004 Datenverarbeitung; Informatik
Refine
Year of publication
Document Type
- Article (343) (remove)
Keywords
- Informatik (16)
- Didaktik (13)
- Ausbildung (12)
- Hochschuldidaktik (12)
- Big Data (4)
- Computer Science Education (4)
- Competence Measurement (3)
- Data profiling (3)
- Informatics Education (3)
- Secondary Education (3)
- Twitter (3)
- computational thinking (3)
- machine learning (3)
- social media (3)
- Blended Learning (2)
- Blockchains (2)
- COVID-19 (2)
- Competence Modelling (2)
- Computational thinking (2)
- Deep learning (2)
- Diversity (2)
- E-Learning (2)
- General Earth and Planetary Sciences (2)
- Geography, Planning and Development (2)
- Informatics (2)
- Informatics Modelling (2)
- Informatics System Application (2)
- Informatics System Comprehension (2)
- Informatikstudium (2)
- JSP (2)
- Kompetenzen (2)
- Machine learning (2)
- Runtime analysis (2)
- Social (2)
- Teamarbeit (2)
- Theory (2)
- Water Science and Technology (2)
- answer set programming (2)
- bibliometric analysis (2)
- citation analysis (2)
- collaboration (2)
- competence (2)
- comprehension (2)
- computer science (2)
- data integration (2)
- digital transformation (2)
- duplicate detection (2)
- education (2)
- evaluation (2)
- identity theory (2)
- informatics education (2)
- knowledge representation and nonmonotonic reasoning (2)
- learning (2)
- networks (2)
- perception of robots (2)
- programming (2)
- social network analysis (2)
- software engineering (2)
- usability (2)
- virtual reality (2)
- (FPGA) (1)
- 21st century skills, (1)
- 3D point clouds (1)
- ABRACADABRA (1)
- APX-hardness (1)
- ARCS Modell (1)
- Achievement (1)
- Activity Theory (1)
- Activity-orientated Learning (1)
- Activity-oriented Optimization (1)
- Actor (1)
- Actor model (1)
- Adaption (1)
- Adaptive hypermedia (1)
- Advanced Video Codec (AVC) (1)
- Agency (1)
- Alcohol Use Disorders Identification Test (1)
- Alcohol use assessment (1)
- Algebraic methods (1)
- Analyse (1)
- Andere Fachrichtungen (1)
- Anerkennung (1)
- Animal building (1)
- Anrechnung (1)
- Application (1)
- Arduino (1)
- Argument Mining (1)
- Artificial neural networks (1)
- Assessment (1)
- Attribute aggregation (1)
- Audience Response Systeme (1)
- Augmented and virtual reality (1)
- Augmented reality (1)
- Austria (1)
- Authentication (1)
- Autismus (1)
- Automated Theorem Proving (1)
- Automatically controlled windows (1)
- Automatisches Beweisen (1)
- BPMN (1)
- Bachelor (1)
- Bachelorstudium (1)
- Barrierefreiheit (1)
- Bean (1)
- Berufsausbildung (1)
- Beweisaufgaben (1)
- Bibliometrics (1)
- Bidirectional order dependencies (1)
- Big Five model (1)
- Bitcoin (1)
- Blended learning (1)
- Bloom’s Taxonomy (1)
- Body schema (1)
- Brownian motion with discontinuous drift (1)
- Business Process Management (1)
- Business process modeling (1)
- Bystander (1)
- C++ tool (1)
- C-Test (1)
- CCS Concepts (1)
- CS Ed Research (1)
- CS at school (1)
- CS concepts (1)
- CS curriculum (1)
- Calibration (1)
- Canvas (1)
- Capability approach (1)
- Case management (1)
- Challenges (1)
- Clause Learning (1)
- Clinical predictive modeling (1)
- Codeverständnis (1)
- Cognitive Skills (1)
- Cographs (1)
- Coherent partition (1)
- Commonsense reasoning (1)
- Community analysis (1)
- Comparing programming environments (1)
- Competences (1)
- Competencies (1)
- Complexity (1)
- Compliance checking (1)
- Computational Thinking (1)
- Computational photography (1)
- Computer Science (1)
- Computer Science in Context (1)
- Computer crime (1)
- Computergestützes Training (1)
- Computing (1)
- Conceptual modeling (1)
- Condition number (1)
- Consistency (1)
- Contest (1)
- Contextualisation (1)
- Contradictions (1)
- Convolution (1)
- Course development (1)
- Course marketing (1)
- Course of Study (1)
- Courses for female students (1)
- Covid (1)
- Critical pairs (1)
- Crowd-sourcing (1)
