Nicht ermittelbar
Refine
Year of publication
Document Type
- Article (98)
- Monograph/Edited Volume (97)
- Part of a Book (62)
- Conference Proceeding (37)
- Other (13)
- Doctoral Thesis (9)
- Review (8)
- Working Paper (6)
- Report (5)
- Postprint (2)
Language
- English (338) (remove)
Is part of the Bibliography
- yes (338) (remove)
Keywords
Institute
- Fachgruppe Betriebswirtschaftslehre (59)
- Institut für Mathematik (46)
- Fachgruppe Politik- & Verwaltungswissenschaft (43)
- Hasso-Plattner-Institut für Digital Engineering GmbH (23)
- Institut für Informatik und Computational Science (23)
- Institut für Anglistik und Amerikanistik (18)
- Öffentliches Recht (18)
- Wirtschaftswissenschaften (16)
- Institut für Physik und Astronomie (12)
- Department Psychologie (9)
Cyber-physical systems often encompass complex concurrent behavior with timing constraints and probabilistic failures on demand. The analysis whether such systems with probabilistic timed behavior adhere to a given specification is essential. When the states of the system can be represented by graphs, the rule-based formalism of Probabilistic Timed Graph Transformation Systems (PTGTSs) can be used to suitably capture structure dynamics as well as probabilistic and timed behavior of the system. The model checking support for PTGTSs w.r.t. properties specified using Probabilistic Timed Computation Tree Logic (PTCTL) has been already presented. Moreover, for timed graph-based runtime monitoring, Metric Temporal Graph Logic (MTGL) has been developed for stating metric temporal properties on identified subgraphs and their structural changes over time. In this paper, we (a) extend MTGL to the Probabilistic Metric Temporal Graph Logic (PMTGL) by allowing for the specification of probabilistic properties, (b) adapt our MTGL satisfaction checking approach to PTGTSs, and (c) combine the approaches for PTCTL model checking and MTGL satisfaction checking to obtain a Bounded Model Checking (BMC) approach for PMTGL. In our evaluation, we apply an implementation of our BMC approach in AutoGraph to a running example.
Software platforms regularly introduce new features to remain competitive. While platform innovation is considered to be a critical success factor, adding certain features could hurt the ecosystem. If platform owners provide functionality that was previously provided by a contributor, the owners enter complementary product spaces. Complementary market entry frequently occurs on software platforms and is a major concern for third-party developers.
Divergent findings on the impact of complementary market entry call for the consideration of additional factors. As prior research neglected the third-party perspective, this contribution aims to address this gap. We explore the use of measures to prevent complementary market entry using a survey approach on browser platforms. The research model is tested with 655 responses among developer from Mozilla Firefox and Google Chrome. To explain countermeasures employment, developer’s attitude and perceived likelihood are important. The results reveal that developers employ countermeasures if complementary market entry is assessed negatively and perceived as likely for their extension. Differences among browser platforms concerning complementary market entry are identified. Product spaces of extensions being available on multiple platforms are less likely to be entered and more heavily protected. Implications for research and stakeholders, i.e. platform owners and contributors are discussed.
Modern browsers are digital software platforms, as they allow third parties to extend functionality by providing extensions. In a highly competitive environment, differentiation through provided functionality is a key factor for browser platforms. As the development of browsers progress, new functions are constantly being released. Browsers could thus enter complementary markets by adding functionality previously provided by third-party extensions, which is referred to as ‘platform coring’. Previous studies have missed the perspective of the parties involved. To address this gap, we conducted interviews with third-party and core developers in the security and privacy domain from Firefox and Chrome. This study provides three contributions. First, insights into stakeholder-specific issues concerning coring. Second, measures to prevent coring. Third, strategical guidance for developers and owners. Third-party vendors experienced and core developers confirmed that coring occurs on browser platforms. While developers with extrinsic motivations assess coring negatively, developers with intrinsic motivations perceive coring positively.
