Refine
H-BRS Bibliography
- yes (238) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (69)
- Fachbereich Wirtschaftswissenschaften (65)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (42)
- Fachbereich Angewandte Naturwissenschaften (39)
- Fachbereich Ingenieurwissenschaften und Kommunikation (38)
- Institut für Verbraucherinformatik (IVI) (17)
- Institute of Visual Computing (IVC) (15)
- Fachbereich Sozialpolitik und Soziale Sicherung (14)
- Institut für Cyber Security & Privacy (ICSP) (11)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (10)
Document Type
- Conference Object (85)
- Article (82)
- Part of a Book (24)
- Book (monograph, edited volume) (17)
- Contribution to a Periodical (8)
- Report (8)
- Part of Periodical (4)
- Conference Proceedings (2)
- Doctoral Thesis (2)
- Working Paper (2)
Year of publication
- 2016 (238) (remove)
Keywords
- Lehrbuch (6)
- User Experience (3)
- Betriebswirtschaftslehre (2)
- Corporate Social Responsibility (2)
- Dielectric analysis (2)
- E-Business (2)
- Fas (2)
- IEEE802.11 (2)
- Intelligent Transport System (2)
- Kommunikation (2)
Der zunehmende Wunsch der Verbraucher nach einem natürlichen Lebensstil führt unter anderem zu einem erhöhten Konsum von Rohmilch und Milchprodukten aus unpasteurisierter Milch (Hudopisk et al., 2013). Rohmilchkonsumenten bevorzugen Rohmilch zum Einen wegen des subjektiven Eindrucks eines besseren Geschmacks und zum Anderen versprechen sie sich gesundheitliche Vorteile, wie eine reduzierte Empfindlichkeit gegen Allergien und eine bessere Qualität der enthaltenen Nährstoffe, durch den Verzehr unbehandelter Milch (Claeys et al., 2014). Mit dem Konsum von Rohmilch gehen allerdings mikrobiologische Risiken einher, da Rohmilch aufgrund ihres neutralen pH-Wertes, dem hohen Nährstoffgehalt und der hohen Wasseraktivität einen guten Nährboden für mikrobielles Wachstum darstellt. Das Wachstum von verschiedenen Mikroorganismen wird dabei größtenteils durch die Temperatur, die kompetitive Begleitflora und die Anwesenheit von Hemmstoffen beeinflusst (Claeys et al., 2013).Mögliche Kontaminationen der Rohmilch resultieren entweder aus einer direkten Abgabe von Mikroorganismen durch das Euter, als Konsequenz von Entzündungen oder durch eine indirekte Kontamination während des Melkvorgangs oder der späteren Handhabung (EFSA, 2015).
Noch sind sich die Experten nicht einig, wie schnell Blockchain das Internet revolutionieren wird. Dass das Potenzial dafür riesig ist, ist sich Professor Jens Böcker sicher. Er unterhält eine Professur für Betriebswirtschaftslehre und Marketing an der Hochschule Bonn-Rhein-Sieg und forscht zu diesem Thema.
Background: Falls are common in older adults and can result in serious injuries. Due to demographic changes, falls and related healthcare costs are likely to increase over the next years. Participation and motivation of older adults in fall prevention measures remain a challenge. The iStoppFalls project developed an information and communication technology (ICT)-based system for older adults to use at home in order to reduce common fall risk factors such as impaired balance and muscle weakness. The system aims at increasing older adults’ motivation to participate in ICT-based fall prevention measures. This article reports on usability, user-experience and user-acceptance aspects affecting the use of the iStoppFalls system by older adults.
Methods: In the course of a 16-week international multicenter study, 153 community-dwelling older adults aged 65+ participated in the iStoppFalls randomized controlled trial, of which half used the system in their home to exercise and assess their risk of falling. During the study, 60 participants completed questionnaires regarding the usability, user experience and user acceptance of the iStoppFalls system. Usability was measured with the System Usability Scale (SUS). For user experience the Physical Activity Enjoyment Scale (PACES) was applied. User acceptance was assessed with the Dynamic Acceptance Model for the Re-evaluation of Technologies (DART). To collect more detailed data on usability, user experience and user acceptance, additional qualitative interviews and observations were conducted with participants.
