Nicht ermittelbar
Refine
Year of publication
Document Type
- Article (99)
- Monograph/Edited Volume (97)
- Part of a Book (65)
- Conference Proceeding (36)
- Other (12)
- Doctoral Thesis (9)
- Review (8)
- Working Paper (6)
- Report (5)
- Postprint (2)
Language
- English (339) (remove)
Is part of the Bibliography
- yes (339) (remove)
Keywords
Institute
- Fachgruppe Betriebswirtschaftslehre (58)
- Institut für Mathematik (46)
- Fachgruppe Politik- & Verwaltungswissenschaft (44)
- Hasso-Plattner-Institut für Digital Engineering GmbH (23)
- Institut für Informatik und Computational Science (23)
- Institut für Anglistik und Amerikanistik (18)
- Öffentliches Recht (18)
- Wirtschaftswissenschaften (16)
- Institut für Physik und Astronomie (12)
- Department Psychologie (9)
An increasing number of clinicians (i.e., nurses and physicians) suffer from mental health-related issues like depression and burnout. These, in turn, stress communication, collaboration, and decision- making—areas in which Conversational Agents (CAs) have shown to be useful. Thus, in this work, we followed a mixed-method approach and systematically analysed the literature on factors affecting the well-being of clinicians and CAs’ potential to improve said well-being by relieving support in communication, collaboration, and decision-making in hospitals. In this respect, we are guided by Brigham et al. (2018)’s model of factors influencing well-being. Based on an initial number of 840 articles, we further analysed 52 papers in more detail and identified the influences of CAs’ fields of application on external and individual factors affecting clinicians’ well-being. As our second method, we will conduct interviews with clinicians and experts on CAs to verify and extend these influencing factors.
How do social changes, new technologies or new management trends affect communication work? A team of researchers at Leipzig University and the University of Potsdam (Germany) observed new developments in related disciplines. As a result, the five most important trends for corporate communications are identified annually and published in the Communications Trend Radar. Thus, Communications managers can identify challenges and opportunities at an early stage, take a position, address issues and make decisions. For 2023, the Communications Trend Radar identifies five key trends for corporate communications: State Revival, Scarcity Management, Unimagination, Parallel Worlds, Augemented Workflows.
Between reality & fantasy
(2023)
Synthetische Medien ermöglichen die zunehmend automatisierte Erstellung virtueller Influencer, von denen bereits einige Millionen Follower in sozialen Medien gewonnen haben. Unter der Leitung von Professor Stefan Stieglitz und Sünje Clausen (Universität Potsdam) und in Kooperation mit Sanofi hat ein Forschungsprojekt untersucht, wie computergenerierten Charaktere für die Influencer-Kommunikation im Unternehmensumfeld genutzt werden können. Nähere Informationen zu den Forschungsergebnissen können in der Communication Insights nachgelesen werden: eine kurze Einführung in die Influencer-Kommunikation, potenziellen Vorteile als auch Herausforderungen von virtuellen Influencern, Tipps für den Prozess der Gestaltung und Nutzung eines virtuellen Influencers.
Disinformation campaigns spread rapidly through social media and can cause serious harm, especially in crisis situations, ranging from confusion about how to act to a loss of trust in government institutions. Therefore, the prevention of digital disinformation campaigns represents an important research topic. However, previous research in the field of information systems focused on the technical possibilities to detect and combat disinformation, while ethical and legal perspectives have been neglected so far. In this article, we synthesize previous information systems literature on disinformation prevention measures and discuss these measures from an ethical and legal perspective. We conclude by proposing questions for future research on the prevention of disinformation campaigns from an IS, ethical, and legal perspective. In doing so, we contribute to a balanced discussion on the prevention of digital disinformation campaigns that equally considers technical, ethical, and legal issues, and encourage increased interdisciplinary collaboration in future research.
Writing travel, writing life
(2022)
The book compares the texts of three Swiss authors: Ella Maillart, Annemarie Schwarzenbach and Nicolas Bouvier. The focus is on their trip from Genève to Kabul that Ella Maillart and Annemarie Schwarzenbach made together in 1939/1940 and Nicolas Bouvier 1953/1954 with the artist Thierry Vernet. The comparison shows the strong connection between the journey and life and between ars vivendi and travel literature.
This book also gives an overview of and organises the numerous terms, genres, and categories that already exist to describe various travel texts and proposes the new term travelling narration. The travelling narration looks at the text from a narratological perspective that distinguishes the author, narrator, and protagonist within the narration.
In the examination, ten motifs could be found to characterise the travelling narration: Culture, Crossing Borders, Freedom, Time and Space, the Aesthetics of Landscapes, Writing and Reading, the Self and/as the Other, Home, Religion and Spirituality as well as the Journey. The importance of each individual motif does not only apply in the 1930s or 1950s but also transmits important findings for living together today and in the future.
This paper consists of two parts: In the first part, some of the challenges with which the Internationaal Criminal Court is currently confronted are being presented. First of all, the article will describe the current state of the International Criminal Court and the Rome Statue. Afterwards, the article analyses the Court’s efforts to deal with cases against third-country nationals and the challenges it is facing in that regard. In addition, the Court’s case law will be analyzed in order to determine an increasing ‘emancipation’ of the case law of the International Criminal Court from international humanitarian law. The second part of the paper will briefly discuss the role of domestic international criminal law and domestic courts in the further development and enforcement of international criminal law. As an example of the role that domestic courts may have in clarifying classic issues in international law, the judgment of the German Supreme Court of January 28, 2021 (3 StR 564/19), which deals with the status of costumary international law on functional immunity of State officials before domestic courts, shall be assessed.
Manufacturing companies still have relatively few points of contact with the circular economy. Especially, extending life time of whole products or parts via remanufacturing is an promising approach to reduce waste. However, necessary cost-efficient assessment of the condition of the individual parts is challenging and assessment procedures are technically complex (e.g., scanning and testing procedures). Furthermore, these assessment procedures are usually only available after the disassembly process has been completed. This is where conceptualization, data acquisition and simulation of remanufacturing processes can help. One major constraining aspect of remanufacturing is reducing logistic efforts, since these also have negative external effects on the environment. Thus regionalization is an additional but in the end consequential challenge for remanufacturing. This article aims to fill a gap by providing an regional remanufacturing approach, in particular the design of local remanufacturing chains. Thereby, further focus lies on modeling and simulating alternative courses of action, including feasibility study and eco-nomic assessment.
Article 15ter Exercise of jurisdiction over the crime of aggression (Security Council referral)
(2022)
Article 15bis. Exercise of jurisdiction over the crime of aggression (State referral, proprio motu)
(2022)
Extreme-right terrorism is a threat that is often underestimated by the public at large. As this paper argues, this is partly due to a concept of terrorism utilized by policymakers, intelligence agents, and police investigators that is based on experience of international terrorism perpetrated by leftists or jihadists as opposed to domestic extreme-right violence. This was one reason why investigators failed to identify the crimes committed by the National Socialist Underground (NSU) in Germany (2000–2011) as extreme-right terrorism, for example. While scholarly debate focused on the Red Army Faction and Al Qaeda, terrorist tendencies among those perpetrating racist and extreme-right violence tended to be disregarded. Influential researchers in the field of “extremism” denied that terrorist acts were committed by right-wingers. By mapping the specifics regarding the strategic use of violence, target selection, addressing of different audiences etc., this paper proposes a more accurate definition of extreme-right terrorism. In comparing it to other forms of terrorism, extreme-right terrorism is distinguished by its specific framework of ideologies and practices, with the underlying idea of an essential inequality that is compensated for through the affirmation of violence. It can be differentiated from other forms of extreme-right violence based on its use of strategic, premeditated and planned attacks against targets of a symbolic nature.
We welcome you to the 53rd Hawaii International Conference on System Sciences (HICSS) conference. After joining with Intentional Forgetting Minitrack last year, this is the fourth year of the Organizational Learning Minitrack. We add Unlearning, and Intentional Forgetting to proudly bring you the latest research focused on organizational learning issues within the Knowledge Innovation and Entrepreneurial Systems Track. The ability to update, change and use current knowledge effectively, especially in light of the ongoing knowledge explosion, can be costly for any organization. Organizations that consider themselves “learning” or “knowledge-based” organizations must develop a competent workforce using KM strategies. Success in organizations involves developing a variety of human factors for changing competencies. With technological change, modification and revisions, many skills require updating for a competitive advantage in the marketplace. The focus on new techniques and insights into how individuals and organizations use their knowledge is our focus for the improvement of organizational learning in this Minitrack.
