---
_id: '61463'
abstract:
- lang: ger
  text: Vernetztes Wissen ist ein zentrales Lernziel des Hochschulstudiums, insbesondere
    im interdisziplinär angelegten Studienfach Komparatistik. Um den Aufbau vernetzten
    Wissens bei Bachelorstudierenden der Komparatistik zu unterstützen, ist in diesem
    Projekt Portfolioarbeit eingesetzt worden, die als Methode selbsttätigen und selbstreflexiven
    Lernens geeignet erscheint, zur Auseinandersetzung mit Lerninhalten zu motivieren
    und zur Kompetenzentwicklung der Studierenden beizutragen. Mittels unstrukturierter
    Beobachtungen der Portfolioarbeit im Seminar sind inhaltliche Effekte und methodische
    Entwicklungen erfasst worden. Anhand anteilig quantitativer, überwiegend qualitativer
    Inhaltsanalysen der Portfolios sind konkrete Vernetzungen zwischen Lerninhalten
    ermittelt worden. Die Explorationsstudie zeigt veränderte Perspektiven und geweckte
    Interessen bei den Studierenden durch die Portfolioarbeit sowie vielfältige Kontextualisierungen,
    Vergleiche und Verknüpfungen in den Portfolios auf und bietet hierdurch einen
    möglichen Ansatzpunkt für strukturelle Empfehlungen für das Studienfach Komparatistik.
- lang: eng
  text: Knowledge networks are a central learning objective in higher education, especially
    in the inherently interdisciplinary discipline of comparative literary and cultural
    studies. To support the development of knowledge networks with undergraduate students
    of comparative literary and cultural studies, this project utilized portfolio
    work as a method of self-actuating and self-reflective learning suitable for motivating
    examinations of learning contents and contributing to students’ skill development.
    Using naturalistic observations of the portfolio work within the seminar, effects
    and developments were recorded. With partly quantitative, predominantly qualitative
    content analyses of the portfolios, concrete connections between learning contents
    were determined. The explorative study shows changed perspectives and peaked interests
    of the students because of portfolio work as well as diverse contextualisations,
    comparisons and connections in the portfolios, thus offering a possible starting
    point for structural recommendations for the discipline of comparative literary
    and cultural studies.
article_type: original
author:
- first_name: Ronja
  full_name: Hannebohm, Ronja
  id: '27419'
  last_name: Hannebohm
citation:
  ama: 'Hannebohm R. Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens
    im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende
    Literatur- und Kulturwissenschaft. <i>die hochschullehre: Interdisziplinäre Zeitschrift
    für Studium und Lehre</i>. 2026;12:65-80. doi:<a href="https://doi.org/10.3278/HSL2606W">10.3278/HSL2606W</a>'
  apa: 'Hannebohm, R. (2026). Potenziale der Portfolioarbeit für den Aufbau vernetzten
    Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende
    Literatur- und Kulturwissenschaft. <i>die hochschullehre: Interdisziplinäre Zeitschrift
    für Studium und Lehre</i>, <i>12</i>, 65–80. <a href="https://doi.org/10.3278/HSL2606W">https://doi.org/10.3278/HSL2606W</a>'
  bibtex: '@article{Hannebohm_2026, title={Potenziale der Portfolioarbeit für den
    Aufbau vernetzten Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach
    Komparatistik/Vergleichende Literatur- und Kulturwissenschaft}, volume={12}, DOI={<a
    href="https://doi.org/10.3278/HSL2606W">10.3278/HSL2606W</a>}, journal={die hochschullehre:
    Interdisziplinäre Zeitschrift für Studium und Lehre}, publisher={wbv}, author={Hannebohm,
    Ronja}, year={2026}, pages={65–80} }'
  chicago: 'Hannebohm, Ronja. “Potenziale der Portfolioarbeit für den Aufbau vernetzten
    Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende
    Literatur- und Kulturwissenschaft.” <i>die hochschullehre: Interdisziplinäre Zeitschrift
    für Studium und Lehre</i> 12 (2026): 65–80. <a href="https://doi.org/10.3278/HSL2606W">https://doi.org/10.3278/HSL2606W</a>.'
  ieee: 'R. Hannebohm, “Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens
    im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende
    Literatur- und Kulturwissenschaft,” <i>die hochschullehre: Interdisziplinäre Zeitschrift
    für Studium und Lehre</i>, vol. 12, pp. 65–80, 2026, doi: <a href="https://doi.org/10.3278/HSL2606W">10.3278/HSL2606W</a>.'
  mla: 'Hannebohm, Ronja. “Potenziale der Portfolioarbeit für den Aufbau vernetzten
    Wissens im Bachelorstudium: Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende
    Literatur- und Kulturwissenschaft.” <i>die hochschullehre: Interdisziplinäre Zeitschrift
    für Studium und Lehre</i>, vol. 12, wbv, 2026, pp. 65–80, doi:<a href="https://doi.org/10.3278/HSL2606W">10.3278/HSL2606W</a>.'
  short: 'R. Hannebohm, die hochschullehre: Interdisziplinäre Zeitschrift für Studium
    und Lehre 12 (2026) 65–80.'
date_created: 2025-09-29T12:34:48Z
date_updated: 2026-02-03T10:59:36Z
department:
- _id: '116'
doi: 10.3278/HSL2606W
intvolume: '        12'
keyword:
- Portfolioarbeit
- portfolio work
- vernetztes Wissen
- knowledge networks
- Beobachtung
- naturalistic observation
- Inhaltsanalyse
- content analysis
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.wbv.de/shop/Paderborner-Beitraege-2025-HSLT2601W
oa: '1'
page: 65-80
publication: 'die hochschullehre: Interdisziplinäre Zeitschrift für Studium und Lehre'
publication_identifier:
  issn:
  - 2199–8825
publication_status: published
publisher: wbv
quality_controlled: '1'
status: public
title: 'Potenziale der Portfolioarbeit für den Aufbau vernetzten Wissens im Bachelorstudium:
  Eine Explorationsstudie im Studienfach Komparatistik/Vergleichende Literatur- und
  Kulturwissenschaft'
type: journal_article
user_id: '27419'
volume: 12
year: '2026'
...
---
_id: '58822'
abstract:
- lang: eng
  text: 'In 1921, John Wisdom (1904–1993) became a member of Fitzwilliam House, Cambridge,
    where he read philosophy and attended lectures by G. E. Moore, C. D. Broad, and
    J. E. McTaggart. He received his BA in 1924, after which he worked for five years
    at the National Institute of Industrial Psychology. From 1929 to 1934, Wisdom
    was a Lecturer in the department of logic and metaphysics at the University of
    St Andrews and a colleague of G. F. Stout. After the publication of his book Interpretation
    and Analysis (1931) and five articles on “Logical Constructions” in Mind (1931–3),
    Wisdom became a Lecturer in Moral Sciences in Cambridge and a Fellow of Trinity
    College. This gave him the opportunity to gain first-hand knowledge of Wittgenstein’s
    philosophy. Since nothing by Wittgenstein but Tractatus appeared in print for
    decades, Wisdom’s publications of these years were—mistakenly—read as portents
    of the new ideas of Wittgenstein himself. The publication of Wittgenstein’s Philosophical
    Investigations in 1953 brought with it, among other things, the fall of Wisdom’s
    popularity. '
author:
- first_name: Nikolay
  full_name: Milkov, Nikolay
  id: '357'
  last_name: Milkov
citation:
  ama: 'Milkov N. Wisdom’s Wittgenstein. In: Khani  AH, Kemp  G, eds. <i>Wittgenstein
    and Other Philosophers: His Influence on Historical and Contemporary Analytic
    Philosophers, 2 Vol., Volume II</i>. 1st ed. Routledge.'
