Nicht ermittelbar
Refine
Year of publication
- 2021 (35) (remove)
Document Type
- Part of a Book (14)
- Monograph/Edited Volume (6)
- Conference Proceeding (5)
- Other (4)
- Article (3)
- Postprint (1)
- Preprint (1)
- Report (1)
Language
- English (35) (remove)
Is part of the Bibliography
- yes (35) (remove)
Keywords
- artificial intelligence (2)
- automation (2)
- browser platforms (2)
- culture, identity, and inclusion (2)
- cyber-physical systems (2)
- empowerment (2)
- ict (2)
- platform innovation (2)
- probabilistic timed systems (2)
- qualitative Analyse (2)
Institute
- Fachgruppe Betriebswirtschaftslehre (13)
- Fachgruppe Politik- & Verwaltungswissenschaft (9)
- Hasso-Plattner-Institut für Digital Engineering GmbH (5)
- Öffentliches Recht (5)
- Wirtschaftswissenschaften (2)
- Bürgerliches Recht (1)
- Department Erziehungswissenschaft (1)
- Fachgruppe Volkswirtschaftslehre (1)
- MenschenRechtsZentrum (1)
Shadow education has become part of mass schooling in many societies. Against the background of the continuing expansion of formal education and the persistence of educational and social inequalities, the growing influence of shadow education begs major implications for the postulated goal of equality in educational opportunities. This chapter addresses this issue both theoretically and empirically, focusing on the following question: What is the relationship between the continuous growth of SE across the world and the persistence of social inequality in educational attainment? First, existing findings on the topic are reviewed before I draw on and expand neo-institutionalist and social reproduction theories to incorporate SE, thereby identifying the universal causes for the inevitable expansion of SE and its relation to social inequality across the world. Finally, policy implications and future research directions are discussed. The results of this analysis indicate that even though there exist tremendous differences in the effects of family background on SE use in different regions and systems of education across the world, SE always feeds into the broader institutionalization of education and its role for social stratification. SE might occupy a key role in maintaining vertical and horizontal inequalities in educational attainment in schooled societies, which continue to struggle with inequity of educational opportunities and outcomes in spite of massive educational expansion at the higher education levels and more equity in educational opportunities.
Don’t settle for less
(2021)
From laggards to leaders
(2021)
The 2015 Paris Agreement on climate change embraces the participation of non-state actors in a separate governance track – the ‘Non-state actor zone for global action’ (nazca) – that runs alongside the formal track of unfccc negotiations and the implementation of the Paris Agreement by State Parties through ‘nationally determined contributions’. unfccc Secretariat is entrusted with orchestrating non-state global and transnational initiatives, partnerships and networks. The involvement of non-state actors in the implementation of the Paris Agreement helps to address an action gap by countries that are unable or unwilling to implement ambitious ndcs.
However, the increased prominence of initiatives driven by non-state actors also increases their direct and indirect influence on processes and rules which raises a number of questions with regards to the legitimacy of action and the democratic deficit of the global climate regime. Balancing legitimacy with effectiveness requires non-state initiatives to ensure transparent and inclusive governance, and accountability towards progress against their goals and pledges.
Despite its encouragement towards private initiatives, the Paris Agreement creates surprisingly little regulatory space for non-state actors to gain hold. Neither are there measures that would link ndcs to nazca initiatives, nor are functional requirements such as transparency or reporting extended to non-state initiatives. While the Paris Agreement marks an important step towards harnessing private sector ability and ambition for climate action, more remains to be done to create a truly enabling framework for private action to strive and complement public efforts to address climate change.