Administrative reforms refer to conscious decisions about institution building and institutional change that are taken at the end of political processes and can be conceived as the attempt by politico-administrative actors to change the institutional order (polity) within which they make and implement decisions. In this paper we proceed from the assumption that the role of politics, the constellation of political actors and arenas vary according to the scope and objectives of administrative reforms. Depending on whether they refer to changes between organizational units/levels/sectors ('external institutional policy') or to an internal reorganization ('internal institutional policy'), different actor strategies, patterns of conflict and power constellations can be expected. As external administrative reforms are aimed at changing functional and/or territorial jurisdictions and thus always involve external actors, larger resistance, heavier political conflicts and generally more politicization are likely to occur than in the case of internal administrative reforms. Yet, for internal reforms, too, actor coalitions which support or block institutional changes, promotors, leaders, and moderators have revealed to shape processes and outcomes. Against this background, this chapter examines the influence of politics on various types of administrative reforms making a distinction between external and internal institutional policies. We analyse the role of politico-administrative actors, their strategies and influence on the formulation, trajectories and outcomes of administrative reforms. Our major focus will be on reforms in the multi-level system on the one hand and on (Post-) NPM reforms on the other as two major international trends. Drawing on reform experiences in different European countries, the chapter will reveal to what extent actors' interests and influences have triggered and shaped administrative reforms and which difference these have made for the reform outcome.
Language developers who design domain-specific languages or new language features need a way to make fast changes to language definitions. Those fast changes require immediate feedback. Also, it should be possible to parse the developed languages quickly to handle extensive sets of code.
Parsing expression grammars provides an easy to understand method for language definitions. Packrat parsing is a method to parse grammars of this kind, but this method is unable to handle left-recursion properly. Existing solutions either partially rewrite left-recursive rules and partly forbid them, or use complex extensions to packrat parsing that are hard to understand and cost-intensive. We investigated methods to make parsing as fast as possible, using easy to follow algorithms while not losing the ability to make fast changes to grammars.
We focused our efforts on two approaches.
One is to start from an existing technique for limited left-recursion rewriting and enhance it to work for general left-recursive grammars. The second approach is to design a grammar compilation process to find left-recursion before parsing, and in this way, reduce computational costs wherever possible and generate ready to use parser classes.
Rewriting parsing expression grammars is a task that, if done in a general way, unveils a large number of cases such that any rewriting algorithm surpasses the complexity of other left-recursive parsing algorithms. Lookahead operators introduce this complexity. However, most languages have only little portions that are left-recursive and in virtually all cases, have no indirect or hidden left-recursion. This means that the distinction of left-recursive parts of grammars from components that are non-left-recursive holds great improvement potential for existing parsers.
In this report, we list all the required steps for grammar rewriting to handle left-recursion, including grammar analysis, grammar rewriting itself, and syntax tree restructuring. Also, we describe the implementation of a parsing expression grammar framework in Squeak/Smalltalk and the possible interactions with the already existing parser Ohm/S. We quantitatively benchmarked this framework directing our focus on parsing time and the ability to use it in a live programming context. Compared with Ohm, we achieved massive parsing time improvements while preserving the ability to use our parser it as a live programming tool.
The work is essential because, for one, we outlined the difficulties and complexity that come with grammar rewriting. Also, we removed the existing limitations that came with left-recursion by eliminating them before parsing.
Pictures are a medium that helps make the past tangible and preserve memories. Without context, they are not able to do so. Pictures are brought to life by their associated stories. However, the older pictures become, the fewer contemporary witnesses can tell these stories.
Especially for large, analog picture archives, knowledge and memories are spread over many people. This creates several challenges: First, the pictures must be digitized to save them from decaying and make them available to the public. Since a simple listing of all the pictures is confusing, the pictures should be structured accessibly. Second, known information that makes the stories vivid needs to be added to the pictures. Users should get the opportunity to contribute their knowledge and memories. To make this usable for all interested parties, even for older, less technophile generations, the interface should be intuitive and error-tolerant.
The resulting requirements are not covered in their entirety by any existing software solution without losing the intuitive interface or the scalability of the system.
Therefore, we have developed our digital picture archive within the scope of a bachelor project in cooperation with the Bad Harzburg-Stiftung. For the implementation of this web application, we use the UI framework React in the frontend, which communicates via a GraphQL interface with the Content Management System Strapi in the backend. The use of this system enables our project partner to create an efficient process from scanning analog pictures to presenting them to visitors in an organized and annotated way. To customize the solution for both picture delivery and information contribution for our target group, we designed prototypes and evaluated them with people from Bad Harzburg. This helped us gain valuable insights into our system’s usability and future challenges as well as requirements.
Our web application is already being used daily by our project partner. During the project, we still came up with numerous ideas for additional features to further support the exchange of knowledge.
The analysis of behavioral models such as Graph Transformation Systems (GTSs) is of central importance in model-driven engineering. However, GTSs often result in intractably large or even infinite state spaces and may be equipped with multiple or even infinitely many start graphs. To mitigate these problems, static analysis techniques based on finite symbolic representations of sets of states or paths thereof have been devised. We focus on the technique of k-induction for establishing invariants specified using graph conditions. To this end, k-induction generates symbolic paths backwards from a symbolic state representing a violation of a candidate invariant to gather information on how that violation could have been reached possibly obtaining contradictions to assumed invariants. However, GTSs where multiple agents regularly perform actions independently from each other cannot be analyzed using this technique as of now as the independence among backward steps may prevent the gathering of relevant knowledge altogether.
In this paper, we extend k-induction to GTSs with multiple agents thereby supporting a wide range of additional GTSs. As a running example, we consider an unbounded number of shuttles driving on a large-scale track topology, which adjust their velocity to speed limits to avoid derailing. As central contribution, we develop pruning techniques based on causality and independence among backward steps and verify that k-induction remains sound under this adaptation as well as terminates in cases where it did not terminate before.
Cyber-physical systems often encompass complex concurrent behavior with timing constraints and probabilistic failures on demand. The analysis whether such systems with probabilistic timed behavior adhere to a given specification is essential. When the states of the system can be represented by graphs, the rule-based formalism of Probabilistic Timed Graph Transformation Systems (PTGTSs) can be used to suitably capture structure dynamics as well as probabilistic and timed behavior of the system. The model checking support for PTGTSs w.r.t. properties specified using Probabilistic Timed Computation Tree Logic (PTCTL) has been already presented. Moreover, for timed graph-based runtime monitoring, Metric Temporal Graph Logic (MTGL) has been developed for stating metric temporal properties on identified subgraphs and their structural changes over time.
In this paper, we (a) extend MTGL to the Probabilistic Metric Temporal Graph Logic (PMTGL) by allowing for the specification of probabilistic properties, (b) adapt our MTGL satisfaction checking approach to PTGTSs, and (c) combine the approaches for PTCTL model checking and MTGL satisfaction checking to obtain a Bounded Model Checking (BMC) approach for PMTGL. In our evaluation, we apply an implementation of our BMC approach in AutoGraph to a running example.
The business problem of having inefficient processes, imprecise process analyses and simulations as well as non-transparent artificial neuronal network models can be overcome by an easy-to-use modeling concept. With the aim of developing a flexible and efficient approach to modeling, simulating and optimizing processes, this paper proposes a flexible Concept of Neuronal Modeling (CoNM). The modeling concept, which is described by the modeling language designed and its mathematical formulation and is connected to a technical substantiation, is based on a collection of novel sub-artifacts. As these have been implemented as a computational model, the set of CoNM tools carries out novel kinds of Neuronal Process Modeling (NPM), Neuronal Process Simulations (NPS) and Neuronal Process Optimizations (NPO). The efficacy of the designed artifacts was demonstrated rigorously by means of six experiments and a simulator of real industrial production processes.
Scrollytellings are an innovative form of web content. Combining the benefits of books, images, movies, and video games, they are a tool to tell compelling stories and provide excellent learning opportunities. Due to their multi-modality, creating high-quality scrollytellings is not an easy task. Different professions, such as content designers, graphics designers, and developers, need to collaborate to get the best out of the possibilities the scrollytelling format provides. Collaboration unlocks great potential. However, content designers cannot create scrollytellings directly and always need to consult with developers to implement their vision. This can result in misunderstandings. Often, the resulting scrollytelling will not match the designer’s vision sufficiently, causing unnecessary iterations. Our project partner Typeshift specializes in the creation of individualized scrollytellings for their clients. Examined existing solutions for authoring interactive content are not optimally suited for creating highly customized scrollytellings while still being able to manipulate all their elements programmatically. Based on their experience and expertise, we developed an editor to author scrollytellings in the lively.next live-programming environment. In this environment, a graphical user interface for content design is combined with powerful possibilities for programming behavior with the morphic system. The editor allows content designers to take on large parts of the creation process of scrollytellings on their own, such as creating the visible elements, animating content, and fine-tuning the scrollytelling. Hence, developers can focus on interactive elements such as simulations and games. Together with Typeshift, we evaluated the tool by recreating an existing scrollytelling and identified possible future enhancements. Our editor streamlines the creation process of scrollytellings. Content designers and developers can now both work on the same scrollytelling. Due to the editor inside of the lively.next environment, they can both work with a set of tools familiar to them and their traits. Thus, we mitigate unnecessary iterations and misunderstandings by enabling content designers to realize large parts of their vision of a scrollytelling on their own. Developers can add advanced and individual behavior. Thus, developers and content designers benefit from a clearer distribution of tasks while keeping the benefits of collaboration.