- Cryptography (1)
- Currencies (1)
- Curricula Development (1)
- Curriculum (1)
- Curriculum Development (1)
- Curriculum analysis (1)
- Customer ownership (1)
- DPLL (1)
- Data Analysis (1)
- Data Literacy (1)
- Data Management (1)
- Data Privacy (1)
- Data Science (1)
- Data dependencies (1)
- Data mining (1)
- Data modeling (1)
- Data warehouse (1)
- Data-centric (1)
- Databases (1)
- Datenanalyse (1)
- Datenbanken (1)
- Datenschutz (1)
- Decision support (1)
- Defining characteristics of physical computing (1)
- Degenerationsprozesse (1)
- Delphi study (1)
- Delta preservation (1)
- Dependency discovery (1)
- Developmental robotics (1)
- Digital Competence (1)
- Digital Education (1)
- Digital Game Based Learning (1)
- Digital Revolution (1)
- Digital image analysis (1)
- Digitalisierung von Produktionsprozessen (1)
- Digitalization (1)
- Diskussionskultur (1)
- Dispositional learning analytics (1)
- Distanzlehre (1)
- Distributed computing (1)
- Distributed programming (1)
- Durchlässigkeit (1)
- Dynamic assessment (1)
- Early Literacy (1)
- Economics (1)
- Ecosystems (1)
- Educational Standards (1)
- Educational software (1)
- Electronic and spintronic devices (1)
- Embedded Systems (1)
- Empirische Untersuchung (1)
- Entity resolution (1)
- Enumeration algorithm (1)
- Erfolgsmessung (1)
- Estimation-of-distribution algorithm (1)
- Ethics (1)
- Euclid’s algorithm (1)
- Evolutionary algorithms (1)
- Explorative Datenanalyse (1)
- FPGA (1)
- Facebook (1)
- Fachinformatik (1)
- Fachinformatiker (1)
- Feature extraction (1)
- Feature selection (1)
- Federated learning (1)
- Feedback (1)
- Fertigkeiten (1)
- Fibonacci numbers (1)
- Field programmable gate arrays (1)
- Finite automata (1)
- Fitness-distance correlation (1)
- Formal modelling (1)
- Formale Sprachen und Automaten (1)
- Formative assessment (1)
- Forschung (1)
- Function (1)
- Functional dependencies (1)
- Fundamental Ideas (1)
- Gender (1)
- Gene expression (1)
- General subject “Information” (1)
- Geschäftsmodell (1)
- Graph algorithm (1)
- Graph databases (1)
- Graph homomorphisms (1)
- Graph logic (1)
- Graph partitions (1)
- Graph repair (1)
- Graph transformation (1)
- Graphensuche (1)
- H.264 (1)
- HEI (1)
- Hardware accelerator (1)
- Helmholtz problem (1)
- Heuristic triangle estimation (1)
- HiGHmed (1)
- Histograms (1)
- Hochschule (1)
- Hochschulkurse (1)
- Hochschullehre (1)
- Human (1)
- Human-robot interaction (1)
- ICT (1)
- ICT Competence (1)
- ICT competencies (1)
- ICT curriculum (1)
- ICT skills (1)
- IHL (1)
- IHRL (1)
- IOPS (1)
- ISSEP (1)
- Identity management systems (1)
- Identität (1)
- Ill-conditioning (1)
- Image (1)
- Image resolution (1)
- Image-based rendering (1)
- Imperative calculi (1)
- Improving classroom (1)
- Inclusion dependencies (1)
- Indefinite (1)
- Industries (1)
- Inference (1)
- Informatik B. Sc. (1)
- Informatik für alle (1)
- Information Ethics (1)
- Informationskompetenz (1)
- Inhalte (1)
- Inhaltsanalyse (1)
- Initial conflicts (1)
- Inquiry-based Learning (1)
- Instagram (1)
- Insurance industry (1)
- Interface design (1)
- Interpretability (1)
- Intersectionality (1)
- Interventionen (1)
- Inverted Classroom (1)
- KI (1)
- Kernel (1)
- Key Competencies (1)
- Klausellernen (1)
- Kollaboration (1)
- Kompetenz (1)
- Kompetenzentwicklung (1)
- Kompetenzerwerb (1)
- Kompetenzmessung (1)
- LIDAR (1)
- LMS (1)
- LSTM (1)
- Large networks (1)
- Learners (1)
- Learning Analytics (1)
- Learning Fields (1)
- Learning analytics (1)
- Learning dispositions (1)
- Learning ecology (1)
- Learning interfaces development (1)
- Learning with ICT (1)
- Lehr- und Lernformate (1)
- Lehramtsstudium (1)
- Lehre (1)
- Lehrer*innenbildung (1)
- Lehrevaluation (1)
- Lern-App (1)
- Lernerfolg (1)
- Lernmotivation (1)
- Lernzentrum (1)
- Licenses (1)
- Lindenmayer systems (1)
- Logarithm (1)
- Loss (1)
- Low Latency (1)
