Refine
H-BRS Bibliography
- yes (25) (remove)
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (8)
- Institut für Verbraucherinformatik (IVI) (8)
- Fachbereich Informatik (7)
- Institut für Cyber Security & Privacy (ICSP) (6)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (6)
- Fachbereich Ingenieurwissenschaften und Kommunikation (5)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (4)
- Sprachenzentrum (2)
- Bibliothek (1)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (1)
Document Type
- Conference Object (25) (remove)
Year of publication
- 2021 (25) (remove)
Has Fulltext
- yes (25) (remove)
Keywords
- Augmented Reality (2)
- Big Data Analysis (2)
- AR design (1)
- AR development (1)
- AR/VR (1)
- Adoption (1)
- Advances in Design Science Research (1)
- Appropriation (1)
- Authentication features (1)
- Consumer Informatics (1)
The rapid increase in solar photovoltaic (PV) installations worldwide has resulted in the electricity grid becoming increasingly dependent on atmospheric conditions, thus requiring more accurate forecasts of incoming solar irradiance. In this context, measured data from PV systems are a valuable source of information about the optical properties of the atmosphere, in particular the cloud optical depth (COD). This work reports first results from an inversion algorithm developed to infer global, direct and diffuse irradiance as well as atmospheric optical properties from PV power measurements, with the goal of assimilating this information into numerical weather prediction (NWP) models.
In den Atmosphärenwissenschaften spielt die Strahlungsbilanz der Erde eine wichtige Rolle für unser Verständnis des Klimasystems. Hier liefern ausgereifte Satellitenprodukte dekadische Klimazeitreihen mit einer so hohen Genauigkeit, dass z.B. Änderungen im Zusammenhang mit dem Klimawandel detektiert werden können. Dies gilt insbesondere auch für die solaren Strahlungsflüsse an der Erdoberfläche. Beim Vergleich dieser Satellitenprodukte mit instantanen Beobachtungen der Strahlung am Erdboden sind jedoch oft erhebliche Abweichungen feststellbar, die hauptsächlich durch kleinskalige Variabilität in der räumlichen Struktur von Wolken und ihrer Strahlungswirkung verursacht werden. Hier ist auch zu bedenken, dass Bodenbeobachtungen fast einer Punktmessung entsprechen, während Satellitenpixel eine Fläche in der Größenordnung von Quadratkilometern abtasten.
West Africa has a great potential for the application of solar energy systems, as it combines high levels of solar irradiance with a lack of energy production. Southern West Africa is a region with a very high aerosol load. Urbanization, uncontrolled fires, traffic as well as power plants and oil rigs lead to increasing anthropogenic emissions. The naturally circulating north winds bring mineral dust from the Sahel and Sahara and monsoons - sea salt and other oceanic compounds from the south. The EU-funded Dynamics-Aerosol-Chemistry-Cloud Interactions in West Africa (DACCIWA) project (2014–2018), dlivered the most complete dataset of the atmosphere over the region to date. In our study, we use in-situ measured optical properties of aerosols from the airborne campaign over the Gulf of Guinea and inland, and from ground measurements in coastal cities.
An der Hochschule Bonn-Rhein-Sieg fand am Donnerstag, den 23.9.21 das erste Verbraucherforum für Verbraucherinformatik statt. Im Rahmen der Online-Tagesveranstaltung diskutierten mehr als 30 Teilnehmer:innen über Themen und Ideen rund um den Bereich Verbraucherdatenschutz. Dabei kamen sowohl Beiträge aus der Informatik, den Verbraucher- und Sozialwissenschaften sowie auch der regulatorischen Perspektive zur Sprache. Der folgende Beitrag stellt den Hintergrund der Veranstaltung dar und berichtet über Inhalte der Vorträge sowie Anknüpfungspunkte für die weitere Konstituierung der Verbraucherinformatik. Veranstalter waren das Institut für Verbraucherinformatik an der H-BRS in Zusammenarbeit mit dem Lehrstuhl IT-Sicherheit der Universität Siegen sowie dem Kompetenzzentrum Verbraucherforschung NRW der Verbraucherzentrale NRW e. V. mit Förderung des Bundesministeriums der Justiz und für Verbraucherschutz.
