[{"doi":"10.3233/efi-190308","main_file_link":[{"open_access":"1"}],"oa":"1","date_updated":"2022-09-15T08:39:32Z","volume":36,"author":[{"id":"90339","full_name":"Steinhardt, Isabel","last_name":"Steinhardt","orcid":"https://orcid.org/0000-0002-2590-6189","first_name":"Isabel"}],"page":"263-279","intvolume":"        36","citation":{"apa":"Steinhardt, I. (2020). Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar. <i>Education for Information</i>, <i>36</i>(3), 263–279. <a href=\"https://doi.org/10.3233/efi-190308\">https://doi.org/10.3233/efi-190308</a>","bibtex":"@article{Steinhardt_2020, title={Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar}, volume={36}, DOI={<a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>}, number={3}, journal={Education for Information}, publisher={IOS Press}, author={Steinhardt, Isabel}, year={2020}, pages={263–279} }","short":"I. Steinhardt, Education for Information 36 (2020) 263–279.","mla":"Steinhardt, Isabel. “Learning Open Science by Doing Open Science. A Reflection of a Qualitative Research Project-Based Seminar.” <i>Education for Information</i>, vol. 36, no. 3, IOS Press, 2020, pp. 263–79, doi:<a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>.","chicago":"Steinhardt, Isabel. “Learning Open Science by Doing Open Science. A Reflection of a Qualitative Research Project-Based Seminar.” <i>Education for Information</i> 36, no. 3 (2020): 263–79. <a href=\"https://doi.org/10.3233/efi-190308\">https://doi.org/10.3233/efi-190308</a>.","ieee":"I. Steinhardt, “Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar,” <i>Education for Information</i>, vol. 36, no. 3, pp. 263–279, 2020, doi: <a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>.","ama":"Steinhardt I. Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar. <i>Education for Information</i>. 2020;36(3):263-279. doi:<a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>"},"has_accepted_license":"1","publication_identifier":{"issn":["0167-8329","1875-8649"]},"publication_status":"published","article_type":"original","extern":"1","file_date_updated":"2022-09-15T08:38:44Z","_id":"29246","department":[{"_id":"477"}],"user_id":"90339","status":"public","type":"journal_article","title":"Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar","publisher":"IOS Press","date_created":"2022-01-11T15:56:37Z","year":"2020","quality_controlled":"1","issue":"3","keyword":["Open Science","Open Education Practices","Library and Information Sciences","Education","Information Systems"],"ddc":["300"],"language":[{"iso":"eng"}],"abstract":[{"text":"<jats:p>Openness in science and education is increasing in importance within the digital knowledge society. So far, less attention has been paid to teaching Open Science in bachelor’s degrees or in qualitative methods. Therefore, the aim of this article is to use a seminar example to explore what Open Science practices can be taught in qualitative research and how digital tools can be involved. The seminar focused on the following practices: Open data practices, the practice of using the free and open source tool “Collaborative online Interpretation, the practice of participating, cooperating, collaborating and contributing through participatory technologies and in social (based) networks. To learn Open Science practices, the students were involved in a qualitative research project about “Use of digital technologies for the study and habitus of students”. The study shows the practices of Open Data are easy to teach, whereas the use of free and open source tools and participatory technologies for collaboration, participation, cooperation and contribution is more difficult. In addition, a cultural shift would have to take place within German universities to promote Open Science practices in general.</jats:p>","lang":"eng"}],"file":[{"date_created":"2022-09-15T08:38:44Z","creator":"isste","date_updated":"2022-09-15T08:38:44Z","file_id":"33376","access_level":"closed","file_name":"2020 Steinhardt Learning Open Science.pdf","file_size":3745348,"content_type":"application/pdf","relation":"main_file","success":1}],"publication":"Education for Information"},{"issue":"6","year":"2020","date_created":"2022-09-08T09:05:30Z","title":"Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen","publication":"die hochschullehre","file":[{"relation":"main_file","content_type":"application/pdf","file_size":318104,"file_name":"HSL2012W.pdf","access_level":"open_access","file_id":"33300","date_updated":"2022-09-08T09:05:22Z","date_created":"2022-09-08T09:05:22Z","creator":"chogg"}],"abstract":[{"text":"The aim of this study was to find out whether teaching how to search for literature\r\nwould be more beneficial to students and teachers if done online through short videos\r\nrather than in person during course time. To find out whether online videos are more\r\nbeneficial, two courses were asked to fill in questionnaires, one at the beginning and\r\none at the end of the semester. One of the courses received the input online via videos\r\nand were given an exercise to put the newly learned skills to use, the other course\r\nserved as a control group and learned how to search for literature during the course.\r\nThe results show that while the difference between the two groups is not significant,\r\nthe videos can still be regarded as being more beneficial than teaching the necessary\r\nskills during course time.","lang":"eng"}],"language":[{"iso":"ger"}],"ddc":["020"],"keyword":["E-Learning","information competence","literature","library","research"],"publication_status":"published","publication_identifier":{"eissn":["ISSN 2199-8825"]},"has_accepted_license":"1","citation":{"ama":"Hahn CA. Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen. <i>die hochschullehre</i>. 2020;(6).","ieee":"C. A. Hahn, “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen,” <i>die hochschullehre</i>, no. 6, 2020.","chicago":"Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen.” <i>die hochschullehre</i>, no. 6 (2020).","bibtex":"@article{Hahn_2020, title={Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen}, number={6}, journal={die hochschullehre}, author={Hahn, Charlotte Anna}, year={2020} }","mla":"Hahn, Charlotte Anna. “Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen.” <i>die hochschullehre</i>, no. 6, 2020.","short":"C.A. Hahn, die hochschullehre (2020).","apa":"Hahn, C. A. (2020). Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen. <i>die hochschullehre</i>, <i>6</i>."},"author":[{"last_name":"Hahn","full_name":"Hahn, Charlotte Anna","id":"25934","first_name":"Charlotte Anna"}],"oa":"1","date_updated":"2023-10-13T10:17:31Z","main_file_link":[{"url":"http://www.hochschullehre.org/wp-content/files/diehochschullehre_2020_Hahn_Informationskompetenz.pdf","open_access":"1"}],"type":"journal_article","status":"public","user_id":"14931","department":[{"_id":"1"},{"_id":"384"}],"_id":"33299","file_date_updated":"2022-09-08T09:05:22Z"},{"date_updated":"2022-01-06T06:51:28Z","author":[{"first_name":"Jens","last_name":"Müller","full_name":"Müller, Jens","id":"1245"},{"first_name":"Sönke","last_name":"Sievers","full_name":"Sievers, Sönke","id":"46447"},{"first_name":"Oliver","full_name":"Mehring, Oliver","id":"36373","last_name":"Mehring"},{"full_name":"Sofilkanitsch, Christian","last_name":"Sofilkanitsch","first_name":"Christian"}],"date_created":"2019-09-04T09:48:44Z","title":"Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?","main_file_link":[{"url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3415109"}],"publication_status":"published","year":"2019","page":"65","citation":{"ieee":"J. Müller, S. Sievers, O. Mehring, and C. Sofilkanitsch, <i>Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?