[{"user_id":"357","department":[{"_id":"14"}],"_id":"58822","language":[{"iso":"eng"}],"keyword":["elucidation","facts","Frege","language","metaphysics","G. E. Moore","Russell","Stebbing","John Wisdom","Wittgenstein"],"type":"book_chapter","publication":"Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II","status":"public","abstract":[{"lang":"eng","text":"In 1921, John Wisdom (1904–1993) became a member of Fitzwilliam House, Cambridge, where he read philosophy and attended lectures by G. E. Moore, C. D. Broad, and J. E. McTaggart. He received his BA in 1924, after which he worked for five years at the National Institute of Industrial Psychology. From 1929 to 1934, Wisdom was a Lecturer in the department of logic and metaphysics at the University of St Andrews and a colleague of G. F. Stout. After the publication of his book Interpretation and Analysis (1931) and five articles on “Logical Constructions” in Mind (1931–3), Wisdom became a Lecturer in Moral Sciences in Cambridge and a Fellow of Trinity College. This gave him the opportunity to gain first-hand knowledge of Wittgenstein’s philosophy. Since nothing by Wittgenstein but Tractatus appeared in print for decades, Wisdom’s publications of these years were—mistakenly—read as portents of the new ideas of Wittgenstein himself. The publication of Wittgenstein’s Philosophical Investigations in 1953 brought with it, among other things, the fall of Wisdom’s popularity. "}],"editor":[{"last_name":"Khani ","full_name":"Khani , Ali Hossein ","first_name":"Ali Hossein "},{"last_name":"Kemp ","full_name":"Kemp , Gary ","first_name":"Gary "}],"date_created":"2025-02-24T18:33:50Z","author":[{"first_name":"Nikolay","last_name":"Milkov","full_name":"Milkov, Nikolay","id":"357"}],"publisher":"Routledge","date_updated":"2025-02-24T18:38:38Z","title":"Wisdom's Wittgenstein","edition":"1","publication_status":"inpress","quality_controlled":"1","citation":{"apa":"Milkov, N. (n.d.). Wisdom’s Wittgenstein. In A. H. Khani  &#38; G. Kemp  (Eds.), <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II</i> (1st ed.). Routledge.","bibtex":"@inbook{Milkov, place={London}, edition={1}, title={Wisdom’s Wittgenstein}, booktitle={Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II}, publisher={Routledge}, author={Milkov, Nikolay}, editor={Khani , Ali Hossein  and Kemp , Gary } }","short":"N. Milkov, in: A.H. Khani , G. Kemp  (Eds.), Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II, 1st ed., Routledge, London, n.d.","mla":"Milkov, Nikolay. “Wisdom’s Wittgenstein.” <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed., Routledge.","chicago":"Milkov, Nikolay. “Wisdom’s Wittgenstein.” In <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed. London: Routledge, n.d.","ieee":"N. Milkov, “Wisdom’s Wittgenstein,” in <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II</i>, 1st ed., A. H. Khani  and G. Kemp , Eds. London: Routledge.","ama":"Milkov N. Wisdom’s Wittgenstein. In: Khani  AH, Kemp  G, eds. <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II</i>. 1st ed. Routledge."},"place":"London","year":"2025"},{"department":[{"_id":"14"}],"user_id":"357","_id":"58821","language":[{"iso":"eng"}],"keyword":["directional analysis","elucidation","facts","metaphysics","G. E. Moore","Russell","Stebbing","John Wisdom","Wittgenstein"],"ddc":["100"],"publication":"Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II","type":"book_chapter","status":"public","editor":[{"first_name":"Ali Hossein ","full_name":"Khani , Ali Hossein ","last_name":"Khani "},{"first_name":"Gary ","last_name":"Kemp ","full_name":"Kemp , Gary "}],"abstract":[{"text":"Susan Stebbing wrote only once on Wittgenstein, in her paper ‘Logical Positivism and Analysis’ (1933). The paper was unusually critical of Wittgenstein. It put the Cambridge analytic philosophy of Moore and Russell in a sharp opposition to the positivist philosophy of the Vienna Circle, in which Stebbing included Wittgenstein. Whereas the positivists were interested in analysing language, the Cambridge realists were analysing facts. To be more explicit, the analytic philosophers were engaged in directional analysis, which seeks to illuminate (to elucidate) the multiplicity of the analysed facts. In contrast, positivists aimed at a final analysis that proves that there are simples. Stebbing’s sympathies were clearly on the side of the Cambridge realists. The important implication of Stebbing’s paper was that it urged Wittgenstein to change the style of his philosophy, abandoning those points which allegedly connected him with the Vienna Circle.","lang":"eng"}],"date_created":"2025-02-24T18:29:59Z","author":[{"first_name":"Nikolay","id":"357","full_name":"Milkov, Nikolay","last_name":"Milkov"}],"date_updated":"2025-02-24T18:30:06Z","publisher":"Routledge","title":"Stebbing's Wittgenstein","edition":"1","quality_controlled":"1","publication_status":"inpress","citation":{"apa":"Milkov, N. (n.d.). Stebbing’s Wittgenstein. In A. H. Khani  &#38; G. Kemp  (Eds.), <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II</i> (1st ed.). Routledge.","mla":"Milkov, Nikolay. “Stebbing’s Wittgenstein.” <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed., Routledge.","bibtex":"@inbook{Milkov, place={London}, edition={1}, title={Stebbing’s Wittgenstein}, booktitle={Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II}, publisher={Routledge}, author={Milkov, Nikolay}, editor={Khani , Ali Hossein  and Kemp , Gary } }","short":"N. Milkov, in: A.H. Khani , G. Kemp  (Eds.), Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II, 1st ed., Routledge, London, n.d.","ama":"Milkov N. Stebbing’s Wittgenstein. In: Khani  AH, Kemp  G, eds. <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>. 