005 Computerprogrammierung, Programme, Daten
Refine
H-BRS Bibliography
- no (195) (remove)
Departments, institutes and facilities
Document Type
- Conference Object (133)
- Article (39)
- Contribution to a Periodical (7)
- Book (monograph, edited volume) (6)
- Part of a Book (6)
- Lecture (2)
- Doctoral Thesis (1)
- Master's Thesis (1)
Year of publication
Keywords
- Cloud (4)
- Global Software Engineering (4)
- HTTP (4)
- REST (4)
- security (4)
- Offshoring (3)
- Privacy (3)
- Qualitative research (3)
- SOA (3)
- Security (3)
- Web (3)
- web caching (3)
- web services (3)
- Business Ethnography (2)
- Claim personal data (2)
- Cloud Security (2)
- Data takeout (2)
- GDPR (2)
- Global Software Development (2)
- Human Factors In Software Design (2)
- Java <Programmiersprache> (2)
- Malware analysis (2)
- Methodology (2)
- Python <Programmiersprache> (2)
- Software (2)
- TLS (2)
- Usable Security (2)
- WS-Security (2)
- end user development (2)
- software engineering (2)
- usable privacy (2)
- 3D Printer (1)
- API usability (1)
- Ad Hoc Kommunikation (1)
- Adaptive Media Streaming (1)
- Adaptive Streaming (1)
- Advance Encryption Standard (1)
- Affective computing (1)
- Alternde Gesellschaft (1)
- Analysis (1)
- Appropriation Infras-tructure (1)
- Articulation Work (1)
- Authentication (1)
- Bewegungsmotivation (1)
- Botnet tracking (1)
- Botnets (1)
- Browser cache (1)
- Cache Poisoning (1)
- Certificates (1)
- Cipher Block Chain (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- CoAP (1)
- Collaborative design (1)
- Community (1)
- Computer Aided Software Engineering (1)
- Computer Security (1)
- Computer Support (1)
- Computing Milieux (1)
- Conficker (1)
- Conformance Testing (1)
- Constructionism (1)
- Context (1)
- Cooperative Work (1)
- Countermeasures (1)
- Crisis management (1)
- Cyber Attacks (1)
- Cyber Security (1)
- Cybercrime (1)
- Cybercrime Legislation (1)
- DASH (1)
- DNSSEC (1)
- DSGVO (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Data collection (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Denial of Service (1)
- Deployment (1)
- Design Case Study (1)
- Design patterns (1)
- Difference-coding (1)
- Digital Energy Management (1)
- Digital Plumbing (1)
- Digital signatures (1)
- Digitaler Konsum (1)
- Disclosive ethics (1)
- Distribute Software Development (1)
- ELSI (1)
- Ecosystems (1)
- Elderly (1)
- Employment (1)
- End-User Development (1)
- Evaluation (1)
- File carving (1)
- Food (1)
- Fragmented files (1)
- Frontend architecture (1)
- Full-text Search (1)
- Gesundheit (1)
- Grassroots (1)
- HCI (1)
- HFI (1)
- HTML5 (1)
- HTTPS (1)
- Hauswirtschaft (1)
- Host-Based Code Injection Attacks (1)
- Human computer interaction (1)
- Human factors (1)
- Human-Robot-Interaction (HRI) (1)
- ICT (1)
- IIoT (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Infrastructuring (1)
- Infrastruktur (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Internet Technology (1)
- Internet of Things (1)
- Interviews (1)
- IoT (1)
- IoT services security (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- Learning (1)
- Learning Environments (1)
- Legal Design (1)
- Legal metrology (1)
- Live Streaming (1)
- Malware (1)
- Malware Detection (1)
- Management (1)
- Memory forensics (1)
- Mental Models (1)
- Message Authentication (1)
- Microservices (1)
- Mobility (1)
- Mobiltelefone (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Nachhaltigkeit (1)
- Nearshoring (1)
- Organizations (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Performance (1)
- Persuasive Systeme (1)
- Phishing (1)
- Platform economy (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Privatsphäre (1)
- Programmer Workbench (1)
- Public Key Infrastructure (1)
- Push-based Streaming (1)
- RACS (1)
- REST security (1)
- Research Trajectories (1)
- Research methods (1)
- Resilienz (1)
- Restful Web Services (1)
- SELMA (1)
- SID (1)
- SME (1)
- SOAP (1)
- SOS calls (1)
- SaaS (1)
- Secure Cloud Storage (1)
- Secure data transfer (1)
- Security APIs (1)
- Security Protocol (1)
- Sensorbasierte Systeme (1)
- Service-Oriented Architecture (1)
- Small to medium-sized enterprises (1)
- Smart metering (1)
- Sociable Technologies (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Socio Informatics (1)
- Software Development (1)
- Software Security (1)
- Stuxnet (1)
- Sustainability (1)
- Sustainable HCI (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Transportation (1)
- UI-Dressing (1)
- URI (1)
- Usable Privacy (1)
- Usage Experience (1)
- User-Centered Design (1)
- Verbraucherforschung (1)
- Verbraucherinformatik (1)
- Video (1)
- Warnings (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Security (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- WebSockets (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Work (1)
- Workflow (1)
- XML (1)
- XML Security (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XSpRES (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- appropriation (1)
- attacks (1)
- breakdowns (1)
- caching (1)
- cooperation (1)
- cryptographic apis (1)
- culture (1)
- culture of participation (1)
- data visualization (1)
- design probe (1)
- developer console (1)
- digital fabrication (1)
- distributed systems (1)
- eco-feedback (1)
- emergency response (1)
- emotion recognition (1)
- end-to-end security (1)
- ethnographically informed studies (1)
- focus groups (1)
- humanoidrobot (1)
- knowledge management (1)
- knowledge sharing practices (1)
- maker communities (1)
- mobile computing (1)
- organizational management and coordination (1)
- participatory design (1)
- pervasive computing (1)
- privacy preferences (1)
- privacy settings (1)
- process infrastructure (1)
- project management (1)
- prosumption (1)
- qualitative research methods (1)
- security warning design (1)
- services (1)
- sharing (1)
- signature (1)
- small enterprises (1)
- smart meters (1)
- social robots (1)
- software development (1)
- sustainability (1)
- technological platform (1)
- usability (1)
- validity (1)
- visibility (1)
- visualization (1)
- voice interaction (1)
- web services security (1)
Cancer is one of the leading causes of death worldwide [183], with lung tumors being the most frequent cause of cancer deaths in men as well as one of the most common cancers diagnosed in woman [40]. As symptoms often arise in advanced stages, an early diagnosis is especially important to ensure the best and earliest possible treatment. In order to achieve this, Computed Tomography (CT) scans are frequently used for tumor detection and diagnosis. We will present examples of publicly available CT image data of lung cancer patients and discuss possible methods to realize an automatic system for automated cancer diagnosis. We will also look at the recent SPIE-AAPM Lung CT Challenge [10] data set in detail and describe possible methods and challenges for image segmentation and classification based on this data set.