</i> 2019.","chicago":"Müller, Jens, Sönke Sievers, Oliver Mehring, and Christian Sofilkanitsch. <i>Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?</i>, 2019.","ama":"Müller J, Sievers S, Mehring O, Sofilkanitsch C. <i>Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?</i>; 2019.","apa":"Müller, J., Sievers, S., Mehring, O., &#38; Sofilkanitsch, C. (2019). <i>Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?</i>","short":"J. Müller, S. Sievers, O. Mehring, C. Sofilkanitsch, Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?, 2019.","mla":"Müller, Jens, et al. <i>Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?</i> 2019.","bibtex":"@book{Müller_Sievers_Mehring_Sofilkanitsch_2019, title={Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?}, author={Müller, Jens and Sievers, Sönke and Mehring, Oliver and Sofilkanitsch, Christian}, year={2019} }"},"jel":["H2","M41"],"_id":"13137","department":[{"_id":"186"},{"_id":"189"}],"user_id":"46447","keyword":["Keywords: non-GAAP reporting","restatements","information content of earnings","firm value","overvaluation"],"language":[{"iso":"eng"}],"type":"working_paper","abstract":[{"lang":"eng","text":"Non-GAAP reporting is under debate as managers may opportunistically inflate non-GAAP earnings. By separating firms into groups based on exclusions of recurring expenses before material restatements occur this paper investigates whether market participants are misled based on ex-ante non-GAAP reporting. The results show a decline in cumulative abnormal returns (–11.8% aggressive non-GAAP Reporting vs. –2.7% non-aggressive non-GAAP reporting), reduction in overvaluation (–22.18% vs. no decline) and losses in the earnings response coefficient (–51.8% vs. no significant decline) for firms with prior aggressive non-GAAP reporting. Further, we document that investors are less responsive to aggressively reported non-GAAP earnings ex-post, indicating that increased attention enhances investor’s ability to see through the quality of non-GAAP exclusions. "}],"status":"public"},{"publication":"HCII 2019","abstract":[{"lang":"eng","text":"This paper explores Finnish, German and Swedish older adults’ perceptions of a future welfare service with increased use of welfare technologies, specifically care robots. The issues are the rapid digitalization and development of health and welfare technology, which presently is mainly technology driven (not need or user driven), and the demographic challenge. The aim of the study was to explore older adults’ perception of the future use of welfare technology or care robots. A qualitative approach with focus group discussions was employed, followed by thematic analysis. The results are presented in four overall themes: the impact on daily life for older adults and professional caregivers, codes of practice and terms of use, dissemination of information and knowledge, and conditions for successful implementation. There were significant differences in the informants’ attitudes toward and knowledge about care robots. However, the informants’ attitudes appeared to change during the focus groups and in general, became more positive. Authentic needs, which care robots could support, refer to independence, safety and security, and the ability to manage or ease daily life or working life. The results suggest that older adults, after receiving relevant information, were open to the idea of being supported by care robots in their daily lives."}],"language":[{"iso":"eng"}],"keyword":["Care robots","Older adults","Implementation","Information","Perceptions","Welfare technology"],"year":"2019","date_created":"2019-03-22T07:27:48Z","publisher":"Springer","title":"Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots","type":"conference","status":"public","editor":[{"first_name":"Jia","last_name":"Zhou","full_name":"Zhou, Jia"},{"last_name":"Salvendy","full_name":"Salvendy, Gavriel","first_name":"Gavriel"}],"department":[{"_id":"178"},{"_id":"184"}],"user_id":"49071","series_title":"Lecture Notes in Computer Science","_id":"8538","project":[{"name":"Use of care robots in welfare services: New models for effective orientation","_id":"46","grant_number":"16SV7954"}],"publication_identifier":{"isbn":["978-3-030-22011-2"]},"publication_status":"published","page":"212-227","intvolume":"     11592","citation":{"bibtex":"@inproceedings{Johansson-Pajala_Thommes_Hoppe_Tuisku_Hennala_Pekkarinen_ Melkas_Gustafsson_2019, place={Cham}, series={Lecture Notes in Computer Science}, title={Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots}, volume={11592}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-22012-9_16\">10.1007/978-3-030-22012-9_16</a>}, booktitle={HCII 2019}, publisher={Springer}, author={Johansson-Pajala, Rose-Marie and Thommes, Kirsten and Hoppe, Julia Amelie and Tuisku, Outi and Hennala, Lea and Pekkarinen, Satu and  Melkas, Helinä and Gustafsson, Christine }, editor={Zhou, Jia and Salvendy, Gavriel}, year={2019}, pages={212–227}, collection={Lecture Notes in Computer Science} }","mla":"Johansson-Pajala, Rose-Marie, et al. “Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots.” <i>HCII 2019</i>, edited by Jia Zhou and Gavriel Salvendy, vol. 11592, Springer, 2019, pp. 212–27, doi:<a href=\"https://doi.org/10.1007/978-3-030-22012-9_16\">10.1007/978-3-030-22012-9_16</a>.","short":"R.-M. Johansson-Pajala, K. Thommes, J.A. Hoppe, O. Tuisku, L. Hennala, S. Pekkarinen, H.  Melkas, C. Gustafsson, in: J. Zhou, G. Salvendy (Eds.), HCII 2019, Springer, Cham, 2019, pp. 212–227.","apa":"Johansson-Pajala, R.-M., Thommes, K., Hoppe, J. A., Tuisku, O., Hennala, L., Pekkarinen, S.,  Melkas, H., &#38; Gustafsson, C. (2019). Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots. In J. Zhou &#38; G. Salvendy (Eds.), <i>HCII 2019</i> (Vol. 11592, pp. 212–227). Springer. <a href=\"https://doi.org/10.1007/978-3-030-22012-9_16\">https://doi.org/10.1007/978-3-030-22012-9_16</a>","ieee":"R.-M. Johansson-Pajala <i>et al.</i>, “Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots,” in <i>HCII 2019</i>, Orlando, 2019, vol. 11592, pp. 212–227, doi: <a href=\"https://doi.org/10.1007/978-3-030-22012-9_16\">10.1007/978-3-030-22012-9_16</a>.","chicago":"Johansson-Pajala, Rose-Marie, Kirsten Thommes, Julia Amelie Hoppe, Outi Tuisku, Lea Hennala, Satu Pekkarinen, Helinä  Melkas, and Christine  Gustafsson. “Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots.” In <i>HCII 2019</i>, edited by Jia Zhou and Gavriel Salvendy, 11592:212–27. Lecture Notes in Computer Science. Cham: Springer, 2019. <a href=\"https://doi.org/10.1007/978-3-030-22012-9_16\">https://doi.org/10.1007/978-3-030-22012-9_16</a>.","ama":"Johansson-Pajala R-M, Thommes K, Hoppe JA, et al. Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots. In: Zhou J, Salvendy G, eds. <i>HCII 2019</i>. Vol 11592. Lecture Notes in Computer Science. Springer; 2019:212-227. doi:<a href=\"https://doi.org/10.1007/978-3-030-22012-9_16\">10.1007/978-3-030-22012-9_16</a>"},"place":"Cham","volume":11592,"author":[{"first_name":"Rose-Marie","full_name":"Johansson-Pajala, Rose-Marie","last_name":"Johansson-Pajala"},{"first_name":"Kirsten","full_name":"Thommes, Kirsten","id":"72497","last_name":"Thommes"},{"full_name":"Hoppe, Julia Amelie","id":"73093","last_name":"Hoppe","first_name":"Julia Amelie"},{"first_name":"Outi","last_name":"Tuisku","full_name":"Tuisku, Outi"},{"first_name":"Lea","last_name":"Hennala","full_name":"Hennala, Lea"},{"last_name":"Pekkarinen","full_name":"Pekkarinen, Satu","first_name":"Satu"},{"first_name":"Helinä","full_name":" Melkas, Helinä","last_name":" Melkas"},{"first_name":"Christine ","last_name":"Gustafsson","full_name":"Gustafsson, Christine "}],"date_updated":"2022-03-10T15:41:56Z","doi":"10.1007/978-3-030-22012-9_16","conference":{"location":"Orlando","name":"Human Aspects of IT for the Aged Population. Design for the Elderly and Technology Acceptance"}},{"citation":{"ama":"Klowait N. Interactionism in the age of ubiquitous telecommunication. <i>Information, Communication &#38; Society</i>. 2019;22(5):605-621. doi:<a href=\"https://doi.org/10.1080/1369118x.2019.1566487\">10.1080/1369118x.2019.1566487</a>","ieee":"N. Klowait, “Interactionism in the age of ubiquitous telecommunication,” <i>Information, Communication &#38; Society</i>, vol. 22, no. 5, pp. 605–621, 2019, doi: <a href=\"https://doi.org/10.1080/1369118x.2019.1566487\">10.1080/1369118x.2019.1566487</a>.","chicago":"Klowait, Nils. “Interactionism in the Age of Ubiquitous Telecommunication.” <i>Information, Communication &#38; Society</i> 22, no. 5 (2019): 605–21. <a href=\"https://doi.org/10.1080/1369118x.2019.1566487\">https://doi.org/10.1080/1369118x.2019.1566487</a>.","bibtex":"@article{Klowait_2019, title={Interactionism in the age of ubiquitous telecommunication}, volume={22}, DOI={<a href=\"https://doi.org/10.1080/1369118x.2019.1566487\">10.1080/1369118x.2019.1566487</a>}, number={5}, journal={Information, Communication &#38; Society}, publisher={Informa UK Limited}, author={Klowait, Nils}, year={2019}, pages={605–621} }","short":"N. Klowait, Information, Communication &#38; Society 22 (2019) 605–621.","mla":"Klowait, Nils. “Interactionism in the Age of Ubiquitous Telecommunication.” <i>Information, Communication &#38; Society</i>, vol. 22, no. 5, Informa UK Limited, 2019, pp. 605–21, doi:<a href=\"https://doi.org/10.1080/1369118x.2019.1566487\">10.1080/1369118x.2019.1566487</a>.","apa":"Klowait, N. (2019). Interactionism in the age of ubiquitous telecommunication. <i>Information, Communication &#38; Society</i>, <i>22</i>(5), 605–621. <a href=\"https://doi.org/10.1080/1369118x.2019.1566487\">https://doi.org/10.1080/1369118x.2019.1566487</a>"},"page":"605-621","intvolume":"        22","publication_status":"published","publication_identifier":{"issn":["1369-118X","1468-4462"]},"doi":"10.1080/1369118x.2019.1566487","author":[{"id":"98454","full_name":"Klowait, Nils","orcid":"0000-0002-7347-099X","last_name":"Klowait","first_name":"Nils"}],"volume":22,"date_updated":"2024-03-26T09:38:55Z","status":"public","type":"journal_article","extern":"1","article_type":"original","user_id":"98454","_id":"42674","year":"2019","issue":"5","quality_controlled":"1","title":"Interactionism in the age of ubiquitous telecommunication","date_created":"2023-03-02T15:43:38Z","publisher":"Informa UK Limited","publication":"Information, Communication & Society","language":[{"iso":"eng"}],"keyword":["Library and Information Sciences","Communication"]},{"series_title":"CEUR Workshop Proceedings","user_id":"5281","department":[{"_id":"66"}],"_id":"2332","status":"public","type":"conference","main_file_link":[{"open_access":"1","url":"http://ceur-ws.org/Vol-2060/rebpm2.pdf"}],"author":[{"id":"5281","full_name":"Rittmeier, Florian","last_name":"Rittmeier","first_name":"Florian"},{"last_name":"Engels","full_name":"Engels, Gregor","id":"107","first_name":"Gregor"},{"last_name":"Teetz","full_name":"Teetz, Alexander","id":"5319","first_name":"Alexander"}],"volume":2060,"oa":"1","date_updated":"2022-01-06T06:55:49Z","citation":{"chicago":"Rittmeier, Florian, Gregor Engels, and Alexander Teetz. “Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes).” In <i>Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.</i>, 2060:215--221. CEUR Workshop Proceedings. CEUR-WS.org, 2018.","ieee":"F. Rittmeier, G. Engels, and A. Teetz, “Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes),” in <i>Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.</i>, 2018, vol. 2060, pp. 215--221.","ama":"Rittmeier F, Engels G, Teetz A. Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes). In: <i>Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.</i> Vol 2060. CEUR Workshop Proceedings. CEUR-WS.org; 2018:215--221.","apa":"Rittmeier, F., Engels, G., &#38; Teetz, A. (2018). Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes). In <i>Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.</i> (Vol. 2060, pp. 215--221). CEUR-WS.org.","short":"F. Rittmeier, G. Engels, A. Teetz, in: Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018., CEUR-WS.org, 2018, pp. 215--221.","mla":"Rittmeier, Florian, et al. “Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes).” <i>Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.</i>, vol. 2060, CEUR-WS.org, 2018, pp. 215--221.","bibtex":"@inproceedings{Rittmeier_Engels_Teetz_2018, series={CEUR Workshop Proceedings}, title={Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes)}, volume={2060}, booktitle={Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.}, publisher={CEUR-WS.org}, author={Rittmeier, Florian and Engels, Gregor and Teetz, Alexander}, year={2018}, pages={215--221}, collection={CEUR Workshop Proceedings} }"},"intvolume":"      2060","page":"215--221","publication_status":"published","language":[{"iso":"ger"}],"keyword":["Digitalisierungspotenziale","BPI","Digitale Transformation","Information Flow-Modellierung","Patterns","Requirements Engineering"],"abstract":[{"text":"Ein wichtiges Element der Digitalen Transformation ist die Digitalisierung der Prozesse in Unternehmen. Eine Herausforderung besteht hierbei in der systematischen Erkennung von Digitalisierungspotenzialen in Prozessen. Bestehende Ansätze benötigen Experten, welche Potenziale über ihre Erfahrung oder zeitaufwendig mithilfe von Musterkatalogen identifizieren.\r\nIn diesem Artikel werden verschiedene Digitalisierungspotenziale klassifiziert und Muster für ein zukünftiges musterbasiertes Analyseverfahren zur automatisierten Identifikation von Digitalisierungspotenzialen in BPMN-Diagrammen beschrieben. Im Vergleich zu bestehenden Ansätzen erlaubt es Experten die Identifizierung von Digitalisierungspotenzialen effizienter und effektiver durchzuführen.","lang":"ger"},{"lang":"eng","text":"An important element of digital transformation is the digitalization of processes within enterprises.\r\nA major challenge is the systematic identification of digitalization potentials in business processes.\r\nExisting approaches require experts who identify said potentials by using the time-consuming method of pattern catalogs or by relying on their professional experiences. \r\nIn this paper we classify potentials of digitalization and corresponding patterns for a future pattern-based analysis procedure. This shall allow for the automated identification of digitalization potentials in BPMN diagrams. In comparison to existing approaches, our proposed method could support a more efficient and effective identification of digitalization potentials by experts."