Nicht ermittelbar
Refine
Year of publication
Document Type
- Article (98)
- Monograph/Edited Volume (97)
- Part of a Book (62)
- Conference Proceeding (37)
- Other (13)
- Doctoral Thesis (9)
- Review (8)
- Working Paper (6)
- Report (5)
- Postprint (2)
Language
- English (338) (remove)
Is part of the Bibliography
- yes (338) (remove)
Keywords
Institute
- Fachgruppe Betriebswirtschaftslehre (59)
- Institut für Mathematik (46)
- Fachgruppe Politik- & Verwaltungswissenschaft (43)
- Hasso-Plattner-Institut für Digital Engineering GmbH (23)
- Institut für Informatik und Computational Science (23)
- Institut für Anglistik und Amerikanistik (18)
- Öffentliches Recht (18)
- Wirtschaftswissenschaften (16)
- Institut für Physik und Astronomie (12)
- Department Psychologie (9)
When participants judge the parity of visually presented digits, left-hand responses are faster for numerically small numbers, whereas right-hand responses are faster for large numbers [SNARC effect; S. Dehaene, S. Bossini, P. Giraux, The mental representation of parity and number magnitude. J. Exp. Psychol. Gen., 122, (1993) 371-396]. The present study aimed to find more direct evidence for the functional locus of this effect by recording brain waves while participants performed speeded parity judgments giving manual responses. Our results show clear and robust SNARC effects in the response-locked event-related potentials (ERPs) compared to the stimulus-locked ERPs, confirming that the SNARC effect arises during response-related rather than stimulus-related processing stages. Further analyses of lateralized readiness potentials strongly suggest that the SNARC effect begins to emerge in a response-related stage prior to response preparation and execution, more specifically, in a response selection stage. (c) 2005 Elsevier B.V All rights reserved
Developmental expression of a tyramine receptor gene in the brain of the honey bee, Apis mellifera
(2005)
Today, InfiniBand is an evolving high speed interconnect technology to build high performance computing clusters, that achieve top 10 rankings in the current top 500 of the worldwide fastest supercomputers. Network interfaces (called host channel adapters) provide transport layer services over connections and datagrams in reliable or unreliable manner. Additionally, InfiniBand supports remote direct memory access (RDMA) primitives that allow for one- sided communication. Using server load balancing together with a high performance cluster makes it possible to build a fast, scalable, and reliable service infrastructure. We have designed and implemented a scalable load balancer for InfiniBand clusters called SLIBNet. Our investigations show that the InfiniBand architecture offers features which perfectly support load balancing. We want to thank the Megware Computer GmbH for providing us an InfiniBand switch to realize a server load balancing testbed.
Symplectic geometry, wigner-weyl-moyal calculus, and quantum mechanics, in phase space ; Part 1
(2006)
Symplectic geometry, wigner-weyl-moyal calculus, and quantum mechanics, in phase space ; Part 2
(2006)
Symplectic geometry, wigner-weyl-moyal calculus, and quantum mechanics, in phase space ; Part 3
(2006)
On null quadrature domains
(2006)
This contribution presents an approach for requirement oriented team building in industrial processes like product development. This will be based on the knowledge modelling and description language (KMDL(R)) that enables the modelling and analysis of knowledge intensive business processes. First the basic elements of the modelling technique are described, presenting the concept and the description language. Furthermore it is shown how the KMDL(R) process models can be used as a basis for the team building component. Therefore, an algorithm was developed that is able to propose a team composition for a specific task by analyzing the knowledge and skills of the employees, which will be contrasted to the process requirements. This can be used as guidance for team building decisions.
