TY - CHAP A1 - Bender, Benedict A1 - Grum, Marcus T1 - Entwicklung eines Architekturkonzepts zum flexiblen Einsatz von Analytics T2 - Proceedings INFORMATIK - Jahrestagung der Gesellschaft für Informatik e.V. ; Lecture Notes in Informatics (LNI) N2 - Die optimale Dimensionierung von IT-Hardware stellt Entscheider aufgrund der stetigen Weiterentwicklung zunehmend vor Herausforderungen. Dies gilt im Speziellen auch für Analytics-Infrastrukturen, die zunehmend auch neue Software zur Analyse von Daten einsetzen, welche in den Ressourcenanforderungen stark variieren. Damit eine flexible und gleichzeitig effiziente Gestaltung von Analytics-Infrastrukturen erreicht werden kann, wird ein dynamisch arbeitendes Architekturkonzept vorgeschlagen, das Aufgaben auf Basis einer systemspezifischen Entscheidungsmaxime mit Hilfe einer Eskalationsmatrix verteilt und hierfür Aufgabencharakteristiken sowie verfügbare Hardwareausstattungen entsprechend ihrer Auslastung berücksichtigt. KW - Analytics KW - Architekturkonzept KW - Cyber-Phsysische Systeme KW - Cloud KW - Internet of Things Y1 - 2016 UR - https://dl.gi.de/handle/20.500.12116/1189 IS - P259 SP - 815 EP - 824 PB - Gesellschaft für Informatik e.V. CY - Bonn ER - TY - CHAP A1 - Glaschke, Christian A1 - Gronau, Norbert A1 - Bender, Benedict T1 - Cross-System Process Mining using RFID Technology T2 - Proceedings of the Sixth International Symposium on Business Modeling and Software Design - BMSD N2 - In times of digitalization, the collection and modeling of business processes is still a challenge for companies. The demand for trustworthy process models that reflect the actual execution steps therefore increases. The respective kinds of processes significantly determine both, business process analysis and the conception of future target processes and they are the starting point for any kind of change initiatives. Existing approaches to model as-is processes, like process mining, are exclusively focused on reconstruction. Therefore, transactional protocols and limited data from a single application system are used. Heterogeneous application landscapes and business processes that are executed across multiple application systems, on the contrary, are one of the main challenges in process mining research. Using RFID technology is hence one approach to close the existing gap between different application systems. This paper focuses on methods for data collection from real world objects via RFID technology and possible combinations with application data (process mining) in order to realize a cross system mining approach. KW - Process Mining KW - RFID KW - Production KW - Cross-System Y1 - 2016 SN - 978-989-758-190-8 U6 - https://doi.org/10.5220/0006223501790186 SP - 179 EP - 186 PB - SCITEPRESS - Science and Technology Publications CY - Setúbal ER - TY - CHAP A1 - Lass, Sander A1 - Bender, Benedict T1 - Dedicated Data Sovereignty as Enabler for Platform-Based Business Models T2 - Proceedings of the 2. Conference on Production Systems and Logistics N2 - The digitalization of value networks holds out the prospect of many advantages for the participating compa- nies. Utilizing information platforms, cross-company data exchange enables increased efficiency of collab- oration and offers space for new business models and services. In addition to the technological challenges, the fear of know-how leakage appears to be a significant roadblock that hinders the beneficial realization of new business models in digital ecosystems. This paper provides the necessary building blocks of digital participation and, in particular, classifies the issue of trust creation within it as a significant success factor. Based on these findings, it presents a solution concept that, by linking the identified building blocks, offers the individual actors of the digital value network the opportunity to retain sovereignty over their data and know-how and to use the potential of extensive networking. In particular, the presented concept takes into account the relevant dilemma, that every actor (e. g. the machine users) has to be able to control his commu- nicated data at any time and have sufficient possibilities for intervention that, on the one hand, satisfy the need for protection of his knowledge and, on the other hand, do not excessively diminish the benefits of the system or the business. Taking up this perspective, this paper introduces dedicated data sovereignty and shows a possible implementation concept. KW - information gateway KW - data security KW - information flow control KW - platform acceptance Y1 - 2021 U6 - https://doi.org/10.15488/11299 SP - 382 EP - 393 PB - publish-Ing. CY - Hannover ER - TY - CHAP A1 - Bender, Benedict A1 - Fabian, Benjamin A1 - Lessmann, Stefan A1 - Haupt, Johannes T1 - E-Mail Tracking BT - status quo and novel countermeasures T2 - Proceedings of the 37th International Conference on Information Systems (ICIS) N2 - E-mail advertisement, as one instrument in the marketing mix, allows companies to collect fine-grained behavioural data about individual users’ e-mail reading habits realised through sophisticated tracking mechanisms. Such tracking can be harmful for user privacy and security. This problem is especially severe since e-mail tracking techniques gather data without user consent. Striving to increase privacy and security in e-mail communication, the paper makes three contributions. First, a large database of newsletter e-mails is developed. This data facilitates investigating the prevalence of e- mail tracking among 300 global enterprises from Germany, the United Kingdom and the United States. Second, countermeasures