[{"doi":"10.3278/HSL2606W","main_file_link":[{"open_access":"1","url":"https://www.wbv.de/shop/Paderborner-Beitraege-2025-HSLT2601W"}],"date_updated":"2026-02-03T10:59:36Z","oa":"1","volume":12,"author":[{"last_name":"Hannebohm","id":"27419","full_name":"Hannebohm, Ronja","first_name":"Ronja"}],"intvolume":"        12","page":"65-80","citation":{"chicago":"Hannebohm, Ronja. “Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft.” <i>die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre</i> 12 (2026): 65–80. <a href=\"https://doi.org/10.3278/HSL2606W\">https://doi.org/10.3278/HSL2606W</a>.","ieee":"R. Hannebohm, “Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft,” <i>die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre</i>, vol. 12, pp. 65–80, 2026, doi: <a href=\"https://doi.org/10.3278/HSL2606W\">10.3278/HSL2606W</a>.","ama":"Hannebohm R. Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft. <i>die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre</i>. 2026;12:65-80. doi:<a href=\"https://doi.org/10.3278/HSL2606W\">10.3278/HSL2606W</a>","apa":"Hannebohm, R. (2026). Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft. <i>die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre</i>, <i>12</i>, 65–80. <a href=\"https://doi.org/10.3278/HSL2606W\">https://doi.org/10.3278/HSL2606W</a>","mla":"Hannebohm, Ronja. “Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft.” <i>die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre</i>, vol. 12, wbv, 2026, pp. 65–80, doi:<a href=\"https://doi.org/10.3278/HSL2606W\">10.3278/HSL2606W</a>.","bibtex":"@article{Hannebohm_2026, title={Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft}, volume={12}, DOI={<a href=\"https://doi.org/10.3278/HSL2606W\">10.3278/HSL2606W</a>}, journal={die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre}, publisher={wbv}, author={Hannebohm, Ronja}, year={2026}, pages={65–80} }","short":"R. Hannebohm, die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre 12 (2026) 65–80."},"publication_identifier":{"issn":["2199–8825"]},"publication_status":"published","article_type":"original","_id":"61463","department":[{"_id":"116"}],"user_id":"27419","status":"public","type":"journal_article","title":"Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und Kulturwissenschaft","publisher":"wbv","date_created":"2025-09-29T12:34:48Z","year":"2026","quality_controlled":"1","keyword":["Portfolioarbeit","portfolio work","vernetztes Wissen","knowledge networks","Beobachtung","naturalistic observation","Inhaltsanalyse","content analysis"],"language":[{"iso":"ger"}],"abstract":[{"text":"Vernetztes Wissen ist ein zentrales Lernziel des Hochschulstudiums, insbesondere im interdisziplinär angelegten Studienfach Komparatistik. Um den Aufbau vernetzten Wissens bei Bachelorstudierenden der Komparatistik zu unterstützen, ist in diesem Projekt Portfolioarbeit eingesetzt worden, die als Methode selbsttätigen und selbstreflexiven Lernens geeignet erscheint, zur Auseinandersetzung mit Lerninhalten zu motivieren und zur Kompetenzentwicklung der Studierenden beizutragen. Mittels unstrukturierter Beobachtungen der Portfolioarbeit im Seminar sind inhaltliche Effekte und methodische Entwicklungen erfasst worden. Anhand anteilig quantitativer, überwiegend qualitativer Inhaltsanalysen der Portfolios sind konkrete Vernetzungen zwischen Lerninhalten ermittelt worden. Die Explorationsstudie zeigt veränderte Perspektiven und geweckte Interessen bei den Studierenden durch die Portfolioarbeit sowie vielfältige Kontextualisierungen, Vergleiche und Verknüpfungen in den Portfolios auf und bietet hierdurch einen möglichen Ansatzpunkt für strukturelle Empfehlungen für das Studienfach Komparatistik.","lang":"ger"},{"lang":"eng","text":"Knowledge networks are a central learning objective in higher education, especially in the inherently interdisciplinary discipline of comparative literary and cultural studies. To support the development of knowledge networks with undergraduate students of comparative literary and cultural studies, this project utilized portfolio work as a method of self-actuating and self-reflective learning suitable for motivating examinations of learning contents and contributing to students’ skill development. Using naturalistic observations of the portfolio work within the seminar, effects and developments were recorded. With partly quantitative, predominantly qualitative content analyses of the portfolios, concrete connections between learning contents were determined. The explorative study shows changed perspectives and peaked interests of the students because of portfolio work as well as diverse contextualisations, comparisons and connections in the portfolios, thus offering a possible starting point for structural recommendations for the discipline of comparative literary and cultural studies."}],"publication":"die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre"},{"edition":"1","quality_controlled":"1","publication_status":"inpress","citation":{"short":"N. Milkov, in: A.H. Khani , G. Kemp  (Eds.), Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II, 1st ed., Routledge, London, n.d.","bibtex":"@inbook{Milkov, place={London}, edition={1}, title={Wisdom’s Wittgenstein}, booktitle={Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II}, publisher={Routledge}, author={Milkov, Nikolay}, editor={Khani , Ali Hossein  and Kemp , Gary } }","mla":"Milkov, Nikolay. “Wisdom’s Wittgenstein.” <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed., Routledge.","apa":"Milkov, N. (n.d.). Wisdom’s Wittgenstein. In A. H. Khani  &#38; G. Kemp  (Eds.), <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II</i> (1st ed.). Routledge.","chicago":"Milkov, Nikolay. “Wisdom’s Wittgenstein.” In <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed. London: Routledge, n.d.","ieee":"N. Milkov, “Wisdom’s Wittgenstein,” in <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II</i>, 1st ed., A. H. Khani  and G. Kemp , Eds. London: Routledge.","ama":"Milkov N. Wisdom’s Wittgenstein. In: Khani  AH, Kemp  G, eds. <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume II</i>. 1st ed. Routledge."