 - 2017 UR - https://aisel.aisnet.org/icis2017/DigitalPlatforms/Presentations/6/ SN - 978-0-9966831-5-9 IS - 8 SP - 5256 EP - 5274 PB - Association for Information Systems (AIS) CY - Atlanta ER - TY - CHAP A1 - Bender, Benedict A1 - Fabian, Benjamin A1 - Haupt, Johannes A1 - Neumann, Tom T1 - Track and Treat BT - usage of e-mail tracking for newsletter individualization T2 - Twenty-Sixth European Conference on Information Systems (ECIS 2018) N2 - E-Mail tracking mechanisms gather information on individual recipients’ reading behavior. Previous studies show that e-mail newsletters commonly include tracking elements. However, prior work does not examine the degree to which e-mail senders actually employ gathered user information. The paper closes this research gap by means of an experimental study to clarify the use of tracking-based infor- mation. To that end, twelve mail accounts are created, each of which subscribes to a pre-defined set of newsletters from companies based in Germany, the UK, and the USA. Systematically varying e-mail reading patterns across accounts, each account simulates a different type of user with individual read- ing behavior. Assuming senders to track e-mail reading habits, we expect changes in mailer behavior. The analysis confirms the prominence of tracking in that over 92% of the newsletter e-mails contain tracking images. For 13 out of 44 senders an adjustment of communication policy in response to user reading behavior is observed. Observed effects include sending newsletters at different times, adapting advertised products to match the users’ IT environment, increased or decreased mailing frequency, and mobile-specific adjustments. Regarding legal issues, not all companies that adapt the mail-sending behavior state the usage of such mechanisms in their privacy policy. KW - E-Mail Tracking KW - Newsletter KW - Individualization KW - Personalization KW - Privacy Y1 - 2018 UR - https://aisel.aisnet.org/ecis2018_rp/59 ER - TY - CHAP A1 - Ermakova, Tatiana A1 - Fabian, Benjamin A1 - Bender, Benedict A1 - Klimek, Kerstin T1 - Web Tracking BT - a literature review on the state of research T2 - Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS 51) N2 - Web tracking seems to become ubiquitous in online business and leads to increased privacy concerns of users. This paper provides an overview over the current state of the art of web-tracking research, aiming to reveal the relevance and methodologies of this research area and creates a foundation for future work. In particular, this study addresses the following research questions: What methods are followed? What results have been achieved so far? What are potential future research areas? For these goals, a structured literature review based upon an established methodological framework is conducted. The identified articles are investigated with respect to the applied research methodologies and the aspects of web tracking they emphasize. KW - Information Security and Privacy KW - literature review KW - privacy KW - web-tracking Y1 - 2018 U6 - https://doi.org/10.24251/HICSS.2018.596 SN - 2572-6862 SP - 4732 EP - 4741 PB - HICSS Conference Office University of Hawaii at Manoa CY - Maile Way ER - TY - CHAP A1 - Bender, Benedict A1 - Thim, Christof A1 - Linke, Felix T1 - Platform coring in the browser domain BT - an exploratory study T2 - Proceedings Information Systems - The Heart of Innovation Ecosystems (ICIS 2019) N2 - Modern web browsers are digital software platforms, as they allow third-parties to extend functionality by providing extensions. Given the intense competition, differentiation through provided functionality is a key factor for browser platforms. As browsers progress, they constantly release new features. Browsers might thereby enter complementary markets if they add functionality formerly provided by third-party extensions, which is referred to as ‘platform coring’. Previous studies missed the perspective of the involved parties. To address this gap, we conduct interviews with third-party and core developers in the security and privacy domain from Firefox and Chrome. In essence, the study provides three contributions. First, insights into stakeholder-specific issues concerning coring. Second, measures to prevent coring. Third, strategical guidance for developers and owners. Third-parties experienced and core developers acknowledged coring to occur on browser platforms. While developers with extrinsic motivations assess coring negatively, developers with intrinsic motivations perceive coring positively. KW - Platform Coring KW - Browser Platforms KW - Platform Innovation KW - Firefox KW - Chrome Y1 - 2019 UR - https://aisel.aisnet.org/icis2019/is_heart_of_innovation_ecosystems/innovation_ecosystems/4/ SN - 978-0-9966831-9-7 ER - TY - CHAP A1 - Grum, Marcus A1 - Rapp, Simon A1 - Gronau, Norbert A1 - Albers, Albert ED - Shishkov, Boris T1 - Accelerating knowledge BT - the speed optimization of knowledge transfers T2 - Business modeling and software design N2 - As knowledge-intensive processes are often carried out in teams and demand for