005 Computerprogrammierung, Programme, Daten
Refine
H-BRS Bibliography
- yes (130) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (63)
- Fachbereich Wirtschaftswissenschaften (58)
- Institut für Verbraucherinformatik (IVI) (48)
- Institut für Cyber Security & Privacy (ICSP) (42)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (7)
- Fachbereich Ingenieurwissenschaften und Kommunikation (3)
- Graduierteninstitut (1)
- Institut für funktionale Gen-Analytik (IFGA) (1)
- Institute of Visual Computing (IVC) (1)
- Zentrum für Ethik und Verantwortung (ZEV) (1)
Document Type
- Conference Object (54)
- Article (37)
- Part of a Book (15)
- Book (monograph, edited volume) (6)
- Working Paper (4)
- Conference Proceedings (3)
- Research Data (2)
- Master's Thesis (2)
- Report (2)
- Study Thesis (2)
Year of publication
Keywords
- Usable Security (8)
- GDPR (6)
- Big Data Analysis (4)
- Risk-based Authentication (4)
- Usable Privacy (4)
- usable privacy (3)
- Artificial Intelligence (2)
- Authentication (2)
- Authentication features (2)
- Consumer Informatics (2)
- Data literacy (2)
- Datenmanagement (2)
- Digital Sovereignty (2)
- Digitalisierung (2)
- Machine Learning (2)
- Password (2)
- Practice Theory (2)
- Privacy (2)
- Public Transport (2)
- Qualitative Study (2)
- Risk-based Authentication (RBA) (2)
- Smart Home (2)
- User Experience (2)
- Verkehrsmittelwahl (2)
- Voice Assistants (2)
- structural equation modeling (2)
- ACPYPE (1)
- API Documentation (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Accounting practices (1)
- Administrative work (1)
- Adoption (1)
- Adoption Factors (1)
- Advances in Design Science Research (1)
- Agent-Based Modeling (1)
- Agilität (1)
- Appropriation (1)
- Attention mechanism (1)
- Authentifikation (1)
- Autonomes Fahren (1)
- Autonomous Driving (1)
- Big Data (1)
- Biometric data (1)
- Black-box models (1)
- CAE metadata structures (1)
- CC (1)
- Carbohydrate (1)
- Chen (1)
- Chloroquine (1)
- Climate Risks (1)
- Cloud (1)
- Clusteranalyse (1)
- Co-performance (1)
- Common Criteria (1)
- Computersicherheit (1)
- Conceptual model (1)
- Connected Car (1)
- Consumer protection (1)
- Content Security Policies (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Creative Commons (1)
- Curse of dimensionality (1)
- Data (1)
- Data Integration (1)
- Data Literacy (1)
- Data Protection Officer (1)
- Data Science (1)
- Data Storytelling (1)
- Data Storytelling Process (1)
- Data protection by design (1)
- Data visualization (1)
- Data-Storytelling-Prozess (1)
- Datenbanken (1)
- Datenbanksysteme (1)
- Datenkompetenz (1)
- Datenmodellierung (1)
- Datenwissenschaft (1)
- Deep Learning (1)
- Design (1)
- Design Probe (1)
- Deskriptive Datenanalyse (1)
- Developer Centered Security (1)
- Digital Ecosystem (1)
- Digital Receipt (1)
- Digitale Lehre (1)
- Digitalisierungsstrategie (1)
- Dimensionsreduktion (1)
- Domestic Robots (1)
- Domestic Technology (1)
- Domestic workplace studies (1)
- E-Health (1)
- ERM (1)
- Effective purpose specification (1)
- Electric micromobility (1)
- Electronic Data Capture (EDC) (1)
- Embodied knowledge (1)
- Empirical Study (1)
- Employee data protection (1)
- Engaging Experience (1)
- Entity-Relationship-Datenmodell (1)
- Entity-Relationship-Modell (1)
- Entitätsmengen-Beziehungs-Modell (1)
- Environment Perception (1)
- Eriodictyol (1)
- Ethnographic Research (1)
- Expert Interviews (1)
- Fake review cues (1)
- Fake review detection (1)
- Financial practices (1)
- Folk theories (1)
- Food (1)
- Food Practices (1)
- Food literacy (1)
- Force field (1)
- Geo-tagging (1)
- Geschäftsmodell (1)
- Glycam06 (1)
- Gromacs (1)
- HCI (1)
- HTTP (1)
- Header whitelisting (1)
- Highly Automated Driving (1)
- Hochschullehre (1)
- Household management (1)
- Human autonomy (1)
- Human computer interaction (HCI) (1)
- Human review fraud detection (1)
- Human-Centered Robotics (1)
- Human-centered computing (1)
- Human-food interaction (1)
- Human–Food Interaction (1)
- Hydroxychloroquine (1)
- ISO 27000 (1)
- IT-Management (1)
- IT-Sicherheitsanforderungen (1)
- IT-Strategie (1)
- Implementation Challenges (1)
- Implementation Model (1)
- Individual Empowerment (1)
- Integrated Household Information System (1)
- Integration Platform as a Service (1)
- Intelligent Process Automation (1)
- Interactive Artifacts (1)
- Interbank Market (1)
- Intermediaries (1)
- Interpretability (1)
- Invisible AI (1)
- IoT (1)
- Java <Programmiersprache> (1)
- KMU (1)
- Labordaten (1)
- Large-Scale Online Services (1)
- Last mile problem (1)
- Lead userness (1)
- Learning and Adaptive Systems (1)
- Liquidity Crises (1)
- Living Lab (1)
- Login (1)
- MLOps Tools (1)
- MLR (1)