- Lower Secondary Level (1)
- Lückentext (1)
- MOOCs (1)
- Machine Learning (1)
- Marketing (1)
- Massive Open Online Courses (1)
- Matroids (1)
- Measurement (1)
- Media in education (1)
- Mensch-Computer-Interaktion (1)
- Metaverse (1)
- Minimal hitting set (1)
- Model repair (1)
- Model verification (1)
- Model-driven (1)
- Multi-objective optimization (1)
- Multi-sided platforms (1)
- Multimodal behavior (1)
- Music Technology (1)
- Mutation operators (1)
- NUI (1)
- Natural Science Education (1)
- Natural ventilation (1)
- Navigation (1)
- Nephrology (1)
- Nested graph conditions (1)
- Network clustering (1)
- NoSQL (1)
- Norway (1)
- Novice programmers (1)
- O (1)
- Onlinekurse (1)
- Open source (1)
- OpenOLAT (1)
- Opinion mining (1)
- Optimization (1)
- OptoGait (1)
- Order dependencies (1)
- Ordinances (1)
- Overlapping community detection (1)
- Parallelization (1)
- Parallelized algorithm (1)
- Pedagogical content knowledge (1)
- Pedagogical issues (1)
- Peer-Review (1)
- Peripersonal space (1)
- Personas (1)
- Physical Science (1)
- Plant identification (1)
- Point-based rendering (1)
- Popular matching (1)
- Preprocessing (1)
- Primary informatics (1)
- Prime graphs (1)
- Prior knowledge (1)
- Privacy (1)
- Problem Solving (1)
- Problem solving (1)
- Problem solving strategies (1)
- Process Execution (1)
- Programmierausbildung (1)
- Programming environments for children (1)
- Programming learning (1)
- Projekte (1)
- Protocols (1)
- Pytho n (1)
- Query execution (1)
- Query optimization (1)
- Rainfall-runoff (1)
- Random access memory (1)
- Re-Engineering (1)
- Recommendations for CS-Curricula in Higher Education (1)
- Region of Interest (1)
- Relational data (1)
- Relevanz (1)
- Reproducible benchmarking (1)
- Resource Allocation (1)
- Resource Management (1)
- Reversibility (1)
- Robot learning (1)
- Robot personality (1)
- Run time analysis (1)
- Runtime improvement (1)
- Russia (1)
- SAT (1)
- SQL (1)
- STEM (1)
- Satisfiability (1)
- Scale-invariant feature transform (SIFT) (1)
- Scientific understanding of Information (1)
- Second Life (1)
- Security (1)
- Semantic Web (1)
- Semiconductors (1)
- Seminarkonzept (1)
- Sensors (1)
- Sequential anomaly (1)
- Sharing (1)
- Signal processing (1)
- Simulations (1)
- Single event upsets (1)
- Small Private Online Courses (1)
- Smart cities (1)
- Social impact (1)
- Sociotechnical Design (1)
- Software Engineering (1)
- Softwareentwicklung (1)
- Specification (1)
- Stable marriage (1)
- Stable matching (1)
- Stance Detection (1)
- Strategie (1)
- Strukturverbesserung (1)
- Student Engagement (1)
- Studentenjobs (1)
- Studienabbrecher (1)
- Studienabbruch (1)
- Studienanfänger*innen (1)
- Studiendauer (1)
- Studieneingangsphase (1)
- Studiengestaltung (1)
- Studiengänge (1)
- Studienverläufe (1)
- Studierendenperformance (1)
- Studium (1)
- Submodular function (1)
- Submodular functions (1)
- Subset selection (1)
- Systematics (1)
- Systems of parallel communicating (1)
- Tasks (1)
- Taxonomy (1)
- Teacher perceptions (1)
- Teachers (1)
- Teaching information security (1)
- Teaching problem solving strategies (1)
- Technology proficiency (1)
- Terminology (1)
- Tests (1)
- Text mining (1)
- Theorembeweisen (1)
- Theoretische Informatik (1)
- Time series (1)
- Trajectories (1)
- Transversal hypergraph (1)
- Type and effect systems (1)
- UX (1)
- Umfrage (1)
- Uncanny valley (1)
- Unifikation (1)
- Unique column combination (1)
- Unique column combinations (1)
- User Experience (1)
- VGG16 (1)
- VR (1)
- Validation (1)
- Value network (1)
- Visualization (1)
- Vocabulary (1)
- Vocational Education (1)
- Vorkenntnisse (1)
- Vorwissen (1)
- W[3]-Completeness (1)
- Wartung von Lehrveranstaltungen (1)
- Weighted clustering coefficient (1)
- Weiterbildung (1)
- Werbung (1)
- WhatsApp (1)
- Wissenschaftliches Arbeiten (1)
- Women and IT (1)
- X-ray imaging (1)
- YouTube (1)