Learning from failure
(2022)
Regression testing is a widespread practice in today's software industry to ensure software product quality. Developers derive a set of test cases, and execute them frequently to ensure that their change did not adversely affect existing functionality. As the software product and its test suite grow, the time to feedback during regression test sessions increases, and impedes programmer productivity: developers wait longer for tests to complete, and delays in fault detection render fault removal increasingly difficult.
Test case prioritization addresses the problem of long feedback loops by reordering test cases, such that test cases of high failure probability run first, and test case failures become actionable early in the testing process. We ask, given test execution schedules reconstructed from publicly available data, to which extent can their fault detection efficiency improved, and which technique yields the most efficient test schedules with respect to APFD?
To this end, we recover regression 6200 test sessions from the build log files of Travis CI, a popular continuous integration service, and gather 62000 accompanying changelists. We evaluate the efficiency of current test schedules, and examine the prioritization results of state-of-the-art lightweight, history-based heuristics. We propose and evaluate a novel set of prioritization algorithms, which connect software changes and test failures in a matrix-like data structure.
Our studies indicate that the optimization potential is substantial, because the existing test plans score only 30% APFD. The predictive power of past test failures proves to be outstanding: simple heuristics, such as repeating tests with failures in recent sessions, result in efficiency scores of 95% APFD. The best-performing matrix-based heuristic achieves a similar score of 92.5% APFD. In contrast to prior approaches, we argue that matrix-based techniques are useful beyond the scope of effective prioritization, and enable a number of use cases involving software maintenance.
We validate our findings from continuous integration processes by extending a continuous testing tool within development environments with means of test prioritization, and pose further research questions. We think that our findings are suited to propel adoption of (continuous) testing practices, and that programmers' toolboxes should contain test prioritization as an existential productivity tool.
openHPI
(2022)
On the occasion of the 10th openHPI anniversary, this technical report provides information about the HPI MOOC platform, including its core features, technology, and architecture.
In an introduction, the platform family with all partner platforms is presented; these now amount to nine platforms, including openHPI. This section introduces openHPI as an advisor and research partner in various projects.
In the second chapter, the functionalities and common course formats of the platform are presented. The functionalities are divided into learner and admin features. The learner features section provides detailed information about performance records, courses, and the learning materials of which a course is composed: videos, texts, and quizzes. In addition, the learning materials can be enriched by adding external exercise tools that communicate with the HPI MOOC platform via the Learning Tools Interoperability (LTI) standard. Furthermore, the concept of peer assessments completed the possible learning materials.
The section then proceeds with further information on the discussion forum, a fundamental concept of MOOCs compared to traditional e-learning offers. The section is concluded with a description of the quiz recap, learning objectives, mobile applications, gameful learning, and the help desk.
The next part of this chapter deals with the admin features. The described functionality is restricted to describing the news and announcements, dashboards and statistics, reporting capabilities, research options with A/B testing, the course feed, and the TransPipe tool to support the process of creating automated or manual subtitles. The platform supports a large variety of additional features, but a detailed description of these features goes beyond the scope of this report.
The chapter then elaborates on common course formats and openHPI teaching activities at the HPI. The chapter concludes with some best practices for course design and delivery.
The third chapter provides insights into the technology and architecture behind openHPI. A special characteristic of the openHPI project is the conscious decision to operate the complete application from bare metal to platform development. Hence, the chapter starts with a section about the openHPI Cloud, including detailed information about the data center and devices, the used cloud software OpenStack and Ceph, as well as the openHPI Cloud Service provided for the HPI.
Afterward, a section on the application technology stack and development tooling describes the application infrastructure components, the used automation, the deployment pipeline, and the tools used for monitoring and alerting. The chapter is concluded with detailed information about the technology stack and concrete platform implementation details. The section describes the service-oriented Ruby on Rails application, inter-service communication, and public APIs. It also provides more information on the design system and components used in the application. The section concludes with a discussion of the original microservice architecture, where we share our insights and reasoning for migrating back to a monolithic application.
The last chapter provides a summary and an outlook on the future of digital education.
'Tools' in public management
(2022)
Tools are methods or procedures, and thus operational patterns of action, applied in public administrations to solve standard problems. It is also possible to consider them as structured communication according to professional standards aiming at complexity reduction. Regularly, tools in management stem on a deductive-synoptic rationale offering a seemingly ‘objective’ decision basis. They have a strong formative influence on the organization, regularly also beyond the intended effects. The prominence of tools is sometimes confused with management as such, e.g. introducing tools is mistaken as equivalent to managing for a particular purpose. However, tools have to be closely and carefully managed regarding the objectives and purposes they should serve.
Strategic management is the deliberate engagement of an administration with the challenges of fulfilling its mission and ensuring and improving its ability to act by clarifying measures of success, an understanding of how to influence patterns of action, and organiza-tional learning. In this respect, it is not just about planning, but about an understanding of the emerging strategies of the administration in fulfilling its tasks and the use of opportunities for performance improvement, taking into account stakeholder expectations, resource base and organizational capabilities.
Does personality matter? Is an individual who is open to experience more or less likely to become an entrepreneur? Is it better to score low or high in agreeableness for surviving as an entrepreneur? To the extent that personality captures one part of entrepreneurial abilities, which are usually unobservable, the analysis of traits and personality characteristics helps better understanding such abilities. This chapter reviews research on the relationship between personality and entrepreneurship since 2000 and shows that possessing certain personality characteristics will make it more likely that an individual will start an own business and hire staff. More specifically, with respect to the entry decision, research finds that nearly all so-called Big Five factors as well as several specific personality characteristics influence the entry probability into entrepreneurship. Further, entrepreneurs are more likely to hire, the higher they score in risk tolerance, trust, openness to experience, and conscientiousness. However, different factors such as low scores in agreeableness, the only Big Factor that does not affect entrepreneurial entry, influence entrepreneurial survival. And for some of characteristics that influence entrepreneurial entry, like high scores in the factor openness for experience or in risk tolerance, “revolving door effects” are found, explaining why some entrepreneurs subsequently exit again the market.
Context-aware, intelligent musical instruments for improving knowledge-intensive business processes
(2022)
With shorter song publication cycles in music industries and a reduced number of physical contact opportunities because of disruptions that may be an obstacle for musicians to cooperate, collaborative time consumption is a highly relevant target factor providing a chance for feedback in contemporary music production processes. This work aims to extend prior research on knowledge transfer velocity by augmenting traditional designs of musical instruments with (I) Digital Twins, (II) Internet of Things and (III) Cyber-Physical System capabilities and consider a new type of musical instrument as a tool to improve knowledge transfers at knowledge-intensive forms of business processes. In a design-science-oriented way, a prototype of a sensitive guitar is constructed as information and cyber-physical system. Findings show that this intelligent SensGuitar increases feedback opportunities. This study establishes the importance of conversion-specific music production processes and novel forms of interactions at guitar playing as drivers of high knowledge transfer velocities in teams and among individuals.
Coming back for more
(2022)
Recent spikes in social networking site (SNS) usage times have launched investigations into reasons for excessive SNS usage. Extending research on social factors (i.e., fear of missing out), this study considers the News Feed setup. More specifically, we suggest that the order of the News Feed (chronological vs. algorithmically assembled posts) affects usage behaviors. Against the background of the variable reward schedule, this study hypothesizes that the different orders exert serendipity differently. Serendipity, termed as unexpected lucky encounters with information, resembles variable rewards. Studies have evidenced a relation between variable rewards and excessive behaviors. Similarly, we hypothesize that order-induced serendipitous encounters affect SNS usage times and explore this link in a two-wave survey with an experimental setup (users using either chronological or algorithmic News Feeds). While theoretically extending explanations for increased SNS usage times by considering the News Feed order, practically the study will offer recommendations for relevant stakeholders.
Although mothers and fathers in almost all rich democracies are entitled to some form of paid parenting leave, fathers in particular do not take all the leave available to them. As employers play an important role in the implementation of parenting leave policies, this chapter investigates which workplace characteristics influence mothers' and fathers' uptake of their statutory leave entitlements. In Part 1, we estimate the size of the gap between statutory leave entitlement and leave uptake across genders and countries by combining data from the OECD and the European Labor Force Survey. In Parts 2 and 3, we review the literature on structural, cultural, and normative explanations for the gap in parenting leave uptake. We conclude the chapter with suggestions for further research, including the need for reliable data on the size of the implementation gap and research on non-European countries.
