@book{63673,
  abstract     = {{Unter welchen historischen Bedingungen und mit welchen Auswirkungen wurde der Computer zum Bestandteil des Wohnalltags? Und wie verhält es sich dabei mit Praktiken des Wohnens und Wohnungseinrichtens? Die Beiträger*innen werfen einen Blick auf die Computerisierung des Zuhauses und zeigen, wie sie sich vollzieht. Der Fokus ihrer Analysen liegt einerseits darauf, wie Arbeit und Assistenz das Wohnen im Hinblick auf den Computer prägen. Andererseits denken sie den Computer aus der Perspektive der Wohnumgebungen neu und geben so einen kompakten medienhistorischen Überblick über den Beginn des Smart Homes.}},
  editor       = {{Bartz, Christina and Cyrkel, Jakob and Hüttemann, Felix and Miggelbrink, Monique}},
  isbn         = {{978-3-8376-7115-5}},
  keywords     = {{Mediengeschichte, Digitale Medien, Design, Medien, Medienwissenschaft, Medienästhetik, Mediensoziologie, Medientheorie, Medienphilosophie, Architektur, Technikgeschichte, Technik, Kultur, Kulturwissenschaft, Kulturgeschichte, Kulturtheorie, Popkultur, Geschichte des 20. Jahrhunderts, Geschichtswissenschaft, Kultursoziologie, Gender Studies, Mode, Klang, Cultural Studies, Informatik}},
  pages        = {{336}},
  publisher    = {{transcript Verlag}},
  title        = {{{ComputerWohnen. Zur Geschichte des Computers in Wohnumgebungen zwischen Arbeit und Assistenz}}},
  doi          = {{10.14361/9783839471159}},
  volume       = {{66}},
  year         = {{2026}},
}

@article{64916,
  abstract     = {{The joining of dissimilar materials, such as steel and aluminum, entails significant challenges during thermal curing processes due to differing coefficients of thermal expansion. This study addresses the formation of “viscous fingering” instabilities in structural adhesive joints, which are induced by thermally driven relative displacements during the liquid phase of the adhesive. Using a component-like specimen “bridge specimen,” the dependency of this phenomenon on process temperature and structural stiffness (rivet distance) was characterized. Experimental results reveal that while the relative displacement scales cubically with the free buckling length, the resulting adhesive area reduction follows an exponential trend, leading to a loss of effective bond area of up to 79%, which significantly compromises the joint strength in automotive applications. To predict these process-induced defects, a thermo-chemo-viscoelastic-viscoplastic adhesive model implemented in LS-DYNA was applied. The model combines curing kinetics, viscoelastic relaxation, and pressure-dependent plasticity and features a geometric damage parameter (D) that captures the adhesive area reduction caused by viscous fingering as an exponential function of the accumulated normal strain in the liquid phase. This damage parameter, calibrated on base-specimen level, was transferred to the component geometry. The simulation demonstrated high predictive accuracy with a maximum deviation of the adhesive area reduction of 3.1% compared to experimental data. This validates the model’s capability to predict manufacturing-induced damage in complex hybrid structures solely based on thermal boundary conditions.}},
  author       = {{Al Trjman, Mohamad and Beule, Felix and Teutenberg, Dominik and Meschut, Gerson and Riese, Julia}},
  issn         = {{0021-8464}},
  journal      = {{The Journal of Adhesion}},
  keywords     = {{Adhesive area reduction, CED coating process, delta alpha problem, epoxy structural adhesive, influence of manufacture, multi-material design, numerical simulation (FEM), relative displacements, viscous fingering (saffman-taylor-instability).}},
  pages        = {{1--24}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Experimental characterization and numerical analysis of the influence of the CED coating process on viscous fingering formation in hybrid-jointed mixed structures}}},
  doi          = {{10.1080/00218464.2026.2644394}},
  year         = {{2026}},
}