- Young People (1)
- Zebris (1)
- Zoom fatigue (1)
- abstraction (1)
- acceptability (1)
- action and change (1)
- acyclic preferences (1)
- adaptive (1)
- adolescent (1)
- agile government (1)
- agility (1)
- algorithms (1)
- analogical thinking (1)
- annotation (1)
- anxiety (1)
- approximation (1)
- architecture (1)
- architecture recovery (1)
- argumentation research (1)
- attacks (1)
- attribute assurance (1)
- authorship attribution (1)
- automata (1)
- automated planning (1)
- benchmark (1)
- betriebliche Weiterbildungspraxis (1)
- big data (1)
- binary representation (1)
- binary search (1)
- biomarker detection (1)
- blockchain (1)
- brand personality (1)
- business process management (1)
- business processes (1)
- cancer therapy (1)
- center dot Computing (1)
- circular economy (1)
- classroom language (1)
- cloud security (1)
- co-citation analysis (1)
- co-occurrence analysis (1)
- coding and information theory (1)
- cognition (1)
- cognitive load (1)
- cognitive modifiability (1)
- combined task and motion planning (1)
- competence development (1)
- competencies (1)
- competency (1)
- complexity (1)
- complexity dichotomy (1)
- computed tomography (1)
- computer science education (1)
- computer science teachers (1)
- computer vision (1)
- computing science education (1)
- concept of algorithm (1)
- concurrent graph rewriting (1)
- conditions (1)
- conflicts and dependencies in (1)
- constructionism (1)
- contract (1)
- conversational agents (1)
- coronavirus (1)
- corporate nomadism (1)
- corporate takeovers (1)
- cryptocurrency exchanges (1)
- cryptology (1)
- cs4fn (1)
- curriculum theory (1)
- cyber (1)
- cyber humanistic (1)
- cyber threat intelligence (1)
- cyber-attack (1)
- cyberbullying (1)
- cyberwar (1)
- data analytics (1)
- data assimilation (1)
- data driven approaches (1)
- data migration (1)
- data pipeline (1)
- data preparation (1)
- data quality (1)
- data requirements (1)
- data structures and information theory (1)
- data transformation (1)
- data wrangling (1)
- database systems (1)
- deferred choice (1)
- dental caries classification (1)
- depression (1)
- determinism (1)
- deterministic properties (1)
- developmental systems (1)
- deviant behaviors (1)
- didactics (1)
- didaktisches Konzept (1)
- diffusion of innovations (1)
- digital health (1)
- digital identity (1)
- digital nomadism (1)
- digital workplace transformation (1)
- digitale Bildung (1)
- digitally-enabled pedagogies (1)
- digitization of production processes (1)
- distributed systems (1)
- divide and conquer (1)
- drift theory (1)
- duale IT-Ausbildung (1)
- e-Assessment (1)
- e-Learning (1)
- e-mentoring (1)
- eco-efficiency (1)
- economic obsolescence (1)
- education and public policy (1)
- educational programming (1)
- educational systems (1)
- edutainment (1)
- efficient deep learning (1)
- elections (1)
- emote work (1)
- emotional design (1)
- empathy (1)
- engaged computing (1)
- engagement (1)
- engine (1)
- engineering (1)
- environments (1)
- ethics (1)
- evolutionary computation (1)
- exact simulation methods (1)
- experiment (1)
- explainability (1)
- explainability-accuracy trade-off (1)
- explainable AI (1)
- exploratory programming (1)
- exponentiation (1)
- expression (1)
- external knowledge bases (1)
- failure model (1)
- fashion (1)
- field-programmable gate array (1)
- forensics (1)
- formal languages (1)
- formal semantics (1)
- forschendes Lernen (1)
- forschungsorientiertes Lernen (1)
- fsQCA (1)
- fun (1)
- functions (1)
- fächerverbindend (1)
- gait analysis algorithm (1)
- gender (1)
- gender-specific medicine (1)
- gene (1)
- gene selection (1)
- general (1)
- general secondary education (1)
- gewerkschaftlich unterstützte Weiterbildungspraxis (1)
- graph languages (1)
- graph pattern matching (1)
- graph transformation (1)
- graph-search (1)
- hardware accelerator (1)