Modeling and Formal Analysis of Meta-Ecosystems with Dynamic Structure using Graph Transformation
(2022)
The dynamics of ecosystems is of crucial importance. Various model-based approaches exist to understand and analyze their internal effects. In this paper, we model the space structure dynamics and ecological dynamics of meta-ecosystems using the formal technique of Graph Transformation (short GT). We build GT models to describe how a meta-ecosystem (modeled as a graph) can evolve over time (modeled by GT rules) and to analyze these GT models with respect to qualitative properties such as the existence of structural stabilities. As a case study, we build three GT models describing the space structure dynamics and ecological dynamics of three different savanna meta-ecosystems. The first GT model considers a savanna meta-ecosystem that is limited in space to two ecosystem patches, whereas the other two GT models consider two savanna meta-ecosystems that are unlimited in the number of ecosystem patches and only differ in one GT rule describing how the space structure of the meta-ecosystem grows. In the first two GT models, the space structure dynamics and ecological dynamics of the meta-ecosystem shows two main structural stabilities: the first one based on grassland-savanna-woodland transitions and the second one based on grassland-desert transitions. The transition between these two structural stabilities is driven by high-intensity fires affecting the tree components. In the third GT model, the GT rule for savanna regeneration induces desertification and therefore a collapse of the meta-ecosystem. We believe that GT models provide a complementary avenue to that of existing approaches to rigorously study ecological phenomena.
From victims to activists
(2022)
The politics of fear
(2022)
Agricultural production worldwide has been increasing in the last decades at a very fast pace and with it the waste generation. Livestock activities are one of the largest producers of residues in the agricultural sector and contribute greatly to climate change. The present chapter gives an introduction and an in-depth analysis of the waste management of livestock for the conversion in a circular agriculture and economy based on research and experience in the sector conducted in the last decades. The conversion of animal waste into energy generation is an opportunity for farmers to obtain additional economic benefits, while contributing to the environment by preventing the release of GHGs into the atmosphere. The use of animal waste for energy generation through anaerobic digestion is a progressive technique and is being widely accepted in Europe, where Germany is the leading country in the use of biogas plants for energy production among others in the European Union. Economically speaking, the livestock industry faces the challenge of converting its production into a clean and more profitable production. The goal of this chapter is to analyze the economic benefit as well as the environmental contribution and future challenges of the use of livestock waste in the biorefineries sector from different perspectives, based on an intensive literature review. This review is accompanied by a geospatial analysis component, mapping biogas reactor hotspots and clusters in Germany, by means of methods of spatial statistics as analysis methods as kernel density estimations (KDE) and K-means clustering, based on volunteer geographic data. The applied methods easily can be transferred to other regions and allow a quick macroscopic overview over existing biogas reactors; furthermore, an identification of cluster and hotspots with a high biogas potential, that in a subsequent step can be analyzed in depth in larger scales.
The power of opposition
(2022)
Proposing a novel way to look at the consolidation of democratic regimes, this book presents important theoretical and empirical contributions to the study of democratic consolidation, legislative organization, and public opinion.
Theoretically, Simone Wegmann brings legislatures into focus as the main body representing both winners and losers of democratic elections. Empirically, Wegmann shows that the degree of policy-making power of opposition players varies considerably between countries. Using survey data from the CSES, the ESS, and the LAPOP and systematically analyzing more than 50 legislatures across the world and the specific rights they grant to opposition players during the policy-making process, Wegmann demonstrates that neglecting the curial role of the legislature in a democratic setting can only lead to an incomplete assessment of the importance of institutions for democratic consolidation.
The Power of Opposition will be of great interest to scholars of comparative politics, especially those working on questions related to legislative organization, democratic consolidation, and/or public opinion.
Visual Social Networking Sites (SNSs) enable users to present themselves favorably to gain likes and the attention of others. Especially, Instagram is known for its focus on beauty, fitness, fashion, and dietary topics. Although a large body of research reports negative weight-related outcomes of SNS usage (e.g., body dissatisfaction, body image concerns), studies examining how SNS usage relates to these outcomes are scarce. Based on the visual normalization theory, we argue that SNS content facilitates normalization of so-called thin- and fit-ideals, thereby leading to biased perceptions of the average body weight in society. Therefore, this study tests whether Instagram use is associated with perceiving that the average person weighs less. Responses of 181 survey participants confirm that Instagram use is negatively related to average weight perception of both women and men. These findings contribute to the growing body of research on how SNS use relates to negative weight-related outcomes.
The metaverse is envisioned as a virtual shared space facilitated by emerging technologies such as virtual reality (VR), augmented reality (AR), the Internet of Things (IoT), 5G, artificial intelligence (AI), big data, spatial computing, and digital twins (Allam et al., 2022; Dwivedi et al., 2022; Ravenscraft, 2022; Wiles, 2022). While still a nascent concept, the metaverse has the potential to “transform the physical world, as well as transport or extend physical activities to a virtual world” (Wiles, 2022). Big data technologies will also be essential in managing the enormous amounts of data created in the metaverse (Sun et al., 2022). Metaverse technologies can offer the public sector a host of benefits, such as simplified information exchange, stronger communication with citizens, better access to public services, or benefiting from a new virtual economy. Implementations are underway in several cities around the world (Geraghty et al., 2022). In this paper, we analyze metaverse opportunities for the public sector and explore their application in the context of Germany’s Federal Employment Agency. Based on an analysis of academic literature and practical examples, we create a capability map for potential metaverse business capabilities for different areas of the public sector (broadly defined). These include education (virtual training and simulation, digital campuses that offer not just online instruction but a holistic university campus experience, etc.), tourism (virtual travel to remote locations and museums, virtual festival participation, etc.), health (employee training – as for emergency situations, virtual simulations for patient treatment – for example, for depression or anxiety, etc.), military (virtual training to experience operational scenarios without being exposed to a real-world threats, practice strategic decision-making, or gain technical knowledge for operating and repairing equipment, etc.), administrative services (document processing, virtual consultations for citizens, etc.), judiciary (AI decision-making aids, virtual proceedings, etc.), public safety (virtual training for procedural issues, special operations, or unusual situations, etc.), emergency management (training for natural disasters, etc.), and city planning (visualization of future development projects and interactive feedback, traffic management, attraction gamification, etc.), among others. We further identify several metaverse application areas for Germany's Federal Employment Agency. These applications can help it realize the goals of the German government for digital transformation that enables faster, more effective, and innovative government services. They include training of employees, training of customers, and career coaching for customers. These applications can be implemented using interactive learning games with AI agents, virtual representations of the organizational spaces, and avatars interacting with each other in these spaces. Metaverse applications will both use big data (to design the virtual environments) and generate big data (from virtual interactions). Issues related to data availability, quality, storage, processing (and related computing power requirements), interoperability, sharing, privacy and security will need to be addressed in these emerging metaverse applications (Sun et al., 2022). Special attention is needed to understand the potential for power inequities (wealth inequity, algorithmic bias, digital exclusion) due to technologies such as VR (Egliston & Carter, 2021), harmful surveillance practices (Bibri & Allam, 2022), and undesirable user behavior or negative psychological impacts (Dwivedi et al., 2022). The results of this exploratory study can inform public sector organizations of emerging metaverse opportunities and enable them to develop plans for action as more of the metaverse technologies become a reality. While the metaverse body of research is still small and research agendas are only now starting to emerge (Dwivedi et al., 2022), this study offers a building block for future development and analysis of metaverse applications.
Many prediction tasks can be done based on users’ trace data. This paper explores divergent and convergent thinking as person-related attributes and predicts them based on features gathered in an online course. We use the logfile data of a short Moodle course, combined with an image test (IMT), the Alternate Uses Task (AUT), the Remote Associates Test (RAT), and creative self-efficacy (CSE). Our results show that originality and elaboration metrics can be predicted with an accuracy of ~.7 in cross-validation, whereby predicting fluency and RAT scores perform worst. CSE items can be predicted with an accuracy of ~.45. The best performing model is a Random Forest Tree, where the features were reduced using a Linear Discriminant Analysis in advance. The promising results can help to adjust online courses to the learners’ needs based on their creative performances.
After some seventy years of intensive debates, there is an increasingly strong consensus within the academic and practitioner communities that development is both an objective and a process towards improving the quality of people's lives in various societal dimensions – economic, social, environmental, cultural and political – and about how subjectively satisfied they are with it. Since 2015, the seventeen Sustainable Development Goals (SDGs) of the United Nations (UN) reflect such consensus. The sections behind this argument are based on a review of (i) three key theoretical contributions to development and different phases of development thinking; (ii) global and regional governance arrangements and institutions for development cooperation; (iii) upcoming challenges to development policy and practice stemming from a series of new global challenges; and, (iv) development policy as a long and steady, increasingly global and participatory learning process.
The “HPI Future SOC Lab” is a cooperation of the Hasso Plattner Institute (HPI) and industry partners. Its mission is to enable and promote exchange and interaction between the research community and the industry partners.
The HPI Future SOC Lab provides researchers with free of charge access to a complete infrastructure of state of the art hard and software. This infrastructure includes components, which might be too expensive for an ordinary research environment, such as servers with up to 64 cores and 2 TB main memory. The offerings address researchers particularly from but not limited to the areas of computer science and business information systems. Main areas of research include cloud computing, parallelization, and In-Memory technologies.
This technical report presents results of research projects executed in 2018. Selected projects have presented their results on April 17th and November 14th 2017 at the Future SOC Lab Day events.