are developed for automatically identifying and blocking e-mail tracking mechanisms without impeding the user experience. The approach consists of identifying important tracking descriptors and creating a neural network-based detection model. Last, the effectiveness of the proposed approach is established by means of empirical experimentation. The results suggest a classification accuracy of 99.99%. KW - E-Mail Tracking KW - Countermeasures KW - Privacy KW - Security KW - Machine Learning Y1 - 2016 UR - https://aisel.aisnet.org/icis2016/ISSecurity/Presentations/13/ ER - TY - CHAP A1 - Bender, Benedict A1 - Gronau, Norbert T1 - Coring on Digital Platforms BT - Fundamentals and Examples from the Mobile Device Sector T2 - Proceedings of the 38th International Conference on Information Systems (ICIS) N2 - Today’s mobile devices are part of powerful business ecosystems, which usually involve digital platforms. To better understand the complex phenomenon of coring and related dynamics, this paper presents a case study comparing iMessage as part of Apple’s iOS and WhatsApp. Specifically, it investigates activities regarding platform coring, as the integration of several functionalities provided by third-party applications in the platform core. The paper makes three contributions. First, a systematization of coring activities is developed. Coring modes are differentiated by the amount of coring and application maintenance. Second, the case study revealed that the phenomenon of platform coring is present on digital platforms for mobile devices. Third, the fundamentals of coring are discussed as a first step towards theoretical development. Even though coring constitutes a potential threat for third-party developers regarding their functional differentiation, an idea of what a beneficial partnership incorporating coring activities could look like is developed here. KW - Coring KW - Digital Platforms KW - Digital Marketplaces KW - Mobile Software Ecosystems Y1 - 2017 UR - https://aisel.aisnet.org/icis2017/DigitalPlatforms/Presentations/6/ SN - 978-0-9966831-5-9 IS - 8 SP - 5256 EP - 5274 PB - Association for Information Systems (AIS) CY - Atlanta ER - TY - CHAP A1 - Grum, Marcus A1 - Bender, Benedict A1 - Gronau, Norbert A1 - Alfa, Attahiru S. T1 - Efficient task realizations in networked production infrastructures T2 - Proceedings of the Conference on Production Systems and Logistics N2 - As Industry 4.0 infrastructures are seen as highly evolutionary environment with volatile, and time-dependent workloads for analytical tasks, particularly the optimal dimensioning of IT hardware is a challenge for decision makers because the digital processing of these tasks can be decoupled from their physical place of origin. Flexible architecture models to allocate tasks efficiently with regard to multi-facet aspects and a predefined set of local systems and external cloud services have been proven in small example scenarios. This paper provides a benchmark of existing task realization strategies, composed of (1) task distribution and (2) task prioritization in a real-world scenario simulation. It identifies heuristics as superior strategies. KW - Industry 4.0 KW - CPS KW - Decentral Decision Making KW - Industrial Analytics KW - Case Study Y1 - 2020 U6 - https://doi.org/10.15488/9682 SP - 397 EP - 407 PB - publish-Ing. CY - Hannover ER - TY - CHAP A1 - Fabian, Benjamin A1 - Bender, Benedict A1 - Weimann, Lars T1 - E-Mail tracking in online marketing BT - Methods, Detection, and Usage T2 - Proceedings of the 12th International Conference on Wirtschaftsinformatik N2 - E-Mail tracking uses personalized links and pictures for gathering information on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing purposes. On the other hand, privacy and security requirements of customers could be violated by tracking. This paper examines how e-mail tracking works, how it can be detected automatically, and to what extent it is used in German e-commerce. We develop a detection model and software tool in order to collect and analyze more than 600 newsletter e-mails from companies of several different industries. The results show that the usage of e-mail tracking in Germany is prevalent but also varies depending on the industry. KW - E-Mail Tracking KW - Online Marketing KW - Privacy Y1 - 2015 UR - https://aisel.aisnet.org/wi2015/74 SN - 978-3-00-049184-9 IS - 74 PB - Associations for Information Systems AIS CY - Atlanta ER - TY - CHAP A1 - Bender, Benedict A1 - Bertheau, Clementine A1 - Gronau, Norbert T1 - Future ERP Systems BT - a research agenda T2 - Proceedings of the 23rd International Conference on Enterprise Information Systems (ICEIS 2021) N2 - This paper presents a research agenda on the current generation of ERP systems which was developed based on a literature review on current problems of ERP systems. The problems are presented following the ERP life cycle. In the next step, the identified problems are mapped on a reference architecture model of ERP systems that is an extension of the three-tier architecture model that is widely used in practice. The research agenda is structured according to the reference architecture model and addresses the problems identified regarding data, infrastructure, adaptation, processes, and user interface layer. KW - ERP KW - Enterprise Resource Planning KW - Enterprise System KW - Three-tier Architecture KW - eference Architecture Model KW - Problems KW - Research Agenda Y1 - 2021 SN - 978-989-758-509-8 U6 - https://doi.org/10.5220/0010477307760783 SN - 2184-4992 IS - 2 SP - 776 EP - 783 PB - Science and Technology Publications CY - Setúbal ER -