Refine
H-BRS Bibliography
- yes (148)
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (148) (remove)
Document Type
- Conference Object (148) (remove)
Year of publication
Keywords
- User Experience (6)
- Sustainability (5)
- Eco-Feedback (4)
- ICT (4)
- Sustainable Interaction Design (4)
- Augmented Reality (3)
- Dementia (3)
- Information Systems (3)
- Peer-to-Peer (3)
- Privacy (3)
Mergers and acquisitions take place all over the world and in many industries, typically motivated by corporate politics. While IT management is often not involved in the decision-making, it has to solve a wide range of problems in the post-merger phase. Indeed, merging two or more companies implies not only merging their core businesses, but also creating a new and efficiently integrated IT organisation from the individual ones, since persistence of the current IT organisations usually does not make sense. In addition, corporate management frequently imposes constraints, e.g., cost reductions, on the IT infrastructure. The principal critical success factor when merging IT organisations is the uninterrupted operation of the IT business, because a service gap is neither acceptable for in-house functional departments nor for external customers. Therefore, the IT rebuilding phase has to focus on IT services that facilitate the processes of functional departments, support processes, and processes of customers and suppliers, so that any transformation work is transparent to internal and external customers. In this article we describe a real-world but anonymous case study. Our goals are to highlight the points important for merging IT organisations, and to help decision-makers, particularly in the areas of IT organisation and IT personnel. We focus on the arising organisational and non-technical issues from a management perspective, i.e., the CIO's view, and provide checklists intended to help IT managers to address the most pressing issues. To assist CIOs surviving in the post merger phase, we give check lists for merging IT organisations, check lists for merging IT human resources, check lists for IT budgets and reporting, and assess activities in a merger scenario. IT hardware, software and IT infrastructure as well as running IT projects are not considered in this paper.
Sind kleinere und mittlere Unternehmen (KMU) bereits auf die Digitale Transformation vorbereitet?
(2018)
Eine von den Autoren durchgeführte Untersuchung konnte deutliche Indizien dafür ausmachen, dass viele kleinere und mittlere Unternehmen (KMU) aktuell noch keine ausreichende Reife zur Digitalen Transformation haben. Zur Lösung des Problems wird vorgeschlagen, ein agiles IT-Management-Konzept zu entwickeln, um den IT-Bereich dynamisch und ohne formalen Ballast des klassischen IT-Managements zu steuern.
Während sich die unternehmerische Arbeitswelt immer mehr in Richtung Agilität verschiebt, verharrt das IT-Controlling noch in alten, klassischen Strukturen. Diese Arbeit untersucht die Fragestellung, ob und inwieweit agile Ansätze im IT-Controlling eingesetzt werden können. Dieser Beitrag ist eine modifizierte Version des in der Zeitschrift „HMD Praxis der Wirtschaftsinformatik“ (https://link.springer.com/article/10.1365/s40702-022-00837-0) erschienenen Artikels „Agiles IT-Controlling“.
IT performance measurement is often associated by chief executive officers with IT cost cutting although IT protects business processes from increasing IT costs. IT cost cutting only endangers the company’s efficiency. This opinion discriminates those who do IT performance measurement in companies as a bean-counter. The present paper describes an integrated reference model for IT performance measurement based on a life cycle model and a performance oriented framework. The presented model was created from a practical point of view. It is designed lank compared with other known concepts and is very appropriate for small and medium enterprises (SME).
In 1991 the researchers at the center for the Learning Sciences of Carnegie Mellon University were confronted with the confusing question of “where is AI” from the users, who were interacting with AI but did not realize it. Three decades of research and we are still facing the same issue with the AItechnology users. In the lack of users’ awareness and mutual understanding of AI-enabled systems between designers and users, informal theories of the users about how a system works (“Folk theories”) become inevitable but can lead to misconceptions and ineffective interactions. To shape appropriate mental models of AI-based systems, explainable AI has been suggested by AI practitioners. However, a profound understanding of the current users’ perception of AI is still missing. In this study, we introduce the term “Perceived AI” as “AI defined from the perspective of its users”. We then present our preliminary results from deep-interviews with 50 AItechnology users, which provide a framework for our future research approach towards a better understanding of PAI and users’ folk theories.
For most people, using their body to authenticate their identity is an integral part of daily life. From our fingerprints to our facial features, our physical characteristics store the information that identifies us as "us." This biometric information is becoming increasingly vital to the way we access and use technology. As more and more platform operators struggle with traffic from malicious bots on their servers, the burden of proof is on users, only this time they have to prove their very humanity and there is no court or jury to judge, but an invisible algorithmic system. In this paper, we critique the invisibilization of artificial intelligence policing. We argue that this practice obfuscates the underlying process of biometric verification. As a result, the new "invisible" tests leave no room for the user to question whether the process of questioning is even fair or ethical. We challenge this thesis by offering a juxtaposition with the science fiction imagining of the Turing test in Blade Runner to reevaluate the ethical grounds for reverse Turing tests, and we urge the research community to pursue alternative routes of bot identification that are more transparent and responsive.