Das Kernanliegen des Datenschutzes ist es, natürliche Personen vor nachteiligen Effekten der Speicherung und Verarbeitung der sie betreffenden Daten zu schützen. Aber viele Personen scheinen gar nicht geschützt werden zu wollen. Im Gegenteil, viele Endanwender willigen “freiwillig“ – bewusst oder unbewusst – in eine umfassende Verarbeitung ihrer personenbezogenen Daten ein. Warum tun Menschen dies? Es werden verschiedene Ursachen diskutiert (beispielsweise in [79]), hierzu gehören Uninformiertheit, mangelnde Sensibilität, das Gefühl der Hilflosigkeit, mangelnde Zahlungsbereitschaft und mangelnde Alternativen. Auch wenn dies in Einzelfällen zutrifft, so gibt es oft sehr wohl datenschutzfreundliche Alternativen. Beispielsweise existiert zu WhatsApp (als Instant Messaging App) die Alternative Threema. Threema gilt als EU-DS-GVO-konform und funktional durchaus mit WhatsApp vergleichbar [62]. Allerdings ist inzwischen die aktuelle Netzwerkgröße ein entscheidendes Auswahlkriterium: Im Januar 2018 hatte Threema 4,5 Millionen Nutzer [172], WhatsApp dagegen 1,5 Milliarden [171]. Dies ist ein Indiz dafür, dass WhatsApp sich quasi zum De-facto-Standard entwickelt hat und es für die einzelne Person nur schwer möglich ist, viele andere “zum Wechsel auf ein anderes Produkt zu bewegen. [. . . ] Bei Diensten mit Nutzerzahlen im Milliardenbereich kann von ’Freiwilligkeit’ nur noch bedingt gesprochen werden.“ [9]
Open-Source Software spielt sowohl zur Ausgestaltung von Lehr- und Lernszenarien (bspw. Organisation mit Editoren und Groupware, Kollaboration und Kommunikation via Chats und Webblogs), als auch für die Umsetzung von Forschunsprojekten (zum Beispiel Auswertung großer Datenbestände, Erprobung realer Situationen in vituellen Laboren, Evaluation neuer Oberflächenentwicklungen) eine wichtige Rolle. Um eine bestmögliche Passung der Software herzustellen, erfolgt Softwareentwicklung im Hochschulbereich entweder forschungsprojektbezogen oder Disziplin- und Einrichtungsübergreifend.
Software offshoring has been established as an important business strategy over the last decade. While research on such forms of Global Software Development (GSD) has mainly focused on the situation of large enterprises, small enterprises are increasingly engaging in offshoring, too. Representing the biggest share of the German software industry, small companies are known to be important innovators and market pioneers. They often regard their flexibility and customer-orientation as core competitive advantages. Unlike large corporations, their small size allows them to adopt software development approaches that are characterized by a high agility and flat hierarchies. At the same time, their distinct strategies make it unlikely that they can simply adopt management strategies that were developed for larger companies.
Flexible development approaches like the ones preferred by small corporations have proven to be problematic in the context of offshoring, as their strong dependency on constant communication is strongly affected by the various barriers of international cooperation between companies. Cooperating closely over companies’ borders in different time zones and in culturally diverse teams poses complex obstacles for flexible management approaches. It is still a matter of discussion in fields like Software Engineering and Computer Supported Cooperative Work how these obstacles can be tackled and how they affect companies in the long term. Hence, it is agreed that we need a more detailed understanding of distributed software development practices in order to come to feasible technological and organizational solutions.
This dissertation presents results from two ethnographically-informed case studies of software offshoring in small German enterprises. By adopting Anselm Strauss’ concept of articulation work, we want to deepen the understanding of managing distributed software development in flexible, customer-oriented organizations. In doing so, we show how practices of coordinating inter-organizational software development are closely related to aspects of organizational learning in small enterprises. By means of interviews with developers and project managers from both parties of the cooperation, we do not only take into account the multiple perspectives of the cooperation, but also include the socio-cultural background of international software development projects into our analysis.