}],"publication":"Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.","title":"Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes)","date_created":"2018-04-13T09:44:09Z","publisher":"CEUR-WS.org","year":"2018"},{"title":"Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning","volume":77,"author":[{"full_name":"Weishäupl, Eva","last_name":"Weishäupl","first_name":"Eva"},{"last_name":"Yasasin","full_name":"Yasasin, Emrah","first_name":"Emrah"},{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"date_created":"2018-11-14T11:24:37Z","oa":"1","publisher":"Elsevier","date_updated":"2022-01-06T07:02:03Z","intvolume":"        77","page":"807 - 823","citation":{"ama":"Weishäupl E, Yasasin E, Schryen G. Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. <i>Computers &#38; Security</i>. 2018;77:807-823.","chicago":"Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” <i>Computers &#38; Security</i> 77 (2018): 807–23.","ieee":"E. Weishäupl, E. Yasasin, and G. Schryen, “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning,” <i>Computers &#38; Security</i>, vol. 77, pp. 807–823, 2018.","bibtex":"@article{Weishäupl_Yasasin_Schryen_2018, title={Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning}, volume={77}, journal={Computers &#38; Security}, publisher={Elsevier}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2018}, pages={807–823} }","mla":"Weishäupl, Eva, et al. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” <i>Computers &#38; Security</i>, vol. 77, Elsevier, 2018, pp. 807–23.","short":"E. Weishäupl, E. Yasasin, G. Schryen, Computers &#38; Security 77 (2018) 807–823.","apa":"Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2018). Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. <i>Computers &#38; Security</i>, <i>77</i>, 807–823."},"year":"2018","has_accepted_license":"1","extern":"1","file_date_updated":"2018-12-13T15:06:10Z","language":[{"iso":"eng"}],"keyword":["Information Security Investments","Multiple Case Study","Organizations","Single Loop Learning","Double Loop Learning"],"ddc":["000"],"department":[{"_id":"277"}],"user_id":"61579","_id":"5586","status":"public","file":[{"file_size":809490,"access_level":"open_access","file_id":"6022","file_name":"JOURNAL VERSION.pdf","date_updated":"2018-12-13T15:06:10Z","date_created":"2018-12-07T11:26:53Z","creator":"hsiemes","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. While the academic literature has provided valuable insights into these issues, there is a lack of empirical contributions. To address this lack, we conduct a theory-based exploratory multiple case study. Our case study reveals that (1) firms? investments in information security are largely driven by external environmental and industry-related factors, (2) firms do not implement standardized decision processes, (3) the security process is perceived to impact the business process in a disturbing way, (4) both the implementation of evaluation processes and the application of metrics are hardly existent and (5) learning activities mainly occur at an ad-hoc basis."}],"publication":"Computers & Security","type":"journal_article"},{"publication":"Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)","keyword":["Library and Information Sciences"],"language":[{"iso":"ger"}],"year":"2018","quality_controlled":"1","issue":"2-3","title":"Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive","publisher":"Klostermann","date_created":"2023-09-27T07:04:45Z","status":"public","type":"journal_article","_id":"47481","department":[{"_id":"233"},{"_id":"572"},{"_id":"856"},{"_id":"615"}],"user_id":"61139","intvolume":"        65","page":"101-104","citation":{"chicago":"Münzmay, Andreas. “Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive.” <i>Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)</i> 65, no. 2–3 (2018): 101–4. <a href=\"https://doi.org/10.3196/1864295018652390\">https://doi.org/10.3196/1864295018652390</a>.","ieee":"A. Münzmay, “Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive,” <i>Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)</i>, vol. 65, no. 2–3, pp. 101–104, 2018, doi: <a href=\"https://doi.org/10.3196/1864295018652390\">10.3196/1864295018652390</a>.","ama":"Münzmay A. Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive. <i>Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)</i>. 2018;65(2-3):101-104. doi:<a href=\"https://doi.org/10.3196/1864295018652390\">10.3196/1864295018652390</a>","bibtex":"@article{Münzmay_2018, title={Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive}, volume={65}, DOI={<a href=\"https://doi.org/10.3196/1864295018652390\">10.3196/1864295018652390</a>}, number={2–3}, journal={Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)}, publisher={Klostermann}, author={Münzmay, Andreas}, year={2018}, pages={101–104} }","mla":"Münzmay, Andreas. “Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive.” <i>Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)</i>, vol. 65, no. 2–3, Klostermann, 2018, pp. 101–04, doi:<a href=\"https://doi.org/10.3196/1864295018652390\">10.3196/1864295018652390</a>.","short":"A. Münzmay, Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB) 65 (2018) 101–104.","apa":"Münzmay, A. (2018). Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive. <i>Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)</i>, <i>65</i>(2–3), 101–104. <a href=\"https://doi.org/10.3196/1864295018652390\">https://doi.org/10.3196/1864295018652390</a>"},"publication_identifier":{"issn":["0044-2380","1864-2950"]},"publication_status":"published","doi":"10.3196/1864295018652390","main_file_link":[{"url":"https://zs.thulb.uni-jena.de/servlets/MCRFileNodeServlet/jportal_derivate_00264273/j18-h2-3-kom-3.pdf","open_access":"1"}],"date_updated":"2024-02-19T10:56:46Z","oa":"1","volume":65,"author":[{"id":"61139","full_name":"Münzmay, Andreas","orcid":"0000-0002-8373-4055","last_name":"Münzmay","first_name":"Andreas"}]},{"publication":"Information Systems and E-Business Management","type":"journal_article","status":"public","abstract":[{"lang":"eng","text":"Digital interactions among businesses and consumers through powerful information systems and omnipresent connected devices establish today’s networked society. In this light, Service Science continues to take root as a research discipline that focuses on the integration of (digital) resources by service providers and service customers for value co-creation in service systems. Rapid advances in information technology allow for designing novel information systems that enable entirely new configurations of service systems. In turn, Service Science also leaves its mark on the design, adoption, and use of information systems and technology. With this special issue, we compile a set of timely papers that investigate selected facets of the complex interplay between information technology, information systems, and Service Science to design innovative IT artifacts for smart service. This editorial opens this special issue by elaborating on our understanding of smart service.<br"}],"department":[{"_id":"526"}],"user_id":"21671","_id":"3490","keyword":["Information system","Smart service","Service system"],"page":"781–787","citation":{"short":"D. Beverungen, M. Matzner, C. Janiesch, Information Systems and E-Business Management (2017) 781–787.","bibtex":"@article{Beverungen_Matzner_Janiesch_2017, title={Information systems for smart services}, DOI={<a href=\"https://doi.org/10.1007/s10257-017-0365-8\">10.1007/s10257-017-0365-8</a>}, journal={Information Systems and E-Business Management}, author={Beverungen, Daniel and Matzner, Martin and Janiesch, Christian}, year={2017}, pages={781–787} }","mla":"Beverungen, Daniel, et al. “Information Systems for Smart Services.” <i>Information Systems and E-Business Management</i>, 2017, pp. 781–787, doi:<a href=\"https://doi.org/10.1007/s10257-017-0365-8\">10.1007/s10257-017-0365-8</a>.","apa":"Beverungen, D., Matzner, M., &#38; Janiesch, C. (2017). Information systems for smart services. <i>Information Systems and E-Business Management</i>, 781–787. <a href=\"https://doi.org/10.1007/s10257-017-0365-8\">https://doi.org/10.1007/s10257-017-0365-8</a>","ama":"Beverungen D, Matzner M, Janiesch C. Information systems for smart services. <i>Information Systems and E-Business Management</i>. 