[{"_id":"5590","department":[{"_id":"277"}],"user_id":"61579","keyword":["Identity and Access Management","Economic Decision Making","Information Systems","Information Security Investment","Decision Theory"],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:09:54Z","extern":"1","publication":"2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)","type":"conference","abstract":[{"lang":"eng","text":"Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview."}],"status":"public","file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"6040","file_name":"Towards an Economic Approach to IAMS.PDF","file_size":166015,"creator":"hsiemes","date_created":"2018-12-07T11:46:28Z","date_updated":"2018-12-13T15:09:54Z"}],"oa":"1","date_updated":"2022-01-06T07:02:04Z","date_created":"2018-11-14T11:27:20Z","author":[{"last_name":"Weishäupl","full_name":"Weishäupl, Eva","first_name":"Eva"},{"last_name":"Kunz","full_name":"Kunz, Michael","first_name":"Michael"},{"last_name":"Yasasin","full_name":"Yasasin, Emrah","first_name":"Emrah"},{"full_name":"Wagner, Gerit","last_name":"Wagner","first_name":"Gerit"},{"full_name":"Prester, Julian","last_name":"Prester","first_name":"Julian"},{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"full_name":"Pernul, Günther","last_name":"Pernul","first_name":"Günther"}],"title":"Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory","has_accepted_license":"1","year":"2015","citation":{"ama":"Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015.","chicago":"Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","ieee":"E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>, 2015.","apa":"Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>.","mla":"Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","bibtex":"@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015, title={Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}, booktitle={2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}, year={2015} }","short":"E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015."}},{"title":"Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation","date_created":"2019-05-13T14:15:36Z","author":[{"first_name":"James Kuria","last_name":"Kimotho","full_name":"Kimotho, James Kuria"},{"first_name":"Chritoph","last_name":"Sondermann-Wölke","full_name":"Sondermann-Wölke, Chritoph"},{"first_name":"Tobias","last_name":"Meyer","full_name":"Meyer, Tobias"},{"first_name":"Walter","full_name":"Sextro, Walter","id":"21220","last_name":"Sextro"}],"volume":4,"date_updated":"2022-01-06T07:04:21Z","citation":{"apa":"Kimotho, J. K., Sondermann-Wölke, C., Meyer, T., &#38; Sextro, W. (2013). Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation. <i>International Journal of Prognostics and Health Management</i>, <i>4</i>(2).","mla":"Kimotho, James Kuria, et al. “Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation.” <i>International Journal of Prognostics and Health Management</i>, vol. 4, no. 2, 2013.","short":"J.K. Kimotho, C. Sondermann-Wölke, T. Meyer, W. Sextro, International Journal of Prognostics and Health Management 4 (2013).","bibtex":"@article{Kimotho_Sondermann-Wölke_Meyer_Sextro_2013, title={Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation}, volume={4}, number={2}, journal={International Journal of Prognostics and Health Management}, author={Kimotho, James Kuria and Sondermann-Wölke, Chritoph and Meyer, Tobias and Sextro, Walter}, year={2013} }","ieee":"J. K. Kimotho, C. Sondermann-Wölke, T. Meyer, and W. Sextro, “Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation,” <i>International Journal of Prognostics and Health Management</i>, vol. 4, no. 2, 2013.","chicago":"Kimotho, James Kuria, Chritoph Sondermann-Wölke, Tobias Meyer, and Walter Sextro. “Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation.” <i>International Journal of Prognostics and Health Management</i> 4, no. 2 (2013).","ama":"Kimotho JK, Sondermann-Wölke C, Meyer T, Sextro W. Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation. <i>International Journal of Prognostics and Health Management</i>. 2013;4(2)."},"intvolume":"         4","year":"2013","issue":"2","quality_controlled":"1","language":[{"iso":"eng"}],"keyword":["maintenance decision","Bagged trees","Decision trees","PSO-SVM","Random forests"],"user_id":"55222","department":[{"_id":"151"}],"_id":"9808","status":"public","abstract":[{"text":"This study presents the methods employed by a team from the department of Mechatronics and Dynamics at the University of Paderborn, Germany for the 2013 PHM data challenge. The focus of the challenge was on maintenance action recommendation for an industrial machinery based on remote monitoring and diagnosis. Since an ensemble of data driven methods has been considered as the state of the art approach in diagnosis and prognosis, the first approach was to evaluate the performance of an ensemble of data driven methods using the parametric data as input and problems (recommended maintenance action) as the output. Due to close correlation of parametric data of different problems, this approach produced high misclassification