Reputation and influence
(2022)
International public administrations (IPAs) are collective bodies within international organizations (IOs) made up of international civil servants that support the intergovernmental bodies and member states. Over the last decade, research on these bodies has “gained substantial momentum”. Comparative assessments of IPAs reputation among stakeholders are rare. The literature on the sociological legitimacy of IOs is most advanced in this respect. A comparative agenda on IPAs reputation for expertise or neutrality is still in its infancy. Research has shown that different stakeholders view the same IPA quite differently. Reputation is a crucial concept in political science and IR research and has been widely used to predict states’ future behavior, notably regarding cooperation and conflict. IPAs seem to vary substantially in their reputation for expertise among critical interlocutors. In financial policy, several prominent IPAs are seen as experts, including the European Central Bank and the IMF.
This study evaluates the challenges, institutional impacts and responses of German local authorities to the COVID-19 pandemic from a political science point of view. The main research question is how they have contributed to combat the COVID-19 pandemic and to what extent the strengths and weaknesses of the German model of municipal autonomy have influenced their policy. It analyses the adaptation strategies of German local authorities and assesses the effectiveness of their actions up to now. Their implementation is then evaluated in five selected issues, e.g. adjustment organization and staff, challenges for local finances, local politics and citizen’s participation. This analysis is reflecting the scientific debate in Germany since the beginning of 2020, based on the available analyses of political science, law, economics, sociology and geography until end of March 2021.
This book compares local self-government in Europe. It examines local institutional structures, autonomy, and capacities in six selected countries - France, Italy, Sweden, Hungary, Poland, and the United Kingdom - each of which represents a typical model of European local government. Within Europe, an overall trend towards more local government capacities and autonomy can be identified, but there are also some counter tendencies to this trend and major differences regarding local politico-administrative settings, functional responsibilities, and resources. The book demonstrates that a certain degree of local financial autonomy and fiscal discretion is necessary for effective service provision. Furthermore, a robust local organization, viable territorial structures, a professional public service, strong local leadership, and well-functioning tools of democratic participation are key aspects for local governments to effectively fulfill their tasks and ensure political accountability. The book will appeal to students and scholars of Public Administration and Public Management, as well as practitioners and policy-makers at different levels of government, in public enterprises, and in NGOs.
Over the last few decades, a network of misogynist blogs, websites, wikis, and forums has developed, where users share their bigoted, sexist, and toxic views of society in general and masculinity and femininity in particular. This chapter outlines conceptual framework of hegemonic and hybrid masculinity. It provides a brief overview of the historical development of the manosphere and its various configurations and present our analysis of the masculinities performed by the five groups of the manosphere. The concept of hegemonic masculinity was articulated by Connell and colleagues in the 1980s as “the pattern of practice that allowed men’s dominance over women to continue.” Prior to the advent of the manosphere, an online iteration of male supremacist mobilizations, both Men’s Rights Activists and Pick-up artists developed as offline movements in the 1970s. MRAs perceive their respective societies as inherently stacked against men. This chapter analyses the masculinities of the manosphere and how they “repudiat[e] and reif[y]” hegemonic masculinity and male supremacism.
Looking for participation
(2022)
A stronger learner orientation through participatory learning increases learning motivation and results. But what does participatory learning mean? Where do learning factories and fabrication laboratories (FabLabs) stand in this context, and how can didactic implementation be improved in this respect? Using a newly developed analytical framework, which contains elements of the stage model of participation and general media didactics, we compare a FabLab and a learning factory example concerning the degree of participation. From this, we derive guidelines for designing participative teaching and learning processes in learning factories. We explain how FabLabs can be an inspiration for the didactic design of learning factories.
During a crisis event, social media enables two-way communication and many-to-many information broadcasting, browsing others’ posts, publishing own content, and public commenting. These records can deliver valuable insights to approach problematic situations effectively. Our study explores how social media communication can be analyzed to understand the responses to health crises better. Results based on nearly 800 K tweets indicate that the coping and regulation foci framework holds good explanatory power, with four clusters salient in public reactions: 1) “Understanding” (problem-promotion); 2) “Action planning” (problem-prevention); 3) “Hope” (emotion-promotion) and 4) “Reassurance” (emotion-prevention). Second, the inter-temporal analysis shows high volatility of topic proportions and a shift from self-centered to community-centered topics during the course of the event. The insights are beneficial for research on crisis management and practicians who are interested in large-scale monitoring of their audience for well-informed decision-making.
Observing inconsistent results in prior studies, this paper applies the elaboration likelihood model to investigate the impact of affective and cognitive cues embedded in social media messages on audience engagement during a political event. Leveraging a rich dataset in the context of the 2020 U.S. presidential elections containing more than 3 million tweets, we found the prominence of both cue types. For the overall sample, positivity and sentiment are negatively related to engagement. In contrast, the post-hoc sub-sample analysis of tweets from famous users shows that emotionally charged content is more engaging. The role of sentiment decreases when the number of followers grows and ultimately becomes insignificant for Twitter participants with a vast number of followers. Prosocial orientation (“we-talk”) is consistently associated with more likes, comments, and retweets in the overall sample and sub-samples.
This chapter consists of three parts. In the first part, I will give a short overview about the integration of the protection of the environment into German constitutional law. This section will start with the presentation of the relevant provision, Art. 20a BL. Then, I will elaborate on its legal character. In the second part, I will make some brief remarks on the practical implications of Art. 20a BL. Finally, I will present some preliminary conclusions.
Would the world be a better place if one were to adopt a European approach to state immunity?
(2021)
This chapter argues not only that there is no European Sonderweg (or ‘special way’) when it comes to the law of state immunity but that there ought not to be one. Debates within The Hague Conference on Private International Law in the late 1990s and those leading to the adoption of the 2002 UN Convention on Jurisdictional Immunities of States, as well as the development of the EU Brussels Regulation on Jurisdiction and Enforcement, as amended in 2015, all demonstrate that state immunity was not meant to be limited by such treaties but ‘safeguarded’. Likewise, there is no proof that regional European customary law limits state immunity when it comes to ius cogens violations, as Italy and (partly) Greece are the only European states denying state immunity in such cases while the European Court of Human Rights has, time and again, upheld a broad concept of state immunity. It therefore seems unlikely that in the foreseeable future a specific European customary law norm on state immunity will develop, especially given the lack of participation in such practice by those states most concerned by the matter, including Germany. This chapter considers the possible legal implications of the jurisprudence of the Italian Constitutional Court for European military operations (if such operations went beyond peacekeeping). These implications would mainly depend on the question of attribution: if one where to assume that acts undertaken within the framework of military operations led by the EU were to be, at least also, attributable to the troop-contributing member states, the respective troop-contributing state would be entitled to enjoy state immunity exactly to the same degree as in any kind of unilateral military operations. Additionally, some possible perspectives beyond Sentenza 238/2014 are examined, in particular concerning the redress awarded by domestic courts ‘as long as’ neither the German nor the international system grant equivalent protection to the victims of serious violations of international humanitarian law committed during World War II. In the author’s opinion, strengthening the jurisdiction of international courts and tribunals, bringing interstate cases for damages before the International Court of Justice, as well as providing for claims commissions where individual compensation might be sought for violations of international humanitarian law would be more useful and appropriate mechanisms than denying state immunity.
Perfectionism is a personality disposition characterized by setting extremely high performance-standards coupled with critical self-evaluations. Often conceived as positive, perfectionism can yield not only beneficial but also deleterious outcomes ranging from anxiety to burnout. In this proposal, we set out to investigate the role of the technology and, particularly, social media in individuals’ strivings for perfection. We lay down theoretical bases for the possibility that social media plays a role in the development of perfectionism. To empirically test the hypothesized relationship, we propose a comprehensive study design based on the experience sampling method. Lastly, we provide an overview of the planned analysis and future steps.
Law of raw data
(2021)
Law of Raw Data gives an overview of the legal situation across major countries and how such data is contractually handled in practice in the respective countries. In recent years, digital technologies have transformed business and society, impacting all sectors of the economy and a wide variety of areas of life. Digitization is leading to rapidly growing volumes of data with great economic potential. Data, in its raw or unstructured form, has become an important and valuable economic asset, and protection of raw data has become a crucial subject for the intellectual property community. As legislators struggle to develop a settled legal regime in this complex area, this invaluable handbook will offer a careful and dedicated analysis of the legal instruments and remedies, both existing and potential, that provide such protection across a wide variety of national legal systems.
What’s in this book:
Produced under the auspices of the International Association for the Protection of International Property (AIPPI), more than forty active specialists of the association from twenty-three countries worldwide contribute national chapters on the relevant law in their respective jurisdictions. The contributions thoroughly explain how each country approaches such crucial matters as the following:
if there is any intellectual property right available to protect raw data; the nature of such intellectual property rights that exist in unstructured data; contracts on data and which legal boundaries stand in the way of contract drafting; liability for data products or services; and questions of international private law and cross-border portability.