  apa: 'Milkov, N. (n.d.). Wisdom’s Wittgenstein. In A. H. Khani  &#38; G. Kemp  (Eds.),
    <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary
    Analytic Philosophers, 2 vol., Volume II</i> (1st ed.). Routledge.'
  bibtex: '@inbook{Milkov, place={London}, edition={1}, title={Wisdom’s Wittgenstein},
    booktitle={Wittgenstein and Other Philosophers: His Influence on Historical and
    Contemporary Analytic Philosophers, 2 vol., Volume II}, publisher={Routledge},
    author={Milkov, Nikolay}, editor={Khani , Ali Hossein  and Kemp , Gary } }'
  chicago: 'Milkov, Nikolay. “Wisdom’s Wittgenstein.” In <i>Wittgenstein and Other
    Philosophers: His Influence on Historical and Contemporary Analytic Philosophers,
    2 Vol., Volume II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed.
    London: Routledge, n.d.'
  ieee: 'N. Milkov, “Wisdom’s Wittgenstein,” in <i>Wittgenstein and Other Philosophers:
    His Influence on Historical and Contemporary Analytic Philosophers, 2 vol., Volume
    II</i>, 1st ed., A. H. Khani  and G. Kemp , Eds. London: Routledge.'
  mla: 'Milkov, Nikolay. “Wisdom’s Wittgenstein.” <i>Wittgenstein and Other Philosophers:
    His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume
    II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed., Routledge.'
  short: 'N. Milkov, in: A.H. Khani , G. Kemp  (Eds.), Wittgenstein and Other Philosophers:
    His Influence on Historical and Contemporary Analytic Philosophers, 2 Vol., Volume
    II, 1st ed., Routledge, London, n.d.'
date_created: 2025-02-24T18:33:50Z
date_updated: 2025-02-24T18:38:38Z
department:
- _id: '14'
edition: '1'
editor:
- first_name: 'Ali Hossein '
  full_name: 'Khani , Ali Hossein '
  last_name: 'Khani '
- first_name: 'Gary '
  full_name: 'Kemp , Gary '
  last_name: 'Kemp '
keyword:
- elucidation
- facts
- Frege
- language
- metaphysics
- G. E. Moore
- Russell
- Stebbing
- John Wisdom
- Wittgenstein
language:
- iso: eng
place: London
publication: 'Wittgenstein and Other Philosophers: His Influence on Historical and
  Contemporary Analytic Philosophers, 2 vol., Volume II'
publication_status: inpress
publisher: Routledge
quality_controlled: '1'
status: public
title: Wisdom's Wittgenstein
type: book_chapter
user_id: '357'
year: '2025'
...
---
_id: '58821'
abstract:
- lang: eng
  text: Susan Stebbing wrote only once on Wittgenstein, in her paper ‘Logical Positivism
    and Analysis’ (1933). The paper was unusually critical of Wittgenstein. It put
    the Cambridge analytic philosophy of Moore and Russell in a sharp opposition to
    the positivist philosophy of the Vienna Circle, in which Stebbing included Wittgenstein.
    Whereas the positivists were interested in analysing language, the Cambridge realists
    were analysing facts. To be more explicit, the analytic philosophers were engaged
    in directional analysis, which seeks to illuminate (to elucidate) the multiplicity
    of the analysed facts. In contrast, positivists aimed at a final analysis that
    proves that there are simples. Stebbing’s sympathies were clearly on the side
    of the Cambridge realists. The important implication of Stebbing’s paper was that
    it urged Wittgenstein to change the style of his philosophy, abandoning those
    points which allegedly connected him with the Vienna Circle.
author:
- first_name: Nikolay
  full_name: Milkov, Nikolay
  id: '357'
  last_name: Milkov
citation:
  ama: 'Milkov N. Stebbing’s Wittgenstein. In: Khani  AH, Kemp  G, eds. <i>Wittgenstein
    and Other Philosophers: His Influence on Historical and Contemporary Analytic
    Philosophers, Vol. II</i>. 1st ed. Routledge.'
  apa: 'Milkov, N. (n.d.). Stebbing’s Wittgenstein. In A. H. Khani  &#38; G. Kemp  (Eds.),
    <i>Wittgenstein and Other Philosophers: His Influence on Historical and Contemporary
    Analytic Philosophers, vol. II</i> (1st ed.). Routledge.'
  bibtex: '@inbook{Milkov, place={London}, edition={1}, title={Stebbing’s Wittgenstein},
    booktitle={Wittgenstein and Other Philosophers: His Influence on Historical and
    Contemporary Analytic Philosophers, vol. II}, publisher={Routledge}, author={Milkov,
    Nikolay}, editor={Khani , Ali Hossein  and Kemp , Gary } }'
  chicago: 'Milkov, Nikolay. “Stebbing’s Wittgenstein.” In <i>Wittgenstein and Other
    Philosophers: His Influence on Historical and Contemporary Analytic Philosophers,
    Vol. II</i>, edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed. London: Routledge,
    n.d.'
  ieee: 'N. Milkov, “Stebbing’s Wittgenstein,” in <i>Wittgenstein and Other Philosophers:
    His Influence on Historical and Contemporary Analytic Philosophers, vol. II</i>,
    1st ed., A. H. Khani  and G. Kemp , Eds. London: Routledge.'
  mla: 'Milkov, Nikolay. “Stebbing’s Wittgenstein.” <i>Wittgenstein and Other Philosophers:
    His Influence on Historical and Contemporary Analytic Philosophers, Vol. II</i>,
    edited by Ali Hossein  Khani  and Gary  Kemp , 1st ed., Routledge.'
  short: 'N. Milkov, in: A.H. Khani , G. Kemp  (Eds.), Wittgenstein and Other Philosophers:
    His Influence on Historical and Contemporary Analytic Philosophers, Vol. II, 1st
    ed., Routledge, London, n.d.'
date_created: 2025-02-24T18:29:59Z
date_updated: 2025-02-24T18:30:06Z
ddc:
- '100'
department:
- _id: '14'
edition: '1'
editor:
- first_name: 'Ali Hossein '
  full_name: 'Khani , Ali Hossein '
  last_name: 'Khani '
- first_name: 'Gary '
  full_name: 'Kemp , Gary '
  last_name: 'Kemp '
keyword:
- directional analysis
- elucidation
- facts
- metaphysics
- G. E. Moore
- Russell
- Stebbing
- John Wisdom
- Wittgenstein
language:
- iso: eng
place: London
publication: 'Wittgenstein and Other Philosophers: His Influence on Historical and
  Contemporary Analytic Philosophers, vol. II'
publication_status: inpress
publisher: Routledge
quality_controlled: '1'
status: public
title: Stebbing's Wittgenstein
type: book_chapter
user_id: '357'
year: '2025'
...