rate. Event-based decision trees were then constructed to identify problems associated with particular events. To distinguish between problems associated with events that appeared in multiple problems, support vector machine (SVM) with parameters optimally tuned using particle swarm optimization (PSO) was employed. Parametric data was used as the input to the SVM algorithm and majority voting was employed to determine the final decision for cases with multiple events. A total of 165 SVM models were constructed. This approach improved the overall score from 21 to 48. The method was further enhanced by employing an ensemble of three data driven methods, that is, SVM, random forests (RF) and bagged trees (BT), to build the event based models. With this approach, a score of 51 was obtained . The results demonstrate that the proposed event based method can be effective in maintenance action recommendation based on events codes and parametric data acquired remotely from an industrial equipment.","lang":"eng"}],"type":"journal_article","publication":"International Journal of Prognostics and Health Management"},{"title":"GMM-based significance decoding","doi":"10.1109/ICASSP.2013.6638984","date_updated":"2022-01-06T06:51:07Z","author":[{"full_name":"Abdelaziz, Ahmed H.","last_name":"Abdelaziz","first_name":"Ahmed H."},{"first_name":"Steffen","full_name":"Zeiler, Steffen","last_name":"Zeiler"},{"first_name":"Dorothea","last_name":"Kolossa","full_name":"Kolossa, Dorothea"},{"first_name":"Volker","last_name":"Leutnant","full_name":"Leutnant, Volker"},{"first_name":"Reinhold","full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach"}],"date_created":"2019-07-12T05:26:53Z","year":"2013","citation":{"bibtex":"@inproceedings{Abdelaziz_Zeiler_Kolossa_Leutnant_Haeb-Umbach_2013, title={GMM-based significance decoding}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2013.6638984\">10.1109/ICASSP.2013.6638984</a>}, booktitle={Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on}, author={Abdelaziz, Ahmed H. and Zeiler, Steffen and Kolossa, Dorothea and Leutnant, Volker and Haeb-Umbach, Reinhold}, year={2013}, pages={6827–6831} }","short":"A.H. Abdelaziz, S. Zeiler, D. Kolossa, V. Leutnant, R. Haeb-Umbach, in: Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On, 2013, pp. 6827–6831.","mla":"Abdelaziz, Ahmed H., et al. “GMM-Based Significance Decoding.” <i>Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On</i>, 2013, pp. 6827–31, doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6638984\">10.1109/ICASSP.2013.6638984</a>.","apa":"Abdelaziz, A. H., Zeiler, S., Kolossa, D., Leutnant, V., &#38; Haeb-Umbach, R. (2013). GMM-based significance decoding. In <i>Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on</i> (pp. 6827–6831). <a href=\"https://doi.org/10.1109/ICASSP.2013.6638984\">https://doi.org/10.1109/ICASSP.2013.6638984</a>","ieee":"A. H. Abdelaziz, S. Zeiler, D. Kolossa, V. Leutnant, and R. Haeb-Umbach, “GMM-based significance decoding,” in <i>Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on</i>, 2013, pp. 6827–6831.","chicago":"Abdelaziz, Ahmed H., Steffen Zeiler, Dorothea Kolossa, Volker Leutnant, and Reinhold Haeb-Umbach. “GMM-Based Significance Decoding.” In <i>Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On</i>, 6827–31, 2013. <a href=\"https://doi.org/10.1109/ICASSP.2013.6638984\">https://doi.org/10.1109/ICASSP.2013.6638984</a>.","ama":"Abdelaziz AH, Zeiler S, Kolossa D, Leutnant V, Haeb-Umbach R. GMM-based significance decoding. In: <i>Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On</i>. ; 2013:6827-6831. doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6638984\">10.1109/ICASSP.2013.6638984</a>"},"page":"6827-6831","publication_identifier":{"issn":["1520-6149"]},"keyword":["Bayes methods","Gaussian processes","convolution","decision theory","decoding","noise","reverberation","speech coding","speech recognition","Bayesian decision rule","GMM","Gaussian mixture models","additive noise scenarios","automatic speech recognition systems","convolutive noise scenarios","decoding approach","mathematical framework","reverberant environments","significance decoding","speech feature estimation","uncertainty-of-observation techniques","Hidden Markov models","Maximum likelihood decoding","Noise","Speech","Speech recognition","Uncertainty","Uncertainty-of-observation","modified imputation","noise robust speech recognition","significance decoding","uncertainty decoding"],"language":[{"iso":"eng"}],"_id":"11716","user_id":"44006","department":[{"_id":"54"}],"abstract":[{"lang":"eng","text":"The accuracy of automatic speech recognition systems in noisy and reverberant environments can be improved notably by exploiting the uncertainty of the estimated speech features using so-called uncertainty-of-observation techniques. In this paper, we introduce a new Bayesian decision rule that can serve as a mathematical framework from which both known and new uncertainty-of-observation techniques can be either derived or approximated. The new decision rule in its direct form leads to the new significance decoding approach for Gaussian mixture models, which results in better performance compared to standard uncertainty-of-observation techniques in different additive and convolutive noise scenarios."