- hardware architecture (1)
- health care (1)
- health data (1)
- healthcare (1)
- heterogeneity (1)
- high school (1)
- higher (1)
- higher education (1)
- home office (1)
- human–computer interaction (1)
- identity broker (1)
- image captioning (1)
- image processing (1)
- image stylization (1)
- individual effects (1)
- individuelle Lernwege (1)
- inertial measurement unit (1)
- informal and formal learning (1)
- informatics (1)
- informatics curricula (1)
- informatics in upper secondary education (1)
- information diffusion (1)
- informatische Grundkompetenzen (1)
- innovation (1)
- instruction (1)
- interactive course (1)
- interactive technologies (1)
- interactive workshop (1)
- international comparison (1)
- international human rights (1)
- international humanitarian law (1)
- international study (1)
- interpretable machine learning (1)
- interpretative research (1)
- intransitivity (1)
- iteration method (1)
- job shop scheduling (1)
- job-shop scheduling (1)
- key competences in physical computing (1)
- key competencies (1)
- kinaesthetic teaching (1)
- klinisch-praktischer Unterricht (1)
- knowledge building (1)
- knowledge management (1)
- knowledge work (1)
- labour union education (1)
- law (1)
- law and technology (1)
- learning factory (1)
- lesson (1)
- literature review (1)
- localization (1)
- logic programming (1)
- logic programming methodology and applications (1)
- long-term interaction (1)
- longitudinal (1)
- machine (1)
- machine learning algorithms (1)
- mandatory computer science foundations (1)
- manipulation planning (1)
- maschinelles Lernen (1)
- matrices (1)
- media (1)
- mediated learning experience (1)
- medical malpractice (1)
- memory (1)
- metaverse (1)
- method comparision (1)
- methodologie (1)
- methods (1)
- metric learning (1)
- migration (1)
- misconceptions (1)
- mobile applications (1)
- mobile learning (1)
- mobile technologies and apps (1)
- mobiles Lernen (1)
- modelling (1)
- modular counting (1)
- modularity (1)
- molecular tumor board (1)
- monitoring (1)
- mood (1)
- multimedia learning (1)
- multimodal representations (1)
- mutli-task learning (1)
- mutual gaze (1)
- narratives (1)
- neural (1)
- neural networks (1)
- new technologies (1)
- news media (1)
- non-photorealistic rendering (NPR) (1)
- notation (1)
- obsolescence (1)
- online learning (1)
- open learning (1)
- operating system (1)
- opportunity cost (1)
- optimal transport (1)
- oracles (1)
- organisational evolution (1)
- paper prototyping (1)
- parallel processing (1)
- parallel rewriting (1)
- parameter (1)
- pedagogy (1)
- performance (1)
- personal (1)
- personal response systems (1)
- personality prediction (1)
- personalization principle (1)
- personalized medicine (1)
- perspective (1)
- philosophical foundation of informatics pedagogy (1)
- phone (1)
- physical computing tools (1)
- planning (1)
- portrait (1)
- poset (1)
- power-law (1)
- pre-primary level (1)
- predictive models (1)
- preprocessing (1)
- primary education (1)
- primary healthcare (1)
- primary level (1)
- primary school (1)
- prior knowledge (1)
- privacy (1)
- problem-solving (1)
- process scheduling (1)
- processes (1)
- processing (1)
- production planning and control (1)
- professional development (1)
- program (1)
- programming in context (1)
- programming skills (1)
- public administration (1)
- public dataset (1)
- public sector organizations (1)
- quantified logics (1)
- random I (1)
- random graphs (1)
- randomized control trial (1)
- real-time (1)
- record linkage (1)
- recursive tuning (1)
- relationship quality (1)
- relevance (1)
- reliability (1)
- remodularization (1)
- remote-first (1)
- representation learning (1)
- resilient architectures (1)
- restoration (1)
- restricted parallelism (1)
- review (1)
- robustness (1)
- romantic (1)
- romantic relationship (1)
- science (1)
- screening tools (1)
- search plan generation (1)
