Refine
Year of publication
Document Type
- Conference Proceeding (378) (remove)
Language
- English (313)
- German (62)
- French (1)
- Multiple languages (1)
- Russian (1)
Is part of the Bibliography
- yes (378) (remove)
Keywords
- social media (5)
- COVID-19 (3)
- Cloud Computing (3)
- E-Learning (3)
- E-Mail Tracking (3)
- ERP (3)
- MOOC (3)
- Privacy (3)
- conversational agents (3)
- enterprise systems (3)
Institute
- Fachgruppe Betriebswirtschaftslehre (68)
- Institut für Biochemie und Biologie (54)
- Department Sport- und Gesundheitswissenschaften (41)
- Institut für Ernährungswissenschaft (37)
- Department Psychologie (29)
- Institut für Informatik und Computational Science (17)
- Institut für Chemie (15)
- Extern (11)
- Wirtschaftswissenschaften (10)
- Institut für Mathematik (9)
Perfectionism is a personality disposition characterized by setting extremely high performance-standards coupled with critical self-evaluations. Often conceived as positive, perfectionism can yield not only beneficial but also deleterious outcomes ranging from anxiety to burnout. In this proposal, we set out to investigate the role of the technology and, particularly, social media in individuals’ strivings for perfection. We lay down theoretical bases for the possibility that social media plays a role in the development of perfectionism. To empirically test the hypothesized relationship, we propose a comprehensive study design based on the experience sampling method. Lastly, we provide an overview of the planned analysis and future steps.
Coming back for more
(2022)
Recent spikes in social networking site (SNS) usage times have launched investigations into reasons for excessive SNS usage. Extending research on social factors (i.e., fear of missing out), this study considers the News Feed setup. More specifically, we suggest that the order of the News Feed (chronological vs. algorithmically assembled posts) affects usage behaviors. Against the background of the variable reward schedule, this study hypothesizes that the different orders exert serendipity differently. Serendipity, termed as unexpected lucky encounters with information, resembles variable rewards. Studies have evidenced a relation between variable rewards and excessive behaviors. Similarly, we hypothesize that order-induced serendipitous encounters affect SNS usage times and explore this link in a two-wave survey with an experimental setup (users using either chronological or algorithmic News Feeds). While theoretically extending explanations for increased SNS usage times by considering the News Feed order, practically the study will offer recommendations for relevant stakeholders.
The devil in disguise
(2021)
Envy constitutes a serious issue on Social Networking Sites (SNSs), as this painful emotion can severely diminish individuals' well-being. With prior research mainly focusing on the affective consequences of envy in the SNS context, its behavioral consequences remain puzzling. While negative interactions among SNS users are an alarming issue, it remains unclear to which extent the harmful emotion of malicious envy contributes to these toxic dynamics. This study constitutes a first step in understanding malicious envy’s causal impact on negative interactions within the SNS sphere. Within an online experiment, we experimentally induce malicious envy and measure its immediate impact on users’ negative behavior towards other users. Our findings show that malicious envy seems to be an essential factor fueling negativity among SNS users and further illustrate that this effect is especially pronounced when users are provided an objective factor to mask their envy and justify their norm-violating negative behavior.
The envy spiral
(2020)
On Social Networking Sites (SNS) users disclose mostly positive and often self-enhancing information. Scholars refer to this phenomenon as the positivity bias in SNS communication (PBSC). However, while theoretical explanations for this phenomenon have been proposed, an empirical proof of these theorized mechanisms is still missing. The project presented in this Research-in-Progress paper aims at explaining the PBSC with the mechanism specified in the self-enhancement envy spiral. Specifically, we hypothesize that feelings of envy drive people to post positive and self-enhancing content on SNS. To test this hypothesis, we developed an experimental design allowing to examine the causal effect of envy on the positivity of users’ subsequently posted content. In a preliminary study, we tested our manipulation of envy and could show its effectiveness in inducing different levels of envy between our groups. Our project will help to broaden the understanding of the complex dynamics of SNS and the potentially adverse driving forces underlying them.
HPI Future SOC Lab
(2015)
Das Future SOC Lab am HPI ist eine Kooperation des Hasso-Plattner-Instituts mit verschiedenen Industriepartnern. Seine Aufgabe ist die Ermöglichung und Förderung des Austausches zwischen Forschungsgemeinschaft und Industrie.
Am Lab wird interessierten Wissenschaftlern eine Infrastruktur von neuester Hard- und Software kostenfrei für Forschungszwecke zur Verfügung gestellt. Dazu zählen teilweise noch nicht am Markt verfügbare Technologien, die im normalen Hochschulbereich in der Regel nicht zu finanzieren wären, bspw. Server mit bis zu 64 Cores und 2 TB Hauptspeicher. Diese Angebote richten sich insbesondere an Wissenschaftler in den Gebieten Informatik und Wirtschaftsinformatik. Einige der Schwerpunkte sind Cloud Computing, Parallelisierung und In-Memory Technologien.