Die Blockchain-Technologie ist einer der großen Innovationstreiber der letzten Jahre. Mit einer zugrundeliegenden Blockchain-Technologie ist auch der Betrieb von verteilten Anwendungen, sogenannter Decentralized Applications (DApps), bereits technisch umsetzbar. Dieser Beitrag verfolgt das Ziel, Gestaltungsmöglichkeiten der digitalen Verbraucherteilhabe an Blockchain-Anwendungen zu untersuchen. Hierzu enthält der Beitrag eine Einführung in die digitale Verbraucherteilhabe und die technischen Grundlagen und Eigenschaften der Blockchain-Technologie, einschließlich darauf basierender DApps. Abschließend werden technische, ethisch-organisatorische, rechtliche und sonstige Anforderungsbereiche für die Umsetzung von digitaler Verbraucherteilhabe in Blockchain-Anwendungen adressiert.
Frequently the main purpose of domestic artifacts equipped with smart sensors is to hide technology, like previous examples of a Smart Mirror show. However, current Smart Homes often fail to provide meaningful IoT applications for all residents’ needs. To design beyond efficiency and productivity, we propose to realize the potential of the traditional artifact for calm and engaging experiences. Therefore, we followed a design case study approach with 22 participants in total. After an initial focus group, we conducted a diary study to examine home routines and developed a conceptual design. The evaluation of our mid-fidelity prototype shows, that we need to study carefully the practices of the residents to leverage the physical material of the artifact to fit the routines. Our Smart Mirror, enhanced by digital qualities, supports meaningful activities and makes the bathroom more appealing. Thereby, we discuss domestic technology design beyond automation.
Recent publications propose concepts of systems that integrate the various services and data sources of everyday food practices. However, this research does not go beyond the conceptualization of such systems. Therefore, there is a deficit in understanding how to combine different services and data sources and which design challenges arise from building integrated Household Information Systems. In this paper, we probed the design of an Integrated Household Information System with 13 participants. The results point towards more personalization, automatization of storage administration and enabling flexible artifact ecologies. Our paper contributes to understanding the design and usage of Integrated Household Information Systems, as a new class of information systems for HCI research.
With the debates on climate change and sustainability, a reduction of the share of cars in the modal split has become increasingly prevalent in both public and academic discourse. Besides some motivational approaches, there is a lack of ICT artifacts that successfully raise the ability of consumers to adopt sustainable mobility patterns. To further understand the requirements and the design of these artifacts within everyday mobility adopted a practice-lens. This lens is helpful to get a broader perspective on the use of ICT artifacts along consumers’ transformational journey towards sustainable mobility practices. Based on 12 retrospective interviews with car-free mobility consumers, we argue that artifacts should not be viewed as ’magic-bullet’ solutions but should accompany the complex transformation of practices in multifaceted ways. Moreover, we highlight in particular the difficulties of appropriating shared infrastructures and aligning own practices with them. This opens up a design space to provide more support for these kinds of material-interactions, to provide access to consumption infrastructures and make them usable, rather than leaving consumers alone with increased motivation.