@article{65311,
  abstract     = {{Information Systems (IS) is rooted in systems theory. Systems theory offers powerful concepts to address challenges of growing system complexity and non-systemic design approaches in information systems. Despite its systemic origins, systems theory remains a peripheral topic in IS. The study addresses this gap by introducing a comprehensive framework of 52 systems-theoretical concepts to guide the design of complex IS artifacts. We synthesize scattered systems knowledge from diverse disciplines to provide a unified level of abstraction for complex information system design. We apply the framework to a use case of business reputation systems to show how the systems lens informs the design of a novel, complex information system. We make three key contributions to the literature. First, the framework provides a common ground for interdisciplinary research in information system design. Second, it offers a unified level of abstraction grounded in systems theory that serves as a coherent basis for artifact design. Third, it demonstrates the potential of systems theory as a foundational justificatory knowledge base. Furthermore, we provide guidance on applying the framework across multiple modes of reasoning, alongside further application guidelines. The study thus serves as a bridge between the body of systems knowledge and contextual design in IS.}},
  author       = {{Ibrahimli, Ulvi and Hemmrich, Simon and Winkelmann, Axel}},
  journal      = {{Communication of the Association for Information Systems}},
  keywords     = {{Information Systems Research, Systems Theory, System Complexity, System Design, Design Science}},
  publisher    = {{AIS}},
  title        = {{{Bridging Systems Theory and Information Systems: A Framework for Designing Complex Information Systems}}},
  doi          = {{https://aisel.aisnet.org/cais/vol58/iss1/37/}},
  year         = {{2026}},
}

@inbook{65310,
  abstract     = {{Trust between client and consultant is perhaps the most important asset in con-sulting, as this is a highly intangible knowledge-intensive business that concerns is-sues of outstanding strategic and operational importance for the customers. Cli-ents who have not worked with a particular consultancy face considerable risk when they place an order while lacking reliable information about the service quality they can expect. There is a strong link between trust and reputation, as the positive reputation of a consultancy can act as a substitute for a new client’s missing individual experience with the provider, fostering trust in the service quali-ty. Thus, creating, maintaining, and demonstrating a good reputation is of signifi-cant importance for consultancies in a very competitive industry.
To facilitate trustworthy signals, we design and implement a novel reputation mechanism that carries a monetary weight stored on a blockchain network as an immutable, decentralized, and transparent ledger. Based on an implementation in the Ethereum network and subsequent evaluation, we conclude that the reputation mechanism can contribute to leveling information asymmetry and reducing risk while increasing reputation and trust. The mechanism lends itself to being used in other business-to-business scenarios that suffer from similar information asymmetries.}},
  author       = {{Hemmrich, Simon and Nissen, Volker}},
  booktitle    = {{ Advanced Studies in Consulting Research and Digitalization – A Scientific Update on the Digital Transformation of the Consulting Industry. Springer.}},
  editor       = {{Nissen, Volker}},
  keywords     = {{Reputation Systems, Consulting, Design Science Invention, Incentive, Blockchain, Monetary ratings, building trust, reduce information asymmetry consulting, B2B reputation system, consulting risk reduction, supplier evaluation system}},
  title        = {{{A blockchain-based reputation system for consulting}}},
  year         = {{2026}},
}

@article{65476,
  abstract     = {{Service research has evolved into an interdisciplinary research field that bridges diverse disciplines, including information systems (IS) and marketing. Nearly two decades ago, the service system concept was introduced as a foundational abstraction in service research, drawing on ideas from the service-dominant logic (S-D logic) of marketing. Despite its widespread adoption in service research, particularly in the IS discipline, the service system concept lacks a solid theoretical foundation. This has resulted in conceptual ambiguity and overlap with related constructs, such as service ecosystems. Moreover, it has largely remained a static analytical lens, insufficiently capturing dynamic service phenomena, including value co-creation and co-destruction, as well as the emergence of institutional arrangements. To address these limitations, we propose Luhmann’s systems theory (LST) as a robust framework for conceptualizing service systems as autopoietic (self-creating) systems, in which communication serves as the fundamental mechanism that drives value co-creation. We derive five theoretical propositions from this re-conceptualization that clarify conceptual ambiguity and allow researchers to explore dynamic service phenomena in greater depth. Given LST’s general approach, our conceptualization provides a theoretically grounded, interdisciplinary foundation for advancing service research.}},
  author       = {{Beverungen, Daniel and Poeppelbuss, Jens and Hemmrich, Simon and Iqbal, Taskeen}},
  issn         = {{1019-6781}},
  journal      = {{Electronic Markets}},
  keywords     = {{Service system, Service ecosystem, Systems theory, Service research}},
  number       = {{1}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Service through communication—Conceptualizing service systems with Luhmann’s systems theory}}},
  doi          = {{10.1007/s12525-026-00889-w}},
  volume       = {{36}},
  year         = {{2026}},
}