As AI technology is increasingly used in production systems, different approaches have emerged from highly decentralized small-scale AI at the edge level to centralized, cloud-based services used for higher-order optimizations. Each direction has disadvantages ranging from the lack of computational power at the edge level to the reliance on stable network connections with the centralized approach. Thus, a hybrid approach with centralized and decentralized components that possess specific abilities and interact is preferred. However, the distribution of AI capabilities leads to problems in self-adapting learning systems, as knowledgebases can diverge when no central coordination is present. Edge components will specialize in distinctive patterns (overlearn), which hampers their adaptability for different cases. Therefore, this paper aims to present a concept for a distributed interchangeable knowledge base in CPPS. The approach is based on various AI components and concepts for each participating node. A service-oriented infrastructure allows a decentralized, loosely coupled architecture of the CPPS. By exchanging knowledge bases between nodes, the overall system should become more adaptive, as each node can “forget” their present specialization.
Since more and more production tasks are enabled by Industry 4.0 techniques, the number of knowledge-intensive production tasks increases as trivial tasks can be automated and only non-trivial tasks demand human-machine interactions. With this, challenges regarding the competence of production workers, the complexity of tasks and stickiness of required knowledge occur [1]. Furthermore, workers experience time pressure which can lead to a decrease in output quality. Cyber-Physical Systems (CPS) have the potential to assist workers in knowledge-intensive work grounded on quantitative insights about knowledge transfer activities [2]. By providing contextual and situational awareness as well as complex classification and selection algorithms, CPS are able to ease knowledge transfer in a way that production time and quality is improved significantly. CPS have only been used for direct production and process optimization, knowledge transfers have only been regarded in assistance systems with little contextual awareness. Embedding production and knowledge transfer optimization thus show potential for further improvements. This contribution outlines the requirements and a framework to design these systems. It accounts for the relevant factors.
For the last 20 years, enterprise architecture management (EAM) was primarily an instrument for harmonizing and consolidating IT landscapes and is lived as a transformation and governance discipline. It, however, is rather related to IT strategy than aligned to the actual corporate strategy and the work of the enterprise architect is characterized by tasks like prescribing, monitoring, documenting, and controlling. As digital transformation continues apace, companies are facing new challenges that lead to a volatile, uncertain, complex, and ambiguous (VUCA) world. To face these challenges, vision, understanding, clarity and agility allow to anticipative and implement necessary changes. This, of course, has implications for the role of the enterprise architect. S/he needs to start actively supporting innovation and taking more of an advisory role instead of just being driven by the current state of the enterprise architecture. This paper investigates the role of the enterprise architect in the VUCA world. Based on current literature and expert interviews, a survey was conducted among consultants who work as (or with) enterprise architects. Survey results include the evaluation of statements on current tasks of enterprise architects, their influence on projects and companies as well as future requirements on the roles of the enterprise architect. The results from the survey were synthesized with the findings from literature to derive the roles, tasks and skills of enterprise architect in the VUCA world.
Immune to COVID?
(2021)
While school supervision structures in the German Länder were extensively reformed during the last decades, systematic analyses of these reforms are missing. This chapter contributes to this research gap by providing an overview of the implemented reforms of school supervision structures in the German Länder. The effects of these reforms are analysed in order to answer the question of whether a convergence of school supervision systems is a result of these reforms. In a first step, a distinction is made to identify system-changing reforms. Although a decrease of the number or a concentration on one school supervision system is not a result of the analysis, it is argued that there is a convergence of school supervision structures, as a clear trend against school supervision systems with lower school supervisory boards can be observed.
Don’t settle for less
(2021)
The devil in disguise
(2021)
Envy constitutes a serious issue on Social Networking Sites (SNSs), as this painful emotion can severely diminish individuals' well-being. With prior research mainly focusing on the affective consequences of envy in the SNS context, its behavioral consequences remain puzzling. While negative interactions among SNS users are an alarming issue, it remains unclear to which extent the harmful emotion of malicious envy contributes to these toxic dynamics. This study constitutes a first step in understanding malicious envy’s causal impact on negative interactions within the SNS sphere. Within an online experiment, we experimentally induce malicious envy and measure its immediate impact on users’ negative behavior towards other users. Our findings show that malicious envy seems to be an essential factor fueling negativity among SNS users and further illustrate that this effect is especially pronounced when users are provided an objective factor to mask their envy and justify their norm-violating negative behavior.