Most scholars in public administration and management research would agree that there is a connection between the culture of a nation or region and the way management in public administration is structured and working ("public management arrangements"). However, to be incorporated into public management research and theory, a more precise notion about the forms, ways, and mechanisms of the interlinkage between societal culture and public management is required. A look into public management literature reveals that wide use and reference is made to the importance and influence of culture on public management arrangements - mostly, though, using the term "culture" as a short-cut for "organizational culture". Public management discussion focuses on varying aspects and levels of culture, and varying conceptual integrations of cultural aspects are found. Public management treatises stress the influence of past events and contexts for the specific functioning and establishment of organizations, rules, and perceptions which in turn have great influence on the reception and functioning of public management mechanisms. Elsewise, organizational culture - or more precisely change thereof - is claimed to be the result of public management efforts. In sum, the interlinkage between culture and public management is there, but is not systematically and explicitly incorporated by referring to adequate theory. Although cultural theory has gained considerable attention, there are still other concepts for the analysis of cultural facts that may be of interest to the subject, too.
The dynamic 1H NMR study of some primary carbamates in the solvents CDCl3 and CD3COCD3 between 183 and 298 K is reported. The free energies of activation, thus obtained (12.4 to 14.3 kcal mol-1), were attributed to the conformational isomerization about the N-C bond. These barriers to rotation show solvent dependence in contrast to the tertiary analogues and are lower in free energy by ca. 2-3 kcal mol-1.
Parsing costs as predictors of reading difficulty : an evaluation using the Potsdam Sentence Corpus
(2008)
Network approach to supply chain management : terms, scope of issues and lines of development
(2009)
The ellipticity of operators on a manifold with edge is defined as the bijectivity of the components of a principal symbolic hierarchy sigma = (sigma(psi), sigma(boolean AND)), where the second component takes values in operators on the infinite model cone of the local wedges. In the general understanding of edge problems there are two basic aspects: Quantisation of edge-degenerate operators in weighted Sobolev spaces, and verifying the ellipticity of the principal edge symbol sigma(boolean AND) which includes the (in general not explicity known) number of additional conditions of trace and potential type on the edge. We focus here on these questions and give explicit answers for a wide class of elliptic operators that are connected with the ellipticity of edge boundary value problems and reductions to the boundary. In particular, we study the edge quantisation and ellipticity for Dirichlet-Neumann operators with respect to interfaces of some codimension on a boundary. We show analogues of the Agranovich-Dynin formula for edge boundary value problems.
Molecular modeling calculations using DFT at the B3LYP/6-31G(d,p) level of theory have been performed on diastereomeric complexes formed between chiral carboxylate anions and chiral urea receptors, a combination previously demonstrated to enable enantiodifferentiation by electrochemical sensing. The calculations correctly predicted the stability order of the enantiomers in acetonitrile solution when the distinction between the enantiomers was above the declared threshold reliability value of 1 kcal mol;1 for computations at this level of theory. Thus, the calculations can not only be applied to predict the likely success of undertakings using the analytical method, it can also, provided ;E is sufficient, potentially be used to determine the absolute configuration of chiral analytes with at least the racemate in hand. The previously successful enantiodifferentiations of various amino acids and alcohols using chiral ion mobility spectroscopy (CIMS) with (S)-2-butanol as the chiral selector were also evaluated by DFT calculations. The calculations again correctly predicted the stability order of the enantiomers when the calculated ;E was above the threshold value though cases not providing a value for ;E above the threshold value was problematic for this system. Attempts to address this shortcoming included an expanded conformational evaluation, a broader analytical approach, and an extended basis set.
Evaluating carbon governance : the clean development mechanism from an emerging economy perspective
(2010)
Accelerating knowledge
(2019)
As knowledge-intensive processes are often carried out in teams and demand for knowledge transfers among various knowledge carriers, any optimization in regard to the acceleration of knowledge transfers obtains a great economic potential. Exemplified with product development projects, knowledge transfers focus on knowledge acquired in former situations and product generations. An adjustment in the manifestation of knowledge transfers in its concrete situation, here called intervention, therefore can directly be connected to the adequate speed optimization of knowledge-intensive process steps. This contribution presents the specification of seven concrete interventions following an intervention template. Further, it describes the design and results of a workshop with experts as a descriptive study. The workshop was used to assess the practical relevance of interventions designed as well as the identification of practical success factors and barriers of their implementation.