knowledge transfers among various knowledge carriers, any optimization in regard to the acceleration of knowledge transfers obtains a great economic potential. Exemplified with product development projects, knowledge transfers focus on knowledge acquired in former situations and product generations. An adjustment in the manifestation of knowledge transfers in its concrete situation, here called intervention, therefore can directly be connected to the adequate speed optimization of knowledge-intensive process steps. This contribution presents the specification of seven concrete interventions following an intervention template. Further, it describes the design and results of a workshop with experts as a descriptive study. The workshop was used to assess the practical relevance of interventions designed as well as the identification of practical success factors and barriers of their implementation. KW - knowledge transfers KW - business process optimization KW - interventions KW - product development KW - product generation engineering KW - empirical evaluation Y1 - 2019 SN - 978-3-030-24853-6 SN - 978-3-030-24854-3 U6 - https://doi.org/10.1007/978-3-030-24854-3_7 VL - 356 SP - 95 EP - 113 PB - Springer CY - Cham ER - TY - CHAP A1 - Eigelshoven, Felix A1 - Ullrich, André A1 - Bender, Benedict T1 - Public blockchain BT - a systematic literature review on the sustainability of consensus algorithms T2 - Proceedings of the 28th European Conference on Information Systems (ECIS)- A Virtual AIS Conference N2 - Blockchain has the potential to change business transactions to a major extent. Thereby, underlying consensus algorithms are the core mechanism to achieve consistency in distributed infrastructures. Their application aims for transparency and accountability in societal transactions. As a result of missing reviews holistically covering consensus algorithms, we aim to (1) identify prevalent consensus algorithms for public blockchains, and (2) address the resource perspective with a sustainability consideration (whereby we address the three spheres of sustainability). Our systematic literature review identified 33 different consensus algorithms for public blockchains. Our contribution is twofold: first, we provide a systematic summary of consensus algorithms for public blockchains derived from the scientific literature as well as real-world applications and systemize them according to their research focus; second, we assess the sustainability of consensus algorithms using a representative sample and thereby highlight the gaps in literature to address the holistic sustainability of consensus algorithms. KW - Blockchain KW - Consensus algorithms KW - Sustainability KW - Systematic literature revieew Y1 - 2020 UR - https://aisel.aisnet.org/ecis2020_rp/202 SP - 1 EP - 19 ER - TY - CHAP A1 - Risius, Marten A1 - Baumann, Annika A1 - Krasnova, Hanna T1 - Developing a new paradigm BT - introducing the intention-behaviour gap to the privacy paradox phenomenon T2 - Proceedings of the 28th European Conference on Information Systems (ECIS) : ECIS 2020 Research Papers N2 - Internet users commonly agree that it is important for them to protect their personal data. However, the same users readily disclose their data when requested by an online service. The dichotomy between privacy attitude and actual behaviour is commonly referred to as the “privacy paradox”. Over twenty years of research were not able to provide one comprehensive explanation for the paradox and seems even further from providing actual means to overcome the paradox. We argue that the privacy paradox is not just an instantiation of the attitude-behaviour gap. Instead, we introduce a new paradigm explaining the paradox as the result of attitude-intention and intentionbehaviour gaps. Historically, motivational goal-setting psychologists addressed the issue of intentionbehaviour gaps in terms of the Rubicon Model of Action Phases and argued that commitment and volitional strength are an essential mechanism that fuel intentions and translate them into action. Thus, in this study we address the privacy paradox from a motivational psychological perspective by developing two interventions on Facebook and assess whether the 287 participants of our online experiment actually change their privacy behaviour. The results demonstrate the presence of an intentionbehaviour gap and the efficacy of our interventions in reducing the privacy paradox. KW - privacy paradox KW - intention-behaviour gap KW - attitude-behaviour gap KW - commitment KW - rubicon model KW - social media Y1 - 2020 UR - https://aisel.aisnet.org/ecis2020_rp/150 UR - https://www.researchgate.net/publication/341507497_Developing_a_New_Paradigm_Introducing_the_Intention-Behaviour_Gap_to_the_Privacy_Paradox_Phenomenon/link/5ec4a1c892851c11a8778d3f/download?