1st ed. Routledge.","chicago":"Milkov, Nikolay. “Stebbing’s Wittgenstein.” In <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed. London: Routledge, n.d.","ieee":"N. Milkov, “Stebbing’s Wittgenstein,” in <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II</i>, 1st ed., A. H. Khani  and G. Kemp , Eds. London: Routledge."},"place":"London","year":"2025"},{"file_date_updated":"2022-09-08T09:05:22Z","user_id":"14931","department":[{"_id":"1"},{"_id":"384"}],"_id":"33299","status":"public","type":"journal_article","main_file_link":[{"url":"http://www.hochschullehre.org/wp-content/files/diehochschullehre_2020_Hahn_Informationskompetenz.pdf","open_access":"1"}],"author":[{"last_name":"Hahn","full_name":"Hahn, Charlotte Anna","id":"25934","first_name":"Charlotte Anna"}],"date_updated":"2023-10-13T10:17:31Z","oa":"1","citation":{"mla":"Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen.” <i>die hochschullehre</i>, no. 6, 2020.","short":"C.A. Hahn, die hochschullehre (2020).","bibtex":"@article{Hahn_2020, title={Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen}, number={6}, journal={die hochschullehre}, author={Hahn, Charlotte Anna}, year={2020} }","apa":"Hahn, C. A. (2020). Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen. <i>die hochschullehre</i>, <i>6</i>.","chicago":"Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen.” <i>die hochschullehre</i>, no. 6 (2020).","ieee":"C. A. Hahn, “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen,” <i>die hochschullehre</i>, no. 6, 2020.","ama":"Hahn CA. Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen. <i>die hochschullehre</i>. 2020;(6)."},"publication_status":"published","publication_identifier":{"eissn":["ISSN 2199-8825"]},"has_accepted_license":"1","language":[{"iso":"ger"}],"ddc":["020"],"keyword":["E-Learning","information competence","literature","library","research"],"file":[{"file_size":318104,"file_id":"33300","file_name":"HSL2012W.pdf","access_level":"open_access","date_updated":"2022-09-08T09:05:22Z","creator":"chogg","date_created":"2022-09-08T09:05:22Z","relation":"main_file","content_type":"application/pdf"}],"license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","abstract":[{"lang":"eng","text":"The aim of this study was to find out whether teaching how to search for literature\r\nwould be more beneficial to students and teachers if done online through short videos\r\nrather than in person during course time. To find out whether online videos are more\r\nbeneficial, two courses were asked to fill in questionnaires, one at the beginning and\r\none at the end of the semester. One of the courses received the input online via videos\r\nand were given an exercise to put the newly learned skills to use, the other course\r\nserved as a control group and learned how to search for literature during the course.\r\nThe results show that while the difference between the two groups is not significant,\r\nthe videos can still be regarded as being more beneficial than teaching the necessary\r\nskills during course time."}],"publication":"die hochschullehre","title":"Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen","date_created":"2022-09-08T09:05:30Z","year":"2020","issue":"6"},{"status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-13T15:06:56Z","_id":"5671","user_id":"61579","department":[{"_id":"277"}],"citation":{"bibtex":"@article{Scholz_Dorner_Schryen_Benlian_2017, title={A configuration-based recommender system for supporting e-commerce decisions}, volume={259}, number={1}, journal={European Journal of Operational Research}, publisher={Elsevier}, author={Scholz, Michael and Dorner, Verena and Schryen, Guido and Benlian, Alexander}, year={2017}, pages={205–215} }","short":"M. Scholz, V. Dorner, G. Schryen, A. Benlian, European Journal of Operational Research 259 (2017) 205–215.","mla":"Scholz, Michael, et al. “A Configuration-Based Recommender System for Supporting e-Commerce Decisions.” <i>European Journal of Operational Research</i>, vol. 259, no. 1, Elsevier, 2017, pp. 205–15.","apa":"Scholz, M., Dorner, V., Schryen, G., &#38; Benlian, A. (2017). A configuration-based recommender system for supporting e-commerce decisions. <i>European Journal of Operational Research</i>, <i>259</i>(1), 205–215.","chicago":"Scholz, Michael, Verena Dorner, Guido Schryen, and Alexander Benlian. “A Configuration-Based Recommender System for Supporting e-Commerce Decisions.” <i>European Journal of Operational Research</i> 259, no. 1 (2017): 205–15.","ieee":"M. Scholz, V. Dorner, G. Schryen, and A. Benlian, “A configuration-based recommender system for supporting e-commerce decisions,” <i>European Journal of Operational Research</i>, vol. 259, no. 1, pp. 205–215, 2017.","ama":"Scholz M, Dorner V, Schryen G, Benlian A. A configuration-based recommender system for supporting e-commerce decisions. <i>European Journal of Operational Research</i>. 