Technological objects present themselves as necessary, only to become obsolete faster than ever before. This phenomenon has led to a population that experiences a plethora of technological objects and interfaces as they age, which become associated with certain stages of life and disappear thereafter. Noting the expanding body of literature within HCI about appropriation, our work pinpoints an area that needs more attention, “outdated technologies.” In other words, we assert that design practices can profit as much from imaginaries of the future as they can from reassessing artefacts from the past in a critical way. In a two-week fieldwork with 37 HCI students, we gathered an international collection of nostalgic devices from 14 different countries to investigate what memories people still have of older technologies and the ways in which these memories reveal normative and accidental use of technological objects. We found that participants primarily remembered older technologies with positive connotations and shared memories of how they had adapted and appropriated these technologies, rather than normative uses. We refer to this phenomenon as nostalgic reminiscence. In the future, we would like to develop this concept further by discussing how nostalgic reminiscence can be operationalized to stimulate speculative design in the present.
When dialogues with voice assistants (VAs) fall apart, users often become confused or even frustrated. To address these issues and related privacy concerns, Amazon recently introduced a feature allowing Alexa users to inquire about why it behaved in a certain way. But how do users perceive this new feature? In this paper, we present preliminary results from research conducted as part of a three-year project involving 33 German households. This project utilized interviews, fieldwork, and co-design workshops to identify common unexpected behaviors of VAs, as well as users’ needs and expectations for explanations. Our findings show that, contrary to its intended purpose, the new feature actually exacerbates user confusion and frustration instead of clarifying Alexa's behavior. We argue that such voice interactions should be characterized as explanatory dialogs that account for VA’s unexpected behavior by providing interpretable information and prompting users to take action to improve their current and future interactions.
Over the past two decades many low and middle income countries worldwide have started to extend the coverage and improve the functioning of public social protection systems. The research program on international policy diffusion provides empirical evidence that apart from domestic factors international interdependencies matter as well for national policy change in social protection. However, little is known about the governance structures mediating international policy diffusion in social protection.
Taste is a complex phenomenon that depends on the individual experience and is a matter of collective negotiation and mediation. On the contrary, it is uncommon to include taste and its many facets in everyday design, particularly online shopping for fresh food products. To realize this unused potential, we conducted two Co-Design workshops. Based on the participants’ results in the workshops, we prototyped and evaluated a click-dummy smart-phone app to explore consumers’ needs for digital taste depiction. We found that emphasizing the natural qualities of food products, external reviews, and personalizing features lead to a reflection on the individual taste experience. The self-reflection through our design enables consumers to develop their taste competencies and thus strengthen their autonomy in decision-making. Ultimately, exploring taste as a social experience adds to a broader understanding of taste beyond a sensory phenomenon.
An der Hochschule Bonn-Rhein-Sieg fand am Donnerstag, den 23.9.21 das erste Verbraucherforum für Verbraucherinformatik statt. Im Rahmen der Online-Tagesveranstaltung diskutierten mehr als 30 Teilnehmer:innen über Themen und Ideen rund um den Bereich Verbraucherdatenschutz. Dabei kamen sowohl Beiträge aus der Informatik, den Verbraucher- und Sozialwissenschaften sowie auch der regulatorischen Perspektive zur Sprache. Der folgende Beitrag stellt den Hintergrund der Veranstaltung dar und berichtet über Inhalte der Vorträge sowie Anknüpfungspunkte für die weitere Konstituierung der Verbraucherinformatik. Veranstalter waren das Institut für Verbraucherinformatik an der H-BRS in Zusammenarbeit mit dem Lehrstuhl IT-Sicherheit der Universität Siegen sowie dem Kompetenzzentrum Verbraucherforschung NRW der Verbraucherzentrale NRW e. V. mit Förderung des Bundesministeriums der Justiz und für Verbraucherschutz.
Trust is the lubricant of the sharing economy, especially in peer-to-peer carsharing where you leave a valuable good to a stranger in the hope of getting it backunscathed. Central mechanisms for handling this information gap nowadays are ratings and reviews of other users. The rising of connected car technology opens new possibilities to increase trust by collecting and providing e.g. driving behavior data. At the same time, this means an intrusion into the privacy of the user. Therefore, in this work we explore technological approaches that allow building trust without violating the privacy of individuals. We evaluate to what extent blockchain technology and smart contracts are suitable technologies to meet these challengesby setting upa prototype implementation of a block-chain-based carsharing approach. In this context, we present our research approachand evaluate the prototype in terms of trust and privacy.