Effectiveness
(2021)
This paper starts from the premise that Western states are connected to some of the harms refugees suffer from. It specifically focuses on the harm of acts of misrecognition and its relation to epistemic injustice that refugees suffer from in refugee camps, in detention centers, and during their desperate attempts to find refuge. The paper discusses the relation between hermeneutical injustice and acts of misrecognition, showing that these two phenomena are interconnected and that acts of misrecognition are particularly damaging when (a) they stretch over different contexts, leaving us without or with very few safe spaces, and (b) they dislocate us, leaving us without a community to turn to. The paper then considers the ways in which refugees experience acts of misrecognition and suffer from hermeneutical injustice, using the case of unaccompanied children at the well-known and overcrowded camp Moria in Greece, the case of unsafe detention centers in Libya, and the case of the denial to assistance on the Mediterranean and the resulting pushbacks from international waters to Libya as well as the preventable drowning of refugees in the Mediterranean to illustrate the arguments. Finally, the paper argues for specific duties toward refugees that result from the prior arguments on misrecognition and hermeneutical injustice.
The devil in disguise
(2021)
Envy constitutes a serious issue on Social Networking Sites (SNSs), as this painful emotion can severely diminish individuals' well-being. With prior research mainly focusing on the affective consequences of envy in the SNS context, its behavioral consequences remain puzzling. While negative interactions among SNS users are an alarming issue, it remains unclear to which extent the harmful emotion of malicious envy contributes to these toxic dynamics. This study constitutes a first step in understanding malicious envy’s causal impact on negative interactions within the SNS sphere. Within an online experiment, we experimentally induce malicious envy and measure its immediate impact on users’ negative behavior towards other users. Our findings show that malicious envy seems to be an essential factor fueling negativity among SNS users and further illustrate that this effect is especially pronounced when users are provided an objective factor to mask their envy and justify their norm-violating negative behavior.
While school supervision structures in the German Länder were extensively reformed during the last decades, systematic analyses of these reforms are missing. This chapter contributes to this research gap by providing an overview of the implemented reforms of school supervision structures in the German Länder. The effects of these reforms are analysed in order to answer the question of whether a convergence of school supervision systems is a result of these reforms. In a first step, a distinction is made to identify system-changing reforms. Although a decrease of the number or a concentration on one school supervision system is not a result of the analysis, it is argued that there is a convergence of school supervision structures, as a clear trend against school supervision systems with lower school supervisory boards can be observed.
Immune to COVID?
(2021)
Since the beginning of the recent global refugee crisis, researchers have been tackling many of its associated aspects, investigating how we can help to alleviate this crisis, in particular, using ICTs capabilities. In our research, we investigated the use of ICT solutions by refugees to foster the social inclusion process in the host community. To tackle this topic, we conducted thirteen interviews with Syrian refugees in Germany. Our findings reveal different ICT usages by refugees and how these contribute to feeling empowered. Moreover, we show the sources of empowerment for refugees that are gained by ICT use. Finally, we identified the two types of social inclusion benefits that were derived from empowerment sources. Our results provide practical implications to different stakeholders and decision-makers on how ICT usage can empower refugees, which can foster the social inclusion of refugees, and what should be considered to support them in their integration effort.
Since the beginning of the recent global refugee crisis, researchers have been tackling many of its associated aspects, investigating how we can help to alleviate this crisis, in particular, using ICTs capabilities. In our research, we investigated the use of ICT solutions by refugees to foster the social inclusion process in the host community. To tackle this topic, we conducted thirteen interviews with Syrian refugees in Germany. Our findings reveal different ICT usages by refugees and how these contribute to feeling empowered. Moreover, we show the sources of empowerment for refugees that are gained by ICT use. Finally, we identified the two types of social inclusion benefits that were derived from empowerment sources. Our results provide practical implications to different stakeholders and decision-makers on how ICT usage can empower refugees, which can foster the social inclusion of refugees, and what should be considered to support them in their integration effort.