},"place":"London","year":"2025","author":[{"full_name":"Milkov, Nikolay","id":"357","last_name":"Milkov","first_name":"Nikolay"}],"date_created":"2025-02-24T18:33:50Z","publisher":"Routledge","date_updated":"2025-02-24T18:38:38Z","title":"Wisdom's Wittgenstein","publication":"Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume II","type":"book_chapter","status":"public","abstract":[{"lang":"eng","text":"In 1921, John Wisdom (1904–1993) became a member of Fitzwilliam House, Cambridge, where he read philosophy and attended lectures by G. E. Moore, C. D. Broad, and J. E. McTaggart. He received his BA in 1924, after which he worked for five years at the National Institute of Industrial Psychology. From 1929 to 1934, Wisdom was a Lecturer in the department of logic and metaphysics at the University of St Andrews and a colleague of G. F. Stout. After the publication of his book Interpretation and Analysis (1931) and five articles on “Logical Constructions” in Mind (1931–3), Wisdom became a Lecturer in Moral Sciences in Cambridge and a Fellow of Trinity College. This gave him the opportunity to gain first-hand knowledge of Wittgenstein’s philosophy. Since nothing by Wittgenstein but Tractatus appeared in print for decades, Wisdom’s publications of these years were—mistakenly—read as portents of the new ideas of Wittgenstein himself. The publication of Wittgenstein’s Philosophical Investigations in 1953 brought with it, among other things, the fall of Wisdom’s popularity. "}],"editor":[{"first_name":"Ali Hossein ","full_name":"Khani , Ali Hossein ","last_name":"Khani "},{"first_name":"Gary ","last_name":"Kemp ","full_name":"Kemp , Gary "}],"department":[{"_id":"14"}],"user_id":"357","_id":"58822","language":[{"iso":"eng"}],"keyword":["elucidation","facts","Frege","language","metaphysics","G. E. Moore","Russell","Stebbing","John Wisdom","Wittgenstein"]},{"date_created":"2025-02-24T18:29:59Z","author":[{"last_name":"Milkov","id":"357","full_name":"Milkov, Nikolay","first_name":"Nikolay"}],"date_updated":"2025-02-24T18:30:06Z","publisher":"Routledge","title":"Stebbing's Wittgenstein","edition":"1","quality_controlled":"1","publication_status":"inpress","citation":{"ama":"Milkov N. Stebbing’s Wittgenstein. In: Khani  AH, Kemp  G, eds. <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>. 1st ed. Routledge.","chicago":"Milkov, Nikolay. “Stebbing’s Wittgenstein.” In <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed. London: Routledge, n.d.","ieee":"N. Milkov, “Stebbing’s Wittgenstein,” in <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II</i>, 1st ed., A. H. Khani  and G. Kemp , Eds. London: Routledge.","apa":"Milkov, N. (n.d.). Stebbing’s Wittgenstein. In A. H. Khani  &#38; G. Kemp  (Eds.), <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II</i> (1st ed.). Routledge.","short":"N. Milkov, in: A.H. Khani , G. Kemp  (Eds.), Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II, 1st ed., Routledge, London, n.d.","bibtex":"@inbook{Milkov, place={London}, edition={1}, title={Stebbing’s Wittgenstein}, booktitle={Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II}, publisher={Routledge}, author={Milkov, Nikolay}, editor={Khani , Ali Hossein  and Kemp , Gary } }","mla":"Milkov, Nikolay. “Stebbing’s Wittgenstein.” <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed., Routledge."},"year":"2025","place":"London","department":[{"_id":"14"}],"user_id":"357","_id":"58821","language":[{"iso":"eng"}],"keyword":["directional analysis","elucidation","facts","metaphysics","G. E. Moore","Russell","Stebbing","John Wisdom","Wittgenstein"],"ddc":["100"],"publication":"Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary Analytic Philosophers, vol. II","type":"book_chapter","status":"public","editor":[{"full_name":"Khani , Ali Hossein ","last_name":"Khani ","first_name":"Ali Hossein "},{"first_name":"Gary ","full_name":"Kemp , Gary ","last_name":"Kemp "}],"abstract":[{"lang":"eng","text":"Susan Stebbing wrote only once on Wittgenstein, in her paper ‘Logical Positivism and Analysis’ (1933). The paper was unusually critical of Wittgenstein. It put the Cambridge analytic philosophy of Moore and Russell in a sharp opposition to the positivist philosophy of the Vienna Circle, in which Stebbing included Wittgenstein. Whereas the positivists were interested in analysing language, the Cambridge realists were analysing facts. To be more explicit, the analytic philosophers were engaged in directional analysis, which seeks to illuminate (to elucidate) the multiplicity of the analysed facts. In contrast, positivists aimed at a final analysis that proves that there are simples. Stebbing’s sympathies were clearly on the side of the Cambridge realists. The important implication of Stebbing’s paper was that it urged Wittgenstein to change the style of his philosophy, abandoning those points which allegedly connected him with the Vienna Circle."}]},{"language":[{"iso":"ger"}],"keyword":["E-Learning","information competence","literature","library","research"],"ddc":["020"],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2022-09-08T09:05:22Z","creator":"chogg","date_updated":"2022-09-08T09:05:22Z","file_id":"33300","file_name":"HSL2012W.pdf","access_level":"open_access","file_size":318104}],"abstract":[{"text":"The aim of this study was to find out whether teaching how to search for literature\r\nwould be more beneficial to students and teachers if done online through short videos\r\nrather than in person during course time. To find out whether online videos are more\r\nbeneficial, two courses were asked to fill in questionnaires, one at the beginning and\r\none at the end of the semester. One of the courses received the input online via videos\r\nand were given an exercise to put the newly learned skills to use, the other course\r\nserved as a control group and learned how to search for literature during the course.\r\nThe results show that while the difference between the two groups is not significant,\r\nthe videos can still be regarded as being more beneficial than teaching the necessary\r\nskills during course time.","lang":"eng"}],"publication":"die hochschullehre","title":"Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen","date_created":"2022-09-08T09:05:30Z","year":"2020","issue":"6","file_date_updated":"2022-09-08T09:05:22Z","department":[{"_id":"1"},{"_id":"384"}],"user_id":"14931","_id":"33299","status":"public","type":"journal_article","main_file_link":[{"open_access":"1","url":"http://www.hochschullehre.org/wp-content/files/diehochschullehre_2020_Hahn_Informationskompetenz.pdf"}],"author":[{"first_name":"Charlotte Anna","last_name":"Hahn","full_name":"Hahn, Charlotte Anna","id":"25934"}],"oa":"1","date_updated":"2023-10-13T10:17:31Z","citation":{"short":"C.A. Hahn, die hochschullehre (2020).","mla":"Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen.” <i>die hochschullehre</i>, no. 6, 2020.","bibtex":"@article{Hahn_2020, title={Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen}, number={6}, journal={die hochschullehre}, author={Hahn, Charlotte Anna}, year={2020} }","apa":"Hahn, C. A. (2020). Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen. <i>die hochschullehre</i>, <i>6</i>.","ieee":"C. A. Hahn, “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen,” <i>die hochschullehre</i>, no. 6, 2020.","chicago":"Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen.” <i>die hochschullehre</i>, no. 6 (2020).","ama":"Hahn CA. Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen. <i>die hochschullehre</i>. 2020;(6)."},"publication_identifier":{"eissn":["ISSN 2199-8825"]},"has_accepted_license":"1","publication_status":"published"},{"year":"2019","jel":["C61","G01","G11","G15","G23"],"citation":{"chicago":"Hippert, Benjamin, André Uhde, and Sascha Tobias Wengerek. “Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe.” <i>Review of Derivatives Research </i> 22, no. 2 (2019): 203–59. <a href=\"https://doi.org/10.1007/s11147-018-9148-8\">https://doi.org/10.1007/s11147-018-9148-8</a>.","ieee":"B. Hippert, A. Uhde, and S. T. Wengerek, “Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe,” <i>Review of Derivatives Research </i>, vol. 22, no. 2, pp. 203–259, 2019, doi: <a href=\"https://doi.org/10.1007/s11147-018-9148-8\">https://doi.org/10.1007/s11147-018-9148-8</a>.","ama":"Hippert B, Uhde A, Wengerek ST. Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe. <i>Review of Derivatives Research </i>. 2019;22(2):203-259. doi:<a href=\"https://doi.org/10.1007/s11147-018-9148-8\">https://doi.org/10.1007/s11147-018-9148-8</a>","apa":"Hippert, B., Uhde, A., &#38; Wengerek, S. T. (2019). Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe. <i>Review of Derivatives Research </i>, <i>22</i>(2), 203–259. <a href=\"https://doi.org/10.1007/s11147-018-9148-8\">https://doi.org/10.1007/s11147-018-9148-8</a>","mla":"Hippert, Benjamin, et al. “Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe.” <i>Review of Derivatives Research </i>, vol. 22, no. 2, 2019, pp. 203–59, doi:<a href=\"https://doi.org/10.1007/s11147-018-9148-8\">https://doi.org/10.1007/s11147-018-9148-8</a>.","short":"B. Hippert, A. Uhde, S.T. Wengerek, Review of Derivatives Research  22 (2019) 203–259.","bibtex":"@article{Hippert_Uhde_Wengerek_2019, title={Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe}, volume={22}, DOI={<a href=\"https://doi.org/10.1007/s11147-018-9148-8\">https://doi.org/10.1007/s11147-018-9148-8</a>}, number={2}, journal={Review of Derivatives Research }, author={Hippert, Benjamin and Uhde, André and Wengerek, Sascha Tobias}, year={2019}, pages={203–259} }"},"page":"203-259","intvolume":"        22","publication_status":"published","issue":"2","title":"Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North America and Europe","doi":"https://doi.org/10.1007/s11147-018-9148-8","date_updated":"2022-05-04T06:15:02Z","author":[{"first_name":"Benjamin","full_name":"Hippert, Benjamin","id":"48476","last_name":"Hippert"},{"full_name":"Uhde, André","id":"36049","orcid":"https://orcid.org/0000-0002-8058-8857","last_name":"Uhde","first_name":"André"},{"orcid":"0000-0002-7820-3903","last_name":"Wengerek","full_name":"Wengerek, Sascha Tobias","id":"48837","first_name":"Sascha Tobias"}],"date_created":"2018-10-01T12:17:35Z","volume":22,"abstract":[{"lang":"eng","text":"Employing main and sector-specific investment-grade CDS indices from the North American and European CDS market and performing mean-variance out-of-sample analyses for conservative and aggressive investors over the period from 2006 to 2014, this paper analyzes portfolio benefits of adding corporate CDS indices to a traditional financial portfolio consisting of stock and sovereign bond indices. As a baseline result, we initially find an increase in portfolio (downside) risk-diversification when adding CDS indices, which is observed irrespective of both CDS markets, investor-types and different sub-periods, including the global financial crisis and European sovereign debt crisis. In addition, the analysis reveals higher portfolio excess returns and performance in CDS index portfolios, however, these effects clearly differ between markets, investor-types and sub-periods. Overall, portfolio benefits of adding CDS indices mainly result from the fact that institutional investors replace sovereign bond indices rather than stock indices by CDS indices due to better risk-return characteristics. Our baseline findings remain robust under a variety of robustness checks. Results from sensitivity analyses provide further important implications for institutional investors with a strategic focus on a long-term conservative portfolio management."}],"status":"public","type":"journal_article","publication":"Review of Derivatives Research ","article_type":"original","keyword":["Corporate credit default swap indices","Mean-variance asset allocation","Out-of-sample portfolio optimization","Portfolio risk-diversification","Portfolio performance evaluation"],"language":[{"iso":"eng"}],"_id":"4562","user_id":"36049","department":[{"_id":"188"},{"_id":"186"}]},{"file":[{"access_level":"open_access","file_name":"EJOR article.pdf","file_id":"6025","file_size":762889,"creator":"hsiemes","date_created":"2018-12-07T11:30:59Z","date_updated":"2018-12-13T15:06:56Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Multi-attribute value theory (MAVT)-based recommender systems have been proposed for dealing with issues of existing recommender systems, such as the cold-start problem and changing preferences. However, as we argue in this paper, existing MAVT-based methods for measuring attribute importance weights do not fit the shopping tasks for which recommender systems are typically used. These methods assume well-trained decision makers who are willing to invest time and cognitive effort, and who are familiar with the