2017;259(1):205-215."},"page":"205 - 215","intvolume":"       259","has_accepted_license":"1","oa":"1","date_updated":"2022-01-06T07:02:27Z","author":[{"first_name":"Michael","full_name":"Scholz, Michael","last_name":"Scholz"},{"first_name":"Verena","full_name":"Dorner, Verena","last_name":"Dorner"},{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"},{"first_name":"Alexander","last_name":"Benlian","full_name":"Benlian, Alexander"}],"volume":259,"abstract":[{"lang":"eng","text":"Multi-attribute value theory (MAVT)-based recommender systems have been proposed for dealing with issues of existing recommender systems, such as the cold-start problem and changing preferences. However, as we argue in this paper, existing MAVT-based methods for measuring attribute importance weights do not fit the shopping tasks for which recommender systems are typically used. These methods assume well-trained decision makers who are willing to invest time and cognitive effort, and who are familiar with the attributes describing the available alternatives and the ranges of these attribute levels. Yet, recommender systems are most often used by consumers who are usually not familiar with the available attributes and ranges and who wish to save time and effort. Against this background, we develop a new method, based on a product configuration process, which is tailored to the characteristics of these particular decision makers. We empirically compare our method to SWING, ranking-based conjoint analysis and TRADEOFF in a between-subjects laboratory experiment with 153 participants. Results indicate that our proposed method performs better than TRADEOFF and CONJOINT and at least as well as SWING in terms of recommendation accuracy, better than SWING and TRADEOFF and at least as well as CONJOINT in terms of cognitive load, and that participants were faster with our method than with any other method. We conclude that our method is a promising option to help support consumers' decision processes in e-commerce shopping tasks."}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"6025","file_name":"EJOR article.pdf","file_size":762889,"creator":"hsiemes","date_created":"2018-12-07T11:30:59Z","date_updated":"2018-12-13T15:06:56Z"}],"publication":"European Journal of Operational Research","ddc":["000"],"keyword":["E-Commerce","Recommender System","Attribute Weights","Configuration System","Decision Support"],"language":[{"iso":"eng"}],"year":"2017","issue":"1","title":"A configuration-based recommender system for supporting e-commerce decisions","publisher":"Elsevier","date_created":"2018-11-14T15:06:18Z"},{"language":[{"iso":"ger"}],"article_type":"original","keyword":["E-Learning","digitale Medien","problembasiertes Lernen","Lehrerbildung","Diagnostik"],"user_id":"36716","department":[{"_id":"43"}],"_id":"48462","status":"public","abstract":[{"text":"Über das Lehramtsstudium sollen Studierende unter anderem dazu befähigt werden, die Leistung ihrer Schüler/innenzu bewerten. Dazu müssen sie Einflussfaktoren auf Schulleistung kennen und diese richtig diagnostizieren und fördern können. Mit diesem Beitrag wird eine game-und E-Learning-gestützte Lernumgebung vorgestellt, in der Studierende –anders als in vielen inputorientierten Seminarkonzepten –in einem virtuellen Klassenzimmer an realitätsnahen Fällen lernen,problembasiert zu diagnostizieren und zu fördern. Über denEinsatz der Lernumgebung in der Lehre wird berichtet, erste Rückmeldungen von Lehrenden und Studierenden werden erläutert und weitere Planungsschritte dargestellt. ","lang":"ger"}],"type":"journal_article","publication":"Zeitschrift für Hochschulentwicklung","title":"Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. ","author":[{"id":"40787","full_name":"Praetorius, Saskia","last_name":"Praetorius","first_name":"Saskia"},{"full_name":"Al-Kabbani, Daniel","last_name":"Al-Kabbani","first_name":"Daniel"},{"first_name":"Carla","full_name":"Bohndick, Carla","last_name":"Bohndick"},{"last_name":"Hilkenmeier","full_name":"Hilkenmeier, Johanna","first_name":"Johanna"},{"first_name":"Sebastian T.","last_name":"König","full_name":"König, Sebastian T."},{"first_name":"Hannah S.","last_name":"Müsche","full_name":"Müsche, Hannah S."},{"full_name":"Sommer, Sabrina","id":"36251","last_name":"Sommer","first_name":"Sabrina"},{"id":"36716","full_name":"Klingsieck, Katrin B.","last_name":"Klingsieck","first_name":"Katrin B."}],"date_created":"2023-10-25T10:28:54Z","volume":11,"date_updated":"2023-11-28T20:39:27Z","citation":{"apa":"Praetorius, S., Al-Kabbani, D., Bohndick, C., Hilkenmeier, J., König, S. T., Müsche, H. S., Sommer, S., &#38; Klingsieck, K. B. (2016). Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. . <i>Zeitschrift für Hochschulentwicklung</i>, <i>11</i>(3), 213–245.","mla":"Praetorius, Saskia, et al. “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. .” <i>Zeitschrift für Hochschulentwicklung</i>, vol. 11, no. 3, 2016, pp. 213–45.","bibtex":"@article{Praetorius_Al-Kabbani_Bohndick_Hilkenmeier_König_Müsche_Sommer_Klingsieck_2016, title={Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. }, volume={11}, number={3}, journal={Zeitschrift für Hochschulentwicklung}, author={Praetorius, Saskia and Al-Kabbani, Daniel and Bohndick, Carla and Hilkenmeier, Johanna and König, Sebastian T. and Müsche, Hannah S. and Sommer, Sabrina and Klingsieck, Katrin B.}, year={2016}, pages={213–245} }","short":"S. Praetorius, D. Al-Kabbani, C. Bohndick, J. Hilkenmeier, S.T. König, H.S. Müsche, S. Sommer, K.B. Klingsieck, Zeitschrift für Hochschulentwicklung 11 (2016) 213–245.","ama":"Praetorius S, Al-Kabbani D, Bohndick C, et al. Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. . <i>Zeitschrift für Hochschulentwicklung</i>. 2016;11(3):213-245.","chicago":"Praetorius, Saskia, Daniel Al-Kabbani, Carla Bohndick, Johanna Hilkenmeier, Sebastian T. König, Hannah S. Müsche, Sabrina Sommer, and Katrin B. Klingsieck. “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. .” <i>Zeitschrift für Hochschulentwicklung</i> 11, no. 3 (2016): 213–45.","ieee":"S. Praetorius <i>et al.</i>, “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. ,” <i>Zeitschrift für Hochschulentwicklung</i>, vol. 11, no. 3, pp. 213–245, 2016."},"intvolume":"        11","page":"213-245","year":"2016","issue":"3","publication_status":"published","quality_controlled":"1"},{"publication_status":"published","publication_identifier":{"issn":["0276-7783."]},"issue":"1","year":"2015","citation":{"ama":"Scherer A, Wünderlich N, Von Wangenheim F. The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>. 2015;39(1):177-200.","chicago":"Scherer, Anne, Nancy Wünderlich, and Florian Von Wangenheim. “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i> 39, no. 1 (2015): 177–200.","ieee":"A. Scherer, N. Wünderlich, and F. Von Wangenheim, “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.,” <i>MIS Quarterly</i>, vol. 39, no. 1, pp. 177–200, 2015.","apa":"Scherer, A., Wünderlich, N., &#38; Von Wangenheim, F. (2015). The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>, <i>39</i>(1), 177–200.","short":"A. Scherer, N. Wünderlich, F. Von Wangenheim, MIS Quarterly 39 (2015) 177–200.","mla":"Scherer, Anne, et al. “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i>, vol. 39, no. 1, MIS RC, 2015, pp. 177–200.","bibtex":"@article{Scherer_Wünderlich_Von Wangenheim_2015, title={The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.}, volume={39}, number={1}, journal={MIS Quarterly}, publisher={MIS RC}, author={Scherer, Anne and Wünderlich, Nancy and Von Wangenheim, Florian}, year={2015}, pages={177–200} }"},"intvolume":"        39","page":"177-200","date_updated":"2022-01-06T07:02:36Z","publisher":"MIS RC","author":[{"first_name":"Anne","full_name":"Scherer, Anne","last_name":"Scherer"},{"first_name":"Nancy","last_name":"Wünderlich","full_name":"Wünderlich, Nancy","id":"36392"},{"first_name":"Florian","last_name":"Von Wangenheim","full_name":"Von Wangenheim, Florian"}],"date_created":"2018-11-15T11:36:38Z","volume":39,"title":"The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.","type":"journal_article","publication":"MIS Quarterly","abstract":[{"lang":"eng","text":"Advancements in information technology have changed the way customers experience a service encounter and their relationship with service providers. Especially technology-based self-service channels have found their way into the 21st century service economy. While research embraces these channels for their cost-efficiency, it has not examined whether a shift from personal to self-service affects customer–firm relationships. Drawing from the service-dominant logic and its central concept of value-in-context, we discuss customers’ value creation in self-service and personal service channels and examine the long-term impact of these channels on customer retention. Using longitudinal customer data, we investigate how the ratio of self-service versus personal service use influences customer defection over time. Our findings suggest that the ratio of self-service to personal service used affects customer defection in a U-shaped manner, with intermediate levels of both self-service and personal service use being associated with the lowest likelihood of defection. We also find that this effect mitigates over time. We conclude that firms should not shift customers toward self-service channels completely, especially not at the beginning of a relationship. Our study underlines the importance of understanding when and how self-service technologies create valuable customer experiences and stresses the notion of actively managing customers’ cocreation of value. "}],"status":"public","_id":"5704","user_id":"37741","department":[{"_id":"181"}],"article_type":"original","keyword":["customer defection","customer retention","e-service","longitudinal","Self-service","value-in-context"],"language":[{"iso":"eng"}]},{"title":"Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation","publisher":"Monsenstein und Vannerdat","date_updated":"2022-01-06T06:56:06Z","date_created":"2021-09-09T12:18:36Z","author":[{"first_name":"Jens","orcid":"http://orcid.org/0000-0001-8778-2989","last_name":"Pottebaum","full_name":"Pottebaum, Jens","id":"405"}],"place":"Münster","year":"2012","citation":{"short":"J. Pottebaum, Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation, Monsenstein