@inproceedings{60497,
  abstract     = {{Despite the advantages that the virtual knowledge graph paradigm has brought to many application domains, state-of-the-art systems still do not support popular graph database management systems like Neo4j. Their query rewriting algorithms focus on languages like conjunctive queries and their unions, which were developed for relational data and are poorly suited for graph data. Moreover, they also limit the expressiveness of the ontology languages that admit rewritings, restricting them to those that enjoy the so-called FO-rewritability property. Rewritings have thus focused on the DL-Lite family of Description Logics. In this paper, we propose a technique for rewriting a family of navigational queries for a suitably tailored fragment of ELHI. Leveraging navigational features in the target query language, we can include some widely-used axiom shapes not supported by DL-Lite. We implemented a proof-of-concept prototype that rewrites into Cypher queries, and tested it on a real-world cognitive neuroscience use case with promising results.}},
  author       = {{Löhnert, Bianca and Augsten, Nikolaus and Okulmus, Cem and Ortiz, Magdalena}},
  booktitle    = {{The Semantic Web - 22nd European Semantic Web Conference, {ESWC} 2025, Portoroz, Slovenia, June 1-5, 2025, Proceedings, Part {I}}},
  isbn         = {{9783031945748}},
  issn         = {{0302-9743}},
  keywords     = {{Ontology-based Data Access, Property Graphs, Navigational Queries}},
  location     = {{Portorož, Slovenia}},
  pages        = {{342----361}},
  publisher    = {{Springer Nature Switzerland}},
  title        = {{{Towards Practicable Algorithms for Rewriting Graph Queries Beyond DL-Lite}}},
  doi          = {{10.1007/978-3-031-94575-5_19}},
  volume       = {{15718}},
  year         = {{2025}},
}

@article{60885,
  abstract     = {{To reduce transport-related environmental impacts, innovative mobility system approaches such as on-demand services are being developed. These can include operating vehicles that differ regarding their characteristics and application profile from privately owned cars in motorized individual transport. Studies on life cycle assessment and life cycle engineering of vehicle lightweight structures are mainly limited to these privately owned cars and the impact category of climate change. In this paper, a method for life cycle assessment-based engineering of lightweight structures in vehicles for various mobility system applications, including on-demand mobility services, is developed. The method enables the holistic life cycle assessment of lightweight structures in different mobility system applications considering parameter changes at the upstream products, component, subsystem, vehicle and mobility system levels, as well as the integration of results into engineering activities. A case study is used to show that the vehicle and mobility system application of lightweight structures can significantly influence their environmental impacts and the selection of ecologically preferable product designs. The application in vehicles for on-demand mobility services can lead to an increase in absolute use stage energy demand and environmental impacts compared to applications in privately owned vehicles for motorized individual transport. However, normalized to the transport performance provided, the lifecycle environmental impacts of structural components in vehicles for on-demand mobility services can be lower than in vehicles for motorized individual transport. The paper contributes methodically and with quantitative results to improved decision making in life cycle engineering activities for lightweight structures in mobility system applications.}},
  author       = {{Ostermann, Moritz and Dierkes, Eric and Marten, Thorsten and Tröster, Thomas}},
  issn         = {{2666-7908}},
  journal      = {{Cleaner Engineering and Technology}},
  keywords     = {{Life cycle assessment, Life cycle engineering, Lightweight design, On-demand mobility, Shared mobility, Mobility services}},
  publisher    = {{Elsevier BV}},
  title        = {{{Life cycle engineering of lightweight structures in vehicles for on-demand mobility services}}},
  doi          = {{10.1016/j.clet.2025.101058}},
  volume       = {{28}},
  year         = {{2025}},
}