_tp=eyJjb250ZXh0Ijp7InBhZ2UiOiJwdWJsaWNhdGlvbiIsInByZXZpb3VzUGFnZSI6bnVsbH19 PB - AIS Electronic Library (AISeL) CY - [Erscheinungsort nicht ermittelbar] ER - TY - CHAP ED - Gronau, Norbert ED - Heine, Moreen ED - Poustcchi, Key ED - Krasnova, Hanna T1 - Entwicklungen, Chancen und Herausforderungen der Digitalisierung BT - Proceedings der Community Tracks zur WI 2020 N2 - Stetig steigende Studierendenzahlen und Studierendenerwartungen der „Generation Z“ als „Digital Natives“ stellen Hochschulen bei gleichbleibenden Lehrressourcen vor vielfältige technische, didaktische, organisationale und curriculare Herausforderungen. Aufgrund ihrer Diversität und Heterogenität gibt es keinen einheitlichen Weg der digitalen Transformation im Hochschulsektor. Curricula, Studienstrukturen, Präsenzlehre und digitale Lehr- und Lernangebote müssen auf die jeweiligen Hochschulen, Zielgruppen und Kooperationspartner zugeschnitten werden. Dabei müssen auch neue Zielgruppen erreicht werden, z.B. Berufstätige und Teilzeitstudierende, und die Individualisierung sowie die nationale und internationale Studierendenmobilität gefördert werden. Kompetenzen für die Informationsextraktion aus Lern- und Studienprozessen, (Big) Data Analytics und Visualisierung, Künstliche Intelligenz und Augmented Reality müssen in Hochschulen aufgebaut werden. Von der digitalen Transformation sind alle Bereiche von Hochschulen betroffen, z.B. Präsidien, Fakultäten und gleichgestellte Einrichtungen, Universitätsverwaltungen, Forschungseinrichtungen sowie zentrale und dezentrale (IT-)Dienstleister, die sich mit schnell verändernden Anforderungs- und Rollenprofilen anpassen müssen. Ferner sind rechtliche Rahmenbedingungen zu betrachten, z.B. Datenschutzanforderungen, um die Potenziale von digitalen Lehr- und Lernangeboten und von digitalen Medien in der Lehre zu erschließen. Dieser Track diskutiert theoretische, konzeptionelle, gestaltungsorientierte, empirische und verhaltensorientierte Beiträge. Y1 - 2020 SN - 978-3-95545-336-7 U6 - https://doi.org/10.30844/wi_2020_ct VL - 2 PB - GITO mbH Verlag für Industrielle Informationstechnik und Organisation CY - Berlin ER - TY - CHAP A1 - Grum, Marcus A1 - Bender, Benedict A1 - Gronau, Norbert A1 - Alfa, Attahiru S. T1 - Efficient task realizations in networked production infrastructures T2 - Proceedings of the Conference on Production Systems and Logistics N2 - As Industry 4.0 infrastructures are seen as highly evolutionary environment with volatile, and time-dependent workloads for analytical tasks, particularly the optimal dimensioning of IT hardware is a challenge for decision makers because the digital processing of these tasks can be decoupled from their physical place of origin. Flexible architecture models to allocate tasks efficiently with regard to multi-facet aspects and a predefined set of local systems and external cloud services have been proven in small example scenarios. This paper provides a benchmark of existing task realization strategies, composed of (1) task distribution and (2) task prioritization in a real-world scenario simulation. It identifies heuristics as superior strategies. KW - Industry 4.0 KW - CPS KW - Decentral Decision Making KW - Industrial Analytics KW - Case Study Y1 - 2020 U6 - https://doi.org/10.15488/9682 SP - 397 EP - 407 PB - publish-Ing. CY - Hannover ER - TY - CHAP A1 - Vladova, Gergana A1 - Rüdian, Sylvio Leo T1 - From learners to educators BT - development of online courses by students for students T2 - The future of education N2 - The rapid growth of technology and its evolving potential to support the transformation of teaching and learning in post-secondary institutions is a major challenge to the basic understanding of both the university and the communities it serves. In higher education, the standard forms of learning and teaching are increasingly being challenged and a more comprehensive process of differentiation is taking place. Student-centered teaching methods are becoming increasingly important in course design and the role of the lecturer is changing from the knowledge mediator to moderator and learning companion. However, this is accelerating the need for strategically planned faculty support and a reassessment of the role of teaching and learning. Even though the benefits of experience-based learning approaches for the development of life skills are well known, most knowledge transfer is still realized through lectures in higher education. Teachers have the goal to design the curriculum, new assignments, and share insights into evolving pedagogy. Student engagement could be the most important factor in the learning success of university students, regardless of the university program or teaching format. Against this background, this article presents the development, application, and initial findings of an innovative learning concept. In this concept, students are allowed to deal with a scientific topic, but instead of a presentation and a written elaboration, their examination consists of developing an online course in terms of content, didactics, and concept to implement it in a learning environment, which is state of the art. The online courses include both self-created teaching material and interactive tasks. The courses are created to be available to other students as learning material after a review process and are thus incorporated into