- secondary computer science education (1)
- secondary education (1)
- security (1)
- security chaos engineering (1)
- security risk assessment (1)
- self-adaptive multiprocessing system (1)
- self-awareness (1)
- self-driving (1)
- self-efficacy (1)
- self-healing (1)
- self-sovereign identity (1)
- self-supervised learning (1)
- self-view (1)
- sentiment (1)
- signal processing (1)
- similarity learning (1)
- similarity measures (1)
- simulation (1)
- single event upset (1)
- situated learning (1)
- skew Brownian motion (1)
- skew diffusions (1)
- small files (1)
- smart contracts (1)
- smoother (1)
- social media analysis (1)
- social networking (1)
- social networking sites (1)
- societal effects (1)
- sociotechnical (1)
- software selection (1)
- solar particle event (1)
- sorting (1)
- space missions (1)
- spread correction (1)
- spreadsheets (1)
- stable matching (1)
- standardization (1)
- stochastic process (1)
- strongly stable matching (1)
- student activation (1)
- student experience (1)
- student perceptions (1)
- studentische Forschung (1)
- students’ conceptions (1)
- students’ knowledge (1)
- style transfer (1)
- super stable matching (1)
- survey mode (1)
- systematic literature review (1)
- taxonomy (1)
- teacher (1)
- teacher competencies (1)
- teacher education (1)
- teacher training (1)
- teaching (1)
- teaching informatics in general education (1)
- teaching material (1)
- teamwork (1)
- technical notes and rapid communications (1)
- technische Rahmenbedingungen (1)
- technology (1)
- technostress (1)
- terminology (1)
- test items (1)
- text based classification methods (1)
- theorem (1)
- theory (1)
- tools (1)
- topics (1)
- tort law (1)
- tracing (1)
- training (1)
- transfer learning (1)
- trust (1)
- trust model (1)
- uncanny valley (1)
- unification (1)
- unsupervised methods (1)
- user experience (1)
- user-centred (1)
- videoconferencing (1)
- virtual collaboration (1)
- virtual groups (1)
- virtual teams (1)
- vocational training (1)
- vulnerabilities (1)
- weakly (1)
- weight (1)
- well-being (1)
- wissenschaftliches Arbeiten (1)
- wissenschaftliches Schreiben (1)
- workflow patterns (1)
- workload prediction (1)
- ‘unplugged’ computing (1)
Institute
- Institut für Informatik und Computational Science (150)
- Hasso-Plattner-Institut für Digital Engineering GmbH (49)
- Hasso-Plattner-Institut für Digital Engineering gGmbH (40)
- Extern (34)
- Institut für Mathematik (16)
- Fachgruppe Betriebswirtschaftslehre (15)
- Bürgerliches Recht (10)
- Wirtschaftswissenschaften (8)
- Department Erziehungswissenschaft (4)
- Department Linguistik (4)
The efficient use of natural resources is considered a necessary condition for their sustainable use. Extending the lifetime of products and using resources circularly are two popular strategies to increase the efficiency of resource use.
Both strategies are usually assumed to contribute to the eco-efficiency of resource use independently.
We argue that a move to a circular economy creates opportunity costs for consumers holding on to their products, due to the resource embedded in the product. Assuming rational consumers, we develop a model that determines optimal replacement times for products subject to minimizing average costs over time.
We find that in a perfectly circular economy, consumers are incentivized to discard their products more quickly than in a perfectly linear economy.
A direct consequence of our finding is that extending product use is in direct conflict with closing resource loops in the circular economy.
We identify the salvage value of discarded products and technical progress as two factors that determine the impact that closing resource loops has on the duration of product use. The article highlights the risk that closing resource loops and moving to a more circular economy incentivizes more unsustainable behavior.