und Vannerdat, Münster, 2012.","mla":"Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Monsenstein und Vannerdat, 2012.","bibtex":"@book{Pottebaum_2012, place={Münster}, title={Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation}, publisher={Monsenstein und Vannerdat}, author={Pottebaum, Jens}, year={2012} }","apa":"Pottebaum, J. (2012). <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>. Monsenstein und Vannerdat.","ieee":"J. Pottebaum, <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>. Münster: Monsenstein und Vannerdat, 2012.","chicago":"Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Münster: Monsenstein und Vannerdat, 2012.","ama":"Pottebaum J. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Monsenstein und Vannerdat; 2012."},"publication_identifier":{"isbn":["3-86991-525-0"]},"keyword":["Arbeitsorganisation","E-Learning","Lernorganisation","Lerntechnik","Wissensmanagement"],"language":[{"iso":"eng"}],"_id":"24036","user_id":"405","status":"public","type":"dissertation"},{"type":"journal_article","publication":"Zeitschrift für E-Learning","status":"public","abstract":[{"lang":"ger","text":"Eine zentrale Herausforderung in der Ausbildung angehender Wirtschaftslehrpersonen stellt die sinnvolle Verknüpfung von Theorie- und Praxiserfahrungen dar. Im Rahmen der Ausbildung angehender Wirtschaftslehrpersonen an der Universität St. Gallen wird eine Lernumgebung gestaltet, die eine Verschränkung von Theorie- und Praxiserfahrungen ermöglichen soll. Die Lernprozesse der Studierenden werden dabei durch didaktisch angeleitete Weblogarbeit unterstützt. Trotz der Lernchancen, die sich aus einer Verknüpfung von theoretischen und praktischen Lernphasen ergeben, schätzen die Studierenden den Nutzen der Weblogarbeit als äusserst gering ein. Die Studierenden bei der reflexiven Integration praxisnaher und theoretischer Lernerfahrungen zu unterstützen, ist eine Herausforderung, die dezidierter Anleitung und Förderung durch die Lehrpersonen bedarf"}],"user_id":"51057","department":[{"_id":"208"},{"_id":"282"}],"_id":"4430","extern":"1","keyword":["Weblog","Blog","e-learning","TEL","higher education","business education"],"issue":"2","publication_identifier":{"issn":["1992-9579"]},"citation":{"ama":"Jenert T, Gebhardt A, Käser R. Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift für E-Learning</i>. 2011;6(2):17-29.","chicago":"Jenert, Tobias, Anja Gebhardt, and Reto Käser. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i> 6, no. 2 (2011): 17–29.","ieee":"T. Jenert, A. Gebhardt, and R. Käser, “Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung,” <i>Zeitschrift für E-Learning</i>, vol. 6, no. 2, pp. 17–29, 2011.","bibtex":"@article{Jenert_Gebhardt_Käser_2011, title={Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung}, volume={6}, number={2}, journal={Zeitschrift für E-Learning}, publisher={Studien-Verlag}, author={Jenert, Tobias and Gebhardt, Anja and Käser, Reto}, year={2011}, pages={17–29} }","mla":"Jenert, Tobias, et al. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i>, vol. 6, no. 2, Studien-Verlag, 2011, pp. 17–29.","short":"T. Jenert, A. Gebhardt, R. Käser, Zeitschrift Für E-Learning 6 (2011) 17–29.","apa":"Jenert, T., Gebhardt, A., &#38; Käser, R. (2011). Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift Für E-Learning</i>, <i>6</i>(2), 17–29."},"page":"17-29","intvolume":"         6","year":"2011","author":[{"last_name":"Jenert","full_name":"Jenert, Tobias","first_name":"Tobias"},{"first_name":"Anja","last_name":"Gebhardt","full_name":"Gebhardt, Anja"},{"first_name":"Reto","full_name":"Käser, Reto","last_name":"Käser"}],"date_created":"2018-09-18T09:23:54Z","volume":6,"publisher":"Studien-Verlag","date_updated":"2022-01-06T07:01:03Z","title":"Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung"},{"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["e-voting","Internet voting","Internet election","security","verifiability","RIES","Estonia","Neuch{\\^a}tel"],"publication":"IEEE Transactions on Information Forensics \\& Security","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-18T13:16:07Z","creator":"hsiemes","date_created":"2018-12-18T13:16:07Z","file_size":1544790,"file_name":"JOURNAL VERSION.pdf","access_level":"open_access","file_id":"6316"}],"abstract":[{"text":"Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence.","lang":"eng"}],"date_created":"2018-11-14T14:06:44Z","publisher":"IEEE","title":"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland","issue":"4 Part","year":"2009","user_id":"61579","department":[{"_id":"277"}],"_id":"5621","file_date_updated":"2018-12-18T13:16:07Z","extern":"1","type":"journal_article","status":"public","author":[{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"last_name":"Rich","full_name":"Rich, Eliot","first_name":"Eliot"}],"volume":4,"date_updated":"2022-01-06T07:02:12Z","oa":"1","has_accepted_license":"1","citation":{"ama":"Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>. 