@inproceedings{61057,
  abstract     = {{Verification and Validation (V&V) are essential processes in engineering Cyber-Physical Systems. However, the role of V&V engineers is often not given sufficient attention. Based on a systematic literature analysis and practical observations, a four-step method for Test-oriented Resilient Requirements Engineering (ToRRE) is developed. The steps are planning V&V, executing V&V activities, documenting V&V activities and analyzing results of V&V activities. Applying ToRRE ensures continuous information flow and traceability. Engineers are enabled to analyze requirements using engineering artifacts connected through Model-Based Systems Engineering. Adopting methods for Model-Based Effect Chain analysis to evaluated test cases and test scenarios, conclusions on requirements engineering and change management are enabled. The method is evaluated in an EU research project.}},
  author       = {{Gräßler, Iris and Ebel, Marcel}},
  booktitle    = {{Proceedings of the Design Society}},
  issn         = {{2732-527X}},
  keywords     = {{systems engineering (SE), product modelling/models, design methods, verification & validation, test cases & test scenarios}},
  location     = {{Dallas, Texas, USA}},
  pages        = {{3031--3040}},
  publisher    = {{Cambridge University Press (CUP)}},
  title        = {{{Test-oriented Resilient Requirements Engineering (ToRRE): extending model-based effect chain analysis to verification objectives}}},
  doi          = {{10.1017/pds.2025.10317}},
  volume       = {{5}},
  year         = {{2025}},
}

@article{55400,
  abstract     = {{This study contributes to the evolving field of robot learning in interaction
with humans, examining the impact of diverse input modalities on learning
outcomes. It introduces the concept of "meta-modalities" which encapsulate
additional forms of feedback beyond the traditional preference and scalar
feedback mechanisms. Unlike prior research that focused on individual
meta-modalities, this work evaluates their combined effect on learning
outcomes. Through a study with human participants, we explore user preferences
for these modalities and their impact on robot learning performance. Our
findings reveal that while individual modalities are perceived differently,
their combination significantly improves learning behavior and usability. This
research not only provides valuable insights into the optimization of
human-robot interactive task learning but also opens new avenues for enhancing
the interactive freedom and scaffolding capabilities provided to users in such
settings.}},
  author       = {{Beierling, Helen and Beierling, Robin  and Vollmer, Anna-Lisa}},
  journal      = {{Frontiers in Robotics and AI}},
  keywords     = {{human-robot interaction, human-in-the-loop learning, reinforcement learning, interactive robot learning, multi-modal feedback, learning from demonstration, preference-based learning, scaffolding in robot learning}},
  publisher    = {{Frontiers }},
  title        = {{{The power of combined modalities in interactive robot learning}}},
  volume       = {{12}},
  year         = {{2025}},
}

@article{61445,
  abstract     = {{ABSTRACT In recent years, there has been an increasing awareness of the importance of incorporating diversity into research projects, focusing on both how they are conducted and their content. Funding organizations have started to require that research applicants pay attention to inclusion and diversity by considering gender dimensions and other diversity factors in their project plans and ensuring gender equality during execution. Based on an extensive literature research and expert discussions on how to develop and implement diversity strategies in large collaborative research projects, we argue that there is a lack of practical advice in existing literature. Drawing from our own experiences in conceptualizing and implementing a Diversity Program across four universities in Germany, we propose a framework for effectively integrating diversity into collaborative research initiatives across various academic fields.}},
  author       = {{Lorke, Mariya and Amelung, Rena and Kuchling, Peter and Paaßen, Benjamin and Pein-Hackelbusch, Miriam and Schloots, Franziska Margarete and Schulz, Klara and Nauerth, Annette}},
  journal      = {{Diversity & Inclusion Research}},
  keywords     = {{collaborative research projects, diversity strategy, gender equality}},
  number       = {{4}},
  pages        = {{e70040}},
  title        = {{{Development and Implementation of Diversity Programs in Large Collaborative Research Projects: An Example From Germany}}},
  doi          = {{https://doi.org/10.1002/dvr2.70040}},
  volume       = {{2}},
  year         = {{2025}},
}