2017:781–787. doi:<a href=\"https://doi.org/10.1007/s10257-017-0365-8\">10.1007/s10257-017-0365-8</a>","chicago":"Beverungen, Daniel, Martin Matzner, and Christian Janiesch. “Information Systems for Smart Services.” <i>Information Systems and E-Business Management</i>, 2017, 781–787. <a href=\"https://doi.org/10.1007/s10257-017-0365-8\">https://doi.org/10.1007/s10257-017-0365-8</a>.","ieee":"D. Beverungen, M. Matzner, and C. Janiesch, “Information systems for smart services,” <i>Information Systems and E-Business Management</i>, pp. 781–787, 2017."},"year":"2017","author":[{"first_name":"Daniel","last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"last_name":"Janiesch","full_name":"Janiesch, Christian","first_name":"Christian"}],"date_created":"2018-07-06T10:34:55Z","date_updated":"2022-01-06T06:59:19Z","doi":"10.1007/s10257-017-0365-8","title":"Information systems for smart services"},{"abstract":[{"text":"This study proposes a simple theoretical framework that allows for assessing financial distress up to five years in advance. We jointly model financial distress by using two of its key driving factors: declining cash-generating ability and insufficient liquidity reserves. The model is based on stochastic processes and incorporates firm-level and industry-sector developments. A large-scale empirical implementation for US-listed firms over the period of 1980-2010 shows important improvements in the discriminatory accuracy and demonstrates incremental information content beyond state-of-the-art accounting and market-based prediction models. Consequently, this study might provide important ex ante warning signals for investors, regulators and practitioners.","lang":"eng"}],"status":"public","type":"working_paper","keyword":["Financial distress prediction","probability of default","accounting information","stochastic processes","simulation"],"language":[{"iso":"eng"}],"_id":"20868","user_id":"46447","department":[{"_id":"275"}],"year":"2017","citation":{"apa":"Sievers, S., Klobucnik, J., &#38; Miersch, D. (2017). <i>Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence</i>. <a href=\"https://doi.org/10.2139/ssrn.2237757\">https://doi.org/10.2139/ssrn.2237757</a>","short":"S. Sievers, J. Klobucnik, D. Miersch, Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence, 2017.","bibtex":"@book{Sievers_Klobucnik_Miersch_2017, title={Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence}, DOI={<a href=\"https://doi.org/10.2139/ssrn.2237757\">10.2139/ssrn.2237757</a>}, author={Sievers, Sönke and Klobucnik, Jan and Miersch, David}, year={2017} }","mla":"Sievers, Sönke, et al. <i>Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence</i>. 2017, doi:<a href=\"https://doi.org/10.2139/ssrn.2237757\">10.2139/ssrn.2237757</a>.","chicago":"Sievers, Sönke, Jan Klobucnik, and David Miersch. <i>Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence</i>, 2017. <a href=\"https://doi.org/10.2139/ssrn.2237757\">https://doi.org/10.2139/ssrn.2237757</a>.","ieee":"S. Sievers, J. Klobucnik, and D. Miersch, <i>Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence</i>. 2017.","ama":"Sievers S, Klobucnik J, Miersch D. <i>Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence</i>.; 2017. doi:<a href=\"https://doi.org/10.2139/ssrn.2237757\">10.2139/ssrn.2237757</a>"},"jel":["C63","C52","C53","G33","M41"],"page":"84","publication_status":"published","title":"Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence","main_file_link":[{"url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2237757"}],"doi":"10.2139/ssrn.2237757","date_updated":"2022-01-06T06:54:41Z","date_created":"2021-01-05T11:44:45Z","author":[{"id":"46447","full_name":"Sievers, Sönke","last_name":"Sievers","first_name":"Sönke"},{"full_name":"Klobucnik, Jan","last_name":"Klobucnik","first_name":"Jan"},{"first_name":"David","last_name":"Miersch","full_name":"Miersch, David"}]},{"user_id":"64756","department":[{"_id":"275"}],"_id":"5199","language":[{"iso":"eng"}],"keyword":["Financial distress prediction","probability of default","accounting information","stochastic processes","simulation"],"type":"journal_article","publication":"SSRN Electronic Journal","status":"public","abstract":[{"lang":"eng","text":"This study proposes a simple theoretical framework that allows for assessing financial distress up to five years in advance. We jointly model financial distress by using two of its key driving factors: declining cash-generating ability and insufficient liquidity reserves. The model is based on stochastic processes and incorporates firm-level and industry-sector developments. A large-scale empirical implementation for US-listed firms over the period of 1980-2010 shows important improvements in the discriminatory accuracy and demonstrates incremental information content beyond state-of-the-art accounting and market-based prediction models. Consequently, this study might provide important ex ante warning signals for investors, regulators and practitioners. "}],"date_created":"2018-10-31T12:19:42Z","author":[{"full_name":"Klobucnik, Jan","last_name":"Klobucnik","first_name":"Jan"},{"last_name":"Miersch","full_name":"Miersch, David","first_name":"David"},{"first_name":"Sönke","last_name":"Sievers","full_name":"Sievers, Sönke"}],"date_updated":"2022-01-06T07:01:43Z","title":"Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence","publication_status":"published","jel":["C63","C52","C53","G33","M41"],"citation":{"apa":"Klobucnik, J., Miersch, D., &#38; Sievers, S. (2017). Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence. <i>SSRN Electronic Journal</i>.","bibtex":"@article{Klobucnik_Miersch_Sievers_2017, title={Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence}, journal={SSRN Electronic Journal}, author={Klobucnik, Jan and Miersch, David and Sievers, Sönke}, year={2017} }","short":"J. Klobucnik, D. Miersch, S. Sievers, SSRN Electronic Journal (2017).","mla":"Klobucnik, Jan, et al. “Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence.” <i>SSRN Electronic Journal</i>, 2017.","ama":"Klobucnik J, Miersch D, Sievers S. Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence. <i>SSRN Electronic Journal</i>. 2017.","chicago":"Klobucnik, Jan, David Miersch, and Sönke Sievers. “Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence.” <i>SSRN Electronic Journal</i>, 2017.","ieee":"J. Klobucnik, D. Miersch, and S. Sievers, “Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence,” <i>SSRN Electronic Journal</i>, 2017."