2009;4(4 Part):729-744.","ieee":"G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744, 2009.","chicago":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i> 4, no. 4 Part (2009): 729–44.","bibtex":"@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \\&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }","short":"G. Schryen, E. Rich, IEEE Transactions on Information Forensics \\&#38; Security 4 (2009) 729–744.","mla":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.","apa":"Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, <i>4</i>(4 Part), 729–744."},"intvolume":"         4","page":"729-744"},{"title":"Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.","conference":{"location":"Siegen","end_date":"2007-09-17","start_date":"2007-09-17","name":"DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik e.V."},"publisher":"Logos Verlag","date_updated":"2022-01-06T07:01:06Z","author":[{"full_name":"Sporer, Thomas","last_name":"Sporer","first_name":"Thomas"},{"first_name":"Tobias","last_name":"Jenert","orcid":" https://orcid.org/0000-0001-9262-5646","full_name":"Jenert, Tobias","id":"71994"},{"first_name":"Bernhard","full_name":"Strehl, Bernhard","last_name":"Strehl"},{"last_name":"Noack","full_name":"Noack, Patrick Ole","first_name":"Patrick Ole"}],"date_created":"2018-09-19T09:08:18Z","year":"2007","page":"19--26","citation":{"ieee":"T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI Workshops</i>, Siegen, 2007, pp. 19--26.","chicago":"Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.","ama":"Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>. Logos Verlag; 2007:19--26.","mla":"Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag, 2007, pp. 19--26.","bibtex":"@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }","short":"T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos Verlag, 2007, pp. 19--26.","apa":"Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag."},"keyword":["E-Portfolios","Lerngemeinschaften","Praxisgemeinschaften","Projektgruppen","Hochschulstudium","informelles Lernen"],"extern":"1","alternative_title":["Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik DeLFI 2007"],"_id":"4494","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","status":"public","publication":"DeLFI Workshops","type":"conference"},{"title":"Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"","conference":{"start_date":"2007-06-17","name":"Second European Conference on Technology Enhanced Learning (EC-TEL) 2007","location":"Kreta ","end_date":"2007-06-20 "},"date_updated":"2022-01-06T07:01:06Z","author":[{"full_name":"Sporer, Thomas","last_name":"Sporer","first_name":"Thomas"},{"last_name":"Heinze","full_name":"Heinze, Nina","first_name":"Nina"},{"first_name":"Tobias","last_name":"Jenert","orcid":" https://orcid.org/0000-0001-9262-5646","id":"71994","full_name":"Jenert, Tobias"},{"first_name":"Gabi","last_name":"Reinmann","full_name":"Reinmann, Gabi"}],"date_created":"2018-09-19T09:22:02Z","year":"2007","citation":{"ama":"Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". In: ; 2007.","chicago":"Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” 2007.","ieee":"T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta , 2007.","apa":"Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta .","mla":"Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"</i>. 2007.","bibtex":"@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"}, author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi}, year={2007} }","short":"T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007."},"keyword":["Problem Solving Competencies","E-Portfolio"],"extern":"1","alternative_title":["Creating New Learning Experiences on a Global Scale"],"_id":"4497","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","status":"public","type":"conference"},{"date_created":"2018-11-14T14:51:41Z","title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","issue":"2","year":"2007","keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"ddc":["000"],"language":[{"iso":"eng"}],"publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)","abstract":[{"text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"6324","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","file_size":100448,"date_created":"2018-12-18T13:25:12Z","creator":"hsiemes","date_updated":"2018-12-18T13:25:12Z"}],"oa":"1","date_updated":"2022-01-06T07:02:22Z","volume":3,"author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"has_accepted_license":"1","intvolume":"         3","page":"66-90","citation":{"apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.","short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90.","ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.","ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>. 2007;3(2):66-90."