---
_id: '33299'
abstract:
- lang: eng
  text: "The aim of this study was to find out whether teaching how to search for
    literature\r\nwould be more beneficial to students and teachers if done online
    through short videos\r\nrather than in person during course time. To find out
    whether online videos are more\r\nbeneficial, two courses were asked to fill in
    questionnaires, one at the beginning and\r\none at the end of the semester. One
    of the courses received the input online via videos\r\nand were given an exercise
    to put the newly learned skills to use, the other course\r\nserved as a control
    group and learned how to search for literature during the course.\r\nThe results
    show that while the difference between the two groups is not significant,\r\nthe
    videos can still be regarded as being more beneficial than teaching the necessary\r\nskills
    during course time."
author:
- first_name: Charlotte Anna
  full_name: Hahn, Charlotte Anna
  id: '25934'
  last_name: Hahn
citation:
  ama: Hahn CA. Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur
    suchen. <i>die hochschullehre</i>. 2020;(6).
  apa: Hahn, C. A. (2020). Informationskompetenz durch E-Learning? Durch Lernvideos
    nach Literatur suchen. <i>die hochschullehre</i>, <i>6</i>.
  bibtex: '@article{Hahn_2020, title={Informationskompetenz durch E-Learning? Durch
    Lernvideos nach Literatur suchen}, number={6}, journal={die hochschullehre}, author={Hahn,
    Charlotte Anna}, year={2020} }'
  chicago: Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos
    nach Literatur suchen.” <i>die hochschullehre</i>, no. 6 (2020).
  ieee: C. A. Hahn, “Informationskompetenz durch E-Learning? Durch Lernvideos nach
    Literatur suchen,” <i>die hochschullehre</i>, no. 6, 2020.
  mla: Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos
    nach Literatur suchen.” <i>die hochschullehre</i>, no. 6, 2020.
  short: C.A. Hahn, die hochschullehre (2020).
date_created: 2022-09-08T09:05:30Z
date_updated: 2023-10-13T10:17:31Z
ddc:
- '020'
department:
- _id: '1'
- _id: '384'
file:
- access_level: open_access
  content_type: application/pdf
  creator: chogg
  date_created: 2022-09-08T09:05:22Z
  date_updated: 2022-09-08T09:05:22Z
  file_id: '33300'
  file_name: HSL2012W.pdf
  file_size: 318104
  relation: main_file
file_date_updated: 2022-09-08T09:05:22Z
has_accepted_license: '1'
issue: '6'
keyword:
- E-Learning
- information competence
- literature
- library
- research
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: http://www.hochschullehre.org/wp-content/files/diehochschullehre_2020_Hahn_Informationskompetenz.pdf
oa: '1'
publication: die hochschullehre
publication_identifier:
  eissn:
  - ISSN 2199-8825
publication_status: published
status: public
title: Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen
type: journal_article
user_id: '14931'
year: '2020'
...
---
_id: '4562'
abstract:
- lang: eng
  text: Employing main and sector-specific investment-grade CDS indices from the North
    American and European CDS market and performing mean-variance out-of-sample analyses
    for conservative and aggressive investors over the period from 2006 to 2014, this
    paper analyzes portfolio benefits of adding corporate CDS indices to a traditional
    financial portfolio consisting of stock and sovereign bond indices. As a baseline
    result, we initially find an increase in portfolio (downside) risk-diversification
    when adding CDS indices, which is observed irrespective of both CDS markets, investor-types
    and different sub-periods, including the global financial crisis and European
    sovereign debt crisis. In addition, the analysis reveals higher portfolio excess
    returns and performance in CDS index portfolios, however, these effects clearly
    differ between markets, investor-types and sub-periods. Overall, portfolio benefits
    of adding CDS indices mainly result from the fact that institutional investors
    replace sovereign bond indices rather than stock indices by CDS indices due to
    better risk-return characteristics. Our baseline findings remain robust under
    a variety of robustness checks. Results from sensitivity analyses provide further
    important implications for institutional investors with a strategic focus on a
    long-term conservative portfolio management.
article_type: original
author:
- first_name: Benjamin
  full_name: Hippert, Benjamin
  id: '48476'
  last_name: Hippert
- first_name: André
  full_name: Uhde, André
  id: '36049'
  last_name: Uhde
  orcid: https://orcid.org/0000-0002-8058-8857
- first_name: Sascha Tobias
  full_name: Wengerek, Sascha Tobias
  id: '48837'
  last_name: Wengerek
  orcid: 0000-0002-7820-3903
citation:
  ama: 'Hippert B, Uhde A, Wengerek ST. Portfolio Benefits of Adding Corporate Credit
    Default Swap Indices: Evidence from North America and Europe. <i>Review of Derivatives
    Research </i>. 2019;22(2):203-259. doi:<a href="https://doi.org/10.1007/s11147-018-9148-8">https://doi.org/10.1007/s11147-018-9148-8</a>'
  apa: 'Hippert, B., Uhde, A., &#38; Wengerek, S. T. (2019). Portfolio Benefits of
    Adding Corporate Credit Default Swap Indices: Evidence from North America and
    Europe. <i>Review of Derivatives Research </i>, <i>22</i>(2), 203–259. <a href="https://doi.org/10.1007/s11147-018-9148-8">https://doi.org/10.1007/s11147-018-9148-8</a>'
  bibtex: '@article{Hippert_Uhde_Wengerek_2019, title={Portfolio Benefits of Adding
    Corporate Credit Default Swap Indices: Evidence from North America and Europe},
    volume={22}, DOI={<a href="https://doi.org/10.1007/s11147-018-9148-8">https://doi.org/10.1007/s11147-018-9148-8</a>},
    number={2}, journal={Review of Derivatives Research }, author={Hippert, Benjamin
    and Uhde, André and Wengerek, Sascha Tobias}, year={2019}, pages={203–259} }'
  chicago: 'Hippert, Benjamin, André Uhde, and Sascha Tobias Wengerek. “Portfolio
    Benefits of Adding Corporate Credit Default Swap Indices: Evidence from North
    America and Europe.” <i>Review of Derivatives Research </i> 22, no. 2 (2019):
    203–59. <a href="https://doi.org/10.1007/s11147-018-9148-8">https://doi.org/10.1007/s11147-018-9148-8</a>.'
  ieee: 'B. Hippert, A. Uhde, and S. T. Wengerek, “Portfolio Benefits of Adding Corporate
    Credit Default Swap Indices: Evidence from North America and Europe,” <i>Review
    of Derivatives Research </i>, vol. 22, no. 2, pp. 203–259, 2019, doi: <a href="https://doi.org/10.1007/s11147-018-9148-8">https://doi.org/10.1007/s11147-018-9148-8</a>.'
  mla: 'Hippert, Benjamin, et al. “Portfolio Benefits of Adding Corporate Credit Default
    Swap Indices: Evidence from North America and Europe.” <i>Review of Derivatives
    Research </i>, vol. 22, no. 2, 2019, pp. 203–59, doi:<a href="https://doi.org/10.1007/s11147-018-9148-8">https://doi.org/10.1007/s11147-018-9148-8</a>.'
  short: B. Hippert, A. Uhde, S.T. Wengerek, Review of Derivatives Research  22 (2019)
    203–259.
date_created: 2018-10-01T12:17:35Z
date_updated: 2022-05-04T06:15:02Z
department:
- _id: '188'
- _id: '186'
doi: https://doi.org/10.1007/s11147-018-9148-8
intvolume: '        22'
issue: '2'
jel:
- C61
- G01
- G11
- G15
- G23
keyword:
- Corporate credit default swap indices
- Mean-variance asset allocation
- Out-of-sample portfolio optimization
- Portfolio risk-diversification
- Portfolio performance evaluation
language:
- iso: eng
page: 203-259
publication: 'Review of Derivatives Research '
publication_status: published
status: public
title: 'Portfolio Benefits of Adding Corporate Credit Default Swap Indices: Evidence
  from North America and Europe'
type: journal_article
user_id: '36049'
volume: 22
year: '2019'
...