Developing a new paradigm
(2020)
Internet users commonly agree that it is important for them to protect their personal data. However, the same users readily disclose their data when requested by an online service. The dichotomy between privacy attitude and actual behaviour is commonly referred to as the “privacy paradox”. Over twenty years of research were not able to provide one comprehensive explanation for the paradox and seems even further from providing actual means to overcome the paradox. We argue that the privacy paradox is not just an instantiation of the attitude-behaviour gap. Instead, we introduce a new paradigm explaining the paradox as the result of attitude-intention and intentionbehaviour gaps. Historically, motivational goal-setting psychologists addressed the issue of intentionbehaviour gaps in terms of the Rubicon Model of Action Phases and argued that commitment and volitional strength are an essential mechanism that fuel intentions and translate them into action. Thus, in this study we address the privacy paradox from a motivational psychological perspective by developing two interventions on Facebook and assess whether the 287 participants of our online experiment actually change their privacy behaviour. The results demonstrate the presence of an intentionbehaviour gap and the efficacy of our interventions in reducing the privacy paradox.
A growing number of business processes can be characterized as knowledge-intensive. The ability to speed up the transfer of knowledge between any kind of knowledge carriers in business processes with AR techniques can lead to a huge competitive advantage, for instance in manufacturing. This includes the transfer of person-bound knowledge as well as externalized knowledge of physical and virtual objects. The contribution builds on a time-dependent knowledge transfer model and conceptualizes an adaptable, AR-based application. Having the intention to accelerate the speed of knowledge transfers between a manufacturer and an information system, empirical results of an experimentation show the validity of this approach. For the first time, it will be possible to discover how to improve the transfer among knowledge carriers of an organization with knowledge-driven information systems (KDIS). Within an experiment setting, the paper shows how to improve the quantitative effects regarding the quality and amount of time needed for an example manufacturing process realization by an adaptable KDIS.
As part of the digitization, the role of artificial systems as new actors in knowledge-intensive processes requires to recognize them as a new form of knowledge bearers side by side with traditional knowledge bearers, such as individuals, groups, organizations. By now, artificial intelligence (AI) methods were used in knowledge management (KM) for knowledge discovery, for the reinterpreting of information, and recent works focus on the studying of different AI technologies implementation for knowledge management, like big data, ontology-based methods and intelligent agents [1]. However, a lack of holistic management approach is present, that considers artificial systems as knowledge bearers. The paper therefore designs a new kind of KM approach, that integrates the technical level of knowledge and manifests as Neuronal KM (NKM). Superimposing traditional KM approaches with the NKM, the Symbiotic Knowledge Management (SKM) is conceptualized furthermore, so that human as well as artificial kinds of knowledge bearers can be managed as symbiosis. First use cases demonstrate the new KM, NKM and SKM approaches in a proof-of-concept and exemplify their differences.
The analysis of behavioral models is of high importance for cyber-physical systems, as the systems often encompass complex behavior based on e.g. concurrent components with mutual exclusion or probabilistic failures on demand. The rule-based formalism of probabilistic timed graph transformation systems is a suitable choice when the models representing states of the system can be understood as graphs and timed and probabilistic behavior is important. However, model checking PTGTSs is limited to systems with rather small state spaces.
We present an approach for the analysis of large scale systems modeled as probabilistic timed graph transformation systems by systematically decomposing their state spaces into manageable fragments. To obtain qualitative and quantitative analysis results for a large scale system, we verify that results obtained for its fragments serve as overapproximations for the corresponding results of the large scale system. Hence, our approach allows for the detection of violations of qualitative and quantitative safety properties for the large scale system under analysis. We consider a running example in which we model shuttles driving on tracks of a large scale topology and for which we verify that shuttles never collide and are unlikely to execute emergency brakes. In our evaluation, we apply an implementation of our approach to the running example.