},"year":"2017"},{"title":"Utilizing big data analytics for information systems research: Challenges, promises and guidelines","doi":"10.1057/ejis.2016.2","date_updated":"2022-01-06T07:01:18Z","date_created":"2018-10-12T08:29:46Z","author":[{"first_name":"Oliver","last_name":"Müller","id":"72849","full_name":"Müller, Oliver"},{"first_name":"Iris","last_name":"Junglas","full_name":"Junglas, Iris"},{"last_name":"vom Brocke","full_name":"vom Brocke, Jan","first_name":"Jan"},{"first_name":"Stefan","last_name":"Debortoli","full_name":"Debortoli, Stefan"}],"year":"2016","citation":{"apa":"Müller, O., Junglas, I., vom Brocke, J., &#38; Debortoli, S. (2016). Utilizing big data analytics for information systems research: Challenges, promises and guidelines. <i>European Journal of Information Systems</i>, (4), 289--302. <a href=\"https://doi.org/10.1057/ejis.2016.2\">https://doi.org/10.1057/ejis.2016.2</a>","bibtex":"@article{Müller_Junglas_vom Brocke_Debortoli_2016, title={Utilizing big data analytics for information systems research: Challenges, promises and guidelines}, DOI={<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>}, number={4}, journal={European Journal of Information Systems}, author={Müller, Oliver and Junglas, Iris and vom Brocke, Jan and Debortoli, Stefan}, year={2016}, pages={289--302} }","mla":"Müller, Oliver, et al. “Utilizing Big Data Analytics for Information Systems Research: Challenges, Promises and Guidelines.” <i>European Journal of Information Systems</i>, no. 4, 2016, pp. 289--302, doi:<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>.","short":"O. Müller, I. Junglas, J. vom Brocke, S. Debortoli, European Journal of Information Systems (2016) 289--302.","ama":"Müller O, Junglas I, vom Brocke J, Debortoli S. Utilizing big data analytics for information systems research: Challenges, promises and guidelines. <i>European Journal of Information Systems</i>. 2016;(4):289--302. doi:<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>","chicago":"Müller, Oliver, Iris Junglas, Jan vom Brocke, and Stefan Debortoli. “Utilizing Big Data Analytics for Information Systems Research: Challenges, Promises and Guidelines.” <i>European Journal of Information Systems</i>, no. 4 (2016): 289--302. <a href=\"https://doi.org/10.1057/ejis.2016.2\">https://doi.org/10.1057/ejis.2016.2</a>.","ieee":"O. Müller, I. Junglas, J. vom Brocke, and S. Debortoli, “Utilizing big data analytics for information systems research: Challenges, promises and guidelines,” <i>European Journal of Information Systems</i>, no. 4, pp. 289--302, 2016."},"page":"289--302","publication_identifier":{"isbn":["0960-085X"],"issn":["14769344"]},"issue":"4","keyword":["analytics","big data","data source","information systems research","methodology"],"language":[{"iso":"eng"}],"extern":"1","_id":"4689","user_id":"72849","status":"public","type":"journal_article","publication":"European Journal of Information Systems"},{"keyword":["Artificial Intelligence","Computer Networks and Communications","Information Systems"],"language":[{"iso":"eng"}],"_id":"52747","user_id":"9503","status":"public","publication":"Journal on Data Semantics","type":"journal_article","title":"Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies","doi":"10.1007/s13740-015-0055-y","publisher":"Springer Science and Business Media LLC","date_updated":"2024-03-25T08:23:55Z","volume":5,"date_created":"2024-03-25T08:10:54Z","author":[{"first_name":"Stefan","full_name":"Borgwardt, Stefan","last_name":"Borgwardt"},{"full_name":"Mailis, Theofilos","last_name":"Mailis","first_name":"Theofilos"},{"first_name":"Rafael","full_name":"Peñaloza, Rafael","last_name":"Peñaloza"},{"first_name":"Anni-Yasmin","full_name":"Turhan, Anni-Yasmin","last_name":"Turhan"}],"year":"2016","page":"55-75","intvolume":"         5","citation":{"chicago":"Borgwardt, Stefan, Theofilos Mailis, Rafael Peñaloza, and Anni-Yasmin Turhan. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i> 5, no. 2 (2016): 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>.","ieee":"S. Borgwardt, T. Mailis, R. Peñaloza, and A.-Y. Turhan, “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies,” <i>Journal on Data Semantics</i>, vol. 5, no. 2, pp. 55–75, 2016, doi: <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","ama":"Borgwardt S, Mailis T, Peñaloza R, Turhan A-Y. Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>. 2016;5(2):55-75. doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>","apa":"Borgwardt, S., Mailis, T., Peñaloza, R., &#38; Turhan, A.-Y. (2016). Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>, <i>5</i>(2), 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>","bibtex":"@article{Borgwardt_Mailis_Peñaloza_Turhan_2016, title={Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies}, volume={5}, DOI={<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>}, number={2}, journal={Journal on Data Semantics}, publisher={Springer Science and Business Media LLC}, author={Borgwardt, Stefan and Mailis, Theofilos and Peñaloza, Rafael and Turhan, Anni-Yasmin}, year={2016}, pages={55–75} }","short":"S. Borgwardt, T. Mailis, R. Peñaloza, A.-Y. Turhan, Journal on Data Semantics 5 (2016) 55–75.","mla":"Borgwardt, Stefan, et al. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i>, vol. 5, no. 2, Springer Science and Business Media LLC, 2016, pp. 55–75, doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>."},"publication_identifier":{"issn":["1861-2032","1861-2040"]},"publication_status":"published","issue":"2"},{"year":"2016","citation":{"ama":"Borgwardt S, Mailis T, Peñaloza R, Turhan A-Y. Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>. 2016;5(2):55-75. doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>","ieee":"S. Borgwardt, T. Mailis, R. Peñaloza, and A.-Y. Turhan, “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies,” <i>Journal on Data Semantics</i>, vol. 5, no. 2, pp. 55–75, 2016, doi: <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","chicago":"Borgwardt, Stefan, Theofilos Mailis, Rafael Peñaloza, and Anni-Yasmin Turhan. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i> 5, no. 2 (2016): 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>.","short":"S. Borgwardt, T. Mailis, R. Peñaloza, A.-Y. Turhan, Journal on Data Semantics 5 (2016) 55–75.","bibtex":"@article{Borgwardt_Mailis_Peñaloza_Turhan_2016, title={Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies}, volume={5}, DOI={<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>}, number={2}, journal={Journal on Data Semantics}, publisher={Springer Science and Business Media LLC}, author={Borgwardt, Stefan and Mailis, Theofilos and Peñaloza, Rafael and Turhan, Anni-Yasmin}, year={2016}, pages={55–75} }","mla":"Borgwardt, Stefan, et al. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i>, vol. 5, no. 2, Springer Science and Business Media LLC, 2016, pp. 55–75, doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","apa":"Borgwardt, S., Mailis, T., Peñaloza, R., &#38; Turhan, A.-Y. (2016). Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>, <i>5</i>(2), 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>"},"page":"55-75","intvolume":"         5","publication_status":"published","publication_identifier":{"issn":["1861-2032","1861-2040"]},"issue":"2","title":"Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies","doi":"10.1007/s13740-015-0055-y","publisher":"Springer Science and Business Media LLC","date_updated":"2024-03-25T13:50:33Z","date_created":"2024-03-25T09:23:39Z","author":[{"last_name":"Borgwardt","full_name":"Borgwardt, Stefan","first_name":"Stefan"},{"full_name":"Mailis, Theofilos","last_name":"Mailis","first_name":"Theofilos"},{"full_name":"Peñaloza, Rafael","last_name":"Peñaloza","first_name":"Rafael"},{"last_name":"Turhan","id":"104470","full_name":"Turhan, Anni-Yasmin","first_name":"Anni-Yasmin"}],"volume":5,"status":"public","type":"journal_article","publication":"Journal on Data Semantics","keyword":["Artificial Intelligence","Computer Networks and Communications","Information Systems"],"language":[{"iso":"eng"}],"_id":"52803","user_id":"9503","department":[{"_id":"888"}]},{"year":"2015","citation":{"ama":"Weishäupl E, Yasasin E, Schryen G. A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In: <i>International Conference on Information Systems</i>. ; 2015.","ieee":"E. Weishäupl, E. Yasasin, and G. Schryen, “A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory,” in <i>International Conference on Information Systems</i>, 2015.","chicago":"Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” In <i>International Conference on Information Systems</i>, 2015.","short":"E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information Systems, 2015.","mla":"Weishäupl, Eva, et al. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” <i>International Conference on Information Systems</i>, 2015.","bibtex":"@inproceedings{Weishäupl_Yasasin_Schryen_2015, title={A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory}, booktitle={International Conference on Information Systems}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2015} }","apa":"Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2015). A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In <i>International Conference on Information Systems</i>."},"has_accepted_license":"1","title":"A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory","oa":"1","date_updated":"2022-01-06T07:02:03Z","date_created":"2018-11-14T11:25:38Z","author":[{"last_name":"Weishäupl","full_name":"Weishäupl, Eva","first_name":"Eva"},{"full_name":"Yasasin, Emrah","last_name":"Yasasin","first_name":"Emrah"},{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"abstract":[{"text":"The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":958019,"file_name":"ICIS PROCEEDINGS PAPER - Security Investments.pdf","file_id":"6038","access_level":"open_access","date_updated":"2018-12-13T15:09:32Z","date_created":"2018-12-07T11:45:31Z","creator":"hsiemes"}],"status":"public","type":"conference","publication":"International Conference on Information Systems","ddc":["000"],"keyword":["Information Security","Investment","Literature review","Resource-based View","Organi-zational Learning Theory","Multi-theoretical Perspective"],"language":[{"iso":"eng"}],"extern":"1","file_date_updated":"2018-12-13T15:09:32Z","_id":"5588","user_id":"61579","department":[{"_id":"277"}]},{"has_accepted_license":"1","year":"2015","citation":{"bibtex":"@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015, title={Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}, booktitle={2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}, year={2015} }","mla":"Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","short":"E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.","apa":"Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>.","ama":"Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015.","chicago":"Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","ieee":"E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>, 2015."},"oa":"1","date_updated":"2022-01-06T07:02:04Z","author":[{"first_name":"Eva","last_name":"Weishäupl","full_name":"Weishäupl, Eva"},{"last_name":"Kunz","full_name":"Kunz, Michael","first_name":"Michael"},{"first_name":"Emrah","full_name":"Yasasin, Emrah","last_name":"Yasasin"},{"full_name":"Wagner, Gerit","last_name":"Wagner","first_name":"Gerit"},{"last_name":"Prester","full_name":"Prester, Julian","first_name":"Julian"},{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"},{"first_name":"Günther","full_name":"Pernul, Günther","last_name":"Pernul"}],"date_created":"2018-11-14T11:27:20Z","title":"Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory","publication":"2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)","type":"conference","abstract":[{"lang":"eng","text":"Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview."}],"status":"public","file":[{"date_created":"2018-12-07T11:46:28Z","creator":"hsiemes","date_updated":"2018-12-13T15:09:54Z","file_id":"6040","file_name":"Towards an Economic Approach to IAMS.PDF","access_level":"open_access","file_size":166015,"content_type":"application/pdf","relation":"main_file"}],"_id":"5590","department":[{"_id":"277"}],"user_id":"61579","keyword":["Identity and Access Management","Economic Decision Making","Information Systems","Information Security Investment","Decision Theory"],"ddc":["000"],"extern":"1","file_date_updated":"2018-12-13T15:09:54Z","language":[{"iso":"eng"}]},{"title":"Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs","doi":"10.1177/1094670514566797","publisher":"SAGE Publications","date_updated":"2023-01-31T15:30:31Z","volume":18,"author":[{"full_name":"Eggert, Andreas","last_name":"Eggert","first_name":"Andreas"},{"first_name":"Lena","last_name":"Steinhoff","full_name":"Steinhoff, Lena"},{"first_name":"Ina","last_name":"Garnefeld","full_name":"Garnefeld, Ina"}],"date_created":"2023-01-31T15:29:06Z","year":"2015","page":"210-228","intvolume":"        18","citation":{"short":"A. Eggert, L. Steinhoff, I. Garnefeld, Journal of Service Research 18 (2015) 210–228.","bibtex":"@article{Eggert_Steinhoff_Garnefeld_2015, title={Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs}, volume={18}, DOI={<a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>}, number={2}, journal={Journal of Service Research}, publisher={SAGE Publications}, author={Eggert, Andreas and Steinhoff, Lena and Garnefeld, Ina}, year={2015}, pages={210–228} }","mla":"Eggert, Andreas, et al. “Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs.” <i>Journal of Service Research</i>, vol. 18, no. 2, SAGE Publications, 2015, pp. 210–28, doi:<a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>.","apa":"Eggert, A., Steinhoff, L., &#38; Garnefeld, I. (2015). Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs. <i>Journal of Service Research</i>, <i>18</i>(2), 210–228. <a href=\"https://doi.org/10.1177/1094670514566797\">https://doi.org/10.1177/1094670514566797</a>","ieee":"A. Eggert, L. Steinhoff, and I. Garnefeld, “Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs,” <i>Journal of Service Research</i>, vol. 18, no. 2, pp. 210–228, 2015, doi: <a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>.","chicago":"Eggert, Andreas, Lena Steinhoff, and Ina Garnefeld. “Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs.” <i>Journal of Service Research</i> 18, no. 2 (2015): 210–28. <a href=\"https://doi.org/10.1177/1094670514566797\">https://doi.org/10.1177/1094670514566797</a>.","ama":"Eggert A, Steinhoff L, Garnefeld I. Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs. <i>Journal of Service Research</i>. 