It’s personal
(2021)
The new technologies of the Fourth Industrial Revolution (4IR) are disrupting traditional models of work and learning. While the impact of digitalization on education was already a point of serious deliberation, the COVID-19 pandemic has expedited ongoing transitions. With 90% of the world’s student population having been impacted by national lockdowns—online learning has gone from being a luxury to a necessity, in a context where around 3.6 billion people are offline. As the impacts of the 4IR unfold alongside the current crisis, it is not enough for future policy pathways to prioritize educational attainment in the traditional sense; it is essential to reimagine education itself as well as its delivery entirely. Future policy narratives will need to evaluate the very process of learning and identify the ways in which technology can help reduce existing disparities and enhance digital access, literacy and fluency in a scalable manner. In this context, this chapter analyses the status quo of online learning in India and Germany. Drawing on the experiences of these two economies with distinct trajectories of digitalization, the chapter explores how new technologies intersect with traditional education and local sociocultural conditions. Further, the limitations and opportunities presented by dominant ed-tech models is critically analyzed against the ongoing COVID-19 pandemic.
We and AI
(2021)
We welcome you to the 54th Hawaii International Conference on System Sciences (HICSS-54) conference. This is the fifth year for the Organizational Learning Minitrack which has had the usual growing pains: two years ago, we added the topic of Unlearning and joined with the Intentional Forgetting Minitrack - as these topics are all organizationally-based knowledge management issues. We proudly bring you the latest research focused on the methods to develop and maintain organizational learning within the Knowledge Innovation and Entrepreneurial Systems Track. The ability to update, change and use current knowledge effectively, especially in light of the ongoing knowledge explosion, can be costly for any organization. Organizations that consider themselves “learning” or “knowledge-based” organizations must develop a competent workforce using KM strategies. Success in organizations involves developing a variety of human factors for changing competencies. With technological change, modification and revisions, many skills require updating for a competitive advantage in the marketplace. The focus on new techniques and insights into how individuals and organizations use their knowledge is our focus for the improvement of organizational
learning in this Minitrack.
For the last 20 years, enterprise architecture management (EAM) was primarily an instrument for harmonizing and consolidating IT landscapes and is lived as a transformation and governance discipline. It, however, is rather related to IT strategy than aligned to the actual corporate strategy and the work of the enterprise architect is characterized by tasks like prescribing, monitoring, documenting, and controlling. As digital transformation continues apace, companies are facing new challenges that lead to a volatile, uncertain, complex, and ambiguous (VUCA) world. To face these challenges, vision, understanding, clarity and agility allow to anticipative and implement necessary changes. This, of course, has implications for the role of the enterprise architect. S/he needs to start actively supporting innovation and taking more of an advisory role instead of just being driven by the current state of the enterprise architecture. This paper investigates the role of the enterprise architect in the VUCA world. Based on current literature and expert interviews, a survey was conducted among consultants who work as (or with) enterprise architects. Survey results include the evaluation of statements on current tasks of enterprise architects, their influence on projects and companies as well as future requirements on the roles of the enterprise architect. The results from the survey were synthesized with the findings from literature to derive the roles, tasks and skills of enterprise architect in the VUCA world.
Modern browsers are digital software platforms, as they allow third parties to extend functionality by providing extensions. In a highly competitive environment, differentiation through provided functionality is a key factor for browser platforms. As the development of browsers progress, new functions are constantly being released. Browsers could thus enter complementary markets by adding functionality previously provided by third-party extensions, which is referred to as ‘platform coring’. Previous studies have missed the perspective of the parties involved. To address this gap, we conducted interviews with third-party and core developers in the security and privacy domain from Firefox and Chrome. This study provides three contributions. First, insights into stakeholder-specific issues concerning coring. Second, measures to prevent coring. Third, strategical guidance for developers and owners. Third-party vendors experienced and core developers confirmed that coring occurs on browser platforms. While developers with extrinsic motivations assess coring negatively, developers with intrinsic motivations perceive coring positively.
Software platforms regularly introduce new features to remain competitive. While platform innovation is considered to be a critical success factor, adding certain features could hurt the ecosystem. If platform owners provide functionality that was previously provided by a contributor, the owners enter complementary product spaces. Complementary market entry frequently occurs on software platforms and is a major concern for third-party developers.