The envy spiral
(2020)
On Social Networking Sites (SNS) users disclose mostly positive and often self-enhancing information. Scholars refer to this phenomenon as the positivity bias in SNS communication (PBSC). However, while theoretical explanations for this phenomenon have been proposed, an empirical proof of these theorized mechanisms is still missing. The project presented in this Research-in-Progress paper aims at explaining the PBSC with the mechanism specified in the self-enhancement envy spiral. Specifically, we hypothesize that feelings of envy drive people to post positive and self-enhancing content on SNS. To test this hypothesis, we developed an experimental design allowing to examine the causal effect of envy on the positivity of users’ subsequently posted content. In a preliminary study, we tested our manipulation of envy and could show its effectiveness in inducing different levels of envy between our groups. Our project will help to broaden the understanding of the complex dynamics of SNS and the potentially adverse driving forces underlying them.
Missing out on life
(2020)
Mobile devices have become an integral part of everyday life due to
their portability. As literature shows, technology use is not only beneficial but also has dark sides, such as addiction. Parents face the need to balance perceived benefits and risks of children’s exposure to mobile technologies. However, no study has uncovered what kind of benefits and concerns parents consider when implementing technology-related rules. We built on qualitative responses of 300
parents of children aged two to thirteen to explore concerns about, and perceived benefits of children’s smartphone and tablet usage, as well as the rules parents have developed regarding technology use. Findings point to concerns regarding children’s development, as well as benefits for both children and parents, and ultimately to new insights about mobile technology mediation. These results provide practical guidance for parents, physicians and mobile industry
stakeholders, trying to ensure that children are acting responsibly with mobile technology.
Living in a world of plenty?
(2020)
Inequality in the distribution of economic wealth within populations has been rising steadily over the past century, having reached unprecedented highs in many Western societies. However, this development is not reflected in people’s perceptions of wealth inequality, as the public tends to underestimate it. Research suggests that inequality estimates are derived from personal reference groups, which, as we propose, are expanded by social network site (SNS) use. As content on SNSs frequently revolves around events of consumption, signaling enhanced overall population wealth, this study tests the hypothesis that SNS use distorts inequality perceptions downward, i.e., increases the perception of societal equality. Responses of 534 survey participants in the United States confirm that SNS use negatively predicts perceived inequality. The relationship is stronger the more SNS users perceive the content they encounter online as real, supporting the assumption that observing other people’s behavior online lowers estimates of nationwide wealth inequality. These findings provide novel insights on inequality misperceptions by suggesting individuals’ SNS use as a new predictor of perceived wealth inequality.
How messy is your news feed
(2020)
Social Networking Sites (SNSs) are pervasive in our daily lives. However, emerging reports suggest that people are increasingly dissatisfied with their experience of SNSs News Feeds. Motivated by the cognitive load theory, the paper postulates that arrangement and presentation of information are important constituents of one’s Facebook News Feed experience. Integrating these factors into the novel concept of ‘perceived disorder’, this paper hypothesizes that the perception of disorder elicited by the Facebook News Feed plays an important role in causing discontinuance intentions. Drawing on the Stressor-Strain-Outcome Model, we suggest that perceived disorder leads to SNS discontinuance intention and is partially mediated by SNS fatigue. The paper uses the responses of 268 Facebook users to investigate these relationships and introduces perceived disorder as a novel stressor. Besides adding to the existing body of literature, these insights are of relevance to internet service providers, policy makers and SNS users.
