@article{21128,
  author       = {{Thommes, Kirsten and Johansson-Pajala, Rose-Marie and Gustaffson, Christine and Pekkarinen, Satu and Tuisku, Outi and Hennala, Lea and Melkas, Helinä and Hoppe, Julia Amelie}},
  issn         = {{1569-1101}},
  journal      = {{Gerontechnology}},
  title        = {{{Trust development in care robots by opinion leader in the society}}},
  doi          = {{10.4017/gt.2020.19.s.70024.4}},
  year         = {{2020}},
}

@article{17854,
  author       = {{Goldbach, Carina and Hoffmann, Christin and Hoppe, Julia Amelie and Pitz, Thomas and Thommes, Kirsten}},
  journal      = {{PloS ONE}},
  number       = {{7}},
  title        = {{{The fast and the furious—An experimental investigation of the pace of life and risky speed choice in traffic}}},
  doi          = {{https://doi.org/10.1371/journal.pone.0236589}},
  volume       = {{15 }},
  year         = {{2020}},
}

@article{17857,
  author       = {{Pekkarinen, Satu and Hennala, Lea and Tuisku, Outi and Gustafsson, Christine and Johansson-Pajala, Rose-Marie and Thommes, Kirsten and Hoppe, Julia Amelie and Melkas, Helina}},
  journal      = {{Futures}},
  title        = {{{Embedding care robots into society and practice: Socio-technical considerations}}},
  doi          = {{https://doi.org/10.1016/j.futures.2020.102593}},
  volume       = {{122}},
  year         = {{2020}},
}

@article{31802,
  abstract     = {{<jats:p> Much work on innovation strategy assumes or theorizes that competition in innovation elicits duplication of research and that disclosure decreases such duplication. We validate this empirically using the American Inventors Protection Act (AIPA), three complementary identification strategies, and a new measure of blocked future patent applications. We show that AIPA—intended to reduce duplication, through default disclosure of patent applications 18 months after filing—reduced duplication in the U.S. and European patent systems. The blocking measure provides a clear and micro measure of technological competition that can be aggregated to facilitate the empirical investigation of innovation, firm strategy, and the positive and negative externalities of patenting. </jats:p><jats:p> This paper was accepted by Joshua Gans, business strategy. </jats:p>}},
  author       = {{Lück, Sonja and Balsmeier, Benjamin and Seliger, Florian and Fleming, Lee}},
  issn         = {{0025-1909}},
  journal      = {{Management Science}},
  keywords     = {{Management Science and Operations Research, Strategy and Management}},
  number       = {{6}},
  pages        = {{2677--2685}},
  publisher    = {{Institute for Operations Research and the Management Sciences (INFORMS)}},
  title        = {{{Early Disclosure of Invention and Reduced Duplication: An Empirical Test}}},
  doi          = {{10.1287/mnsc.2019.3521}},
  volume       = {{66}},
  year         = {{2020}},
}

@article{11946,
  abstract     = {{Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a
lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1)
derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs
that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs
with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published
in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development
achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant
conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge
building activities to achieve their goals with respect to theory.}},
  author       = {{Schryen, Guido and Wagner, Gerit and Benlian, Alexander and Paré, Guy}},
  issn         = {{ 1529-3181}},
  journal      = {{Communications of the AIS}},
  keywords     = {{Literature review, knowledge development, knowledge building activities, knowledge-based typology, information systems research}},
  pages        = {{134--186}},
  title        = {{{A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field}}},
  doi          = {{10.17705/1CAIS.04607}},
  volume       = {{46}},
  year         = {{2020}},
}

@article{14985,
  author       = {{Schryen, Guido and Kliewer, Natalia and Fink, Andreas}},
  journal      = {{Business & Information Systems Engineering}},
  number       = {{1}},
  pages        = {{1--3}},
  title        = {{{High Performance Business Computing}}},
  doi          = {{10.1007/s12599-019-00622-2}},
  volume       = {{62}},
  year         = {{2020}},
}