Divergent findings on the impact of complementary market entry call for the consideration of additional factors. As prior research neglected the third-party perspective, this contribution aims to address this gap. We explore the use of measures to prevent complementary market entry using a survey approach on browser platforms. The research model is tested with 655 responses among developer from Mozilla Firefox and Google Chrome. To explain countermeasures employment, developer’s attitude and perceived likelihood are important. The results reveal that developers employ countermeasures if complementary market entry is assessed negatively and perceived as likely for their extension. Differences among browser platforms concerning complementary market entry are identified. Product spaces of extensions being available on multiple platforms are less likely to be entered and more heavily protected. Implications for research and stakeholders, i.e. platform owners and contributors are discussed.
This chapter analyses managerial reforms at the subnational level of government from a comparative perspective and outlines possible routes for future comparative research. It examines reforms of the external relationships between local governments and private service providers, which were aimed at transforming the organizational macro-setting of local service provision, the task portfolio and functional profile of local governments. The chapter then moves to scrutinizing internal managerial reforms concerned with the modernization of organization and processes and the improvement of management capacities inside local administrations meant to strengthen performance, output- and consumer-orientation in local service delivery. The country sample includes the United Kingdom (England), Sweden, and Germany that represent three distinct types of administrative culture and local government in Europe.
Helping overcome distance, the use of videoconferencing tools has surged during the pandemic. To shed light on the consequences of videoconferencing at work, this study takes a granular look at the implications of the self-view feature for meeting outcomes. Building on self-awareness research and self-regulation theory, we argue that by heightening the state of self-awareness, self-view engagement depletes participants’ mental resources and thereby can undermine online meeting outcomes. Evaluation of our theoretical model on a sample of 179 employees reveals a nuanced picture. Self-view engagement while speaking and while listening is positively associated with self-awareness, which, in turn, is negatively associated with satisfaction with meeting process, perceived productivity, and meeting enjoyment. The criticality of the communication role is put forward: looking at self while listening to other attendees has a negative direct and indirect effect on meeting outcomes; however, looking at self while speaking produces equivocal effects.
Beyond good faith
(2021)
The ambitious climate targets set by industrialized nations worldwide cannot be met without decarbonizing the building stock. Using Germany as a case study, this paper takes stock of the extensive set of energy efficiency policies that are already in place and clarifies that they have been designed “in good faith” but lack in overall effectiveness as well as cost-efficiency in achieving these climate targets. We map out the market failures and behavioural considerations that are potential reasons for why realized energy savings fall below expectations and why the household adoption of energy-efficient and low-carbon technologies has remained low. We highlight the pressing need for data and modern empirical research to develop targeted and cost-effective policies seeking to correct these market failures. To this end, we identify some key research questions and identify gaps in the data required for evidence-based policy.
Perfectionism is a personality disposition characterized by setting extremely high performance-standards coupled with critical self-evaluations. Often conceived as positive, perfectionism can yield not only beneficial but also deleterious outcomes ranging from anxiety to burnout. In this proposal, we set out to investigate the role of the technology and, particularly, social media in individuals’ strivings for perfection. We lay down theoretical bases for the possibility that social media plays a role in the development of perfectionism. To empirically test the hypothesized relationship, we propose a comprehensive study design based on the experience sampling method. Lastly, we provide an overview of the planned analysis and future steps.
Since more and more production tasks are enabled by Industry 4.0 techniques, the number of knowledge-intensive production tasks increases as trivial tasks can be automated and only non-trivial tasks demand human-machine interactions. With this, challenges regarding the competence of production workers, the complexity of tasks and stickiness of required knowledge occur [1]. Furthermore, workers experience time pressure which can lead to a decrease in output quality. Cyber-Physical Systems (CPS) have the potential to assist workers in knowledge-intensive work grounded on quantitative insights about knowledge transfer activities [2]. By providing contextual and situational awareness as well as complex classification and selection algorithms, CPS are able to ease knowledge transfer in a way that production time and quality is improved significantly. CPS have only been used for direct production and process optimization, knowledge transfers have only been regarded in assistance systems with little contextual awareness. Embedding production and knowledge transfer optimization thus show potential for further improvements. This contribution outlines the requirements and a framework to design these systems. It accounts for the relevant factors.