Data sharing requires researchers to publish their (primary) data and any supporting research materials. With increased attention on reproducibility and more transparent research requiring sharing of data, the issues surrounding data sharing are moving beyond whether data sharing is beneficial, to what kind of research data should be shared and how. However, despite its benefits, data sharing still is not common practice in Information Systems (IS) research. The panel seeks to discuss the controversies related to data sharing in research, specifically focusing on the IS discipline. It remains unclear how the positive effects of data sharing that are often framed as extending beyond the individual researcher (e.g., openness for innovation) can be utilized while reducing the downsides often associated with negative consequences for the individual researcher (e.g., losing a competitive advantage). To foster data sharing practices in IS, the panel will address this dilemma by drawing on the panelists’ expertise.
Comparative methods B
(2020)
This chapter outlines the relevance and value of comparative approaches and methods in studying Public Administration (PA). It discusses the roots and current developments of comparative research in PA and discusses various methodological venues for cross-country comparisons, such as most similar/dissimilar systems designs, the method of concomitant variation and the difference-in-difference method. Besides the description of these approaches, we highlight their conceptual value for theory-driven empirical comparative research. Drawing on selected pieces of comparative research, the chapter furthermore provides examples for the application of comparative methods in practice presenting empirical findings and highlighting strengths and weaknesses. The chapter finally emphasizes that the methodological development in comparative PA research has by far not yet reached its end, and that some future challenges need to be addressed, such as the issues of causality, generalizability, and mixed-methods approaches.
Challenges, triggers and initiators of climate policies and implications for policy formulation
(2020)
The COVID-19 virus has hit Germany as unexpectedly as other European countries. For a few weeks, Germans thought that COVID-19 was an issue for Asian states and not for their country. Although Germany continues to be affected by the coronavirus, the situation is nowhere as dire as it was in Britain, Italy or Spain. The race to lift restrictions in Germany began in May, and by early June, the country may be back to normal. Germany, with its enormous financial resources and a well-equipped medical sector, appears to be better placed than other economies to weather the storm.
Germany as a leading power
(2020)
Rankings have grown in importance in the last decades. This is particularly evident in, but not limited to, academia. In this paper, we propose a power analytical take on academic rankings as a transnational(izing) phenomenon. In doing so, we make two contributions. First, we develop a conceptual definition of rankings as consecratory institutions. After providing an overview of the most prominent types of rankings in the academic field and discussing the different forms they can take, we suggest that rankings operate through subjectivation, zero-sum comparisons, quantification, publication and generating a doxical belief. Second, we propose that rankings fulfil a strategic double function. As a particularly momentous consecratory institution, rankings propel power shifts in the academic field and beyond by preferring (and being pushed by) specific academic milieus, types of agents, paradigms, and strategies. As a dispositif, rankings operate at the intersection of different fields, open academic fields up for a lay audience and advance processes of transnationalization by facilitating new modes of governance for hubs of state institutions, private corporations, media corporations, and data providers. Concluding, we argue that the consecration and dispositif functions rely on some basic principles of the practical functioning of rankings.
Does a smile open all doors?
(2020)
Online photographs govern an individual’s choices across a variety of contexts. In sharing arrangements, facial appearance has been shown to affect the desire to collaborate, interest to explore a listing, and even willingness to pay for a stay. Because of the ubiquity of online images and their influence on social attitudes, it seems crucial to be able to control these aspects. The present study examines the effect of different photographic self-disclosures on the provider’s perceptions and willingness to accept a potential co-sharer. The findings from our experiment in the accommodation-sharing context suggest social attraction mediates the effect of photographic self-disclosures on willingness to host. Implications of the results for IS research and practitioners are discussed.
This chapter consists of three parts. In the first part, I will give a short overview about the integration of the protection of the environment into German constitutional law. This section will start with the presentation of the relevant provision, Art. 20a BL. Then, I will elaborate on its legal character. In the second part, I will make some brief remarks on the practical implications of Art. 20a BL. Finally, I will present some preliminary conclusions.
Would the world be a better place if one were to adopt a European approach to state immunity?