}],"status":"public","type":"conference","publication":"Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on"},{"status":"public","abstract":[{"text":"If one of two events is attended to, it will be perceived earlier than a simultaneously occurring unattended event. Since 150 years, this effect has been ascribed to the facilitating influence of attention, also known as prior entry. Yet, the attentional origin of prior-entry effects¹ has been repeatedly doubted. One criticism is that prior-entry effects might be due to biased decision processes that would mimic a temporal advantage for attended stimuli. Although most obvious biases have already been excluded experimentally (e.g. judgment criteria, response compatibility) and prior-entry effects have shown to persist (Shore, Spence, & Klein, 2001), many other biases are conceivable, which makes it difficult to put the debate to an end. Thus, we approach this problem the other way around by asking whether prior-entry effects can be biased voluntarily. Observers were informed about prior entry and instructed to reduce it as far as possible. For this aim they received continuous feedback","lang":"eng"}],"type":"journal_article","publication":"Acta Psychologica","funded_apc":"1","language":[{"iso":"eng"}],"keyword":["intentions","events","attention","decision processes","Adult","Attention","Choice Behavior","Cues","Female","Humans","Intention","Judgment","Male","Middle Aged","Reaction Time","Time Perception","Visual Perception","Attention","Decision Making","Experiences (Events)","Intention"],"user_id":"42165","department":[{"_id":"424"}],"_id":"6064","citation":{"ieee":"K. Weiß and I. Scharlau, “At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions.,” <i>Acta Psychologica</i>, vol. 139, no. 1, pp. 54–64, 2012.","chicago":"Weiß, Katharina, and Ingrid Scharlau. “At the Mercy of Prior Entry: Prior Entry Induced by Invisible Primes Is Not Susceptible to Current Intentions.” <i>Acta Psychologica</i> 139, no. 1 (2012): 54–64.","ama":"Weiß K, Scharlau I. At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions. <i>Acta Psychologica</i>. 2012;139(1):54-64.","apa":"Weiß, K., &#38; Scharlau, I. (2012). At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions. <i>Acta Psychologica</i>, <i>139</i>(1), 54–64.","mla":"Weiß, Katharina, and Ingrid Scharlau. “At the Mercy of Prior Entry: Prior Entry Induced by Invisible Primes Is Not Susceptible to Current Intentions.” <i>Acta Psychologica</i>, vol. 139, no. 1, 2012, pp. 54–64.","bibtex":"@article{Weiß_Scharlau_2012, title={At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions.}, volume={139}, number={1}, journal={Acta Psychologica}, author={Weiß, Katharina and Scharlau, Ingrid}, year={2012}, pages={54–64} }","short":"K. Weiß, I. Scharlau, Acta Psychologica 139 (2012) 54–64."},"page":"54 - 64","intvolume":"       139","year":"2012","issue":"1","publication_status":"published","publication_identifier":{"issn":["0001-6918"]},"title":"At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions.","date_created":"2018-12-10T07:01:19Z","author":[{"last_name":"Weiß","full_name":"Weiß, Katharina","first_name":"Katharina"},{"last_name":"Scharlau","orcid":"0000-0003-2364-9489","id":"451","full_name":"Scharlau, Ingrid","first_name":"Ingrid"}],"volume":139,"date_updated":"2022-06-06T16:41:22Z"},{"oa":"1","date_updated":"2022-01-06T07:02:32Z","author":[{"last_name":"Finkbeiner","full_name":"Finkbeiner, Josef","first_name":"Josef"},{"first_name":"Christian","full_name":"Bodenstein, Christian","last_name":"Bodenstein"},{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"first_name":"Dirk","full_name":"Neumann, Dirk","last_name":"Neumann"}],"date_created":"2018-11-14T15:45:11Z","title":"Applying heuristic methods for job scheduling in storage markets","has_accepted_license":"1","year":"2010","citation":{"ama":"Finkbeiner J, Bodenstein C, Schryen G, Neumann D. Applying heuristic methods for job scheduling in storage markets. In: <i>18th European Conference on Information Systems (ECIS 2010)</i>. ; 2010.","chicago":"Finkbeiner, Josef, Christian Bodenstein, Guido Schryen, and Dirk Neumann. “Applying Heuristic Methods for Job Scheduling in Storage Markets.” In <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","ieee":"J. Finkbeiner, C. Bodenstein, G. Schryen, and D. Neumann, “Applying heuristic methods for job scheduling in storage markets,” in <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","apa":"Finkbeiner, J., Bodenstein, C., Schryen, G., &#38; Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In <i>18th European Conference on Information Systems (ECIS 2010)</i>.","short":"J. Finkbeiner, C. Bodenstein, G. Schryen, D. Neumann, in: 18th European Conference on Information Systems (ECIS 2010), 2010.","bibtex":"@inproceedings{Finkbeiner_Bodenstein_Schryen_Neumann_2010, title={Applying heuristic methods for job scheduling in storage markets}, booktitle={18th European Conference on Information Systems (ECIS 2010)}, author={Finkbeiner, Josef and Bodenstein, Christian and Schryen, Guido and Neumann, Dirk}, year={2010} }","mla":"Finkbeiner, Josef, et al. “Applying Heuristic Methods for Job Scheduling in Storage Markets.” <i>18th European Conference on Information Systems (ECIS 2010)</i>, 2010."