As AI technology is increasingly used in production systems, different approaches have emerged from highly decentralized small-scale AI at the edge level to centralized, cloud-based services used for higher-order optimizations. Each direction has disadvantages ranging from the lack of computational power at the edge level to the reliance on stable network connections with the centralized approach. Thus, a hybrid approach with centralized and decentralized components that possess specific abilities and interact is preferred. However, the distribution of AI capabilities leads to problems in self-adapting learning systems, as knowledgebases can diverge when no central coordination is present. Edge components will specialize in distinctive patterns (overlearn), which hampers their adaptability for different cases. Therefore, this paper aims to present a concept for a distributed interchangeable knowledge base in CPPS. The approach is based on various AI components and concepts for each participating node. A service-oriented infrastructure allows a decentralized, loosely coupled architecture of the CPPS. By exchanging knowledge bases between nodes, the overall system should become more adaptive, as each node can “forget” their present specialization.
Law of raw data
(2021)
Law of Raw Data gives an overview of the legal situation across major countries and how such data is contractually handled in practice in the respective countries. In recent years, digital technologies have transformed business and society, impacting all sectors of the economy and a wide variety of areas of life. Digitization is leading to rapidly growing volumes of data with great economic potential. Data, in its raw or unstructured form, has become an important and valuable economic asset, and protection of raw data has become a crucial subject for the intellectual property community. As legislators struggle to develop a settled legal regime in this complex area, this invaluable handbook will offer a careful and dedicated analysis of the legal instruments and remedies, both existing and potential, that provide such protection across a wide variety of national legal systems.
What’s in this book:
Produced under the auspices of the International Association for the Protection of International Property (AIPPI), more than forty active specialists of the association from twenty-three countries worldwide contribute national chapters on the relevant law in their respective jurisdictions. The contributions thoroughly explain how each country approaches such crucial matters as the following:
if there is any intellectual property right available to protect raw data; the nature of such intellectual property rights that exist in unstructured data; contracts on data and which legal boundaries stand in the way of contract drafting; liability for data products or services; and questions of international private law and cross-border portability.
Each country’s rules concerning specific forms of data – such as data embedded in household appliances and consumer goods, criminal offence data, data relating to human genetics, tax and bank secrecy, medical records, and clinical trial data – are described, drawing on legislation, regulation, and case law.
How this will help you:
A matchless legal resource on one of the most important raw materials of the twenty-first century, this book provides corporate counsel, practitioners and policymakers working in the field of intellectual property rights, and concerned academics with both a broad-based global overview on emerging legal strategies in the protection of unstructured data and the latest information on existing legislation and regulation in the area.
This chapter consists of three parts. In the first part, I will give a short overview about the integration of the protection of the environment into German constitutional law. This section will start with the presentation of the relevant provision, Art. 20a BL. Then, I will elaborate on its legal character. In the second part, I will make some brief remarks on the practical implications of Art. 20a BL. Finally, I will present some preliminary conclusions.
As part of the current overall process of de-formalization in international law States increasingly chose informal, non-legally binding agreements or ‘Memoranda of Understanding’ (‘MOUs') to organize their international affairs. The increasing conclusion of such legally non-binding instruments in addition to their flexibility, however, also leads to uncertainties in international relations. Against this background, this article deals with possible indirect legal consequences produced by MOUs. It discusses the different legal mechanisms and avenues that may give rise to secondary legal effects of MOUs through a process of interaction with and interpretation in line with other (formal) sources of international law. The article further considers various strategies how to avoid such eventual possible unintended or unexpected indirect legal effects of MOUs when drafting such instruments and when dealing with them subsequent to their respective ‘adoption’.
Would the world be a better place if one were to adopt a European approach to state immunity?