Each country’s rules concerning specific forms of data – such as data embedded in household appliances and consumer goods, criminal offence data, data relating to human genetics, tax and bank secrecy, medical records, and clinical trial data – are described, drawing on legislation, regulation, and case law.
How this will help you:
A matchless legal resource on one of the most important raw materials of the twenty-first century, this book provides corporate counsel, practitioners and policymakers working in the field of intellectual property rights, and concerned academics with both a broad-based global overview on emerging legal strategies in the protection of unstructured data and the latest information on existing legislation and regulation in the area.
As part of the current overall process of de-formalization in international law States increasingly chose informal, non-legally binding agreements or ‘Memoranda of Understanding’ (‘MOUs') to organize their international affairs. The increasing conclusion of such legally non-binding instruments in addition to their flexibility, however, also leads to uncertainties in international relations. Against this background, this article deals with possible indirect legal consequences produced by MOUs. It discusses the different legal mechanisms and avenues that may give rise to secondary legal effects of MOUs through a process of interaction with and interpretation in line with other (formal) sources of international law. The article further considers various strategies how to avoid such eventual possible unintended or unexpected indirect legal effects of MOUs when drafting such instruments and when dealing with them subsequent to their respective ‘adoption’.
This chapter analyses managerial reforms at the subnational level of government from a comparative perspective and outlines possible routes for future comparative research. It examines reforms of the external relationships between local governments and private service providers, which were aimed at transforming the organizational macro-setting of local service provision, the task portfolio and functional profile of local governments. The chapter then moves to scrutinizing internal managerial reforms concerned with the modernization of organization and processes and the improvement of management capacities inside local administrations meant to strengthen performance, output- and consumer-orientation in local service delivery. The country sample includes the United Kingdom (England), Sweden, and Germany that represent three distinct types of administrative culture and local government in Europe.
Helping overcome distance, the use of videoconferencing tools has surged during the pandemic. To shed light on the consequences of videoconferencing at work, this study takes a granular look at the implications of the self-view feature for meeting outcomes. Building on self-awareness research and self-regulation theory, we argue that by heightening the state of self-awareness, self-view engagement depletes participants’ mental resources and thereby can undermine online meeting outcomes. Evaluation of our theoretical model on a sample of 179 employees reveals a nuanced picture. Self-view engagement while speaking and while listening is positively associated with self-awareness, which, in turn, is negatively associated with satisfaction with meeting process, perceived productivity, and meeting enjoyment. The criticality of the communication role is put forward: looking at self while listening to other attendees has a negative direct and indirect effect on meeting outcomes; however, looking at self while speaking produces equivocal effects.
Beyond good faith
(2021)
The ambitious climate targets set by industrialized nations worldwide cannot be met without decarbonizing the building stock. Using Germany as a case study, this paper takes stock of the extensive set of energy efficiency policies that are already in place and clarifies that they have been designed “in good faith” but lack in overall effectiveness as well as cost-efficiency in achieving these climate targets. We map out the market failures and behavioural considerations that are potential reasons for why realized energy savings fall below expectations and why the household adoption of energy-efficient and low-carbon technologies has remained low. We highlight the pressing need for data and modern empirical research to develop targeted and cost-effective policies seeking to correct these market failures. To this end, we identify some key research questions and identify gaps in the data required for evidence-based policy.
We welcome you to the 54th Hawaii International Conference on System Sciences (HICSS-54) conference. This is the fifth year for the Organizational Learning Minitrack which has had the usual growing pains: two years ago, we added the topic of Unlearning and joined with the Intentional Forgetting Minitrack - as these topics are all organizationally-based knowledge management issues. We proudly bring you the latest research focused on the methods to develop and maintain organizational learning within the Knowledge Innovation and Entrepreneurial Systems Track. The ability to update, change and use current knowledge effectively, especially in light of the ongoing knowledge explosion, can be costly for any organization. Organizations that consider themselves “learning” or “knowledge-based” organizations must develop a competent workforce using KM strategies. Success in organizations involves developing a variety of human factors for changing competencies. With technological change, modification and revisions, many skills require updating for a competitive advantage in the marketplace. The focus on new techniques and insights into how individuals and organizations use their knowledge is our focus for the improvement of organizational
learning in this Minitrack.
We and AI
(2021)
It’s personal
(2021)
The new technologies of the Fourth Industrial Revolution (4IR) are disrupting traditional models of work and learning. While the impact of digitalization on education was already a point of serious deliberation, the COVID-19 pandemic has expedited ongoing transitions. With 90% of the world’s student population having been impacted by national lockdowns—online learning has gone from being a luxury to a necessity, in a context where around 3.6 billion people are offline. As the impacts of the 4IR unfold alongside the current crisis, it is not enough for future policy pathways to prioritize educational attainment in the traditional sense; it is essential to reimagine education itself as well as its delivery entirely. Future policy narratives will need to evaluate the very process of learning and identify the ways in which technology can help reduce existing disparities and enhance digital access, literacy and fluency in a scalable manner. In this context, this chapter analyses the status quo of online learning in India and Germany. Drawing on the experiences of these two economies with distinct trajectories of digitalization, the chapter explores how new technologies intersect with traditional education and local sociocultural conditions. Further, the limitations and opportunities presented by dominant ed-tech models is critically analyzed against the ongoing COVID-19 pandemic.
The noble way to substantiate decisions that affect many people is to ask these people for their opinions. For governments that run whole countries, this means asking all citizens for their views to consider their situations and needs.
Organizations such as Africa's Voices Foundation, who want to facilitate communication between decision-makers and citizens of a country, have difficulty mediating between these groups. To enable understanding, statements need to be summarized and visualized. Accomplishing these goals in a way that does justice to the citizens' voices and situations proves challenging. Standard charts do not help this cause as they fail to create empathy for the people behind their graphical abstractions. Furthermore, these charts do not create trust in the data they are representing as there is no way to see or navigate back to the underlying code and the original data. To fulfill these functions, visualizations would highly benefit from interactions to explore the displayed data, which standard charts often only limitedly provide.
To help improve the understanding of people's voices, we developed and categorized 80 ideas for new visualizations, new interactions, and better connections between different charts, which we present in this report. From those ideas, we implemented 10 prototypes and two systems that integrate different visualizations. We show that this integration allows consistent appearance and behavior of visualizations. The visualizations all share the same main concept: representing each individual with a single dot. To realize this idea, we discuss technologies that efficiently allow the rendering of a large number of these dots. With these visualizations, direct interactions with representations of individuals are achievable by clicking on them or by dragging a selection around them. This direct interaction is only possible with a bidirectional connection from the visualization to the data it displays. We discuss different strategies for bidirectional mappings and the trade-offs involved. Having unified behavior across visualizations enhances exploration. For our prototypes, that includes grouping, filtering, highlighting, and coloring of dots. Our prototyping work was enabled by the development environment Lively4. We explain which parts of Lively4 facilitated our prototyping process. Finally, we evaluate our approach to domain problems and our developed visualization concepts.
Our work provides inspiration and a starting point for visualization development in this domain. Our visualizations can improve communication between citizens and their government and motivate empathetic decisions. Our approach, combining low-level entities to create visualizations, provides value to an explorative and empathetic workflow. We show that the design space for visualizing this kind of data has a lot of potential and that it is possible to combine qualitative and quantitative approaches to data analysis.
Crochet is a popular handcraft all over the world. While other techniques such as knitting or weaving have received technical support over the years through machines, crochet is still a purely manual craft. Not just the act of crochet itself is manual but also the process of creating instructions for new crochet patterns, which is barely supported by domain specific digital solutions. This leads to unstructured and often also ambiguous and erroneous pattern instructions. In this report, we propose a concept to digitally represent crochet patterns. This format incorporates crochet techniques which allows domain specific support for crochet pattern designers during the pattern creation and instruction writing process. As contributions, we present a thorough domain analysis, the concept of a graph structure used as domain specific language to specify crochet patterns and a prototype of a projectional editor using the graph as representation format of patterns and a diagramming system to visualize them in 2D and 3D. By analyzing the domain, we learned about crochet techniques and pain points of designers in their pattern creation workflow. These insights are the basis on which we defined the pattern representation. In order to evaluate our concept, we built a prototype by which the feasibility of the concept is shown and we tested the software with professional crochet designers who approved of the concept.
In recent years, computer vision algorithms based on machine learning have seen rapid development. In the past, research mostly focused on solving computer vision problems such as image classification or object detection on images displaying natural scenes. Nowadays other fields such as the field of cultural heritage, where an abundance of data is available, also get into the focus of research. In the line of current research endeavours, we collaborated with the Getty Research Institute which provided us with a challenging dataset, containing images of paintings and drawings. In this technical report, we present the results of the seminar "Deep Learning for Computer Vision". In this seminar, students of the Hasso Plattner Institute evaluated state-of-the-art approaches for image classification, object detection and image recognition on the dataset of the Getty Research Institute. The main challenge when applying modern computer vision methods to the available data is the availability of annotated training data, as the dataset provided by the Getty Research Institute does not contain a sufficient amount of annotated samples for the training of deep neural networks. However, throughout the report we show that it is possible to achieve satisfying to very good results, when using further publicly available datasets, such as the WikiArt dataset, for the training of machine learning models.