Formal constraints on crossing dependencies have played a large role in research on the formal complexity of natural language grammars and parsing. Here we ask whether the apparent evidence for constraints on crossing dependencies in treebanks might arise because of independent constraints on trees, such as low arity and dependency length minimization. We address this question using two sets of experiments. In Experiment 1, we compare the distribution of formal properties of crossing dependencies, such as gap degree, between real trees and baseline trees matched for rate of crossing dependencies and various other properties. In Experiment 2, we model whether two dependencies cross, given certain psycholinguistic properties of the dependencies. We find surprisingly weak evidence for constraints originating from the mild context-sensitivity literature (gap degree and well-nestedness) beyond what can be explained by constraints on rate of crossing dependencies, topological properties of the trees, and dependency length. However, measures that have emerged from the parsing literature (e.g., edge degree, end-point crossings, and heads' depth difference) differ strongly between real and random trees. Modeling results show that cognitive metrics relating to information locality and working-memory limitations affect whether two dependencies cross or not, but they do not fully explain the distribution of crossing dependencies in natural languages. Together these results suggest that crossing constraints are better characterized by processing pressures than by mildly context-sensitive constraints.
The purpose of this study was to examine the moderating effects of technology use for relationship maintenance on the longitudinal associations among self-isolation during the coronavirus-19 (COVID-19) pandemic and romantic relationship quality among adolescents. Participants were 239 (120 female; M age = 16.69, standard deviation [SD] = 0.61; 60 percent Caucasian) 11th and 12th graders from three midwestern high schools. To qualify for this study, adolescents had to be in the same romantic relationship for the duration of the study, similar to 7 months (M length of relationship = 10.03 months). Data were collected in October of 2019 (Time 1) and again 7 months later in May of 2020 (Time 2). Adolescents completed a romantic relationship questionnaire at Time 1 and again at Time 2, along with questionnaires on frequency of self-isolation during the COVID-19 pandemic and use of technology for romantic relationship maintenance. Findings revealed that increases in self-isolation during the COVID-19 pandemic related positively to the use of technology for romantic relationship maintenance and negatively to Time 2 romantic relationship quality. High use of technology for romantic relationship maintenance buffered against the negative effects of self-isolation during the COVID-19 pandemic on adolescents' romantic relationship quality 7 months later, whereas low use strengthened the negative relationship between self-isolation during the COVID-19 pandemic and romantic relationship quality. These findings suggest the importance of considering the implications of societal crisis or pandemics on adolescents' close relationships, particularly their romantic relationships.
A remarkable peculiarity of videoconferencing (VC) applications – the self-view – a.k.a. digital mirror, is examined as a potential reason behind the voiced exhaustion among users. This work draws on technostress research and objective self-awareness theory and proposes the communication role (sender vs. receiver) as an interaction variable. We report the results of two studies among European employees (n1 = 176, n2 = 253) with a one-year time lag. A higher frequency of self-view in a VC when receiving a message, i.e., listening to others, indirectly increases negative affect (study 1 & 2) and exhaustion (study 2) via the increased state of public self-awareness. Self-viewing in the role of message sender, e.g., as an online presenter, also increases public self-awareness, but its overall effects are less harmful. As for individual differences, users predisposed to public self-consciousness were more concerned with how other VC participants perceived them. Gender effects were insignificant.
The field of healthcare is characterized by constant innovation, with gender-specific medicine emerging as a new subfield that addresses sex and gender disparities in clinical manifestations, outcomes, treatment, and prevention of disease. Despite its importance, the adoption of gender-specific medicine remains understudied, posing potential risks to patient outcomes due to a lack of awareness of the topic. Building on the Innovation Decision Process Theory, this study examines the spread of information about gender-specific medicine in online networks. The study applies social network analysis to a Twitter dataset reflecting online discussions about the topic to gain insights into its adoption by health professionals and patients online. Results show that the network has a community structure with limited information exchange between sub-communities and that mainly medical experts dominate the discussion. The findings suggest that the adoption of gender-specific medicine might be in its early stages, focused on knowledge exchange. Understanding the diffusion of gender-specific medicine among medical professionals and patients may facilitate its adoption and ultimately improve health outcomes.
‘Modern talking’
(2024)
Despite growing interest, we lack a clear understanding of how the arguably ambiguous phenomenon of agile is perceived in government practice. This study aims to alleviate this puzzle by investigating how managers and employees in German public sector organisations make sense of agile as a spreading management fashion in the form of narratives. This is important because narratives function as innovation carriers that ultimately influence the manifestations of the concept in organisations. Based on a multi-case study of 31 interviews and 24 responses to a qualitative online survey conducted in 2021 and 2022, we provide insights into what public sector managers, employees and consultants understand (and, more importantly, do not understand) as agile and how they weave it into their existing reality of bureaucratic organisations. We uncover three meta-narratives of agile government, which we label ‘renew’, ‘complement’ and ‘integrate’. In particular, the meta-narratives differ in their positioning of how agile interacts with the characteristics of bureaucratic organisations. Importantly, we also show that agile as a management fad serves as a projection surface for what actors want from a modern and digital organisation. Thus, the vocabulary of agile government within the narratives is inherently linked to other diffusing phenomena such as new work or digitalisation.