attributes describing the available alternatives and the ranges of these attribute levels. Yet, recommender systems are most often used by consumers who are usually not familiar with the available attributes and ranges and who wish to save time and effort. Against this background, we develop a new method, based on a product configuration process, which is tailored to the characteristics of these particular decision makers. We empirically compare our method to SWING, ranking-based conjoint analysis and TRADEOFF in a between-subjects laboratory experiment with 153 participants. Results indicate that our proposed method performs better than TRADEOFF and CONJOINT and at least as well as SWING in terms of recommendation accuracy, better than SWING and TRADEOFF and at least as well as CONJOINT in terms of cognitive load, and that participants were faster with our method than with any other method. We conclude that our method is a promising option to help support consumers' decision processes in e-commerce shopping tasks.","lang":"eng"}],"publication":"European Journal of Operational Research","language":[{"iso":"eng"}],"keyword":["E-Commerce","Recommender System","Attribute Weights","Configuration System","Decision Support"],"ddc":["000"],"year":"2017","issue":"1","title":"A configuration-based recommender system for supporting e-commerce decisions","date_created":"2018-11-14T15:06:18Z","publisher":"Elsevier","status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-13T15:06:56Z","department":[{"_id":"277"}],"user_id":"61579","_id":"5671","page":"205 - 215","intvolume":"       259","citation":{"ama":"Scholz M, Dorner V, Schryen G, Benlian A. A configuration-based recommender system for supporting e-commerce decisions. <i>European Journal of Operational Research</i>. 2017;259(1):205-215.","ieee":"M. Scholz, V. Dorner, G. Schryen, and A. Benlian, “A configuration-based recommender system for supporting e-commerce decisions,” <i>European Journal of Operational Research</i>, vol. 259, no. 1, pp. 205–215, 2017.","chicago":"Scholz, Michael, Verena Dorner, Guido Schryen, and Alexander Benlian. “A Configuration-Based Recommender System for Supporting e-Commerce Decisions.” <i>European Journal of Operational Research</i> 259, no. 1 (2017): 205–15.","apa":"Scholz, M., Dorner, V., Schryen, G., &#38; Benlian, A. (2017). A configuration-based recommender system for supporting e-commerce decisions. <i>European Journal of Operational Research</i>, <i>259</i>(1), 205–215.","bibtex":"@article{Scholz_Dorner_Schryen_Benlian_2017, title={A configuration-based recommender system for supporting e-commerce decisions}, volume={259}, number={1}, journal={European Journal of Operational Research}, publisher={Elsevier}, author={Scholz, Michael and Dorner, Verena and Schryen, Guido and Benlian, Alexander}, year={2017}, pages={205–215} }","short":"M. Scholz, V. Dorner, G. Schryen, A. Benlian, European Journal of Operational Research 259 (2017) 205–215.","mla":"Scholz, Michael, et al. “A Configuration-Based Recommender System for Supporting e-Commerce Decisions.” <i>European Journal of Operational Research</i>, vol. 259, no. 1, Elsevier, 2017, pp. 205–15."},"has_accepted_license":"1","volume":259,"author":[{"first_name":"Michael","last_name":"Scholz","full_name":"Scholz, Michael"},{"full_name":"Dorner, Verena","last_name":"Dorner","first_name":"Verena"},{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"last_name":"Benlian","full_name":"Benlian, Alexander","first_name":"Alexander"}],"oa":"1","date_updated":"2022-01-06T07:02:27Z"},{"citation":{"short":"S. Praetorius, D. Al-Kabbani, C. Bohndick, J. Hilkenmeier, S.T. König, H.S. Müsche, S. Sommer, K.B. Klingsieck, Zeitschrift für Hochschulentwicklung 11 (2016) 213–245.","mla":"Praetorius, Saskia, et al. “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. .” <i>Zeitschrift für Hochschulentwicklung</i>, vol. 11, no. 3, 2016, pp. 213–45.","bibtex":"@article{Praetorius_Al-Kabbani_Bohndick_Hilkenmeier_König_Müsche_Sommer_Klingsieck_2016, title={Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. }, volume={11}, number={3}, journal={Zeitschrift für Hochschulentwicklung}, author={Praetorius, Saskia and Al-Kabbani, Daniel and Bohndick, Carla and Hilkenmeier, Johanna and König, Sebastian T. and Müsche, Hannah S. and Sommer, Sabrina and Klingsieck, Katrin B.}, year={2016}, pages={213–245} }","apa":"Praetorius, S., Al-Kabbani, D., Bohndick, C., Hilkenmeier, J., König, S. T., Müsche, H. S., Sommer, S., &#38; Klingsieck, K. B. (2016). Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. . <i>Zeitschrift für Hochschulentwicklung</i>, <i>11</i>(3), 213–245.","ieee":"S. Praetorius <i>et al.</i>, “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. ,” <i>Zeitschrift für Hochschulentwicklung</i>, vol. 11, no. 3, pp. 213–245, 2016.","chicago":"Praetorius, Saskia, Daniel Al-Kabbani, Carla Bohndick, Johanna Hilkenmeier, Sebastian T. König, Hannah S. Müsche, Sabrina Sommer, and Katrin B. Klingsieck. “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. .” <i>Zeitschrift für Hochschulentwicklung</i> 11, no. 3 (2016): 213–45.","ama":"Praetorius S, Al-Kabbani D, Bohndick C, et al. Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. . <i>Zeitschrift für Hochschulentwicklung</i>. 2016;11(3):213-245."},"page":"213-245","intvolume":"        11","year":"2016","issue":"3","publication_status":"published","quality_controlled":"1","title":"Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. ","date_created":"2023-10-25T10:28:54Z","author":[{"full_name":"Praetorius, Saskia","id":"40787","last_name":"Praetorius","first_name":"Saskia"},{"first_name":"Daniel","last_name":"Al-Kabbani","full_name":"Al-Kabbani, Daniel"},{"full_name":"Bohndick, Carla","last_name":"Bohndick","first_name":"Carla"},{"last_name":"Hilkenmeier","full_name":"Hilkenmeier, Johanna","first_name":"Johanna"},{"first_name":"Sebastian T.","last_name":"König","full_name":"König, Sebastian T."