Die digitale Transformation verändert die internationale Kooperation der Hochschulen massiv. Über die Möglichkeiten der virtuellen Mobilität hinaus entstehen neue Themenfelder, die internationale Lern- und Lehrerlebnisse mit digitaler Unterstützung verändern, ergänzen oder neu ermöglichen. Dazu sind im Bereich der Förderung der Internationalisierung (DAAD, Erasmus+, BMBF u.a.) Projekte und Förderformate entstanden, die Digitalisierung und Internationalisierung kombinieren und die neuen Themenstellungen adressieren, z.B. didaktische Formate, administrative Prozesse (auch im Kontext OZG und DSGVO), virtuelle und hybride Mobilität, internationale Projekt- und Teamformate sowie schlussendlich auch Inhalte, die internationale, interkulturelle und interdisziplinäre Kompetenzen mit digitalen Kompetenzen verbinden. Der vorgeschlagene Workshop soll entsprechende Projekte zusammenbringen und die Themen strukturieren, um einen Überblick der Entwicklungen zu schaffen und somit einen Beitrag zur Definition des Themenfelds „Digitalisierung & Internationalisierung“ zu leisten.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Over the last decades, different kinds of design guides have been created to maintain consistency and usability in interactive system development. However, in the case of spatial applications, practitioners from research and industry either have difficulty finding them or perceive such guides as lacking relevance, practicability, and applicability. This paper presents the current state of scientific research and industry practice by investigating currently used design recommendations for mixed reality (MR) system development. We analyzed and compared 875 design recommendations for MR applications elicited from 89 scientific papers and documentation from six industry practitioners in a literature review. In doing so, we identified differences regarding four key topics: Focus on unique MR design challenges, abstraction regarding devices and ecosystems, level of detail and abstraction of content, and covered topics. Based on that,we contribute to the MR design research by providing three factors for perceived irrelevance and six main implications for design recommendations that are applicable in scientific and industry practice.
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is recommended by NIST and NCSC to strengthen password-based authentication, and is already used by major online services. Also, users consider RBA to be more usable than two-factor authentication and just as secure. However, users currently obtain RBA's high security and usability benefits at the cost of exposing potentially sensitive personal data (e.g., IP address or browser information). This conflicts with user privacy and requires to consider user rights regarding the processing of personal data. We outline potential privacy challenges regarding different attacker models and propose improvements to balance privacy in RBA systems. To estimate the properties of the privacy-preserving RBA enhancements in practical environments, we evaluated a subset of them with long-term data from 780 users of a real-world online service. Our results show the potential to increase privacy in RBA solutions. However, it is limited to certain parameters that should guide RBA design to protect privacy. We outline research directions that need to be considered to achieve a widespread adoption of privacy preserving RBA with high user acceptance.
In contrast to the German power supply, the energy supply in many West African countries is very unstable. Frequent power outages are not uncommon. Especially for critical infrastructures, such as hospitals, a stable power supply is vital. To compensate for the power outages, diesel generators are often used. In the future, these systems will increasingly be supplemented by PV systems and storage, so that the generator will have to be used less or not at all when needed. For the design and operation of such systems, it is necessary to better understand the atmospheric variability of PV power generation. For example, there are large variations between rainy and dry seasons, between days with high and low dust levels - caused by sandstorms (harmattan) or urban air pollution.
In view of the rapid growth of solar power installations worldwide, accurate forecasts of photovoltaic (PV) power generation are becoming increasingly indispensable for the overall stability of the electricity grid. In the context of household energy storage systems, PV power forecasts contribute towards intelligent energy management and control of PV-battery systems, in particular so that self-sufficiency and battery lifetime are maximised. Typical battery control algorithms require day-ahead forecasts of PV power generation, and in most cases a combination of statistical methods and numerical weather prediction (NWP) models are employed. The latter are however often inaccurate, both due to deficiencies in model physics as well as an insufficient description of irradiance variability.
New communication technologies are changing the way we work and communicate with people around the world. Given this reality, students in Higher Education (HE) worldwide need to develop knowledge in their area of study as well as attitudes and values that will enable them to be responsible and ethical global citizens in the workforce they will soon enter, regardless of the degree. Different institutional and country-specific requirements are important factors when developing an international Virtual Exchange (VE) program. Digital learning environments such as ProGlobe – Promoting the Global Exchange of Ideas on Sustainable Goals, Practices, and Cultural Diversity – offer a platform for collaborating with diverse students around the world to share and reflect on ideas on sustainable practices. Students work together virtually on a joint interdisciplinary project that aims to create knowledge and foster cultural diversity. This project was successfully integrated into each country’s course syllabus through a common global theme; sustainability. The focus of this paper is to present multi-disciplinary perspectives on the opportunities and challenges in implementing a VE project in HE. Furthermore, it will present the challenges that country coordinators dealt with when planning and implementing their project. Given the disparity found in each course syllabus, project coordinators uniquely handled the project goal, approach, and assessment for their specific course and program. Not only did the students and faculty gain valuable insight into different aspects of collaboration when working in interdisciplinary HE projects, they also reflected on their own impact on the environment and learned to listen to how people in different countries deal with environmental issues. This approach provided students with meaningful intercultural experiences that helped them link ideas and concepts about a global issue through the lens of their own discipline as well as other disciplines worldwide.