- Marketplaces (1)
- Mental models (1)
- Microsoft (1)
- Misconception (1)
- Mixed / augmented reality (1)
- Mobile devices (1)
- Model surrogation (1)
- Modellierung (1)
- Multimodal Mobility (1)
- Nonbonded scaling factor (1)
- Nutzerakzeptanz (1)
- OER (1)
- Online Services (1)
- Open Access (1)
- Open Educational Ressources (1)
- OpenStack (1)
- Opinion scam (1)
- PHR (1)
- Passwort (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Personal Health Record (1)
- Policy (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy patterns (1)
- Prudential Regulation (1)
- Public Cloud Services (1)
- Python <Programmiersprache> (1)
- RBAR (1)
- REDCap (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Relationenmodell (1)
- Relative Energies (1)
- Relativer Mehrwert (1)
- Repositories (1)
- Requirements Engineering (1)
- Review scam (1)
- Risk Perception (1)
- Risk-Based Account Recovery (1)
- Robotic Process Automation (1)
- SAML (1)
- SARS-CoV-2 (1)
- SOAP (1)
- Safety (1)
- Scholarly workbench (1)
- Schutzobjekte (1)
- Scientific workbench (1)
- Secure Coding Practices (1)
- Selbstfahrende Autos (1)
- Selbstfahrtechnik (1)
- Self-Driving Cars (1)
- Self-driving (1)
- Semantic gap (1)
- Service Design (1)
- Shared Autonomous Vehicles (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Silmitasertib (1)
- Smartphones (1)
- Software as a Service (1)
- Sustainability (1)
- Taste (1)
- Trust (1)
- Two-factor Authentication (1)
- UXD (1)
- Umfrage (1)
- Usable Security and Privacy (1)
- User Requirements (1)
- User-Centered Design (1)
- User-perspective (1)
- Valproic acid (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Verification systems (1)
- Virtual Reality (1)
- Voight-Kampff test (1)
- Vorgehensmodell (1)
- Web (1)
- Well-being (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- Zeitreihenanalyse (1)
- accelerometer (1)
- carsharing (1)
- co-design (1)
- conformations (1)
- connected car (1)
- consumer informatics (1)
- critical consumerism (1)
- data literacy (1)
- data management (1)
- data science (1)
- data science canvas (1)
- database systems (1)
- decision support system (1)
- deep learning (1)
- democratization (1)
- digital platform ecosystem (1)
- drugs (1)
- employee privacy (1)
- ethics (1)
- ethnography (1)
- factor analysis (1)
- food waste (1)
- higher education (1)
- human-centred design (1)
- informational self-determination (1)
- innovative work behavior (1)
- intervention mechanisms (1)
- knowledge graphs (1)
- latent class analysis (1)
- mental models (1)
- mobility intelligence (1)
- multi-sensory (1)
- natural language processing (1)
- ontology (1)
- open educational resources (OERs) (1)
- optimized geometries (1)
- posture analysis (1)
- privacy at work (1)
- privacy by design (1)
- question answering (1)
- reCAPTCHA (1)
- recommender systems (1)
- right to access (1)
- security (1)
- security and privacy literacy (1)
- semantic technologies (1)
- shared mobility (1)
- simulation process (1)
- small molecule (1)
- spinal posture (1)
- sustainable mobility (1)
- text mining (1)
- transfer learning (1)
- transparency-enhancing technologies (1)
- usability (1)
- usable privacy controls (1)
- usable secure email (1)
- user interface design (1)
- user journey (1)
- wearable sensor (1)
- wine (1)
The digitization of financial activities in consumers' lives is increasing, and the digitalization of invoicing processes is expected to play a significant role, although this area is not well understood regarding the private sector. Human-Computer Interaction (HCI) and Computer Supported Cooperative Work (CSCW) research have a long history of analyzing the socio-material and temporal aspects of work practices that are relevant for the domestic domain. The socio-material structuring of invoicing work and the working styles of consumers must be considered when designing effective consumer support systems. In this ethnomethodologically-informed, design-oriented interview study, we followed 17 consumers in their daily practices of dealing with invoices to make the invisible administrative work involved in this process visible. We identified and described the meaningful artifacts that were used in a spatial-temporal process within various storage locations such as input, reminding, intermediate (for postponing cases) buffers, and archive systems. Furthermore, we identified three different working styles that consumers exhibited: direct completion, at the next opportunity, and postpone as far as possible. This study contributes to our understanding of household economics and domestic workplace studies in the tradition of CSCW and has implications for the design of electronic invoicing systems.