},{"first_name":"Hannah S.","full_name":"Müsche, Hannah S.","last_name":"Müsche"},{"last_name":"Sommer","id":"36251","full_name":"Sommer, Sabrina","first_name":"Sabrina"},{"first_name":"Katrin B.","last_name":"Klingsieck","full_name":"Klingsieck, Katrin B.","id":"36716"}],"volume":11,"date_updated":"2023-11-28T20:39:27Z","status":"public","abstract":[{"lang":"ger","text":"Über das Lehramtsstudium sollen Studierende unter anderem dazu befähigt werden, die Leistung ihrer Schüler/innenzu bewerten. Dazu müssen sie Einflussfaktoren auf Schulleistung kennen und diese richtig diagnostizieren und fördern können. Mit diesem Beitrag wird eine game-und E-Learning-gestützte Lernumgebung vorgestellt, in der Studierende –anders als in vielen inputorientierten Seminarkonzepten –in einem virtuellen Klassenzimmer an realitätsnahen Fällen lernen,problembasiert zu diagnostizieren und zu fördern. Über denEinsatz der Lernumgebung in der Lehre wird berichtet, erste Rückmeldungen von Lehrenden und Studierenden werden erläutert und weitere Planungsschritte dargestellt. "}],"type":"journal_article","publication":"Zeitschrift für Hochschulentwicklung","language":[{"iso":"ger"}],"article_type":"original","keyword":["E-Learning","digitale Medien","problembasiertes Lernen","Lehrerbildung","Diagnostik"],"user_id":"36716","department":[{"_id":"43"}],"_id":"48462"},{"issue":"1","publication_identifier":{"issn":["0276-7783."]},"publication_status":"published","page":"177-200","intvolume":"        39","citation":{"ama":"Scherer A, Wünderlich N, Von Wangenheim F. The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>. 2015;39(1):177-200.","ieee":"A. Scherer, N. Wünderlich, and F. Von Wangenheim, “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.,” <i>MIS Quarterly</i>, vol. 39, no. 1, pp. 177–200, 2015.","chicago":"Scherer, Anne, Nancy Wünderlich, and Florian Von Wangenheim. “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i> 39, no. 1 (2015): 177–200.","bibtex":"@article{Scherer_Wünderlich_Von Wangenheim_2015, title={The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.}, volume={39}, number={1}, journal={MIS Quarterly}, publisher={MIS RC}, author={Scherer, Anne and Wünderlich, Nancy and Von Wangenheim, Florian}, year={2015}, pages={177–200} }","mla":"Scherer, Anne, et al. “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i>, vol. 39, no. 1, MIS RC, 2015, pp. 177–200.","short":"A. Scherer, N. Wünderlich, F. Von Wangenheim, MIS Quarterly 39 (2015) 177–200.","apa":"Scherer, A., Wünderlich, N., &#38; Von Wangenheim, F. (2015). The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>, <i>39</i>(1), 177–200."},"year":"2015","volume":39,"author":[{"full_name":"Scherer, Anne","last_name":"Scherer","first_name":"Anne"},{"last_name":"Wünderlich","id":"36392","full_name":"Wünderlich, Nancy","first_name":"Nancy"},{"full_name":"Von Wangenheim, Florian","last_name":"Von Wangenheim","first_name":"Florian"}],"date_created":"2018-11-15T11:36:38Z","date_updated":"2022-01-06T07:02:36Z","publisher":"MIS RC","title":"The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.","publication":"MIS Quarterly","type":"journal_article","status":"public","abstract":[{"text":"Advancements in information technology have changed the way customers experience a service encounter and their relationship with service providers. Especially technology-based self-service channels have found their way into the 21st century service economy. While research embraces these channels for their cost-efficiency, it has not examined whether a shift from personal to self-service affects customer–firm relationships. Drawing from the service-dominant logic and its central concept of value-in-context, we discuss customers’ value creation in self-service and personal service channels and examine the long-term impact of these channels on customer retention. Using longitudinal customer data, we investigate how the ratio of self-service versus personal service use influences customer defection over time. Our findings suggest that the ratio of self-service to personal service used affects customer defection in a U-shaped manner, with intermediate levels of both self-service and personal service use being associated with the lowest likelihood of defection. We also find that this effect mitigates over time. We conclude that firms should not shift customers toward self-service channels completely, especially not at the beginning of a relationship. Our study underlines the importance of understanding when and how self-service technologies create valuable customer experiences and stresses the notion of actively managing customers’ cocreation of value. ","lang":"eng"}],"department":[{"_id":"181"}],"user_id":"37741","_id":"5704","language":[{"iso":"eng"}],"keyword":["customer defection","customer retention","e-service","longitudinal","Self-service","value-in-context"],"article_type":"original"},{"date_updated":"2022-01-06T07:01:03Z","publisher":"Studien-Verlag","volume":13,"author":[{"last_name":"Jenert","full_name":"Jenert, Tobias","first_name":"Tobias"},{"first_name":"Taiga","last_name":"Brahm","full_name":"Brahm, Taiga"}],"date_created":"2018-09-18T09:19:16Z","title":"Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung","publication_identifier":{"issn":["1681-7028"]},"issue":"4","year":"2013","intvolume":"        13","page":"29-33","citation":{"ama":"Jenert T, Brahm T. Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung. <i>Journal für LehrerInnenbildung</i>. 2013;13(4):29-33.","ieee":"T. Jenert and T. Brahm, “Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung,” <i>Journal für LehrerInnenbildung</i>, vol. 13, no. 4, pp. 29–33, 2013.","chicago":"Jenert, Tobias, and Taiga Brahm. “Ein E-Portfolio-Konzept Zur Integration Heterogener Lernvoraussetzungen Und Studienerfahrungen in Der Lehrerbildung.” <i>Journal Für LehrerInnenbildung</i> 13, no. 4 (2013): 29–33.","apa":"Jenert, T., &#38; Brahm, T. (2013). Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung. <i>Journal Für LehrerInnenbildung</i>, <i>13</i>(4), 29–33.","mla":"Jenert, Tobias, and Taiga Brahm. “Ein E-Portfolio-Konzept Zur Integration Heterogener Lernvoraussetzungen Und Studienerfahrungen in Der Lehrerbildung.” <i>Journal Für LehrerInnenbildung</i>, vol. 13, no. 4, Studien-Verlag, 2013, pp. 29–33.","bibtex":"@article{Jenert_Brahm_2013, title={Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung}, volume={13}, number={4}, journal={Journal für LehrerInnenbildung}, publisher={Studien-Verlag}, author={Jenert, Tobias and Brahm, Taiga}, year={2013}, pages={29–33} }","short":"T. Jenert, T. Brahm, Journal Für LehrerInnenbildung 13 (2013) 29–33."