Trust is the lubricant of the sharing economy. This is true especially in peer-to-peer carsharing, in which one leaves a highly valuable good to a stranger in the hope of getting it back unscathed. Nowadays, ratings of other users are major mechanisms for establishing trust. To foster uptake of peer-to-peer carsharing, connected car technology opens new possibilities to support trust-building, e.g., by adding driving behavior statistics to users' profiles. However, collecting such data intrudes into rentees' privacy. To explore the tension between the need for trust and privacy demands, we conducted three focus group and eight individual interviews. Our results show that connected car technologies can increase trust for car owners and rentees not only before but also during and after rentals. The design of such systems must allow a differentiation between information in terms of type, the context, and the negotiability of information disclosure.
Bei genauer Betrachtung heutiger Sharing Plattformen wie AirBnB, Uber, Drivy oder Fairleihen fällt auf, dass diese eines gemein haben. Als Plattformökonomien basieren sie auf mindestens zwei Nutzergruppen, Anbietern und Nachfragern für Güter oder Dienstleistungen. Ein Problem solcher zweioder mehrseitigen Märkte ist jedoch häufig, dass der Wertezuwachs, der durch die Nutzer generiert wird, nicht gleichmäßig unter der Plattform und den aktiven Nutzern verteilt wird, sondern meist ausschließlich als Gewinn an die Plattformen geht. Mit der Blockchain-Technologie könnte dieses Problem gelöst werden, indem der Informations- und Wertetransfer sicher und dezentral organisiert wird und viele Funktionen traditioneller Intermediäre dadurch obsolet werden. Diese Arbeit bietet einen Überblick über Anwendungsfelder und das Grundkonzept der Sharing Economy. Wir zeigen auf, wie sich Geschäftsmodelle und Infrastrukturen in einer Blockchain abbilden lassen, welche Potentiale eine Blockchain-basierte Infrastruktur bietet, wann diese in der Sharing Economy sinnvoll sein kann und welche Probleme dadurch gelöst werden können.
Softwareentwickelnde kleine und mittlere Unternehmen (KMU) erkennen zunehmend, dass die nutzerzentrierte Gestaltung ein wichtiges, oft entscheidendes Kriterium für die Benutzerfreundlichkeit und damit den Erfolg ihrer Produkte ist. Stolpersteine auf dem Weg zum erfolgreichen Usability- und User Experience-Engineering sind dabei allerdings häufig die Unkenntnis der passenden Methoden bzw. die Befürchtung zu hohen Aufwands an Ressourcen und von Verzögerungen in der Produktentwicklung (vgl. Stade et al., 2013; Reckin & Brandenburg, 2013; Woywode et al., 2011).
Konzept zum Umgang mit Prüfungsstress und Lernblockaden bei Studierenden in der Studieneingangsphase
(2021)
Validierung einer Web-Applikation zum Fern-Monitoring von Belastungs- und Erholungsparametern
(2020)
Simultan zur agilen Entwicklung einer Web-Applikation, die Parameter der Belastungs- und Beanspruchungssteuerung erfasst, wurden die implementierten Belastungs- und Erholungs-parameter an freiwilligen Testern/innen in der Praxis überprüft. Um sowohl die Applikation als auch die z.T. selbst entwickelten Kenngrößen auf ihre externe Validität hin zu bewerten, werden diese regressionsanalytisch bearbeitet.
Die im Jahre 2013 begonnene Workshop-Reihe „Usability in der betrieblichen Praxis“ auf der Mensch und Computer wird mit diesem Workshop als Aktivität des Mittelstand 4.0-Kompetenzzentrums Usability des BMWi fortgesetzt. Unter dem Stichwort „Digitalisierung“ ergeben sich neue Herausforderungen der Umsetzung von Usability und positiver User Experience (UUX) in der betrieblichen Praxis kleiner und mittelständischer Unternehmen (UUX-Praxis). Diese werden in vier Schwerpunktthemen im Workshop behandelt: „UUX - Erfolgsfaktor für Innovation und Zukunft der Arbeit“, „UUX und digitale Nutzerforschung“, „UUX und Agilität“ sowie „UUX - Unterstützung mittelständischer Unternehmensnetzwerke“. Der Workshop richtet sich an Entwicklungs- und UUX-Praktiker aus Softwareentwicklungs-, Anwendungs- und UUX-Beratungsunternehmen sowie Wissenschaftler, die sich mit Umsetzung der UUX-Praxis in Unternehmen beschäftigen.