@article{59335,
  abstract     = {{Technological advancements and evolving value orientations reshape future value creation and pose new requirements for service innovation. While a variety of disciplines are developing new approaches to drive service innovation, this is primarily done in isolation and generates only fragmented solutions. Sociological theory has proposed “boundary objects” as an effective umbrella for communication and cooperation among communities. Therefore, we introduce continuous value shaping (CVS) as a boundary object describing service innovation approaches along five principles. We reflect on this concept through the different disciplinary lenses of researchers in service marketing, information systems, service engineering, sociology of work, and innovation management. These perspectives highlight how the CVS principles already connect to discourses within the individual disciplines. However, the CVS concept will not only provide an umbrella to embrace existing activities in different academic disciplines. It also assists to identify research themes that will benefit from uniting the power of these disciplines, and it can serve as an integrating framework to conceptualize complex service innovation approaches. Thus, the CVS concept should guide both researchers and practitioners to develop and implement novel innovation and transformation efforts—in and across organizations.}},
  author       = {{Böhmann, Tilo and Roth, Angela and Satzger, Gerhard and Benz, Carina and Beverungen, Daniel and Boes, Andreas and Breidbach, Christoph and Gersch, Martin and Gudergan, Gerhard and Hogreve, Jens and Kurtz, Christian and Langes, Barbara and Leimeister, Jan Marco and Lewandowski, Tom and Meiren, Thomas and Nägele, Rainer and Paluch, Stefanie and Peters, Christoph and Poeppelbuss, Jens and Robra-Bissantz, Susanne and Schultz, Carsten and Schumann, Jan H. and Wirtz, Jochen and Wünderlich, Nancy V.}},
  issn         = {{1019-6781}},
  journal      = {{Electronic Markets}},
  keywords     = {{Continuous value shaping (CVS), Service research, Service innovation, Digitalization, Sustainability, Interdisciplinary research}},
  number       = {{1}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Continuous value shaping: A boundary concept for innovating service innovation approaches}}},
  doi          = {{10.1007/s12525-025-00771-1}},
  volume       = {{35}},
  year         = {{2025}},
}

@inproceedings{62738,
  abstract     = {{Vulnerability disclosures are necessary to improve the security of our digital ecosystem. However, they can also be challenging for researchers: it may be hard to find out who the affected parties even are, or how to contact them. Researchers may be ignored or face adversity when disclosing vulnerabilities. We investigate researchers' experiences with vulnerability disclosures, extract best practices, and make recommendations for researchers, institutions that employ them, industry, and regulators to enable effective vulnerability disclosures.}},
  author       = {{Sri Ramulu, Harshini and Rotthaler, Anna Lena and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl, Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}},
  booktitle    = {{Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security}},
  keywords     = {{software vulnerabilities, vulnerability disclosure, security research}},
  publisher    = {{ACM}},
  title        = {{{Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures}}},
  doi          = {{10.1145/3719027.3760723}},
  year         = {{2025}},
}

@article{62937,
  abstract     = {{Sandwich packings are assembled from two conventional structured packings with different geometrical surface areas stacked alternatingly within a separation column. When operated under partially flooded conditions, they provide significant mass transfer improvement compared to common structured packings. In this work, a rate-based model including novel mass transfer correlations is presented and validated using a comprehensive experimental database for the reactive absorption of CO2 into aqueous monoethanolamine. The proposed rate-based approach is capable of accounting for axial dispersion, thereby enabling the evaluation of the effect of liquid-phase backmixing on the mass transfer performance. The validated rate-based model is used to evaluate the separation performance of sandwich packings. Compared with structured packings, up to 10 % higher mass transfer rates are obtained.}},
  author       = {{Franke, Patrick and Schubert, Markus and Hampel, Uwe and Kenig, Eugeny Y.}},
  issn         = {{0009-2509}},
  journal      = {{Chemical Engineering Science}},
  keywords     = {{Sandwich packings Structured packings Rate-based approach Model validation Ultra-fast X-ray tomography}},
  publisher    = {{Elsevier BV}},
  title        = {{{A rate-based model for reactive separation columns with sandwich packings}}},
  doi          = {{10.1016/j.ces.2025.122681}},
  volume       = {{321}},
  year         = {{2025}},
}