@article{34115,
  author       = {{Haake, Claus-Jochen and Trockel, Walter}},
  issn         = {{0943-0180}},
  journal      = {{Homo Oeconomicus}},
  keywords     = {{Industrial and Manufacturing Engineering, Environmental Engineering}},
  number       = {{1-2}},
  pages        = {{1--6}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Introduction to the Special Issue “Bargaining”}}},
  doi          = {{10.1007/s41412-020-00104-x}},
  volume       = {{37}},
  year         = {{2020}},
}

@article{13770,
  author       = {{Karl, Holger and Kundisch, Dennis and Meyer auf der Heide, Friedhelm and Wehrheim, Heike}},
  journal      = {{Business & Information Systems Engineering}},
  number       = {{6}},
  pages        = {{467--481}},
  publisher    = {{Springer}},
  title        = {{{A Case for a New IT Ecosystem: On-The-Fly Computing}}},
  doi          = {{10.1007/s12599-019-00627-x}},
  volume       = {{62}},
  year         = {{2020}},
}

@article{17350,
  abstract     = {{Many countries have opened their health care markets to private for-profit providers, aiming to promote quality and choice for patients. The prices are regulated and providers compete in location and quality. We show that whereas opening a public hospital market typically raises quality, the private provider strategically locates towards the corner of the market to avoid costly quality competition. Social welfare depends on the size of the regulator's budget and on the altruism of the public provider. If the budget is large, high quality results and welfare is highest in a duopoly whenever entry is optimal. If the budget is small, quality levels in a duopoly mirror the quality level in a monopoly. It can be optimal for the regulator not to use the full budget.}},
  author       = {{Hehenkamp, Burkhard and Kaarbøe, Odvar M. }},
  journal      = {{Journal of Economic Behavior & Organization}},
  pages        = {{641--660}},
  title        = {{{Location Choice and Quality Competition in Mixed Hospital Markets}}},
  doi          = {{10.1016/j.jebo.2020.06.026}},
  volume       = {{177}},
  year         = {{2020}},
}

@inproceedings{17095,
  abstract     = {{In order to sustain their competitive advantage, data driven organizations must continue investing in business intelligence and analytics (BI&A) while mitigating inherent cost increases. Research shows that examining outlays by individual BI&A artifact (e.g. reports, analytics) is necessary, but introduction in practice is cumbersome and adoption is slow. BI&A service-oriented cost allocation (BIASOCA) represents an improvement to this situation. This approach enables to render the BI&A cost pool accountable and improves cost transparency, which leads to a higher BI&A penetration of economically viable applications in organizations. Against this background, this paper aims at designing and implementing BIASOCA in a medium-sized company. To record organizational impact and increase customer acceptance, this study is carried out as action design research (ADR). Our findings indicate improvements in BI&A management from working with consumers to locate cost savings and drivers. After invoicing, consumers’ BI&A awareness increased, releasing resources while also making a better understanding of BIASOCA necessary. We detail how to implement BIASOCA in a real-life setting and the challenges attendant in so doing. Our research contributes to theory and practice with a set of design principles highlighting, besides the accuracy of cost accounting, the importance of collaboration, model comprehensibility and strategic alignment.}},
  author       = {{Grytz, Raphael and Krohn-Grimberghe, Artus and Müller, Oliver}},
  booktitle    = {{European Conference on Information Systems}},
  title        = {{{Business Intelligence & Analytics Cost Accounting: An Action Design Research Approach}}},
  year         = {{2020}},
}

@article{17086,
  author       = {{Gries, Thomas and Redlin, Margarete}},
  issn         = {{1612-4804}},
  journal      = {{International Economics and Economic Policy}},
  pages        = {{923--944}},
  title        = {{{Trade and economic development: global causality and development- and openness-related heterogeneity}}},
  doi          = {{10.1007/s10368-020-00467-1}},
  volume       = {{17}},
  year         = {{2020}},
}