},"_id":"5655","department":[{"_id":"277"}],"user_id":"61579","extern":"1","file_date_updated":"2018-12-18T13:25:12Z","type":"journal_article","status":"public"},{"oa":"1","date_updated":"2022-01-06T07:02:24Z","author":[{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"}],"citation":{"ama":"Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>. Westpoint; 2005:37-41.","chicago":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 37–41. Westpoint, 2005.","ieee":"G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 2005, pp. 37–41.","apa":"Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i> (pp. 37–41). Westpoint.","short":"G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41.","mla":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, Westpoint, 2005, pp. 37–41.","bibtex":"@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses}, booktitle={Proceedings of the 6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen, Guido}, year={2005}, pages={37–41} }"},"page":"37-41","has_accepted_license":"1","file_date_updated":"2018-12-18T13:31:41Z","extern":"1","_id":"5661","user_id":"61579","department":[{"_id":"277"}],"status":"public","type":"conference","title":"An e-mail honeypot addressing spammers' behavior in collecting and applying addresses","publisher":"Westpoint","date_created":"2018-11-14T14:55:48Z","year":"2005","ddc":["000"],"keyword":["Spam","ham","e-mail","honeypot","address obscuring technique","address taxonomy"],"language":[{"iso":"eng"}],"abstract":[{"text":"Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":119362,"file_name":"Schryen - An e-mail honeypot addressing spammers' behavior in collecting and applying addresses.pdf","access_level":"open_access","file_id":"6331","date_updated":"2018-12-18T13:31:41Z","date_created":"2018-12-18T13:31:41Z","creator":"hsiemes"}],"publication":"Proceedings of the 6th IEEE Information Assurance Workshop"},{"language":[{"iso":"eng"}],"keyword":["Spam","E-Mail","Spoofing","Blockieren","Filtern","Lightweight Mail Transfer Agent Authentication Protocol (LMAP)"],"ddc":["000"],"file":[{"file_name":"Verlagsversion Guido_Schryen__281__288.pdf","access_level":"open_access","file_id":"6338","file_size":288686,"creator":"hsiemes","date_created":"2018-12-18T13:36:34Z","date_updated":"2018-12-18T13:36:34Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam."}],"publication":"Wirtschaftsinformatik","title":"Effektivität von Lösungsansätzen zur Bekämpfung von Spam","date_created":"2018-11-14T14:56:51Z","publisher":"Springer","year":"2004","issue":"4","file_date_updated":"2018-12-18T13:36:34Z","extern":"1","department":[{"_id":"277"}],"user_id":"61579","_id":"5662","status":"public","type":"journal_article","volume":46,"author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"}],"oa":"1","date_updated":"2022-01-06T07:02:24Z","intvolume":"        46","page":"281-288","citation":{"short":"G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.","bibtex":"@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido}, year={2004}, pages={281–288} }","mla":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.","apa":"Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288.","ama":"Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>. 2004;46(4):281-288.","ieee":"G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, pp. 281–288, 2004.","chicago":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88."},"has_accepted_license":"1"},{"publisher":"IADIS Press","date_created":"2018-11-14T14:59:03Z","title":"Fighting Spam: Motivating an Account-based Approach","year":"2004","ddc":["000"],"keyword":["e-mail","spam","filtering","blocking","LMAP","SMTP account"],"language":[{"iso":"eng"}],"publication":"Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2","abstract":[{"text":"Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-18T13:33:30Z","creator":"hsiemes","date_updated":"2018-12-18T13:33:30Z","file_name":"Fighting Spam_Motivating an account-based approach.pdf","access_level":"open_access","file_id":"6333","file_size":46083}],"oa":"1","date_updated":"2022-01-06T07:02:25Z","author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"has_accepted_license":"1","place":"Madrid","citation":{"apa":"Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.","mla":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, IADIS Press, 2004, pp. 937–40.","short":"G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.","bibtex":"@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating an Account-based Approach}, booktitle={Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }","ama":"Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.","ieee":"G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp. 937–940.","chicago":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004."},"page":"937-940","_id":"5663","user_id":"61579","department":[{"_id":"277"}],"extern":"1","file_date_updated":"2018-12-18T13:33:30Z","type":"conference","editor":[{"full_name":"Isaias, Pedro","last_name":"Isaias","first_name":"Pedro"}],"status":"public"},{"citation":{"ama":"Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.","ieee":"G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press, 2003, pp. 1017–1021.","chicago":"Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve: IADIS Press, 2003.","apa":"Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021). Algarve: IADIS Press.","bibtex":"@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting}, booktitle={Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021} }","short":"G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.","mla":"Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp. 1017–21."