},"_id":"5685","department":[{"_id":"277"}],"user_id":"61579","keyword":["Decision Support System","Algorithms","Optimization","Market Engineering"],"ddc":["000"],"extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:19:40Z","publication":"18th European Conference on Information Systems (ECIS 2010)","type":"conference","abstract":[{"lang":"eng","text":"In double-sided markets for computing resources an optimal allocation schedule among job offers and requests subject to relevant capacity constraints can be determined. With increasing storage demands and emerging storage services the question how to schedule storage jobs becomes more and more interesting. Since such scheduling problems are often in the class NP-complete an exact computation is not feasible in practice. On the other hand an approximation to the optimal solution can easily be found by means of using heuristics. The problem with this attempt is that the suggested solution may not be exactly optimal and is thus less satisfying. Considering the two above mentioned solution approaches one can clearly find a trade-off between the optimality of the solution and the efficiency to get to a solution at all. This work proposes to apply and combine heuristics in optimization to gain from both of their benefits while reducing the problematic aspects. Following this method it is assumed to get closer to the optimal solution in a shorter time compared to a full optimization."}],"status":"public","file":[{"date_created":"2018-12-11T15:21:06Z","creator":"hsiemes","date_updated":"2018-12-13T15:19:40Z","file_id":"6188","access_level":"open_access","file_name":"s1-ln7055316-1881058806-1939656818Hwf-1884822883IdV-5442784107055316PDF_HI0001.pdf","file_size":171336,"content_type":"application/pdf","relation":"main_file"}]},{"title":"A decision-theoretic foundation of IS business value research","oa":"1","date_updated":"2022-01-06T07:02:14Z","date_created":"2018-11-14T14:24:25Z","author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"},{"first_name":"Christian","last_name":"Bodenstein","full_name":"Bodenstein, Christian"}],"year":"2010","citation":{"ieee":"G. Schryen and C. Bodenstein, “A decision-theoretic foundation of IS business value research,” in <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","chicago":"Schryen, Guido, and Christian Bodenstein. “A Decision-Theoretic Foundation of IS Business Value Research.” In <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","ama":"Schryen G, Bodenstein C. A decision-theoretic foundation of IS business value research. In: <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>. ; 2010.","apa":"Schryen, G., &#38; Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>.","short":"G. Schryen, C. Bodenstein, in: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.","mla":"Schryen, Guido, and Christian Bodenstein. “A Decision-Theoretic Foundation of IS Business Value Research.” <i>Proceedings of the 18th European Conference on Information Systems (ECIS 2010)</i>, 2010.","bibtex":"@inproceedings{Schryen_Bodenstein_2010, title={A decision-theoretic foundation of IS business value research}, booktitle={Proceedings of the 18th European Conference on Information Systems (ECIS 2010)}, author={Schryen, Guido and Bodenstein, Christian}, year={2010} }"},"has_accepted_license":"1","keyword":["Decision theory","IT value","IS assessment","IS evaluation"],"ddc":["000"],"file_date_updated":"2018-12-13T15:20:37Z","extern":"1","language":[{"iso":"eng"}],"_id":"5632","department":[{"_id":"277"}],"user_id":"61579","abstract":[{"lang":"eng","text":"Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. Three research tasks are essential requisites on the path towards addressing this criticism: the synthesis of knowledge, the identification of lack of knowledge, and the proposition of paths for closing knowledge gaps. This paper considers each of these tasks by a) synthesizing key research findings based on a comprehensive literature review, b) identifying and unfolding key limitations of current research, and c) applying a decision-theoretic perspective, which opens new horizons to IS business value research and shows paths for overcoming the limitations. The adoption of this perspective results in a decision-theoretic foundation of IS business value research and includes the proposition of a consistent terminology and a research model that frames further research."}],"status":"public","file":[{"date_created":"2018-12-11T15:24:22Z","creator":"hsiemes","date_updated":"2018-12-13T15:20:37Z","access_level":"open_access","file_name":"IS business value - ECIS - Final Version.pdf","file_id":"6193","file_size":174368,"content_type":"application/pdf","relation":"main_file"}],"publication":"Proceedings of the 18th European Conference on Information Systems (ECIS 2010)","type":"conference"}]