the curriculum. KW - future curriculum KW - digitalization KW - online courses KW - COVID-19 Y1 - 2020 UR - https://conference.pixel-online.net/files/foe/ed0010/FP/6824-CUD4792-FP-FOE10.pdf SN - 978-88-85813-87-8 U6 - https://doi.org/10.26352/E618_2384-9509 SN - 2420-9732 VL - 10 PB - Pixel CY - Florenz ER - TY - CHAP A1 - Krause, Hannes-Vincent A1 - Große Deters, Fenne A1 - Baumann, Annika T1 - The envy spiral BT - unraveling the black box of social media positivityorganizations T2 - Proceedings of the 28th European Conference on Information Systems (ECIS) : ECIS 2020 Research-in-Progress Papers N2 - On Social Networking Sites (SNS) users disclose mostly positive and often self-enhancing information. Scholars refer to this phenomenon as the positivity bias in SNS communication (PBSC). However, while theoretical explanations for this phenomenon have been proposed, an empirical proof of these theorized mechanisms is still missing. The project presented in this Research-in-Progress paper aims at explaining the PBSC with the mechanism specified in the self-enhancement envy spiral. Specifically, we hypothesize that feelings of envy drive people to post positive and self-enhancing content on SNS. To test this hypothesis, we developed an experimental design allowing to examine the causal effect of envy on the positivity of users’ subsequently posted content. In a preliminary study, we tested our manipulation of envy and could show its effectiveness in inducing different levels of envy between our groups. Our project will help to broaden the understanding of the complex dynamics of SNS and the potentially adverse driving forces underlying them. Y1 - 2020 UR - https://aisel.aisnet.org/ecis2020_rip/68 SN - 978-1-7336325-1-5 PB - AIS Electronic Library (AISeL) CY - [Erscheinungsort nicht ermittelbar] ER - TY - CHAP A1 - Grum, Marcus A1 - Blunk, Oliver A1 - Rojahn, Marcel A1 - Fettke, Peter A1 - Gronau, Norbert T1 - Research challenges of knowledge modelling and the outline of a research agenda T2 - Knowledge in digital age : IFKAD 2020 KW - knowledge management KW - process modelling KW - research challenges Y1 - 2020 SN - 978-88-96687-13-0 SN - 2280-787X PB - The Arts of Business Institute CY - Matera, Italy ER - TY - CHAP A1 - Abramova, Olga T1 - Does a smile open all doors? BT - understanding the impact of appearance disclosure on accommodation sharing platforms T2 - Proceedings of the 53rd Hawaii International Conference on System Sciences N2 - Online photographs govern an individual’s choices across a variety of contexts. In sharing arrangements, facial appearance has been shown to affect the desire to collaborate, interest to explore a listing, and even willingness to pay for a stay. Because of the ubiquity of online images and their influence on social attitudes, it seems crucial to be able to control these aspects. The present study examines the effect of different photographic self-disclosures on the provider’s perceptions and willingness to accept a potential co-sharer. The findings from our experiment in the accommodation-sharing context suggest social attraction mediates the effect of photographic self-disclosures on willingness to host. Implications of the results for IS research and practitioners are discussed. KW - The Sharing Economy KW - airbnb KW - online photographs KW - self-disclosure KW - sharing economy KW - social attraction Y1 - 2020 SN - 978-0-9981331-3-3 SP - 831 EP - 840 PB - HICSS Conference Office University of Hawaii at Manoa CY - Honolulu ER - TY - CHAP A1 - Bergert, Cora A1 - Köster, Antonia A1 - Krasnova, Hanna A1 - Turel, Ofir T1 - Missing out on life BT - parental perceptions of children’s mobile technology use T2 - Proceedings of the 15th International Conference on Wirtschaftsinformatik : WI2020 Zentrale Tracks N2 - Mobile devices have become an integral part of everyday life due to their portability. As literature shows, technology use is not only beneficial but also has dark sides, such as addiction. Parents face the need to balance perceived benefits and risks of children’s exposure to mobile technologies. However, no study has uncovered what kind of benefits and concerns parents consider when implementing technology-related rules. We built on qualitative responses of 300 parents of children aged two to thirteen to explore concerns about, and perceived benefits of children’s smartphone and tablet usage, as well as the rules parents have developed regarding technology use. Findings point to concerns regarding children’s development, as well as benefits for both children and parents, and ultimately to new insights about mobile technology mediation. These results provide practical guidance for parents, physicians and mobile industry stakeholders, trying to ensure that children are acting responsibly with mobile technology. KW - mobile technology KW - smartphone KW - parental mediation KW - rules KW - children Y1 - 2020 SN - 978-3-95545-335-0 U6 - https://doi.org/10.30844/wi_2020_f1-bergert SP - 568 EP - 583 PB - GITO Verlag für Industrielle Informationstechnik und Organisation CY - Berlin ER -