The European General Data Protection Regulation requires the implementation of Technical and Organizational Measures (TOMs) to reduce the risk of illegitimate processing of personal data. For these measures to be effective, they must be applied correctly by employees who process personal data under the authority of their organization. However, even data processing employees often have limited knowledge of data protection policies and regulations, which increases the likelihood of misconduct and privacy breaches. To lower the likelihood of unintentional privacy breaches, TOMs must be developed with employees’ needs, capabilities, and usability requirements in mind. To reduce implementation costs and help organizations and IT engineers with the implementation, privacy patterns have proven to be effective for this purpose. In this chapter, we introduce the privacy pattern Data Cart, which specifically helps to develop TOMs for data processing employees. Based on a user-centered design approach with employees from two public organizations in Germany, we present a concept that illustrates how Privacy by Design can be effectively implemented. Organizations, IT engineers, and researchers will gain insight on how to improve the usability of privacy-compliant tools for managing personal data.
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Projekte des maschinellen Lernens (ML), insbesondere im Bereich der Zeitreihenanalyse, gewinnen heute zunehmend an Bedeutung. Die Bereitstellung solcher Projekte in einer Produktionsumgebung mit dem gleichen Automatisierungsgrad wie bei klassischen Softwareprojekten ist ein komplexes Unterfangen. Die Umsetzung in Produktionsumgebungen erfordert neben klassischen DevOps auch Machine Learning Operation (MLOps) Technologien und Werkzeuge. Ziel dieser Studie ist es, einen umfassenden Überblick über verfügbare MLOps Tools zu bieten und einen spezifischen Techstack für Zeitreihen ML Projekte zu entwickeln. Es werden aktuelle Trends und Werkzeuge im Bereich MLOps durch eine multivokale Literaturrecherche (MLR) untersucht und analysiert. Die Studie identifiziert passende MLOps Werkzeuge und Methoden für die Zeitreihenanalyse und präsentiert eine spezifische Implementierung einer MLOps Pipeline für die Aktienkursprognose des S&P 500. MLOps und DevOps Tools nehmen eine essenzielle Rolle bei der effektiven Konstruktion und Verwaltung von ML Pipelines ein. Bei der Auswahl geeigneter Werkzeuge ist stets eine spezifische Anpassung an die jeweiligen Projektanforderungen erforderlich. Die Bereitstellung einer detaillierten Darstellung der aktuellen MLOps Tool Landschaft erweist sich hierbei als wertvolle Ressource, die es Entwicklern ermöglicht, die Effizienz und Effektivität ihrer ML Projekte zu optimieren.
Angesichts der raschen Entwicklungen und der Besonderheiten von Softwaresystemen, welche Künstliche Intelligenz (KI) nutzen, ist ein angepasstes Requirements Engineering (RE) erforderlich. Die spezifischen Anforderungen von KI-Projekten müssen dabei erkannt und angegangen werden. Hierfür wird eine systematische Überprufung bestehender Herausforderungen des RE in KI-Projekten durchgeführt. Darauf aufbauend werden neue RE-Ansätze und Empfehlungen präsentiert, die auf die Datensicht von KI-Projekten abzielen. Mithilfe der Analyse bestehender Lösungsansatze, Methoden, Frameworks und Tools soll aufgezeigt werden, inwiefern die Herausforderungen im RE bewältigt werden können. Noch bestehende Lücken im Forschungsstand werden identifiziert und aufgezeigt.
Integrating physical simulation data into data ecosystems challenges the compatibility and interoperability of data management tools. Semantic web technologies and relational databases mostly use other data types, such as measurement or manufacturing design data. Standardizing simulation data storage and harmonizing the data structures with other domains is still a challenge, as current standards such as the ISO standard STEP (ISO 10303 ”Standard for the Exchange of Product model data”) fail to bridge the gap between design and simulation data. This challenge requires new methods, such as ontologies, to rethink simulation results integration. This research describes a new software architecture and application methodology based on the industrial standard ”Virtual Material Modelling in Manufacturing” (VMAP). The architecture integrates large quantities of structured simulation data and their analyses into a semantic data structure. It is capable of providing data permeability from the global digital twin level to the detailed numerical values of data entries and even new key indicators in a three-step approach: It represents a file as an instance in a knowledge graph, queries the file’s metadata, and finds a semantically represented process that enables new metadata to be created and instantiated.