(2021)
This chapter argues not only that there is no European Sonderweg (or ‘special way’) when it comes to the law of state immunity but that there ought not to be one. Debates within The Hague Conference on Private International Law in the late 1990s and those leading to the adoption of the 2002 UN Convention on Jurisdictional Immunities of States, as well as the development of the EU Brussels Regulation on Jurisdiction and Enforcement, as amended in 2015, all demonstrate that state immunity was not meant to be limited by such treaties but ‘safeguarded’. Likewise, there is no proof that regional European customary law limits state immunity when it comes to ius cogens violations, as Italy and (partly) Greece are the only European states denying state immunity in such cases while the European Court of Human Rights has, time and again, upheld a broad concept of state immunity. It therefore seems unlikely that in the foreseeable future a specific European customary law norm on state immunity will develop, especially given the lack of participation in such practice by those states most concerned by the matter, including Germany. This chapter considers the possible legal implications of the jurisprudence of the Italian Constitutional Court for European military operations (if such operations went beyond peacekeeping). These implications would mainly depend on the question of attribution: if one where to assume that acts undertaken within the framework of military operations led by the EU were to be, at least also, attributable to the troop-contributing member states, the respective troop-contributing state would be entitled to enjoy state immunity exactly to the same degree as in any kind of unilateral military operations. Additionally, some possible perspectives beyond Sentenza 238/2014 are examined, in particular concerning the redress awarded by domestic courts ‘as long as’ neither the German nor the international system grant equivalent protection to the victims of serious violations of international humanitarian law committed during World War II. In the author’s opinion, strengthening the jurisdiction of international courts and tribunals, bringing interstate cases for damages before the International Court of Justice, as well as providing for claims commissions where individual compensation might be sought for violations of international humanitarian law would be more useful and appropriate mechanisms than denying state immunity.
Perfectionism is a personality disposition characterized by setting extremely high performance-standards coupled with critical self-evaluations. Often conceived as positive, perfectionism can yield not only beneficial but also deleterious outcomes ranging from anxiety to burnout. In this proposal, we set out to investigate the role of the technology and, particularly, social media in individuals’ strivings for perfection. We lay down theoretical bases for the possibility that social media plays a role in the development of perfectionism. To empirically test the hypothesized relationship, we propose a comprehensive study design based on the experience sampling method. Lastly, we provide an overview of the planned analysis and future steps.
Law of raw data
(2021)
Law of Raw Data gives an overview of the legal situation across major countries and how such data is contractually handled in practice in the respective countries. In recent years, digital technologies have transformed business and society, impacting all sectors of the economy and a wide variety of areas of life. Digitization is leading to rapidly growing volumes of data with great economic potential. Data, in its raw or unstructured form, has become an important and valuable economic asset, and protection of raw data has become a crucial subject for the intellectual property community. As legislators struggle to develop a settled legal regime in this complex area, this invaluable handbook will offer a careful and dedicated analysis of the legal instruments and remedies, both existing and potential, that provide such protection across a wide variety of national legal systems.
What’s in this book:
Produced under the auspices of the International Association for the Protection of International Property (AIPPI), more than forty active specialists of the association from twenty-three countries worldwide contribute national chapters on the relevant law in their respective jurisdictions. The contributions thoroughly explain how each country approaches such crucial matters as the following:
if there is any intellectual property right available to protect raw data; the nature of such intellectual property rights that exist in unstructured data; contracts on data and which legal boundaries stand in the way of contract drafting; liability for data products or services; and questions of international private law and cross-border portability.
Each country’s rules concerning specific forms of data – such as data embedded in household appliances and consumer goods, criminal offence data, data relating to human genetics, tax and bank secrecy, medical records, and clinical trial data – are described, drawing on legislation, regulation, and case law.
How this will help you:
A matchless legal resource on one of the most important raw materials of the twenty-first century, this book provides corporate counsel, practitioners and policymakers working in the field of intellectual property rights, and concerned academics with both a broad-based global overview on emerging legal strategies in the protection of unstructured data and the latest information on existing legislation and regulation in the area.