@inbook{58874,
  author       = {{Fahrbach, Manuel and Jenert, Tobias and Fust, Alexander and Bellwald, Noah and Winkler, Christoph}},
  booktitle    = {{Annals of Entrepreneurship Education and Pedagogy - 2025}},
  isbn         = {{9781035325795}},
  keywords     = {{Self-Regulated Learning, Entrepreneurship Education, Entrepreneurship Research}},
  pages        = {{249–265}},
  publisher    = {{Edward Elgar Publishing}},
  title        = {{{Fostering self-regulated entrepreneurial learning in entrepreneurship education}}},
  doi          = {{10.4337/9781035325795.00021}},
  year         = {{2025}},
}

@inbook{58875,
  author       = {{Winkler, Christoph and Jenert, Tobias and Fust, Alexander}},
  booktitle    = {{Annals of Entrepreneurship Education and Pedagogy - 2025}},
  isbn         = {{9781035325795}},
  keywords     = {{Methodology, Entrepreneurship Education, Entrepreneurship Research}},
  pages        = {{93–105 }},
  publisher    = {{Edward Elgar Publishing}},
  title        = {{{Transferability as a key to impactful entrepreneurship education outcomes: a new quest}}},
  doi          = {{10.4337/9781035325795.00013}},
  year         = {{2025}},
}

@unpublished{63403,
  abstract     = {{Stateful signatures like the NIST standardized signature schemes LMS and XMSS provide an efficient and mature realization of post-quantum secure signature schemes. They are recommended for long-term use cases like e.g. firmware signing. However, stateful signature schemes require to properly manage a so-called state. In stateful signature schemes like LMS and XMSS, signing keys consist of a set of keys of a one-time signature scheme and it has to be guaranteed that each one-time key is used only once. This is done by updating a state in each signature computation, basically recording which one-time keys have already been used. While this is straightforward in centralized systems, in distributed systems like secure enclaves consisting of e.g. multiple hardware security modules (HSMs) with limited communication keeping a distributed state that at any point in time is consistent among all parties involved presents a challenge. This challenge is not addressed by the current standardization processes. 
In this paper we present a security model for the distributed key management of post-quantum secure stateful signatures like XMSS and LMS. We also present a simple, efficient, and easy to implement protocol proven secure in this security model, i.e. the protocol guarantees at any point in time a consistent state among the parties in a distributed system, like a distributed security enclave. The security model is defined in the universal composabilty (UC) framework by Ran Canetti by providing an ideal functionality for the distributed key management for stateful signatures. Hence our protocol remains secure even if arbitrarily composed with other instances of the same or other protocols, a necessity for the security of distributed key management protocols. Our main application are security enclaves consisting of HSMs, but the model and the protocol can easily be adapted to other scenarios of distributed key management of stateful signature schemes.}},
  author       = {{Blömer, Johannes and Bröcher, Henrik and Krummel, Volker and Porzenheim, Laurens Alexander}},
  keywords     = {{distributed state, hash-based signature, stateful hash-based signature, universal composability, secure enclave}},
  pages        = {{22}},
  title        = {{{Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol}}},
  year         = {{2025}},
}

@article{52201,
  author       = {{Han, Daxin and Kappe, Fabian and Vorderbrüggen, Julian and Jendrny, Jörg and Gorr, Eugen and Meschut, Gerson}},
  issn         = {{1526-6125}},
  journal      = {{Journal of Manufacturing Processes}},
  keywords     = {{Industrial and Manufacturing Engineering, Management Science and Operations Research, Strategy and Management}},
  pages        = {{92--108}},
  publisher    = {{Elsevier BV}},
  title        = {{{Single-step self-punching lockbolt process for aluminum sheets without pre-hole}}},
  doi          = {{10.1016/j.jmapro.2024.02.043}},
  volume       = {{116}},
  year         = {{2024}},
}