---
_id: '5671'
abstract:
- lang: eng
  text: Multi-attribute value theory (MAVT)-based recommender systems have been proposed
    for dealing with issues of existing recommender systems, such as the cold-start
    problem and changing preferences. However, as we argue in this paper, existing
    MAVT-based methods for measuring attribute importance weights do not fit the shopping
    tasks for which recommender systems are typically used. These methods assume well-trained
    decision makers who are willing to invest time and cognitive effort, and who are
    familiar with the attributes describing the available alternatives and the ranges
    of these attribute levels. Yet, recommender systems are most often used by consumers
    who are usually not familiar with the available attributes and ranges and who
    wish to save time and effort. Against this background, we develop a new method,
    based on a product configuration process, which is tailored to the characteristics
    of these particular decision makers. We empirically compare our method to SWING,
    ranking-based conjoint analysis and TRADEOFF in a between-subjects laboratory
    experiment with 153 participants. Results indicate that our proposed method performs
    better than TRADEOFF and CONJOINT and at least as well as SWING in terms of recommendation
    accuracy, better than SWING and TRADEOFF and at least as well as CONJOINT in terms
    of cognitive load, and that participants were faster with our method than with
    any other method. We conclude that our method is a promising option to help support
    consumers' decision processes in e-commerce shopping tasks.
author:
- first_name: Michael
  full_name: Scholz, Michael
  last_name: Scholz
- first_name: Verena
  full_name: Dorner, Verena
  last_name: Dorner
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Alexander
  full_name: Benlian, Alexander
  last_name: Benlian
citation:
  ama: Scholz M, Dorner V, Schryen G, Benlian A. A configuration-based recommender
    system for supporting e-commerce decisions. <i>European Journal of Operational
    Research</i>. 2017;259(1):205-215.
  apa: Scholz, M., Dorner, V., Schryen, G., &#38; Benlian, A. (2017). A configuration-based
    recommender system for supporting e-commerce decisions. <i>European Journal of
    Operational Research</i>, <i>259</i>(1), 205–215.
  bibtex: '@article{Scholz_Dorner_Schryen_Benlian_2017, title={A configuration-based
    recommender system for supporting e-commerce decisions}, volume={259}, number={1},
    journal={European Journal of Operational Research}, publisher={Elsevier}, author={Scholz,
    Michael and Dorner, Verena and Schryen, Guido and Benlian, Alexander}, year={2017},
    pages={205–215} }'
  chicago: 'Scholz, Michael, Verena Dorner, Guido Schryen, and Alexander Benlian.
    “A Configuration-Based Recommender System for Supporting e-Commerce Decisions.”
    <i>European Journal of Operational Research</i> 259, no. 1 (2017): 205–15.'
  ieee: M. Scholz, V. Dorner, G. Schryen, and A. Benlian, “A configuration-based recommender
    system for supporting e-commerce decisions,” <i>European Journal of Operational
    Research</i>, vol. 259, no. 1, pp. 205–215, 2017.
  mla: Scholz, Michael, et al. “A Configuration-Based Recommender System for Supporting
    e-Commerce Decisions.” <i>European Journal of Operational Research</i>, vol. 259,
    no. 1, Elsevier, 2017, pp. 205–15.
  short: M. Scholz, V. Dorner, G. Schryen, A. Benlian, European Journal of Operational
    Research 259 (2017) 205–215.
date_created: 2018-11-14T15:06:18Z
date_updated: 2022-01-06T07:02:27Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:30:59Z
  date_updated: 2018-12-13T15:06:56Z
  file_id: '6025'
  file_name: EJOR article.pdf
  file_size: 762889
  relation: main_file
file_date_updated: 2018-12-13T15:06:56Z
has_accepted_license: '1'
intvolume: '       259'
issue: '1'
keyword:
- E-Commerce
- Recommender System
- Attribute Weights
- Configuration System
- Decision Support
language:
- iso: eng
oa: '1'
page: 205 - 215
publication: European Journal of Operational Research
publisher: Elsevier
status: public
title: A configuration-based recommender system for supporting e-commerce decisions
type: journal_article
user_id: '61579'
volume: 259
year: '2017'
...
---
_id: '48462'
abstract:
- lang: ger
  text: 'Über das Lehramtsstudium sollen Studierende unter anderem dazu befähigt werden,
    die Leistung ihrer Schüler/innenzu bewerten. Dazu müssen sie Einflussfaktoren
    auf Schulleistung kennen und diese richtig diagnostizieren und fördern können.
    Mit diesem Beitrag wird eine game-und E-Learning-gestützte Lernumgebung vorgestellt,
    in der Studierende –anders als in vielen inputorientierten Seminarkonzepten –in
    einem virtuellen Klassenzimmer an realitätsnahen Fällen lernen,problembasiert
    zu diagnostizieren und zu fördern. Über denEinsatz der Lernumgebung in der Lehre
    wird berichtet, erste Rückmeldungen von Lehrenden und Studierenden werden erläutert
    und weitere Planungsschritte dargestellt. '
article_type: original
author:
- first_name: Saskia
  full_name: Praetorius, Saskia
  id: '40787'
  last_name: Praetorius
- first_name: Daniel
  full_name: Al-Kabbani, Daniel
  last_name: Al-Kabbani
- first_name: Carla
  full_name: Bohndick, Carla
  last_name: Bohndick
- first_name: Johanna
  full_name: Hilkenmeier, Johanna
  last_name: Hilkenmeier
- first_name: Sebastian T.
  full_name: König, Sebastian T.
  last_name: König
- first_name: Hannah S.
  full_name: Müsche, Hannah S.
  last_name: Müsche
- first_name: Sabrina
  full_name: Sommer, Sabrina
  id: '36251'
  last_name: Sommer
- first_name: Katrin B.
  full_name: Klingsieck, Katrin B.
  id: '36716'
  last_name: Klingsieck
citation:
  ama: 'Praetorius S, Al-Kabbani D, Bohndick C, et al. Spielend Lehrer/in werden:
    problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. . <i>Zeitschrift
    für Hochschulentwicklung</i>. 2016;11(3):213-245.'
  apa: 'Praetorius, S., Al-Kabbani, D., Bohndick, C., Hilkenmeier, J., König, S. T.,
    Müsche, H. S., Sommer, S., &#38; Klingsieck, K. B. (2016). Spielend Lehrer/in
    werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. . <i>Zeitschrift
    für Hochschulentwicklung</i>, <i>11</i>(3), 213–245.'
  bibtex: '@article{Praetorius_Al-Kabbani_Bohndick_Hilkenmeier_König_Müsche_Sommer_Klingsieck_2016,
    title={Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern.
    }, volume={11}, number={3}, journal={Zeitschrift für Hochschulentwicklung}, author={Praetorius,
    Saskia and Al-Kabbani, Daniel and Bohndick, Carla and Hilkenmeier, Johanna and
    König, Sebastian T. and Müsche, Hannah S. and Sommer, Sabrina and Klingsieck,
    Katrin B.}, year={2016}, pages={213–245} }'
  chicago: 'Praetorius, Saskia, Daniel Al-Kabbani, Carla Bohndick, Johanna Hilkenmeier,
    Sebastian T. König, Hannah S. Müsche, Sabrina Sommer, and Katrin B. Klingsieck.
    “Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern.