Results: Participants evaluated the usability of the system with an overall score of 62 (Standard Deviation, SD 15.58) out of 100, which suggests good usability. Most users enjoyed the iStoppFalls games and assessments, as shown by the overall PACES score of 31 (SD 8.03). With a score of 0.87 (SD 0.26), user acceptance results showed that participants accepted the iStoppFalls system for use in their own home. Interview data suggested that certain factors such as motivation, complexity or graphical design were different for gender and age.
Conclusions: The results suggest that the iStoppFalls system has good usability, user experience and user acceptance. It will be important to take these along with factors such as motivation, gender and age into consideration when designing and further developing ICT-based fall prevention systems.
Marketing und Recht kompakt
(2016)
"Marketing und Recht - was soll das denn?" So oder ähnlich wird der eine oder andere auf den Titel des vorliegenden Buches spontan reagieren. Das verwundert nicht, ist die Buch-Landschaft doch vor allem dadurch geprägt, dass Marketing-Werke und Abhandlungen zu marketingrelevanten Rechtsthemen am Büchermarkt stets "getrennt marschieren". Wer Marketingkonzepte entwirft, Vorhaben im Rahmen der Marketingforschung durchführen will oder beabsichtigt, Entscheidungen im Rahmen des Marketings zu treffen, sollte unseres Erachtens möglichst frühzeitig die gängigen "juristischen Fallstricke" erkennen und in seinen Überlegungen berücksichtigen.
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Mobilitäts- und Nachhaltigkeitsforscher sehen sich bei der Erforschung des Mobilitätsverhaltens von Personen mit einer bunten Palette an Erhebungsmethoden konfrontiert. Erweitert wird diese Vielfalt in der letzten Zeit durch die Möglichkeit, dieses Verhalten direkt über die Smartphones der Probanden zu erfassen. Um die Auswahl geeigneter Methoden zu erleichtern, liefert die vorliegende Literaturstudie einen detaillierten Überblick zu Fragestellungen, Daten und Erhebungsmethoden, die im Bereich der Mobilitätsforschung zur Erfassung von Alltagsmobilität eingesetzt werden.
Dieser Artikel stützt sich auf das vom 13.10.2015 bis 12.01.2016 gemeinsam durchgeführten Praxisprojekt von ORBIT und der Hochschule Bonn-Rhein-Sieg. Thema des Projekts waren die Methodenevaluation und Automatisierung von Auswertungsprozessen. Speziell ging es um die Überprüfung der von ORBIT entwickelten Methodik zur Anforderungsanalyse und Standortbestimmung – dem ORBIT-Navigator.
SpMV Runtime Improvements with Program Optimization Techniques on Different Abstraction Levels
(2016)
The multiplication of a sparse matrix with a dense vector is a performance critical computational kernel in many applications, especially in natural and engineering sciences. To speed up this operation, many optimization techniques have been developed in the past, mainly focusing on the data layout for the sparse matrix. Strongly related to the data layout is the program code for the multiplication. But even for a fixed data layout with an accommodated kernel, there are several alternatives for program optimizations. This paper discusses a spectrum of program optimization techniques on different abstraction layers for six different sparse matrix data format and kernels. At the one end of the spectrum, compiler options can be used that hide from the programmer all optimizations done by the compiler internally. On the other end of the spectrum, a multiplication kernel can be programmed that use highly sophisticated intrinsics on an assembler level that ask for a programmer with a deep understanding of processor architectures. These special instructions can be used to efficiently utilize hardware features in processors like vector units that have the potential to speed up sparse matrix computations. The paper compares the programming effort and required knowledge level for certain program optimizations in relation to the gained runtime improvements.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
A deployment of the Vehicle-to-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a Public Key Infrastructure policy for Intelligent Transport Systems in Europe is in discussion to enable V2V communication. This policy set aside two classes of keys and certificates for ITS vehicle stations: long term authentication keys and pseudonymous keys and certificates. We show that from our point of view the periodic sent Cooperative Awareness Messages with extensive data have technical limitations and together with the pseudonym concept cause privacy problems.