The dark side of metaverse: a multi-perspective of deviant behaviors from PLS-SEM and fsQCA findings
(2024)
The metaverse has created a huge buzz of interest because such a phenomenon is emerging. The behavioral aspect of the metaverse includes user engagement and deviant behaviors in the metaverse. Such technology has brought various dangers to individuals and society. There are growing cases reported of sexual abuse, racism, harassment, hate speech, and bullying because of online disinhibition make us feel more relaxed. This study responded to the literature call by investigating the effect of technical and social features through mediating roles of security and privacy on deviant behaviors in the metaverse. The data collected from virtual network users reached 1121 respondents. Partial Least Squares based structural equation modeling (PLS-SEM) and fuzzy set Qualitative Comparative Analysis (fsQCA) were used. PLS-SEM results revealed that social features such as user-to-user interaction, homophily, social ties, and social identity, and technical design such as immersive experience and invisibility significantly affect users’ deviant behavior in the metaverse. The fsQCA results provided insights into the multiple causal solutions and configurations. This study is exceptional because it provided decisive results by understanding the deviant behavior of users based on the symmetrical and asymmetrical approach to virtual networks.
Safe human-robot interactions require robots to be able to learn how to behave appropriately in spaces populated by people and thus to cope with the challenges posed by our dynamic and unstructured environment, rather than being provided a rigid set of rules for operations. In humans, these capabilities are thought to be related to our ability to perceive our body in space, sensing the location of our limbs during movement, being aware of other objects and agents, and controlling our body parts to interact with them intentionally. Toward the next generation of robots with bio-inspired capacities, in this paper, we first review the developmental processes of underlying mechanisms of these abilities: The sensory representations of body schema, peripersonal space, and the active self in humans. Second, we provide a survey of robotics models of these sensory representations and robotics models of the self; and we compare these models with the human counterparts. Finally, we analyze what is missing from these robotics models and propose a theoretical computational framework, which aims to allow the emergence of the sense of self in artificial agents by developing sensory representations through self-exploration.
Epistemic logic programs constitute an extension of the stable model semantics to deal with new constructs called subjective literals. Informally speaking, a subjective literal allows checking whether some objective literal is true in all or some stable models. As it can be imagined, the associated semantics has proved to be non-trivial, since the truth of subjective literals may interfere with the set of stable models it is supposed to query. As a consequence, no clear agreement has been reached and different semantic proposals have been made in the literature. Unfortunately, comparison among these proposals has been limited to a study of their effect on individual examples, rather than identifying general properties to be checked. In this paper, we propose an extension of the well-known splitting property for logic programs to the epistemic case. We formally define when an arbitrary semantics satisfies the epistemic splitting property and examine some of the consequences that can be derived from that, including its relation to conformant planning and to epistemic constraints. Interestingly, we prove (through counterexamples) that most of the existing approaches fail to fulfill the epistemic splitting property, except the original semantics proposed by Gelfond 1991 and a recent proposal by the authors, called Founded Autoepistemic Equilibrium Logic.
Recently, there has been an upsurge of activity in image-based non-photorealistic rendering (NPR), and in particular portrait image stylisation, due to the advent of neural style transfer (NST). However, the state of performance evaluation in this field is poor, especially compared to the norms in the computer vision and machine learning communities. Unfortunately, the task of evaluating image stylisation is thus far not well defined, since it involves subjective, perceptual, and aesthetic aspects. To make progress towards a solution, this paper proposes a new structured, three-level, benchmark dataset for the evaluation of stylised portrait images. Rigorous criteria were used for its construction, and its consistency was validated by user studies. Moreover, a new methodology has been developed for evaluating portrait stylisation algorithms, which makes use of the different benchmark levels as well as annotations provided by user studies regarding the characteristics of the faces. We perform evaluation for a wide variety of image stylisation methods (both portrait-specific and general purpose, and also both traditional NPR approaches and NST) using the new benchmark dataset.