    .” <i>Zeitschrift für Hochschulentwicklung</i> 11, no. 3 (2016): 213–45.'
  ieee: 'S. Praetorius <i>et al.</i>, “Spielend Lehrer/in werden: problembasiertes
    Lernen mit virtuellen Schülerinnen/Schülern. ,” <i>Zeitschrift für Hochschulentwicklung</i>,
    vol. 11, no. 3, pp. 213–245, 2016.'
  mla: 'Praetorius, Saskia, et al. “Spielend Lehrer/in werden: problembasiertes Lernen
    mit virtuellen Schülerinnen/Schülern. .” <i>Zeitschrift für Hochschulentwicklung</i>,
    vol. 11, no. 3, 2016, pp. 213–45.'
  short: S. Praetorius, D. Al-Kabbani, C. Bohndick, J. Hilkenmeier, S.T. König, H.S.
    Müsche, S. Sommer, K.B. Klingsieck, Zeitschrift für Hochschulentwicklung 11 (2016)
    213–245.
date_created: 2023-10-25T10:28:54Z
date_updated: 2023-11-28T20:39:27Z
department:
- _id: '43'
intvolume: '        11'
issue: '3'
keyword:
- E-Learning
- digitale Medien
- problembasiertes Lernen
- Lehrerbildung
- Diagnostik
language:
- iso: ger
page: 213-245
publication: Zeitschrift für Hochschulentwicklung
publication_status: published
quality_controlled: '1'
status: public
title: 'Spielend Lehrer/in werden: problembasiertes Lernen mit virtuellen Schülerinnen/Schülern. '
type: journal_article
user_id: '36716'
volume: 11
year: '2016'
...
---
_id: '5704'
abstract:
- lang: eng
  text: 'Advancements in information technology have changed the way customers experience
    a service encounter and their relationship with service providers. Especially
    technology-based self-service channels have found their way into the 21st century
    service economy. While research embraces these channels for their cost-efficiency,
    it has not examined whether a shift from personal to self-service affects customer–firm
    relationships. Drawing from the service-dominant logic and its central concept
    of value-in-context, we discuss customers’ value creation in self-service and
    personal service channels and examine the long-term impact of these channels on
    customer retention. Using longitudinal customer data, we investigate how the ratio
    of self-service versus personal service use influences customer defection over
    time. Our findings suggest that the ratio of self-service to personal service
    used affects customer defection in a U-shaped manner, with intermediate levels
    of both self-service and personal service use being associated with the lowest
    likelihood of defection. We also find that this effect mitigates over time. We
    conclude that firms should not shift customers toward self-service channels completely,
    especially not at the beginning of a relationship. Our study underlines the importance
    of understanding when and how self-service technologies create valuable customer
    experiences and stresses the notion of actively managing customers’ cocreation
    of value. '
article_type: original
author:
- first_name: Anne
  full_name: Scherer, Anne
  last_name: Scherer
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
- first_name: Florian
  full_name: Von Wangenheim, Florian
  last_name: Von Wangenheim
citation:
  ama: 'Scherer A, Wünderlich N, Von Wangenheim F. The Value of Self-Service: Long-Term
    Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>.
    2015;39(1):177-200.'
  apa: 'Scherer, A., Wünderlich, N., &#38; Von Wangenheim, F. (2015). The Value of
    Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer
    Retention. <i>MIS Quarterly</i>, <i>39</i>(1), 177–200.'
  bibtex: '@article{Scherer_Wünderlich_Von Wangenheim_2015, title={The Value of Self-Service:
    Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.},
    volume={39}, number={1}, journal={MIS Quarterly}, publisher={MIS RC}, author={Scherer,
    Anne and Wünderlich, Nancy and Von Wangenheim, Florian}, year={2015}, pages={177–200}
    }'
  chicago: 'Scherer, Anne, Nancy Wünderlich, and Florian Von Wangenheim. “The Value
    of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer
    Retention.” <i>MIS Quarterly</i> 39, no. 1 (2015): 177–200.'
  ieee: 'A. Scherer, N. Wünderlich, and F. Von Wangenheim, “The Value of Self-Service:
    Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.,”
    <i>MIS Quarterly</i>, vol. 39, no. 1, pp. 177–200, 2015.'
  mla: 'Scherer, Anne, et al. “The Value of Self-Service: Long-Term Effects of Technology-Based
    Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i>, vol. 39, no.
    1, MIS RC, 2015, pp. 177–200.'
  short: A. Scherer, N. Wünderlich, F. Von Wangenheim, MIS Quarterly 39 (2015) 177–200.
date_created: 2018-11-15T11:36:38Z
date_updated: 2022-01-06T07:02:36Z
department:
- _id: '181'
intvolume: '        39'
issue: '1'
keyword:
- customer defection
- customer retention
- e-service
- longitudinal
- Self-service
- value-in-context
language:
- iso: eng
page: 177-200
publication: MIS Quarterly
publication_identifier:
  issn:
  - 0276-7783.
publication_status: published
publisher: MIS RC
status: public
title: 'The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service
  Usage on Customer Retention.'
type: journal_article
user_id: '37741'
volume: 39
year: '2015'
...
---
_id: '4428'
abstract:
- lang: ger
  text: 'Die Auseinandersetzung mit Bildungstechnologien erfolgt häufig ausgehend
    von einem technologischen Trend bzw. einer Klasse innovativer Werkzeuge (bspw.
    mobile Technologien). Es geht dann darum, die Potenziale dieser Tools für das
    Lernen zu ergründen, also letztlich eine Passung zwischen den technologischen
    Möglichkeiten und pädagogisch-didaktischen Erfordernissen zu konstruieren. In
    diesem Beitrag kehren wir diese Perspektive um: Ausgehend von einer bestimmten
    pädagogischen Problemstellung - der Bearbeitung heterogener Lernvoraussetzungen
    und Studienerfahrungen in der Lehrerbildung - entwickeln wir unterschiedliche
    didaktische Handlungsoptionen. Am Ende entsteht ein Werkzeug, das sich in Design
    und Funktionsumfang auf den Kern der pädagogischen Zielsetzung beschränkt.'
author:
- first_name: Tobias
  full_name: Jenert, Tobias
  last_name: Jenert
- first_name: Taiga
  full_name: Brahm, Taiga
  last_name: Brahm
citation:
  ama: Jenert T, Brahm T. Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen
    und Studienerfahrungen in der Lehrerbildung. <i>Journal für LehrerInnenbildung</i>.
    2013;13(4):29-33.
  apa: Jenert, T., &#38; Brahm, T. (2013). Ein e-Portfolio-Konzept zur Integration
    heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung. <i>Journal
    Für LehrerInnenbildung</i>, <i>13</i>(4), 29–33.
  bibtex: '@article{Jenert_Brahm_2013, title={Ein e-Portfolio-Konzept zur Integration
    heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung},
    volume={13}, number={4}, journal={Journal für LehrerInnenbildung}, publisher={Studien-Verlag},
    author={Jenert, Tobias and Brahm, Taiga}, year={2013}, pages={29–33} }'
  chicago: 'Jenert, Tobias, and Taiga Brahm. “Ein E-Portfolio-Konzept Zur Integration
    Heterogener Lernvoraussetzungen Und Studienerfahrungen in Der Lehrerbildung.”