The formal modeling and analysis is of crucial importance for software development processes following the model based approach. We present the formalism of Interval Probabilistic Timed Graph Transformation Systems (IPTGTSs) as a high-level modeling language. This language supports structure dynamics (based on graph transformation), timed behavior (based on clocks, guards, resets, and invariants as in Timed Automata (TA)), and interval probabilistic behavior (based on Discrete Interval Probability Distributions). That is, for the probabilistic behavior, the modeler using IPTGTSs does not need to provide precise probabilities, which are often impossible to obtain, but rather provides a probability range instead from which a precise probability is chosen nondeterministically. In fact, this feature on capturing probabilistic behavior distinguishes IPTGTSs from Probabilistic Timed Graph Transformation Systems (PTGTSs) presented earlier.
Following earlier work on Interval Probabilistic Timed Automata (IPTA) and PTGTSs, we also provide an analysis tool chain for IPTGTSs based on inter-formalism transformations. In particular, we provide in our tool AutoGraph a translation of IPTGTSs to IPTA and rely on a mapping of IPTA to Probabilistic Timed Automata (PTA) to allow for the usage of the Prism model checker. The tool Prism can then be used to analyze the resulting PTA w.r.t. probabilistic real-time queries asking for worst-case and best-case probabilities to reach a certain set of target states in a given amount of time.
Cyber-physical systems often encompass complex concurrent behavior with timing constraints and probabilistic failures on demand. The analysis whether such systems with probabilistic timed behavior adhere to a given specification is essential. When the states of the system can be represented by graphs, the rule-based formalism of Probabilistic Timed Graph Transformation Systems (PTGTSs) can be used to suitably capture structure dynamics as well as probabilistic and timed behavior of the system. The model checking support for PTGTSs w.r.t. properties specified using Probabilistic Timed Computation Tree Logic (PTCTL) has been already presented. Moreover, for timed graph-based runtime monitoring, Metric Temporal Graph Logic (MTGL) has been developed for stating metric temporal properties on identified subgraphs and their structural changes over time. In this paper, we (a) extend MTGL to the Probabilistic Metric Temporal Graph Logic (PMTGL) by allowing for the specification of probabilistic properties, (b) adapt our MTGL satisfaction checking approach to PTGTSs, and (c) combine the approaches for PTCTL model checking and MTGL satisfaction checking to obtain a Bounded Model Checking (BMC) approach for PMTGL. In our evaluation, we apply an implementation of our BMC approach in AutoGraph to a running example.
Software platforms regularly introduce new features to remain competitive. While platform innovation is considered to be a critical success factor, adding certain features could hurt the ecosystem. If platform owners provide functionality that was previously provided by a contributor, the owners enter complementary product spaces. Complementary market entry frequently occurs on software platforms and is a major concern for third-party developers.
Divergent findings on the impact of complementary market entry call for the consideration of additional factors. As prior research neglected the third-party perspective, this contribution aims to address this gap. We explore the use of measures to prevent complementary market entry using a survey approach on browser platforms. The research model is tested with 655 responses among developer from Mozilla Firefox and Google Chrome. To explain countermeasures employment, developer’s attitude and perceived likelihood are important. The results reveal that developers employ countermeasures if complementary market entry is assessed negatively and perceived as likely for their extension. Differences among browser platforms concerning complementary market entry are identified. Product spaces of extensions being available on multiple platforms are less likely to be entered and more heavily protected. Implications for research and stakeholders, i.e. platform owners and contributors are discussed.
Modern browsers are digital software platforms, as they allow third parties to extend functionality by providing extensions. In a highly competitive environment, differentiation through provided functionality is a key factor for browser platforms. As the development of browsers progress, new functions are constantly being released. Browsers could thus enter complementary markets by adding functionality previously provided by third-party extensions, which is referred to as ‘platform coring’. Previous studies have missed the perspective of the parties involved. To address this gap, we conducted interviews with third-party and core developers in the security and privacy domain from Firefox and Chrome. This study provides three contributions. First, insights into stakeholder-specific issues concerning coring. Second, measures to prevent coring. Third, strategical guidance for developers and owners. Third-party vendors experienced and core developers confirmed that coring occurs on browser platforms. While developers with extrinsic motivations assess coring negatively, developers with intrinsic motivations perceive coring positively.
As AI technology is increasingly used in production systems, different approaches have emerged from highly decentralized small-scale AI at the edge level to centralized, cloud-based services used for higher-order optimizations. Each direction has disadvantages ranging from the lack of computational power at the edge level to the reliance on stable network connections with the centralized approach. Thus, a hybrid approach with centralized and decentralized components that possess specific abilities and interact is preferred. However, the distribution of AI capabilities leads to problems in self-adapting learning systems, as knowledgebases can diverge when no central coordination is present. Edge components will specialize in distinctive patterns (overlearn), which hampers their adaptability for different cases. Therefore, this paper aims to present a concept for a distributed interchangeable knowledge base in CPPS. The approach is based on various AI components and concepts for each participating node. A service-oriented infrastructure allows a decentralized, loosely coupled architecture of the CPPS. By exchanging knowledge bases between nodes, the overall system should become more adaptive, as each node can “forget” their present specialization.
Since more and more production tasks are enabled by Industry 4.0 techniques, the number of knowledge-intensive production tasks increases as trivial tasks can be automated and only non-trivial tasks demand human-machine interactions. With this, challenges regarding the competence of production workers, the complexity of tasks and stickiness of required knowledge occur [1]. Furthermore, workers experience time pressure which can lead to a decrease in output quality. Cyber-Physical Systems (CPS) have the potential to assist workers in knowledge-intensive work grounded on quantitative insights about knowledge transfer activities [2]. By providing contextual and situational awareness as well as complex classification and selection algorithms, CPS are able to ease knowledge transfer in a way that production time and quality is improved significantly. CPS have only been used for direct production and process optimization, knowledge transfers have only been regarded in assistance systems with little contextual awareness. Embedding production and knowledge transfer optimization thus show potential for further improvements. This contribution outlines the requirements and a framework to design these systems. It accounts for the relevant factors.
For the last 20 years, enterprise architecture management (EAM) was primarily an instrument for harmonizing and consolidating IT landscapes and is lived as a transformation and governance discipline. It, however, is rather related to IT strategy than aligned to the actual corporate strategy and the work of the enterprise architect is characterized by tasks like prescribing, monitoring, documenting, and controlling. As digital transformation continues apace, companies are facing new challenges that lead to a volatile, uncertain, complex, and ambiguous (VUCA) world. To face these challenges, vision, understanding, clarity and agility allow to anticipative and implement necessary changes. This, of course, has implications for the role of the enterprise architect. S/he needs to start actively supporting innovation and taking more of an advisory role instead of just being driven by the current state of the enterprise architecture. This paper investigates the role of the enterprise architect in the VUCA world. Based on current literature and expert interviews, a survey was conducted among consultants who work as (or with) enterprise architects. Survey results include the evaluation of statements on current tasks of enterprise architects, their influence on projects and companies as well as future requirements on the roles of the enterprise architect. The results from the survey were synthesized with the findings from literature to derive the roles, tasks and skills of enterprise architect in the VUCA world.
Immune to COVID?
(2021)
While school supervision structures in the German Länder were extensively reformed during the last decades, systematic analyses of these reforms are missing. This chapter contributes to this research gap by providing an overview of the implemented reforms of school supervision structures in the German Länder. The effects of these reforms are analysed in order to answer the question of whether a convergence of school supervision systems is a result of these reforms. In a first step, a distinction is made to identify system-changing reforms. Although a decrease of the number or a concentration on one school supervision system is not a result of the analysis, it is argued that there is a convergence of school supervision structures, as a clear trend against school supervision systems with lower school supervisory boards can be observed.
Don’t settle for less
(2021)
The devil in disguise
(2021)
Envy constitutes a serious issue on Social Networking Sites (SNSs), as this painful emotion can severely diminish individuals' well-being. With prior research mainly focusing on the affective consequences of envy in the SNS context, its behavioral consequences remain puzzling. While negative interactions among SNS users are an alarming issue, it remains unclear to which extent the harmful emotion of malicious envy contributes to these toxic dynamics. This study constitutes a first step in understanding malicious envy’s causal impact on negative interactions within the SNS sphere. Within an online experiment, we experimentally induce malicious envy and measure its immediate impact on users’ negative behavior towards other users. Our findings show that malicious envy seems to be an essential factor fueling negativity among SNS users and further illustrate that this effect is especially pronounced when users are provided an objective factor to mask their envy and justify their norm-violating negative behavior.