@article{13175,
  abstract     = {{Today, organizations must deal with a plethora of IT security threats and to ensure smooth and
uninterrupted business operations, firms are challenged to predict the volume of IT security vulnerabilities
and allocate resources for fixing them. This challenge requires decision makers to assess
which system or software packages are prone to vulnerabilities, how many post-release vulnerabilities
can be expected to occur during a certain period of time, and what impact exploits might have.
Substantial research has been dedicated to techniques that analyze source code and detect security
vulnerabilities. However, only limited research has focused on forecasting security vulnerabilities
that are detected and reported after the release of software. To address this shortcoming, we apply
established methodologies which are capable of forecasting events exhibiting specific time series
characteristics of security vulnerabilities, i.e., rareness of occurrence, volatility, non-stationarity,
and seasonality. Based on a dataset taken from the National Vulnerability Database (NVD), we use
the Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) to measure the forecasting
accuracy of single, double, and triple exponential smoothing methodologies, Croston's methodology,
ARIMA, and a neural network-based approach. We analyze the impact of the applied forecasting
methodology on the prediction accuracy with regard to its robustness along the dimensions of the
examined system and software package "operating systems", "browsers" and "office solutions" and
the applied metrics. To the best of our knowledge, this study is the first to analyze the effect
of forecasting methodologies and to apply metrics that are suitable in this context. Our results
show that the optimal forecasting methodology depends on the software or system package, as some
methodologies perform poorly in the context of IT security vulnerabilities, that absolute metrics
can cover the actual prediction error precisely, and that the prediction accuracy is robust within the
two applied forecasting-error metrics.}},
  author       = {{Yasasin, Emrah and Prester, Julian and Wagner, Gerit and Schryen, Guido}},
  issn         = {{0167-4048}},
  journal      = {{Computers & Security}},
  number       = {{January}},
  title        = {{{Forecasting IT Security Vulnerabilities - An Empirical Analysis}}},
  volume       = {{88}},
  year         = {{2020}},
}

@article{35723,
  abstract     = {{<jats:p>The development of renewable energies and smart mobility has profoundly impacted the future of the distribution grid. An increasing bidirectional energy flow stresses the assets of the distribution grid, especially medium voltage switchgear. This calls for improved maintenance strategies to prevent critical failures. Predictive maintenance, a maintenance strategy relying on current condition data of assets, serves as a guideline. Novel sensors covering thermal, mechanical, and partial discharge aspects of switchgear, enable continuous condition monitoring of some of the most critical assets of the distribution grid. Combined with machine learning algorithms, the demands put on the distribution grid by the energy and mobility revolutions can be handled. In this paper, we review the current state-of-the-art of all aspects of condition monitoring for medium voltage switchgear. Furthermore, we present an approach to develop a predictive maintenance system based on novel sensors and machine learning. We show how the existing medium voltage grid infrastructure can adapt these new needs on an economic scale.</jats:p>}},
  author       = {{Hoffmann, Martin W. and Wildermuth, Stephan and Gitzel, Ralf and Boyaci, Aydin and Gebhardt, Jörg and Kaul, Holger and Amihai, Ido and Forg, Bodo and Suriyah, Michael and Leibfried, Thomas and Stich, Volker and Hicking, Jan and Bremer, Martin and Kaminski, Lars and Beverungen, Daniel and zur Heiden, Philipp and Tornede, Tanja}},
  issn         = {{1424-8220}},
  journal      = {{Sensors}},
  keywords     = {{Electrical and Electronic Engineering, Biochemistry, Instrumentation, Atomic and Molecular Physics, and Optics, Analytical Chemistry}},
  number       = {{7}},
  publisher    = {{MDPI AG}},
  title        = {{{Integration of Novel Sensors and Machine Learning for Predictive Maintenance in Medium Voltage Switchgear to Enable the Energy and Mobility Revolutions}}},
  doi          = {{10.3390/s20072099}},
  volume       = {{20}},
  year         = {{2020}},
}

@phdthesis{35956,
  author       = {{Schwabl, Franziska}},
  publisher    = {{Eusl-Verlagsgesellschaft mbH}},
  title        = {{{Inszenierungen im digitalen Bild. Eine Rekonstruktion der Selfie-Praktiken Jugendlicher mittels der Dokumentarischen Bildinterpretation.}}},
  year         = {{2020}},
}