    <i>Journal Für LehrerInnenbildung</i> 13, no. 4 (2013): 29–33.'
  ieee: T. Jenert and T. Brahm, “Ein e-Portfolio-Konzept zur Integration heterogener
    Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung,” <i>Journal für
    LehrerInnenbildung</i>, vol. 13, no. 4, pp. 29–33, 2013.
  mla: Jenert, Tobias, and Taiga Brahm. “Ein E-Portfolio-Konzept Zur Integration Heterogener
    Lernvoraussetzungen Und Studienerfahrungen in Der Lehrerbildung.” <i>Journal Für
    LehrerInnenbildung</i>, vol. 13, no. 4, Studien-Verlag, 2013, pp. 29–33.
  short: T. Jenert, T. Brahm, Journal Für LehrerInnenbildung 13 (2013) 29–33.
date_created: 2018-09-18T09:19:16Z
date_updated: 2022-01-06T07:01:03Z
department:
- _id: '208'
- _id: '282'
extern: '1'
intvolume: '        13'
issue: '4'
keyword:
- Portfolio
- Lehrerbildung
- Wirtschaftspädagogik
page: 29-33
publication: Journal für LehrerInnenbildung
publication_identifier:
  issn:
  - 1681-7028
publisher: Studien-Verlag
status: public
title: Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und
  Studienerfahrungen in der Lehrerbildung
type: journal_article
user_id: '51057'
volume: 13
year: '2013'
...
---
_id: '24036'
author:
- first_name: Jens
  full_name: Pottebaum, Jens
  id: '405'
  last_name: Pottebaum
  orcid: http://orcid.org/0000-0001-8778-2989
citation:
  ama: Pottebaum J. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>.
    Monsenstein und Vannerdat; 2012.
  apa: Pottebaum, J. (2012). <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>.
    Monsenstein und Vannerdat.
  bibtex: '@book{Pottebaum_2012, place={Münster}, title={Optimierung des einsatzbezogenen
    Lernens durch Wissensidentifikation}, publisher={Monsenstein und Vannerdat}, author={Pottebaum,
    Jens}, year={2012} }'
  chicago: 'Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>.
    Münster: Monsenstein und Vannerdat, 2012.'
  ieee: 'J. Pottebaum, <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>.
    Münster: Monsenstein und Vannerdat, 2012.'
  mla: Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>.
    Monsenstein und Vannerdat, 2012.
  short: J. Pottebaum, Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation,
    Monsenstein und Vannerdat, Münster, 2012.
date_created: 2021-09-09T12:18:36Z
date_updated: 2022-01-06T06:56:06Z
keyword:
- Arbeitsorganisation
- E-Learning
- Lernorganisation
- Lerntechnik
- Wissensmanagement
language:
- iso: eng
place: Münster
publication_identifier:
  isbn:
  - 3-86991-525-0
publisher: Monsenstein und Vannerdat
status: public
title: Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation
type: dissertation
user_id: '405'
year: '2012'
...
---
_id: '4430'
abstract:
- lang: ger
  text: Eine zentrale Herausforderung in der Ausbildung angehender Wirtschaftslehrpersonen
    stellt die sinnvolle Verknüpfung von Theorie- und Praxiserfahrungen dar. Im Rahmen
    der Ausbildung angehender Wirtschaftslehrpersonen an der Universität St. Gallen
    wird eine Lernumgebung gestaltet, die eine Verschränkung von Theorie- und Praxiserfahrungen
    ermöglichen soll. Die Lernprozesse der Studierenden werden dabei durch didaktisch
    angeleitete Weblogarbeit unterstützt. Trotz der Lernchancen, die sich aus einer
    Verknüpfung von theoretischen und praktischen Lernphasen ergeben, schätzen die
    Studierenden den Nutzen der Weblogarbeit als äusserst gering ein. Die Studierenden
    bei der reflexiven Integration praxisnaher und theoretischer Lernerfahrungen zu
    unterstützen, ist eine Herausforderung, die dezidierter Anleitung und Förderung
    durch die Lehrpersonen bedarf
author:
- first_name: Tobias
  full_name: Jenert, Tobias
  last_name: Jenert
- first_name: Anja
  full_name: Gebhardt, Anja
  last_name: Gebhardt
- first_name: Reto
  full_name: Käser, Reto
  last_name: Käser
citation:
  ama: Jenert T, Gebhardt A, Käser R. Weblogs zur Unterstützung der Theorie-Praxis-Integration
    in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift für E-Learning</i>. 2011;6(2):17-29.
  apa: Jenert, T., Gebhardt, A., &#38; Käser, R. (2011). Weblogs zur Unterstützung
    der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift
    Für E-Learning</i>, <i>6</i>(2), 17–29.
  bibtex: '@article{Jenert_Gebhardt_Käser_2011, title={Weblogs zur Unterstützung der
    Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung}, volume={6},
    number={2}, journal={Zeitschrift für E-Learning}, publisher={Studien-Verlag},
    author={Jenert, Tobias and Gebhardt, Anja and Käser, Reto}, year={2011}, pages={17–29}
    }'
  chicago: 'Jenert, Tobias, Anja Gebhardt, and Reto Käser. “Weblogs Zur Unterstützung
    Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift
    Für E-Learning</i> 6, no. 2 (2011): 17–29.'
  ieee: T. Jenert, A. Gebhardt, and R. Käser, “Weblogs zur Unterstützung der Theorie-Praxis-Integration
    in der Wirtschaftslehrenden-Ausbildung,” <i>Zeitschrift für E-Learning</i>, vol.
    6, no. 2, pp. 17–29, 2011.
  mla: Jenert, Tobias, et al. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration
    in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i>, vol.
    6, no. 2, Studien-Verlag, 2011, pp. 17–29.
  short: T. Jenert, A. Gebhardt, R. Käser, Zeitschrift Für E-Learning 6 (2011) 17–29.
date_created: 2018-09-18T09:23:54Z
date_updated: 2022-01-06T07:01:03Z
department:
- _id: '208'
- _id: '282'
extern: '1'
intvolume: '         6'
issue: '2'
keyword:
- Weblog
- Blog
- e-learning
- TEL
- higher education
- business education
page: 17-29
publication: Zeitschrift für E-Learning
publication_identifier:
  issn:
  - 1992-9579
publisher: Studien-Verlag
status: public
title: Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung
type: journal_article
user_id: '51057'
volume: 6
year: '2011'
...
---
_id: '5621'
abstract:
- lang: eng
  text: Remote voting through the Internet provides convenience and access to the
    electorate. At the same time, the security concerns facing any distributed application
    are magnified when the task is so crucial to democratic society. In addition,
    some of the electoral process loses transparency when it is encapsulated in information
    technology. In this paper, we examine the public record of three recent elections
    that used Internet voting. Our specific goal is to identify any potential flaws
    that security experts would recognize, but may have not been identified in the
    rush to implement technology. To do this, we present a multiple exploratory case
    study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands,
    and Switzerland. These elections were selected as particularly interesting and
    accessible, and each presents its own technical and security challenges. The electoral
    environment, technical design and process for each election are described, including
    reconstruction of details which are implied but not specified within the source
    material. We found that all three elections warrant significant concern about
    voter security, verifiability, and transparency. Usability, our fourth area of
    focus, seems to have been well-addressed in these elections. While our analysis
    is based on public documents and previously published reports, and therefore lacking
    access to any confidential materials held by electoral officials, this comparative
    analysis provides interesting insight and consistent questions across all these
    cases. Effective review of Internet voting requires an aggressive stance towards
    identifying potential security and operational flaws, and we encourage the use
    of third party reviews with critical technology skills during design, programming,
    and voting to reduce the changes of failure or fraud that would undermine public
    confidence.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Eliot
  full_name: Rich, Eliot
  last_name: Rich
citation:
  ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>. 2009;4(4 Part):729-744.'
  apa: 'Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, <i>4</i>(4
    Part), 729–744.'
  bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland},
    volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics
    \&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009},
    pages={729–744} }'
  chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i> 4, no. 4 Part
    (2009): 729–44.'
  ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744,
    2009.'
  mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, vol. 4, no.
    4 Part, IEEE, 2009, pp. 729–44.'
  short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \&#38; Security
    4 (2009) 729–744.
date_created: 2018-11-14T14:06:44Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:16:07Z
  date_updated: 2018-12-18T13:16:07Z
  file_id: '6316'
  file_name: JOURNAL VERSION.pdf
  file_size: 1544790
  relation: main_file
file_date_updated: 2018-12-18T13:16:07Z
has_accepted_license: '1'
intvolume: '         4'
issue: 4 Part
keyword:
- e-voting
- Internet voting
- Internet election
- security
- verifiability
- RIES
- Estonia
- Neuch{\^a}tel
language:
- iso: eng
oa: '1'
page: 729-744
publication: IEEE Transactions on Information Forensics \& Security
publisher: IEEE
status: public
title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections
  in Estonia, The Netherlands, and Switzerland'
type: journal_article
user_id: '61579'
volume: 4
year: '2009'
...
---
_id: '4494'
alternative_title:
- Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik
  DeLFI 2007
author:
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Bernhard
  full_name: Strehl, Bernhard
  last_name: Strehl
- first_name: Patrick Ole
  full_name: Noack, Patrick Ole
  last_name: Noack
citation:
  ama: 'Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung
    von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>.
    Logos Verlag; 2007:19--26.'
  apa: 'Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von
    E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.
    In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag.'
  bibtex: '@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios
    zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI
    Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias
    and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }'
  chicago: Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack.
    “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im
    Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.
  ieee: T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios
    zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI
    Workshops</i>, Siegen, 2007, pp. 19--26.
  mla: Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen
    Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag,
    2007, pp. 19--26.
  short: 'T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos
    Verlag, 2007, pp. 19--26.'
conference:
  end_date: 2007-09-17
  location: Siegen
  name: DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik
    e.V.
  start_date: 2007-09-17
date_created: 2018-09-19T09:08:18Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- E-Portfolios
- Lerngemeinschaften
- Praxisgemeinschaften
- Projektgruppen
- Hochschulstudium
- informelles Lernen
page: 19--26
publication: DeLFI Workshops
publisher: Logos Verlag
status: public
title: Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften
  im Hochschulstudium.
type: conference
user_id: '51057'
year: '2007'
...
---
_id: '4497'
alternative_title:
- Creating New Learning Experiences on a Global Scale
author:
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Nina
  full_name: Heinze, Nina
  last_name: Heinze
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Gabi
  full_name: Reinmann, Gabi
  last_name: Reinmann
citation:
  ama: 'Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in
    the Project-Centered Study Program" Problem-Solving Competencies". In: ; 2007.'
  apa: Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning
    Communities in the Project-Centered Study Program" Problem-Solving Competencies".
    Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL)
    2007, Kreta .
  bibtex: '@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning
    Communities in the Project-Centered Study Program" Problem-Solving Competencies"},
    author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi},
    year={2007} }'
  chicago: Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student
    Learning Communities in the Project-Centered Study Program" Problem-Solving Competencies",”
    2007.
  ieee: T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities
    in the Project-Centered Study Program" Problem-Solving Competencies",” presented
    at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007,
    Kreta , 2007.
  mla: Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered
    Study Program" Problem-Solving Competencies"</i>. 2007.
  short: 'T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007.'
conference:
  end_date: '2007-06-20 '
  location: 'Kreta '
  name: Second European Conference on Technology Enhanced Learning (EC-TEL) 2007
  start_date: 2007-06-17
date_created: 2018-09-19T09:22:02Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- Problem Solving Competencies
- E-Portfolio
status: public
title: Student Learning Communities in the Project-Centered Study Program" Problem-Solving
  Competencies"
type: conference
user_id: '51057'
year: '2007'
...
---
_id: '5655'
abstract:
- lang: eng
  text: Spam e-mails have become a serious technological and economic problem. Up
    to now, by deploying complementary anti-spam measures, we have been reasonably
    able to withstand spam e-mails and use the Internet for regular communication.
    However, if we are to avert the danger of losing the Internet e-mail service in
    its capacity as a valuable, free and worldwide medium of open communication, anti-spam
    activities should be performed more systematically than is currently the case
    regarding the mainly heuristic, anti-spam measures in place. A formal framework,
    within which the existing delivery routes that a spam e-mail may take, and anti-spam
    measures and their effectiveness can be investigated, will perhaps encourage a
    shift in methodology and pave the way for new, holistic anti-spam measures. This
    paper presents a model of the Internet e-mail infrastructure as a directed graph
    and a deterministic finite automaton and draws on automata theory to formally
    derive the spam delivery routes. The most important anti-spam measures are then
    described. Methods controlling only specific delivery routes are evaluated in
    terms of how effectively they cover the modeled e-mail infrastructure; methods
    operating independently of any particular routes receive a more general assessment.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>. 2007;3(2):66-90.
  apa: Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.
  bibtex: '@article{Schryen_2007, title={Do anti-spam measures effectively cover the
    e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The
    Journal of Information Systems Security (AIS Special Interest Group in Security)},
    author={Schryen, Guido}, year={2007}, pages={66–90} }'
  chicago: 'Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.'
  ieee: G. Schryen, “Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach,” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.
  mla: Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.
  short: G. Schryen, The Journal of Information Systems Security (AIS Special Interest
    Group in Security) 3 (2007) 66–90.
date_created: 2018-11-14T14:51:41Z
date_updated: 2022-01-06T07:02:22Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:25:12Z
  date_updated: 2018-12-18T13:25:12Z
  file_id: '6324'
  file_name: Do anti-spam measures effectively cover the e-mail communication - Journal
    version.pdf
  file_size: 100448
  relation: main_file
file_date_updated: 2018-12-18T13:25:12Z
has_accepted_license: '1'
intvolume: '         3'
issue: '2'
keyword:
- e-mail
- spam
- e-mail infrastructure
- anti-spam measures
- spamming options
language:
- iso: eng
oa: '1'
page: 66-90
publication: The Journal of Information Systems Security (AIS Special Interest Group
  in Security)
status: public
title: Do anti-spam measures effectively cover the e-mail communication network? A
  formal approach
type: journal_article
user_id: '61579'
volume: 3
year: '2007'
...
---
_id: '5661'
abstract:
- lang: eng
  text: Spam has become one of the most annoying and costly phenomenon in the Internet.