(2021)
This chapter argues not only that there is no European Sonderweg (or ‘special way’) when it comes to the law of state immunity but that there ought not to be one. Debates within The Hague Conference on Private International Law in the late 1990s and those leading to the adoption of the 2002 UN Convention on Jurisdictional Immunities of States, as well as the development of the EU Brussels Regulation on Jurisdiction and Enforcement, as amended in 2015, all demonstrate that state immunity was not meant to be limited by such treaties but ‘safeguarded’. Likewise, there is no proof that regional European customary law limits state immunity when it comes to ius cogens violations, as Italy and (partly) Greece are the only European states denying state immunity in such cases while the European Court of Human Rights has, time and again, upheld a broad concept of state immunity. It therefore seems unlikely that in the foreseeable future a specific European customary law norm on state immunity will develop, especially given the lack of participation in such practice by those states most concerned by the matter, including Germany. This chapter considers the possible legal implications of the jurisprudence of the Italian Constitutional Court for European military operations (if such operations went beyond peacekeeping). These implications would mainly depend on the question of attribution: if one where to assume that acts undertaken within the framework of military operations led by the EU were to be, at least also, attributable to the troop-contributing member states, the respective troop-contributing state would be entitled to enjoy state immunity exactly to the same degree as in any kind of unilateral military operations. Additionally, some possible perspectives beyond Sentenza 238/2014 are examined, in particular concerning the redress awarded by domestic courts ‘as long as’ neither the German nor the international system grant equivalent protection to the victims of serious violations of international humanitarian law committed during World War II. In the author’s opinion, strengthening the jurisdiction of international courts and tribunals, bringing interstate cases for damages before the International Court of Justice, as well as providing for claims commissions where individual compensation might be sought for violations of international humanitarian law would be more useful and appropriate mechanisms than denying state immunity.
Cyber-physical systems often encompass complex concurrent behavior with timing constraints and probabilistic failures on demand. The analysis whether such systems with probabilistic timed behavior adhere to a given specification is essential. When the states of the system can be represented by graphs, the rule-based formalism of Probabilistic Timed Graph Transformation Systems (PTGTSs) can be used to suitably capture structure dynamics as well as probabilistic and timed behavior of the system. The model checking support for PTGTSs w.r.t. properties specified using Probabilistic Timed Computation Tree Logic (PTCTL) has been already presented. Moreover, for timed graph-based runtime monitoring, Metric Temporal Graph Logic (MTGL) has been developed for stating metric temporal properties on identified subgraphs and their structural changes over time. In this paper, we (a) extend MTGL to the Probabilistic Metric Temporal Graph Logic (PMTGL) by allowing for the specification of probabilistic properties, (b) adapt our MTGL satisfaction checking approach to PTGTSs, and (c) combine the approaches for PTCTL model checking and MTGL satisfaction checking to obtain a Bounded Model Checking (BMC) approach for PMTGL. In our evaluation, we apply an implementation of our BMC approach in AutoGraph to a running example.
The formal modeling and analysis is of crucial importance for software development processes following the model based approach. We present the formalism of Interval Probabilistic Timed Graph Transformation Systems (IPTGTSs) as a high-level modeling language. This language supports structure dynamics (based on graph transformation), timed behavior (based on clocks, guards, resets, and invariants as in Timed Automata (TA)), and interval probabilistic behavior (based on Discrete Interval Probability Distributions). That is, for the probabilistic behavior, the modeler using IPTGTSs does not need to provide precise probabilities, which are often impossible to obtain, but rather provides a probability range instead from which a precise probability is chosen nondeterministically. In fact, this feature on capturing probabilistic behavior distinguishes IPTGTSs from Probabilistic Timed Graph Transformation Systems (PTGTSs) presented earlier.
Following earlier work on Interval Probabilistic Timed Automata (IPTA) and PTGTSs, we also provide an analysis tool chain for IPTGTSs based on inter-formalism transformations. In particular, we provide in our tool AutoGraph a translation of IPTGTSs to IPTA and rely on a mapping of IPTA to Probabilistic Timed Automata (PTA) to allow for the usage of the Prism model checker. The tool Prism can then be used to analyze the resulting PTA w.r.t. probabilistic real-time queries asking for worst-case and best-case probabilities to reach a certain set of target states in a given amount of time.