In diesem Technischen Bericht werden die Ergebnisse der Forschungsprojekte des Jahres 2015 vorgestellt. Ausgewählte Projekte stellten ihre Ergebnisse am 15. April 2015 und 4. November 2015 im Rahmen der Future SOC Lab Tag Veranstaltungen vor.
Intrasession reliability of insole in-shoe plantar pressure measurements in different foot areas
(2012)
Data sharing requires researchers to publish their (primary) data and any supporting research materials. With increased attention on reproducibility and more transparent research requiring sharing of data, the issues surrounding data sharing are moving beyond whether data sharing is beneficial, to what kind of research data should be shared and how. However, despite its benefits, data sharing still is not common practice in Information Systems (IS) research. The panel seeks to discuss the controversies related to data sharing in research, specifically focusing on the IS discipline. It remains unclear how the positive effects of data sharing that are often framed as extending beyond the individual researcher (e.g., openness for innovation) can be utilized while reducing the downsides often associated with negative consequences for the individual researcher (e.g., losing a competitive advantage). To foster data sharing practices in IS, the panel will address this dilemma by drawing on the panelists’ expertise.
Visual Social Networking Sites (SNSs) enable users to present themselves favorably to gain likes and the attention of others. Especially, Instagram is known for its focus on beauty, fitness, fashion, and dietary topics. Although a large body of research reports negative weight-related outcomes of SNS usage (e.g., body dissatisfaction, body image concerns), studies examining how SNS usage relates to these outcomes are scarce. Based on the visual normalization theory, we argue that SNS content facilitates normalization of so-called thin- and fit-ideals, thereby leading to biased perceptions of the average body weight in society. Therefore, this study tests whether Instagram use is associated with perceiving that the average person weighs less. Responses of 181 survey participants confirm that Instagram use is negatively related to average weight perception of both women and men. These findings contribute to the growing body of research on how SNS use relates to negative weight-related outcomes.
Mit der politischen Wende in den Staaten des ehemaligen Ostblockes wurde für viele militärisch genutzte Flächen ein tiefgreifender Nutzungswandel eingeleitet. Truppenübungsplätze als stark gestörte Bestandteile unserer Kulturlandschaft weisen auf großen Flächen naturschutzfachlich wertvolle Habitatmosaike mit speziellen Lebensgemeinschaften auf. Der Nutzungswandel ist mit einer Veränderung der Vegetationsstrukturen (Sukzession) und weiteren landschaftsökologischen Prozessen verbunden. Der ehemalige Truppenübungsplatz Döberitz im Norden der Landeshauptstadt Potsdam kann auf eine lange militärische Nutzungsgeschichte verweisen (erste Manöver des Soldatenkönigs im Jahr 1713). Nach 1992 wurden das NSG Döberitzer Heide (3.415 ha) und das NSG Ferbitzer Bruch (1.155 ha) ausgewiesen. Als Schutzgebiete nach der Vogelschutzrichtlinie sind sie Bestandteile des kohärenten Schutzgebietssystems Natura 2000 der europäischen Gemeinschaft. Trotz des Schutzstatus und der militärischen Altlasten unterliegt das Gebiet als größte zusammenhängende Naturfläche im engeren Verflechtungsraum des Landes Brandenburg einem hohen Nutzungsdruck. <hr> Interdisziplinäres Zentrum für Musterdynamik und Angewandte Fernerkundung Workshop vom 9. - 10. Februar 2006
The digitalization of value networks holds out the prospect of many advantages for the participating compa- nies. Utilizing information platforms, cross-company data exchange enables increased efficiency of collab- oration and offers space for new business models and services. In addition to the technological challenges, the fear of know-how leakage appears to be a significant roadblock that hinders the beneficial realization of new business models in digital ecosystems. This paper provides the necessary building blocks of digital participation and, in particular, classifies the issue of trust creation within it as a significant success factor. Based on these findings, it presents a solution concept that, by linking the identified building blocks, offers the individual actors of the digital value network the opportunity to retain sovereignty over their data and know-how and to use the potential of extensive networking. In particular, the presented concept takes into account the relevant dilemma, that every actor (e. g. the machine users) has to be able to control his commu- nicated data at any time and have sufficient possibilities for intervention that, on the one hand, satisfy the need for protection of his knowledge and, on the other hand, do not excessively diminish the benefits of the system or the business. Taking up this perspective, this paper introduces dedicated data sovereignty and shows a possible implementation concept.