    Valid e-mail addresses belong to the most valuable resources of spammers, but
    little is known about spammers? behavior when collecting and harvesting addresses
    and spammers? capabilities and interest in carefully directed, consumer-oriented
    marketing have not been explored yet. Gaining insight into spammers? ways to obtain
    and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment
    of the effectiveness of address obscuring techniques and the usability and necessity
    of hiding e-mail addresses on the Internet. This paper presents a spam honeypot
    project in progress addressing these issues by systematically placing e-mail addresses
    in the Internet and analyzing received e-mails. The honeypot?s conceptual framework,
    its implementation, and first empirical results are presented. Finally, an outlook
    on further work and activities is provided.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>. Westpoint; 2005:37-41.'
  apa: Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i> (pp. 37–41). Westpoint.
  bibtex: '@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’
    behavior in collecting and applying addresses}, booktitle={Proceedings of the
    6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen,
    Guido}, year={2005}, pages={37–41} }'
  chicago: Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting
    and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, 37–41. Westpoint, 2005.
  ieee: G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, 2005, pp. 37–41.
  mla: Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting
    and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, Westpoint, 2005, pp. 37–41.
  short: 'G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop,
    Westpoint, 2005, pp. 37–41.'
date_created: 2018-11-14T14:55:48Z
date_updated: 2022-01-06T07:02:24Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:31:41Z
  date_updated: 2018-12-18T13:31:41Z
  file_id: '6331'
  file_name: Schryen - An e-mail honeypot addressing spammers' behavior in collecting
    and applying addresses.pdf
  file_size: 119362
  relation: main_file
file_date_updated: 2018-12-18T13:31:41Z
has_accepted_license: '1'
keyword:
- Spam
- ham
- e-mail
- honeypot
- address obscuring technique
- address taxonomy
language:
- iso: eng
oa: '1'
page: 37-41
publication: Proceedings of the 6th IEEE Information Assurance Workshop
publisher: Westpoint
status: public
title: An e-mail honeypot addressing spammers' behavior in collecting and applying
  addresses
type: conference
user_id: '61579'
year: '2005'
...
---
_id: '5662'
abstract:
- lang: eng
  text: Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur
    ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten,
    weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im
    Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe.
    Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem
    technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails
    in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt
    in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit
    bedeutendsten Verfahren zur Bekämpfung von Spam.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>.
    2004;46(4):281-288.
  apa: Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam.
    <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288.
  bibtex: '@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung
    von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer},
    author={Schryen, Guido}, year={2004}, pages={281–288} }'
  chicago: 'Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.”
    <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.'
  ieee: G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>,
    vol. 46, no. 4, pp. 281–288, 2004.
  mla: Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.”
    <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.
  short: G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.
date_created: 2018-11-14T14:56:51Z
date_updated: 2022-01-06T07:02:24Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:36:34Z
  date_updated: 2018-12-18T13:36:34Z
  file_id: '6338'
  file_name: Verlagsversion Guido_Schryen__281__288.pdf
  file_size: 288686
  relation: main_file
file_date_updated: 2018-12-18T13:36:34Z
has_accepted_license: '1'
intvolume: '        46'
issue: '4'
keyword:
- Spam
- E-Mail
- Spoofing
- Blockieren
- Filtern
- Lightweight Mail Transfer Agent Authentication Protocol (LMAP)
language:
- iso: eng
oa: '1'
page: 281-288
publication: Wirtschaftsinformatik
publisher: Springer
status: public
title: Effektivität von Lösungsansätzen zur Bekämpfung von Spam
type: journal_article
user_id: '61579'
volume: 46
year: '2004'
...
---
_id: '5663'
abstract:
- lang: eng
  text: Spam as unsolicited e-mail to a large number of recipients is known to ecome
    an increasingly disturbing and costly issue of electronic business and internet
    traffic. Mainly technical-oriented approaches are applied with a focus on blocking,
    filtering, and authentication mechanisms based on the domain name system. They
    come along with different drawbacks and have all low effectiveness in common.
    The article sketches these approaches, shows its limitations, and proposes an
    account-based approach where the number of e-mails per day and account is restricted.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias
    P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004.
    Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.'
  apa: 'Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In
    P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet
    2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.'
  bibtex: '@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating
    an Account-based Approach}, booktitle={Proceedings of the IADIS International
    Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen,
    Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }'
  chicago: 'Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.”
    In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol.
    2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.'
  ieee: 'G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings
    of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp.
    937–940.'
  mla: 'Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings
    of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by
    Pedro Isaias, IADIS Press, 2004, pp. 937–40.'
  short: 'G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International
    Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.'
date_created: 2018-11-14T14:59:03Z
date_updated: 2022-01-06T07:02:25Z
ddc:
- '000'
department:
- _id: '277'
editor:
- first_name: Pedro
  full_name: Isaias, Pedro
  last_name: Isaias
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:33:30Z
  date_updated: 2018-12-18T13:33:30Z
  file_id: '6333'
  file_name: Fighting Spam_Motivating an account-based approach.pdf
  file_size: 46083
  relation: main_file
file_date_updated: 2018-12-18T13:33:30Z
has_accepted_license: '1'
keyword:
- e-mail
- spam
- filtering
- blocking
- LMAP
- SMTP account
language:
- iso: eng
oa: '1'
page: 937-940
place: Madrid
publication: Proceedings of the IADIS International Conference WWW/Internet 2004.
  vol. 2
publisher: IADIS Press
status: public
title: 'Fighting Spam: Motivating an Account-based Approach'
type: conference
user_id: '61579'
year: '2004'
...
---
_id: '5667'
abstract:
- lang: eng
  text: Voting via the Internet is part of electronic government and electronic democracy.
    However, there are many obstacles which have to be overcome, especially legal
    restrictions have to be transformed into technical and security solutions. In
    the first part the article discusses advantages and disadvantages of Internet
    elections, shows different application fields, and presents important international
    pilot schemes (political and business ones). in the second part, due to democratic
    basic principles, technological security aspects are worked out.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International
    Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.'
  apa: 'Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the
    IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021).
    Algarve: IADIS Press.'
  bibtex: '@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting},
    booktitle={Proceedings of the IADIS International Conference WWW Internet 2003.
    vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021}
    }'
  chicago: 'Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the
    IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve:
    IADIS Press, 2003.'
  ieee: 'G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS
    International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press,
    2003, pp. 1017–1021.'
  mla: 'Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS
    International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp.
    1017–21.'
  short: 'G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet
    2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.'
date_created: 2018-11-14T15:01:49Z
date_updated: 2022-01-06T07:02:25Z
department:
- _id: '277'
extern: '1'
keyword:
- Internet Voting
- Online polls
- E-Democracy
- Security
language:
- iso: eng
page: 1017-1021
place: Algarve
publication: Proceedings of the IADIS International Conference WWW Internet 2003.
  vol. 2
publisher: IADIS Press
status: public
title: 'E-Democracy: Internet Voting'
type: book_chapter
user_id: '61579'
year: '2003'
...
---
_id: '5668'
abstract:
- lang: eng
  text: 'Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen
    diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger
    Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen
    wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden
    anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen
    herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte
    herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität
    der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell
    vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems
    systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem
    Ausblick auf notwendige Untersuchungen.'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>.
    ; 2003:937-956.'
  apa: Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i>
    (pp. 937–956).
  bibtex: '@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale
    Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956}
    }'
  chicago: Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    937–56, 2003.
  ieee: G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    2003, pp. 937–956.
  mla: Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    2003, pp. 937–56.
  short: 'G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp.
    937–956.'
date_created: 2018-11-14T15:03:15Z
date_updated: 2022-01-06T07:02:26Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:40:14Z
  date_updated: 2018-12-18T13:40:14Z
  file_id: '6340'
  file_name: Schryen - Internet-Wahlen.pdf
  file_size: 364380
  relation: main_file
file_date_updated: 2018-12-18T13:40:14Z
has_accepted_license: '1'
keyword:
- Internet-Wahlen
- E-Democracy
- Sicherheit
- Kryptographie
language:
- iso: eng
oa: '1'
page: 937-956
publication: 6. Internationale Tagung Wirtschaftsinformatik
status: public
title: Internet-Wahlen
type: conference
user_id: '61579'
year: '2003'
...