In recent years, computer vision algorithms based on machine learning have seen rapid development. In the past, research mostly focused on solving computer vision problems such as image classification or object detection on images displaying natural scenes. Nowadays other fields such as the field of cultural heritage, where an abundance of data is available, also get into the focus of research. In the line of current research endeavours, we collaborated with the Getty Research Institute which provided us with a challenging dataset, containing images of paintings and drawings. In this technical report, we present the results of the seminar "Deep Learning for Computer Vision". In this seminar, students of the Hasso Plattner Institute evaluated state-of-the-art approaches for image classification, object detection and image recognition on the dataset of the Getty Research Institute. The main challenge when applying modern computer vision methods to the available data is the availability of annotated training data, as the dataset provided by the Getty Research Institute does not contain a sufficient amount of annotated samples for the training of deep neural networks. However, throughout the report we show that it is possible to achieve satisfying to very good results, when using further publicly available datasets, such as the WikiArt dataset, for the training of machine learning models.
The noble way to substantiate decisions that affect many people is to ask these people for their opinions. For governments that run whole countries, this means asking all citizens for their views to consider their situations and needs.
Organizations such as Africa's Voices Foundation, who want to facilitate communication between decision-makers and citizens of a country, have difficulty mediating between these groups. To enable understanding, statements need to be summarized and visualized. Accomplishing these goals in a way that does justice to the citizens' voices and situations proves challenging. Standard charts do not help this cause as they fail to create empathy for the people behind their graphical abstractions. Furthermore, these charts do not create trust in the data they are representing as there is no way to see or navigate back to the underlying code and the original data. To fulfill these functions, visualizations would highly benefit from interactions to explore the displayed data, which standard charts often only limitedly provide.
To help improve the understanding of people's voices, we developed and categorized 80 ideas for new visualizations, new interactions, and better connections between different charts, which we present in this report. From those ideas, we implemented 10 prototypes and two systems that integrate different visualizations. We show that this integration allows consistent appearance and behavior of visualizations. The visualizations all share the same main concept: representing each individual with a single dot. To realize this idea, we discuss technologies that efficiently allow the rendering of a large number of these dots. With these visualizations, direct interactions with representations of individuals are achievable by clicking on them or by dragging a selection around them. This direct interaction is only possible with a bidirectional connection from the visualization to the data it displays. We discuss different strategies for bidirectional mappings and the trade-offs involved. Having unified behavior across visualizations enhances exploration. For our prototypes, that includes grouping, filtering, highlighting, and coloring of dots. Our prototyping work was enabled by the development environment Lively4. We explain which parts of Lively4 facilitated our prototyping process. Finally, we evaluate our approach to domain problems and our developed visualization concepts.
Our work provides inspiration and a starting point for visualization development in this domain. Our visualizations can improve communication between citizens and their government and motivate empathetic decisions. Our approach, combining low-level entities to create visualizations, provides value to an explorative and empathetic workflow. We show that the design space for visualizing this kind of data has a lot of potential and that it is possible to combine qualitative and quantitative approaches to data analysis.
Crochet is a popular handcraft all over the world. While other techniques such as knitting or weaving have received technical support over the years through machines, crochet is still a purely manual craft. Not just the act of crochet itself is manual but also the process of creating instructions for new crochet patterns, which is barely supported by domain specific digital solutions. This leads to unstructured and often also ambiguous and erroneous pattern instructions. In this report, we propose a concept to digitally represent crochet patterns. This format incorporates crochet techniques which allows domain specific support for crochet pattern designers during the pattern creation and instruction writing process. As contributions, we present a thorough domain analysis, the concept of a graph structure used as domain specific language to specify crochet patterns and a prototype of a projectional editor using the graph as representation format of patterns and a diagramming system to visualize them in 2D and 3D. By analyzing the domain, we learned about crochet techniques and pain points of designers in their pattern creation workflow. These insights are the basis on which we defined the pattern representation. In order to evaluate our concept, we built a prototype by which the feasibility of the concept is shown and we tested the software with professional crochet designers who approved of the concept.