},"_id":"4428","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","keyword":["Portfolio","Lehrerbildung","Wirtschaftspädagogik"],"extern":"1","publication":"Journal für LehrerInnenbildung","type":"journal_article","abstract":[{"text":"Die Auseinandersetzung mit Bildungstechnologien erfolgt häufig ausgehend von einem technologischen Trend bzw. einer Klasse innovativer Werkzeuge (bspw. mobile Technologien). Es geht dann darum, die Potenziale dieser Tools für das Lernen zu ergründen, also letztlich eine Passung zwischen den technologischen Möglichkeiten und pädagogisch-didaktischen Erfordernissen zu konstruieren. In diesem Beitrag kehren wir diese Perspektive um: Ausgehend von einer bestimmten pädagogischen Problemstellung - der Bearbeitung heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung - entwickeln wir unterschiedliche didaktische Handlungsoptionen. Am Ende entsteht ein Werkzeug, das sich in Design und Funktionsumfang auf den Kern der pädagogischen Zielsetzung beschränkt.","lang":"ger"}],"status":"public"},{"publication_identifier":{"isbn":["3-86991-525-0"]},"citation":{"ama":"Pottebaum J. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Monsenstein und Vannerdat; 2012.","ieee":"J. Pottebaum, <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>. Münster: Monsenstein und Vannerdat, 2012.","chicago":"Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Münster: Monsenstein und Vannerdat, 2012.","short":"J. Pottebaum, Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation, Monsenstein und Vannerdat, Münster, 2012.","mla":"Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Monsenstein und Vannerdat, 2012.","bibtex":"@book{Pottebaum_2012, place={Münster}, title={Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation}, publisher={Monsenstein und Vannerdat}, author={Pottebaum, Jens}, year={2012} }","apa":"Pottebaum, J. (2012). <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>. Monsenstein und Vannerdat."},"year":"2012","place":"Münster","date_created":"2021-09-09T12:18:36Z","author":[{"full_name":"Pottebaum, Jens","id":"405","orcid":"http://orcid.org/0000-0001-8778-2989","last_name":"Pottebaum","first_name":"Jens"}],"date_updated":"2022-01-06T06:56:06Z","publisher":"Monsenstein und Vannerdat","title":"Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation","type":"dissertation","status":"public","user_id":"405","_id":"24036","language":[{"iso":"eng"}],"keyword":["Arbeitsorganisation","E-Learning","Lernorganisation","Lerntechnik","Wissensmanagement"]},{"year":"2011","citation":{"chicago":"Jenert, Tobias, Anja Gebhardt, and Reto Käser. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i> 6, no. 2 (2011): 17–29.","ieee":"T. Jenert, A. Gebhardt, and R. Käser, “Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung,” <i>Zeitschrift für E-Learning</i>, vol. 6, no. 2, pp. 17–29, 2011.","ama":"Jenert T, Gebhardt A, Käser R. Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift für E-Learning</i>. 2011;6(2):17-29.","mla":"Jenert, Tobias, et al. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i>, vol. 6, no. 2, Studien-Verlag, 2011, pp. 17–29.","bibtex":"@article{Jenert_Gebhardt_Käser_2011, title={Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung}, volume={6}, number={2}, journal={Zeitschrift für E-Learning}, publisher={Studien-Verlag}, author={Jenert, Tobias and Gebhardt, Anja and Käser, Reto}, year={2011}, pages={17–29} }","short":"T. Jenert, A. Gebhardt, R. Käser, Zeitschrift Für E-Learning 6 (2011) 17–29.","apa":"Jenert, T., Gebhardt, A., &#38; Käser, R. (2011). Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift Für E-Learning</i>, <i>6</i>(2), 17–29."},"intvolume":"         6","page":"17-29","publication_identifier":{"issn":["1992-9579"]},"issue":"2","title":"Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung","publisher":"Studien-Verlag","date_updated":"2022-01-06T07:01:03Z","date_created":"2018-09-18T09:23:54Z","author":[{"first_name":"Tobias","last_name":"Jenert","full_name":"Jenert, Tobias"},{"first_name":"Anja","last_name":"Gebhardt","full_name":"Gebhardt, Anja"},{"first_name":"Reto","last_name":"Käser","full_name":"Käser, Reto"}],"volume":6,"abstract":[{"text":"Eine zentrale Herausforderung in der Ausbildung angehender Wirtschaftslehrpersonen stellt die sinnvolle Verknüpfung von Theorie- und Praxiserfahrungen dar. Im Rahmen der Ausbildung angehender Wirtschaftslehrpersonen an der Universität St. Gallen wird eine Lernumgebung gestaltet, die eine Verschränkung von Theorie- und Praxiserfahrungen ermöglichen soll. Die Lernprozesse der Studierenden werden dabei durch didaktisch angeleitete Weblogarbeit unterstützt. Trotz der Lernchancen, die sich aus einer Verknüpfung von theoretischen und praktischen Lernphasen ergeben, schätzen die Studierenden den Nutzen der Weblogarbeit als äusserst gering ein. Die Studierenden bei der reflexiven Integration praxisnaher und theoretischer Lernerfahrungen zu unterstützen, ist eine Herausforderung, die dezidierter Anleitung und Förderung durch die Lehrpersonen bedarf","lang":"ger"}],"status":"public","type":"journal_article","publication":"Zeitschrift für E-Learning","keyword":["Weblog","Blog","e-learning","TEL","higher education","business education"],"extern":"1","_id":"4430","user_id":"51057","department":[{"_id":"208"},{"_id":"282"}]},{"year":"2009","issue":"4 Part","title":"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland","date_created":"2018-11-14T14:06:44Z","publisher":"IEEE","file":[{"file_id":"6316","access_level":"open_access","file_name":"JOURNAL VERSION.pdf","file_size":1544790,"creator":"hsiemes","date_created":"2018-12-18T13:16:07Z","date_updated":"2018-12-18T13:16:07Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence.","lang":"eng"}],"publication":"IEEE Transactions on Information Forensics \\& Security","language":[{"iso":"eng"}],"keyword":["e-voting","Internet voting","Internet election","security","verifiability","RIES","Estonia","Neuch{\\^a}tel"],"ddc":["000"],"intvolume":"         4","page":"729-744","citation":{"chicago":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i> 4, no. 4 Part (2009): 729–44.","ieee":"G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744, 2009.","ama":"Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>. 