From laggards to leaders
(2021)
The 2015 Paris Agreement on climate change embraces the participation of non-state actors in a separate governance track – the ‘Non-state actor zone for global action’ (nazca) – that runs alongside the formal track of unfccc negotiations and the implementation of the Paris Agreement by State Parties through ‘nationally determined contributions’. unfccc Secretariat is entrusted with orchestrating non-state global and transnational initiatives, partnerships and networks. The involvement of non-state actors in the implementation of the Paris Agreement helps to address an action gap by countries that are unable or unwilling to implement ambitious ndcs.
However, the increased prominence of initiatives driven by non-state actors also increases their direct and indirect influence on processes and rules which raises a number of questions with regards to the legitimacy of action and the democratic deficit of the global climate regime. Balancing legitimacy with effectiveness requires non-state initiatives to ensure transparent and inclusive governance, and accountability towards progress against their goals and pledges.
Despite its encouragement towards private initiatives, the Paris Agreement creates surprisingly little regulatory space for non-state actors to gain hold. Neither are there measures that would link ndcs to nazca initiatives, nor are functional requirements such as transparency or reporting extended to non-state initiatives. While the Paris Agreement marks an important step towards harnessing private sector ability and ambition for climate action, more remains to be done to create a truly enabling framework for private action to strive and complement public efforts to address climate change.
Effectiveness
(2021)
This paper starts from the premise that Western states are connected to some of the harms refugees suffer from. It specifically focuses on the harm of acts of misrecognition and its relation to epistemic injustice that refugees suffer from in refugee camps, in detention centers, and during their desperate attempts to find refuge. The paper discusses the relation between hermeneutical injustice and acts of misrecognition, showing that these two phenomena are interconnected and that acts of misrecognition are particularly damaging when (a) they stretch over different contexts, leaving us without or with very few safe spaces, and (b) they dislocate us, leaving us without a community to turn to. The paper then considers the ways in which refugees experience acts of misrecognition and suffer from hermeneutical injustice, using the case of unaccompanied children at the well-known and overcrowded camp Moria in Greece, the case of unsafe detention centers in Libya, and the case of the denial to assistance on the Mediterranean and the resulting pushbacks from international waters to Libya as well as the preventable drowning of refugees in the Mediterranean to illustrate the arguments. Finally, the paper argues for specific duties toward refugees that result from the prior arguments on misrecognition and hermeneutical injustice.
Since the beginning of the recent global refugee crisis, researchers have been tackling many of its associated aspects, investigating how we can help to alleviate this crisis, in particular, using ICTs capabilities. In our research, we investigated the use of ICT solutions by refugees to foster the social inclusion process in the host community. To tackle this topic, we conducted thirteen interviews with Syrian refugees in Germany. Our findings reveal different ICT usages by refugees and how these contribute to feeling empowered. Moreover, we show the sources of empowerment for refugees that are gained by ICT use. Finally, we identified the two types of social inclusion benefits that were derived from empowerment sources. Our results provide practical implications to different stakeholders and decision-makers on how ICT usage can empower refugees, which can foster the social inclusion of refugees, and what should be considered to support them in their integration effort.
Since the beginning of the recent global refugee crisis, researchers have been tackling many of its associated aspects, investigating how we can help to alleviate this crisis, in particular, using ICTs capabilities. In our research, we investigated the use of ICT solutions by refugees to foster the social inclusion process in the host community. To tackle this topic, we conducted thirteen interviews with Syrian refugees in Germany. Our findings reveal different ICT usages by refugees and how these contribute to feeling empowered. Moreover, we show the sources of empowerment for refugees that are gained by ICT use. Finally, we identified the two types of social inclusion benefits that were derived from empowerment sources. Our results provide practical implications to different stakeholders and decision-makers on how ICT usage can empower refugees, which can foster the social inclusion of refugees, and what should be considered to support them in their integration effort.
Introduction
(2021)
Developing a new paradigm
(2020)
Internet users commonly agree that it is important for them to protect their personal data. However, the same users readily disclose their data when requested by an online service. The dichotomy between privacy attitude and actual behaviour is commonly referred to as the “privacy paradox”. Over twenty years of research were not able to provide one comprehensive explanation for the paradox and seems even further from providing actual means to overcome the paradox. We argue that the privacy paradox is not just an instantiation of the attitude-behaviour gap. Instead, we introduce a new paradigm explaining the paradox as the result of attitude-intention and intentionbehaviour gaps. Historically, motivational goal-setting psychologists addressed the issue of intentionbehaviour gaps in terms of the Rubicon Model of Action Phases and argued that commitment and volitional strength are an essential mechanism that fuel intentions and translate them into action. Thus, in this study we address the privacy paradox from a motivational psychological perspective by developing two interventions on Facebook and assess whether the 287 participants of our online experiment actually change their privacy behaviour. The results demonstrate the presence of an intentionbehaviour gap and the efficacy of our interventions in reducing the privacy paradox.
A growing number of business processes can be characterized as knowledge-intensive. The ability to speed up the transfer of knowledge between any kind of knowledge carriers in business processes with AR techniques can lead to a huge competitive advantage, for instance in manufacturing. This includes the transfer of person-bound knowledge as well as externalized knowledge of physical and virtual objects. The contribution builds on a time-dependent knowledge transfer model and conceptualizes an adaptable, AR-based application. Having the intention to accelerate the speed of knowledge transfers between a manufacturer and an information system, empirical results of an experimentation show the validity of this approach. For the first time, it will be possible to discover how to improve the transfer among knowledge carriers of an organization with knowledge-driven information systems (KDIS). Within an experiment setting, the paper shows how to improve the quantitative effects regarding the quality and amount of time needed for an example manufacturing process realization by an adaptable KDIS.
As part of the digitization, the role of artificial systems as new actors in knowledge-intensive processes requires to recognize them as a new form of knowledge bearers side by side with traditional knowledge bearers, such as individuals, groups, organizations. By now, artificial intelligence (AI) methods were used in knowledge management (KM) for knowledge discovery, for the reinterpreting of information, and recent works focus on the studying of different AI technologies implementation for knowledge management, like big data, ontology-based methods and intelligent agents [1]. However, a lack of holistic management approach is present, that considers artificial systems as knowledge bearers. The paper therefore designs a new kind of KM approach, that integrates the technical level of knowledge and manifests as Neuronal KM (NKM). Superimposing traditional KM approaches with the NKM, the Symbiotic Knowledge Management (SKM) is conceptualized furthermore, so that human as well as artificial kinds of knowledge bearers can be managed as symbiosis. First use cases demonstrate the new KM, NKM and SKM approaches in a proof-of-concept and exemplify their differences.
The analysis of behavioral models is of high importance for cyber-physical systems, as the systems often encompass complex behavior based on e.g. concurrent components with mutual exclusion or probabilistic failures on demand. The rule-based formalism of probabilistic timed graph transformation systems is a suitable choice when the models representing states of the system can be understood as graphs and timed and probabilistic behavior is important. However, model checking PTGTSs is limited to systems with rather small state spaces.
We present an approach for the analysis of large scale systems modeled as probabilistic timed graph transformation systems by systematically decomposing their state spaces into manageable fragments. To obtain qualitative and quantitative analysis results for a large scale system, we verify that results obtained for its fragments serve as overapproximations for the corresponding results of the large scale system. Hence, our approach allows for the detection of violations of qualitative and quantitative safety properties for the large scale system under analysis. We consider a running example in which we model shuttles driving on tracks of a large scale topology and for which we verify that shuttles never collide and are unlikely to execute emergency brakes. In our evaluation, we apply an implementation of our approach to the running example.
The envy spiral
(2020)
On Social Networking Sites (SNS) users disclose mostly positive and often self-enhancing information. Scholars refer to this phenomenon as the positivity bias in SNS communication (PBSC). However, while theoretical explanations for this phenomenon have been proposed, an empirical proof of these theorized mechanisms is still missing. The project presented in this Research-in-Progress paper aims at explaining the PBSC with the mechanism specified in the self-enhancement envy spiral. Specifically, we hypothesize that feelings of envy drive people to post positive and self-enhancing content on SNS. To test this hypothesis, we developed an experimental design allowing to examine the causal effect of envy on the positivity of users’ subsequently posted content. In a preliminary study, we tested our manipulation of envy and could show its effectiveness in inducing different levels of envy between our groups. Our project will help to broaden the understanding of the complex dynamics of SNS and the potentially adverse driving forces underlying them.
Missing out on life
(2020)
Mobile devices have become an integral part of everyday life due to
their portability. As literature shows, technology use is not only beneficial but also has dark sides, such as addiction. Parents face the need to balance perceived benefits and risks of children’s exposure to mobile technologies. However, no study has uncovered what kind of benefits and concerns parents consider when implementing technology-related rules. We built on qualitative responses of 300
parents of children aged two to thirteen to explore concerns about, and perceived benefits of children’s smartphone and tablet usage, as well as the rules parents have developed regarding technology use. Findings point to concerns regarding children’s development, as well as benefits for both children and parents, and ultimately to new insights about mobile technology mediation. These results provide practical guidance for parents, physicians and mobile industry
stakeholders, trying to ensure that children are acting responsibly with mobile technology.