},"page":"1017-1021","year":"2003","place":"Algarve","date_created":"2018-11-14T15:01:49Z","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"date_updated":"2022-01-06T07:02:25Z","publisher":"IADIS Press","title":"E-Democracy: Internet Voting","type":"book_chapter","publication":"Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2","status":"public","abstract":[{"lang":"eng","text":"Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out."}],"user_id":"61579","department":[{"_id":"277"}],"_id":"5667","extern":"1","language":[{"iso":"eng"}],"keyword":["Internet Voting","Online polls","E-Democracy","Security"]},{"publication":"6. Internationale Tagung Wirtschaftsinformatik","type":"conference","abstract":[{"lang":"eng","text":"Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen."}],"status":"public","file":[{"date_created":"2018-12-18T13:40:14Z","creator":"hsiemes","date_updated":"2018-12-18T13:40:14Z","access_level":"open_access","file_name":"Schryen - Internet-Wahlen.pdf","file_id":"6340","file_size":364380,"content_type":"application/pdf","relation":"main_file"}],"_id":"5668","department":[{"_id":"277"}],"user_id":"61579","keyword":["Internet-Wahlen","E-Democracy","Sicherheit","Kryptographie"],"ddc":["000"],"extern":"1","file_date_updated":"2018-12-18T13:40:14Z","language":[{"iso":"eng"}],"has_accepted_license":"1","year":"2003","page":"937-956","citation":{"apa":"Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i> (pp. 937–956).","short":"G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–956.","mla":"Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–56.","bibtex":"@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956} }","chicago":"Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 937–56, 2003.","ieee":"G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–956.","ama":"Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>. ; 2003:937-956."},"oa":"1","date_updated":"2022-01-06T07:02:26Z","author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"date_created":"2018-11-14T15:03:15Z","title":"Internet-Wahlen"},{"_id":"5623","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"keyword":["Elektronisches Papier","Elektronische Tinte","E Ink","Gyricon Media","Displays","Mobile Endger{\\"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:43:09Z","extern":"1","type":"journal_article","publication":"Wirtschaftsinformatik","abstract":[{"text":"Mit dem elektronischen Papier wird in der Displayforschung ein neuer materialtechnologischer Ansatz verfolgt: Elektronisches Papier besteht aus einer dünnen, flexiblen Folie, in der farbige Pigmente mittels elektrischer Felder ausgerichtet werden. Die Vorteile gegenüber traditionellen Technologien wie beispielsweise LCD-Displays bestehen zum einen in niedrigeren Herstellungskosten (niedrigere Produktionskosten und geringere Materialkosten) und einem geringeren Gewicht. Zum anderen entsteht eine bessere Lesbarkeit, da sich Reflexion, Kontrast und mögliche Betrachtungswinkel verbessern bzw. vergrößern. Diese Potenziale können bei Anzeigetafeln, Computerdisplays und mobilen Endgeräten ausgeschöpft werden. Mit der Eigenschaft, fast beliebige Materialien als Trägermedium zu verwenden, öffnet sich auch die Anwendungsmöglichkeit des biegsamen, elektronischen Mediums für Zeitungen und Zeitschriften. Die US-Unternehmen E Ink und Gyricon Media bieten eine zunehmend größere Produktpalette mit elektronischem Papier an.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":415354,"access_level":"open_access","file_id":"6344","file_name":"Schryen Karla - ElektronischesPapier.pdf","date_updated":"2018-12-18T13:43:09Z","date_created":"2018-12-18T13:43:09Z","creator":"hsiemes"}],"status":"public","oa":"1","date_updated":"2022-01-06T07:02:12Z","publisher":"Springer","date_created":"2018-11-14T14:08:02Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"},{"full_name":"Karla, Jürgen","last_name":"Karla","first_name":"Jürgen"}],"volume":44,"title":"Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum","has_accepted_license":"1","issue":"6","year":"2002","citation":{"apa":"Schryen, G., &#38; Karla, J. (2002). Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum. <i>Wirtschaftsinformatik</i>, <i>44</i>(6), 567–574.","short":"G. Schryen, J. Karla, Wirtschaftsinformatik 44 (2002) 567–574.","mla":"Schryen, Guido, and Jürgen Karla. “Elektronisches Papier - Display-Technologie Mit Weitem Anwendungsspektrum.” <i>Wirtschaftsinformatik</i>, vol. 44, no. 6, Springer, 2002, pp. 567–74.","bibtex":"@article{Schryen_Karla_2002, title={Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum}, volume={44}, number={6}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido and Karla, Jürgen}, year={2002}, pages={567–574} }","ieee":"G. Schryen and J. Karla, “Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum,” <i>Wirtschaftsinformatik</i>, vol. 44, no. 6, pp. 567–574, 2002.","chicago":"Schryen, Guido, and Jürgen Karla. “Elektronisches Papier - Display-Technologie Mit Weitem Anwendungsspektrum.” <i>Wirtschaftsinformatik</i> 44, no. 6 (2002): 567–74.","ama":"Schryen G, Karla J. Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum. <i>Wirtschaftsinformatik</i>. 2002;44(6):567-574."},"page":"567-574","intvolume":"        44"}]