2009;4(4 Part):729-744.","bibtex":"@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \\&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }","short":"G. Schryen, E. Rich, IEEE Transactions on Information Forensics \\&#38; Security 4 (2009) 729–744.","mla":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.","apa":"Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, <i>4</i>(4 Part), 729–744."},"has_accepted_license":"1","volume":4,"author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"},{"first_name":"Eliot","last_name":"Rich","full_name":"Rich, Eliot"}],"oa":"1","date_updated":"2022-01-06T07:02:12Z","status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-18T13:16:07Z","department":[{"_id":"277"}],"user_id":"61579","_id":"5621"},{"year":"2007","page":"19--26","citation":{"apa":"Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag.","mla":"Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag, 2007, pp. 19--26.","bibtex":"@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }","short":"T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos Verlag, 2007, pp. 19--26.","ama":"Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>. Logos Verlag; 2007:19--26.","chicago":"Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.","ieee":"T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI Workshops</i>, Siegen, 2007, pp. 19--26."},"title":"Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.","conference":{"start_date":"2007-09-17","name":"DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik e.V.","location":"Siegen","end_date":"2007-09-17"},"date_updated":"2022-01-06T07:01:06Z","publisher":"Logos Verlag","date_created":"2018-09-19T09:08:18Z","author":[{"full_name":"Sporer, Thomas","last_name":"Sporer","first_name":"Thomas"},{"first_name":"Tobias","full_name":"Jenert, Tobias","id":"71994","last_name":"Jenert","orcid":" https://orcid.org/0000-0001-9262-5646"},{"full_name":"Strehl, Bernhard","last_name":"Strehl","first_name":"Bernhard"},{"first_name":"Patrick Ole","last_name":"Noack","full_name":"Noack, Patrick Ole"}],"status":"public","publication":"DeLFI Workshops","type":"conference","keyword":["E-Portfolios","Lerngemeinschaften","Praxisgemeinschaften","Projektgruppen","Hochschulstudium","informelles Lernen"],"extern":"1","alternative_title":["Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik DeLFI 2007"],"_id":"4494","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057"},{"date_updated":"2022-01-06T07:01:06Z","date_created":"2018-09-19T09:22:02Z","author":[{"last_name":"Sporer","full_name":"Sporer, Thomas","first_name":"Thomas"},{"full_name":"Heinze, Nina","last_name":"Heinze","first_name":"Nina"},{"first_name":"Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","last_name":"Jenert","id":"71994","full_name":"Jenert, Tobias"},{"first_name":"Gabi","last_name":"Reinmann","full_name":"Reinmann, Gabi"}],"title":"Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"","conference":{"location":"Kreta ","end_date":"2007-06-20 ","start_date":"2007-06-17","name":"Second European Conference on Technology Enhanced Learning (EC-TEL) 2007"},"year":"2007","citation":{"ieee":"T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta , 2007.","chicago":"Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” 2007.","ama":"Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". In: ; 2007.","apa":"Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta .","mla":"Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"</i>. 2007.","bibtex":"@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"}, author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi}, year={2007} }","short":"T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007."},"_id":"4497","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","keyword":["Problem Solving Competencies","E-Portfolio"],"extern":"1","alternative_title":["Creating New Learning Experiences on a Global Scale"],"type":"conference","status":"public"},{"year":"2007","issue":"2","title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","date_created":"2018-11-14T14:51:41Z","file":[{"file_size":100448,"access_level":"open_access","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","file_id":"6324","date_updated":"2018-12-18T13:25:12Z","creator":"hsiemes","date_created":"2018-12-18T13:25:12Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.","lang":"eng"}],"publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)","language":[{"iso":"eng"}],"keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"ddc":["000"],"intvolume":"         3","page":"66-90","citation":{"ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.","ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>. 2007;3(2):66-90.","apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.","short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90."},"has_accepted_license":"1","volume":3,"author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"oa":"1","date_updated":"2022-01-06T07:02:22Z","status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-18T13:25:12Z","department":[{"_id":"277"}],"user_id":"61579","_id":"5655"},{"author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"oa":"1","date_updated":"2022-01-06T07:02:24Z","has_accepted_license":"1","page":"37-41","citation":{"mla":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, Westpoint, 2005, pp. 37–41.","bibtex":"@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses}, booktitle={Proceedings of the 6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen, Guido}, year={2005}, pages={37–41} }","short":"G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41.","apa":"Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i> (pp. 37–41). Westpoint.","ieee":"G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 2005, pp. 37–41.","chicago":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 37–41. Westpoint, 2005.","ama":"Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>. Westpoint; 2005:37-41."},"department":[{"_id":"277"}],"user_id":"61579","_id":"5661","file_date_updated":"2018-12-18T13:31:41Z","extern":"1","type":"conference","status":"public","date_created":"2018-11-14T14:55:48Z","publisher":"Westpoint","title":"An e-mail honeypot addressing spammers' behavior in collecting and applying addresses","year":"2005","language":[{"iso":"eng"}],"keyword":["Spam","ham","e-mail","honeypot","address obscuring technique","address taxonomy"],"ddc":["000"],"publication":"Proceedings of the 6th IEEE Information Assurance Workshop","file":[{"relation":"main_file","content_type":"application/pdf","file_id":"6331","access_level":"open_access","file_name":"Schryen - An e-mail honeypot addressing spammers' behavior in collecting and applying addresses.pdf","file_size":119362,"creator":"hsiemes","date_created":"2018-12-18T13:31:41Z","date_updated":"2018-12-18T13:31:41Z"}],"abstract":[{"lang":"eng","text":"Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided."}]},{"has_accepted_license":"1","citation":{"short":"G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.","bibtex":"@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido}, year={2004}, pages={281–288} }","mla":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.","apa":"Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288.","ieee":"G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, pp. 281–288, 2004.","chicago":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.","ama":"Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>. 2004;46(4):281-288."},"page":"281-288","intvolume":"        46","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"volume":46,"date_updated":"2022-01-06T07:02:24Z","oa":"1","type":"journal_article","status":"public","user_id":"61579","department":[{"_id":"277"}],"_id":"5662","file_date_updated":"2018-12-18T13:36:34Z","extern":"1","issue":"4","year":"2004","date_created":"2018-11-14T14:56:51Z","publisher":"Springer","title":"Effektivität von Lösungsansätzen zur Bekämpfung von Spam","publication":"Wirtschaftsinformatik","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-18T13:36:34Z","creator":"hsiemes","date_created":"2018-12-18T13:36:34Z","file_size":288686,"file_name":"Verlagsversion Guido_Schryen__281__288.pdf","access_level":"open_access","file_id":"6338"}],"abstract":[{"lang":"eng","text":"Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam."}],"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Spam","E-Mail","Spoofing","Blockieren","Filtern","Lightweight Mail Transfer Agent Authentication Protocol (LMAP)"]},{"place":"Madrid","citation":{"apa":"Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.","short":"G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.","mla":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, IADIS Press, 2004, pp. 937–40.","bibtex":"@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating an Account-based Approach}, booktitle={Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }","chicago":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.","ieee":"G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp. 937–940.","ama":"Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>. Madrid: IADIS Press; 2004:937-940."},"page":"937-940","has_accepted_license":"1","date_updated":"2022-01-06T07:02:25Z","oa":"1","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"editor":[{"first_name":"Pedro","full_name":"Isaias, Pedro","last_name":"Isaias"}],"status":"public","type":"conference","file_date_updated":"2018-12-18T13:33:30Z","extern":"1","_id":"5663","user_id":"61579","department":[{"_id":"277"}],"year":"2004","title":"Fighting Spam: Motivating an Account-based Approach","publisher":"IADIS Press","date_created":"2018-11-14T14:59:03Z","abstract":[{"text":"Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-18T13:33:30Z","date_updated":"2018-12-18T13:33:30Z","file_name":"Fighting Spam_Motivating an account-based approach.pdf","access_level":"open_access","file_id":"6333","file_size":46083}],"publication":"Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2","ddc":["000"],"keyword":["e-mail","spam","filtering","blocking","LMAP","SMTP account"],"language":[{"iso":"eng"}]},{"type":"book_chapter","publication":"Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2","abstract":[{"lang":"eng","text":"Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out."}],"status":"public","_id":"5667","user_id":"61579","department":[{"_id":"277"}],"keyword":["Internet Voting","Online polls","E-Democracy","Security"],"extern":"1","language":[{"iso":"eng"}],"year":"2003","place":"Algarve","citation":{"ama":"Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.","ieee":"G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press, 2003, pp. 1017–1021.","chicago":"Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve: IADIS Press, 2003.","mla":"Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp. 1017–21.","bibtex":"@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting}, booktitle={Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021} }","short":"G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.","apa":"Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021). Algarve: IADIS Press."},"page":"1017-1021","publisher":"IADIS Press","date_updated":"2022-01-06T07:02:25Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T15:01:49Z","title":"E-Democracy: Internet Voting"},{"title":"Internet-Wahlen","date_created":"2018-11-14T15:03:15Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"oa":"1","date_updated":"2022-01-06T07:02:26Z","citation":{"chicago":"Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 937–56, 2003.","ieee":"G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–956.","ama":"Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>. ; 2003:937-956.","apa":"Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i> (pp. 937–956).","mla":"Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–56.","short":"G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–956.","bibtex":"@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956} }"},"page":"937-956","year":"2003","has_accepted_license":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:40:14Z","extern":"1","ddc":["000"],"keyword":["Internet-Wahlen","E-Democracy","Sicherheit","Kryptographie"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5668","file":[{"relation":"main_file","content_type":"application/pdf","file_size":364380,"access_level":"open_access","file_name":"Schryen - Internet-Wahlen.pdf","file_id":"6340","date_updated":"2018-12-18T13:40:14Z","date_created":"2018-12-18T13:40:14Z","creator":"hsiemes"}],"status":"public","abstract":[{"text":"Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen.","lang":"eng"}],"type":"conference","publication":"6. Internationale Tagung Wirtschaftsinformatik"}]