Target meaning representations for semantic parsing tasks are often based on programming or query languages, such as SQL, and can be formalized by a context-free grammar. Assuming a priori knowledge of the target domain, such grammars can be exploited to enforce syntactical constraints when predicting logical forms. To that end, we assess how syntactical parsers can be integrated into modern encoder-decoder frameworks. Specifically, we implement an attentional SEQ2SEQ model that uses an LR parser to maintain syntactically valid sequences throughout the decoding procedure. Compared to other approaches to grammar-guided decoding that modify the underlying neural network architecture or attempt to derive full parse trees, our approach is conceptually simpler, adds less computational overhead during inference and integrates seamlessly with current SEQ2SEQ frameworks. We present preliminary evaluation results against a recurrent SEQ2SEQ baseline on GEOQUERY and ATIS and demonstrate improved performance while enforcing grammatical constraints.
Since stationary self-checkout is widely introduced and well understood, previous research barely examined newer generations of smartphone-based Scan&Go. Especially from a design perspective, we know little about the factors contributing to the adoption of Scan&Go solutions and how design enables consumers to take full advantage of this development rather than being burdened with using complex and unenjoyable systems. To understand the influencing factors and the design from a consumer perspective, we conducted a mixed-methods study where we triangulated data of an online survey with 103 participants and a qualitative study with 20 participants. Based on the results, our study presents a refined and nuanced understanding of technology as well as infrastructure-related factors that influence adoption. Moreover, we present several implications for designing and implementing of Scan&Go in retail environments.
An der H-BRS, einer Hochschule für Angewandte Wissenschaften mit ca. 9.000 Studierenden, wurde die OER-Kultur bewusst als Teil der Strategie zur Digitalisierung der Lehre in drei Schritten etabliert: (1) Gemeinsame Strategiebildung als Teil eines partizipativ erarbeiteten Hochschulentwicklungsplans: Verankerung von OER in der Digitalisierungsstrategie. (2) Basierend auf der Vernetzung der Expertinnen und Experten erfolgreiche Einwerbung von OER-Projekten, die exemplarisch vorgestellt werden. (3) Dauerhafte strategische Verankerung, basierend auf kontinuierlicher interner und externer Netzwerkarbeit, Etablierung von digitalen Austauschplattformen für die Lehrenden, Transfer des OER-Gedankens (Kooperation, Austausch, Mehrfachnutzen) auf die Hochschuldidaktik sowie regelmäßige Ausschreibungen von Fördermaßnahmen.
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
(2021)
The web is the most wide-spread digital system in the world and is used for many crucial applications. This makes web application security extremely important and, although there are already many security measures, new vulnerabilities are constantly being discovered. One reason for some of the recent discoveries lies in the presence of intermediate systems—e.g. caches, message routers, and load balancers—on the way between a client and a web application server. The implementations of such intermediaries may interpret HTTP messages differently, which leads to a semantically different understanding of the same message. This so-called semantic gap can cause weaknesses in the entire HTTP message processing chain.
In this paper we introduce the header whitelisting (HWL) approach to address the semantic gap in HTTP message processing pipelines. The basic idea is to normalize and reduce an HTTP request header to the minimum required fields using a whitelist before processing it in an intermediary or on the server, and then restore the original request for the next hop. Our results show that HWL can avoid misinterpretations of HTTP messages in the different components and thus prevent many attacks rooted in a semantic gap including request smuggling, cache poisoning, and authentication bypass.
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case study. In doing so, we highlight several deficiencies in defending against XSW. Using this real-world contemporary example as motivation, we introduce a guideline for more secure XML signature processing that provides practitioners with easier access to the effective countermeasures identified in the current state of research.