From laggards to leaders
(2021)
The 2015 Paris Agreement on climate change embraces the participation of non-state actors in a separate governance track – the ‘Non-state actor zone for global action’ (nazca) – that runs alongside the formal track of unfccc negotiations and the implementation of the Paris Agreement by State Parties through ‘nationally determined contributions’. unfccc Secretariat is entrusted with orchestrating non-state global and transnational initiatives, partnerships and networks. The involvement of non-state actors in the implementation of the Paris Agreement helps to address an action gap by countries that are unable or unwilling to implement ambitious ndcs.
However, the increased prominence of initiatives driven by non-state actors also increases their direct and indirect influence on processes and rules which raises a number of questions with regards to the legitimacy of action and the democratic deficit of the global climate regime. Balancing legitimacy with effectiveness requires non-state initiatives to ensure transparent and inclusive governance, and accountability towards progress against their goals and pledges.
Despite its encouragement towards private initiatives, the Paris Agreement creates surprisingly little regulatory space for non-state actors to gain hold. Neither are there measures that would link ndcs to nazca initiatives, nor are functional requirements such as transparency or reporting extended to non-state initiatives. While the Paris Agreement marks an important step towards harnessing private sector ability and ambition for climate action, more remains to be done to create a truly enabling framework for private action to strive and complement public efforts to address climate change.
Effectiveness
(2021)
This paper starts from the premise that Western states are connected to some of the harms refugees suffer from. It specifically focuses on the harm of acts of misrecognition and its relation to epistemic injustice that refugees suffer from in refugee camps, in detention centers, and during their desperate attempts to find refuge. The paper discusses the relation between hermeneutical injustice and acts of misrecognition, showing that these two phenomena are interconnected and that acts of misrecognition are particularly damaging when (a) they stretch over different contexts, leaving us without or with very few safe spaces, and (b) they dislocate us, leaving us without a community to turn to. The paper then considers the ways in which refugees experience acts of misrecognition and suffer from hermeneutical injustice, using the case of unaccompanied children at the well-known and overcrowded camp Moria in Greece, the case of unsafe detention centers in Libya, and the case of the denial to assistance on the Mediterranean and the resulting pushbacks from international waters to Libya as well as the preventable drowning of refugees in the Mediterranean to illustrate the arguments. Finally, the paper argues for specific duties toward refugees that result from the prior arguments on misrecognition and hermeneutical injustice.
Since the beginning of the recent global refugee crisis, researchers have been tackling many of its associated aspects, investigating how we can help to alleviate this crisis, in particular, using ICTs capabilities. In our research, we investigated the use of ICT solutions by refugees to foster the social inclusion process in the host community. To tackle this topic, we conducted thirteen interviews with Syrian refugees in Germany. Our findings reveal different ICT usages by refugees and how these contribute to feeling empowered. Moreover, we show the sources of empowerment for refugees that are gained by ICT use. Finally, we identified the two types of social inclusion benefits that were derived from empowerment sources. Our results provide practical implications to different stakeholders and decision-makers on how ICT usage can empower refugees, which can foster the social inclusion of refugees, and what should be considered to support them in their integration effort.
Beyond good faith
(2021)
The ambitious climate targets set by industrialized nations worldwide cannot be met without decarbonizing the building stock. Using Germany as a case study, this paper takes stock of the extensive set of energy efficiency policies that are already in place and clarifies that they have been designed “in good faith” but lack in overall effectiveness as well as cost-efficiency in achieving these climate targets. We map out the market failures and behavioural considerations that are potential reasons for why realized energy savings fall below expectations and why the household adoption of energy-efficient and low-carbon technologies has remained low. We highlight the pressing need for data and modern empirical research to develop targeted and cost-effective policies seeking to correct these market failures. To this end, we identify some key research questions and identify gaps in the data required for evidence-based policy.
Since the beginning of the recent global refugee crisis, researchers have been tackling many of its associated aspects, investigating how we can help to alleviate this crisis, in particular, using ICTs capabilities. In our research, we investigated the use of ICT solutions by refugees to foster the social inclusion process in the host community. To tackle this topic, we conducted thirteen interviews with Syrian refugees in Germany. Our findings reveal different ICT usages by refugees and how these contribute to feeling empowered. Moreover, we show the sources of empowerment for refugees that are gained by ICT use. Finally, we identified the two types of social inclusion benefits that were derived from empowerment sources. Our results provide practical implications to different stakeholders and decision-makers on how ICT usage can empower refugees, which can foster the social inclusion of refugees, and what should be considered to support them in their integration effort.