@article{35968,
  author       = {{Schwabl, Franziska}},
  journal      = {{bwp@Berufs-und Wirtschaftspädagogik – online}},
  pages        = {{1--24}},
  title        = {{{Fotografien als Zugang zur Lebenswelt Jugendlicher. Eine Analyse der digitalen Inszenierungspraktiken Jugendlicher im berufsschulischen Übergangssystem.}}},
  volume       = {{38}},
  year         = {{2020}},
}

@article{17862,
  author       = {{Schlangenotto, Darius and Schnedler, Wendelin and Vadovic, Radovan}},
  journal      = {{Games}},
  number       = {{3}},
  pages        = {{1----24}},
  title        = {{{Against All Odds: Tentative Steps Toward Efficient Information Sharing in Groups}}},
  volume       = {{11}},
  year         = {{2020}},
}

@article{18236,
  author       = {{Schnedler, Wendelin and Stephan, Nina Lucia}},
  issn         = {{1439-2917}},
  journal      = {{Schmalenbach Business Review}},
  pages        = {{347--364}},
  title        = {{{Revisiting a Remedy Against Chains of Unkindness}}},
  doi          = {{10.1007/s41464-020-00090-2}},
  year         = {{2020}},
}

@inproceedings{35660,
  abstract     = {{Effective customer loyalty programs are essential for every company. Small and medium sized brick-and- mortar stores, such as bakeries, butcher and flower shops, often share a common overarching loyalty program, organized by a third-party provider. Furthermore, these small shops have limited resources and often cannot afford complex BI tools. Out of these reasons we investigated how traditional brick-and- mortar stores can benefit from an expansion of service functionalities of a loyalty card provider. To answer this question, we cooperated with a cross-industry customer loyalty program in a polycentric region. The loyalty program was transformed from simple card-based solution to a mobile app for customers and a web- application for shop owners. The new solution offers additional BI services for performing data analytics and strengthening the position of brick-and-mortar stores. Participating shops can work together in order to increase sales and align marketing campaigns. Therefore, shopping data from 12 years, 55 shops, and 19,000 customers was analyzed.}},
  author       = {{Kucklick, Jan-Peter and Kamm, Michael Reiner and Schneider, Johannes and vom Brocke, Jan}},
  booktitle    = {{Proceedings of the 53rd Hawaii International Conference on System Sciences}},
  keywords     = {{brick-and-mortar stores, business intelligence, case study, loyalty program}},
  title        = {{{Extending Loyalty Programs with BI Functionalities A Case Study for Brick-and-Mortar Stores}}},
  year         = {{2020}},
}

@article{35662,
  abstract     = {{While the analysis and usage of data are increasing in importance, the application of sophisticated BI solutions in small stores is limited by available technical capabilities and financial resources. This study investigates how brick-and-mortar stores can benefit from an expansion of service functionalities of a cross-industry loyalty card provider. Digitalizing the loyalty program created new opportunities, while the analysis of shopping data of 13 years, 19,000 customers, and 55 shops empowered data-based decision support.}},
  author       = {{Kamm, Michael Reiner and Kucklick, Jan-Peter and Schneider, Johannes and vom Brocke, Jan}},
  issn         = {{1058-0530}},
  journal      = {{Information Systems Management}},
  keywords     = {{Customer loyalty, case study, brick-and-mortar stores, business intelligence, loyalty programs}},
  number       = {{4}},
  pages        = {{270--286}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Data mining for small shops: Empowering brick-and-mortar stores through BI functionalities of a loyalty program1}}},
  doi          = {{10.1080/10580530.2020.1855486}},
  volume       = {{38}},
  year         = {{2020}},
}

@techreport{35089,
  author       = {{Ebert, Michael and Kadane, Joseph (Jay) B. and Simons, Dirk and Stecher, Jack Douglas}},
  issn         = {{1556-5068}},
  title        = {{{Information Design in Coordination Games with Risk Dominant Equilibrium Selection}}},
  doi          = {{10.2139/ssrn.3564451}},
  year         = {{2020}},
}