@article{52726,
  abstract     = {{Heteroclinic structures organize global features of dynamical systems. We analyse whether heteroclinic structures can arise in network dynamics with higher-order interactions which describe the nonlinear interactions between three or more units. We find that while commonly analysed model equations such as network dynamics on undirected hypergraphs may be useful to describe local dynamics such as cluster synchronization, they give rise to obstructions that allow to design of heteroclinic structures in phase space. By contrast, directed hypergraphs break the homogeneity and lead to vector fields that support heteroclinic structures.}},
  author       = {{Bick, Christian and von der Gracht, Sören}},
  issn         = {{2051-1329}},
  journal      = {{Journal of Complex Networks}},
  keywords     = {{Applied Mathematics, Computational Mathematics, Control and Optimization, Management Science and Operations Research, Computer Networks and Communications}},
  number       = {{2}},
  publisher    = {{Oxford University Press (OUP)}},
  title        = {{{Heteroclinic dynamics in network dynamical systems with higher-order interactions}}},
  doi          = {{10.1093/comnet/cnae009}},
  volume       = {{12}},
  year         = {{2024}},
}

@article{53200,
  abstract     = {{Customer misbehavior poses a major risk in the sharing economy. For example, property damage to shared accommodations imposes burdens on both sharing platforms and hosts, especially if misbehaving guests purposefully, not coincidentally conceal, or fail to report damages. Such misbehavior might be facilitated by remote listing management and the lack of face-to-face interactions between hosts and guests. Therefore, this study investigated the effects of host–guest interaction modes (face-to-face, online-only) and frequency on guests’ misbehavior concealment intentions. Social identification and irritation emerged as bright- and dark side mediators, respectively. Guests who interacted face-to-face (vs. online-only) with hosts exhibited weaker intentions to conceal their misbehavior due to increased social identification. Platforms can elicit social identification by engaging guests in virtual communities. However, when face-to-face interactions become excessive, guests experience irritation and are more likely to conceal their misbehavior. These insights offer practical implications for both peer-to-peer sharing platforms and hosts.}},
  author       = {{Ozuna, Edna and Steinhoff, Lena}},
  issn         = {{0148-2963}},
  journal      = {{Journal of Business Research}},
  keywords     = {{Sharing economy, Customer misbehavior, Peer-to-peer services, Face-to-face interactions, Experimental research}},
  publisher    = {{Elsevier BV}},
  title        = {{{“Look me in the eye, customer”: How do face-to-face interactions in peer-to-peer sharing economy services affect customers’ misbehavior concealment intentions?}}},
  doi          = {{10.1016/j.jbusres.2024.114582}},
  volume       = {{177}},
  year         = {{2024}},
}

@inproceedings{54916,
  abstract     = {{Reputation systems for companies to rate each other's performance are largely unexplored in research and hardly available in practice. However, these systems are relevant for prospective buyers to find a trustworthy seller. This observation applies especially to short-lived business relationships where fulfilling the performance promise is subject to a high degree of uncertainty. This paper explores the value of a reputation system for a business-to-business (B2B) context and focuses on three novel solutions for designing reputation systems. These solutions include selling ratings, conducting ratings as payments, and employing a counter-rating mechanism. We interview buyers to fathom the added value of these solutions in different contexts. Our findings suggest that such a system is useful for companies acting in less transparent markets and also helps when companies already have a good market overview. Depending on the market conditions and business context, the perceived value of the proposed system varies.}},
  author       = {{Hemmrich, Simon and Schäfer, Jannika Marie and Hansmeier, Philipp and Beverungen, Daniel}},
  booktitle    = {{Proceedings of the 57th Hawaii International Conference on System Sciences}},
  keywords     = {{Electronic Marketing, business-to-business, new design approach, reputation systems, value for buyers.}},
  location     = {{Honolulu}},
  title        = {{{The Value of Reputation Systems in Business Contexts–A Qualitative Study Taking the View of Buyers}}},
  year         = {{2024}},
}