2015;18(2):210-228. doi:<a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>"},"publication_identifier":{"issn":["1094-6705","1552-7379"]},"publication_status":"published","issue":"2","keyword":["Organizational Behavior and Human Resource Management","Sociology and Political Science","Information Systems"],"language":[{"iso":"eng"}],"_id":"41297","user_id":"4336","abstract":[{"text":"<jats:p> In service industries, hierarchical loyalty programs are common relationship marketing instruments that award elevated status to customers who exceed a certain spending level (e.g., gold membership). In practice, service companies offer elevated status to some customers who do not meet the required spending level, in an attempt to profit from the profound allure of status. Relying on social psychology research and a mixed-method approach, this study analyzes the loyalty impact of status endowments, defined as awards of elevated status to customers who are not entitled to it. An exploratory qualitative study identifies customer gratitude and customer skepticism as positive and negative mediators, respectively, of customers’ attitudinal responses to endowed status. Quantitative studies—two experimental and one survey—substantiate these bright and dark sides of endowed status. The efficacy of status endowment is contingent on the context. To alleviate the dark-side effect, managers can allow target customers to actively choose whether to be endowed, especially those who are close to achieving the status already, and provide valuable preferential treatment to customers elevated by either endowment or achievement. These insights offer guidelines for whether and how to use status endowment in hierarchical loyalty programs. </jats:p>","lang":"eng"}],"status":"public","publication":"Journal of Service Research","type":"journal_article"},{"language":[{"iso":"eng"}],"keyword":["Organizational Behavior and Human Resource Management","Sociology and Political Science","Information Systems"],"user_id":"49063","department":[{"_id":"785"}],"_id":"41341","status":"public","abstract":[{"text":"<jats:p> In many business markets, manufacturers seek service-led growth to secure their existing positions and continue to grow in increasingly competitive environments. Using longitudinal data from 513 German mechanical engineering companies and latent growth curve modeling, this study offers a fine-grained view of the financial performance implications of industrial service strategies. By disentangling the revenue and profit implications of industrial service strategies, findings reveal that such strategies increase both the level and the growth of manufacturing firms’ revenue streams. In contrast, they reduce the level but improve the growth of manufacturers’ profits. Results further suggest that services supporting the clients’ actions (SSC) and services supporting the supplier’s product (SSP) affect performance outcomes in different ways. SSCs directly affect revenue and profit streams. In turn, SSPs display only indirect effects on financial performance mediated through SSCs. A moderator analysis identifies two organizational contingencies that facilitate service business success: Only companies with decentralized decision-making processes and a high share of loyal customers can expect favorable financial results from industrial service strategies. In summary, this research provides significant insights and managerial guidance for turning service strategies into financial successes. </jats:p>","lang":"eng"}],"type":"journal_article","publication":"Journal of Service Research","doi":"10.1177/1094670513485823","title":"Revenue and Profit Implications of Industrial Service Strategies","author":[{"full_name":"Eggert, Andreas","last_name":"Eggert","first_name":"Andreas"},{"full_name":"Hogreve, Jens","last_name":"Hogreve","first_name":"Jens"},{"full_name":"Ulaga, Wolfgang","last_name":"Ulaga","first_name":"Wolfgang"},{"first_name":"Eva","last_name":"Münkhoff","orcid":"0000-0001-6053-1012","full_name":"Münkhoff, Eva","id":"3043"}],"date_created":"2023-02-01T08:31:19Z","volume":17,"date_updated":"2023-09-01T10:08:03Z","publisher":"SAGE Publications","citation":{"chicago":"Eggert, Andreas, Jens Hogreve, Wolfgang Ulaga, and Eva Münkhoff. “Revenue and Profit Implications of Industrial Service Strategies.” <i>Journal of Service Research</i> 17, no. 1 (2014): 23–39. <a href=\"https://doi.org/10.1177/1094670513485823\">https://doi.org/10.1177/1094670513485823</a>.","ieee":"A. Eggert, J. Hogreve, W. Ulaga, and E. Münkhoff, “Revenue and Profit Implications of Industrial Service Strategies,” <i>Journal of Service Research</i>, vol. 17, no. 1, pp. 23–39, 2014, doi: <a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>.","ama":"Eggert A, Hogreve J, Ulaga W, Münkhoff E. Revenue and Profit Implications of Industrial Service Strategies. <i>Journal of Service Research</i>. 2014;17(1):23-39. doi:<a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>","bibtex":"@article{Eggert_Hogreve_Ulaga_Münkhoff_2014, title={Revenue and Profit Implications of Industrial Service Strategies}, volume={17}, DOI={<a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>}, number={1}, journal={Journal of Service Research}, publisher={SAGE Publications}, author={Eggert, Andreas and Hogreve, Jens and Ulaga, Wolfgang and Münkhoff, Eva}, year={2014}, pages={23–39} }","short":"A. Eggert, J. Hogreve, W. Ulaga, E. Münkhoff, Journal of Service Research 17 (2014) 23–39.","mla":"Eggert, Andreas, et al. “Revenue and Profit Implications of Industrial Service Strategies.” <i>Journal of Service Research</i>, vol. 17, no. 1, SAGE Publications, 2014, pp. 23–39, doi:<a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>.","apa":"Eggert, A., Hogreve, J., Ulaga, W., &#38; Münkhoff, E. (2014). Revenue and Profit Implications of Industrial Service Strategies. <i>Journal of Service Research</i>, <i>17</i>(1), 23–39. <a href=\"https://doi.org/10.1177/1094670513485823\">https://doi.org/10.1177/1094670513485823</a>"},"intvolume":"        17","page":"23-39","year":"2014","issue":"1","publication_status":"published","publication_identifier":{"issn":["1094-6705","1552-7379"]}},{"type":"conference","publication":"European Conference on Information Systems","status":"public","user_id":"72849","_id":"4698","language":[{"iso":"eng"}],"extern":"1","keyword":["Abstraction","Affordances","Design Science Research","Design Theory","Information Systems Development","Reflection","Theorizing"],"citation":{"chicago":"Gregor, Shirley, Oliver Müller, and Stefan Seidel. “Reflection, Abstraction and Theorizing in Design and Development Research.” In <i>European Conference on Information Systems</i>, 2013.","ieee":"S. Gregor, O. Müller, and S. Seidel, “Reflection, abstraction and theorizing in design and development research,” in <i>European Conference on Information Systems</i>, 2013.","ama":"Gregor S, Müller O, Seidel S. Reflection, abstraction and theorizing in design and development research. In: <i>European Conference on Information Systems</i>. ; 2013.","mla":"Gregor, Shirley, et al. “Reflection, Abstraction and Theorizing in Design and Development Research.” <i>European Conference on Information Systems</i>, 2013.","short":"S. Gregor, O. Müller, S. Seidel, in: European Conference on Information Systems, 2013.","bibtex":"@inproceedings{Gregor_Müller_Seidel_2013, title={Reflection, abstraction and theorizing in design and development research}, booktitle={European Conference on Information Systems}, author={Gregor, Shirley and Müller, Oliver and Seidel, Stefan}, year={2013} }","apa":"Gregor, S., Müller, O., &#38; Seidel, S. (2013). Reflection, abstraction and theorizing in design and development research. In <i>European Conference on Information Systems</i>."},"year":"2013","date_created":"2018-10-12T08:30:49Z","author":[{"full_name":"Gregor, Shirley","last_name":"Gregor","first_name":"Shirley"},{"full_name":"Müller, Oliver","id":"72849","last_name":"Müller","first_name":"Oliver"},{"first_name":"Stefan","last_name":"Seidel","full_name":"Seidel, Stefan"}],"date_updated":"2022-01-06T07:01:18Z","main_file_link":[{"url":"https://aisel.aisnet.org/ecis2013_cr/74/"}],"title":"Reflection, abstraction and theorizing in design and development research"},{"keyword":["Transfer Pricing","Negotiation","Generalized Nash Bargaining Solution","Incomplete Information"],"ddc":["040"],"language":[{"iso":"eng"}],"abstract":[{"text":"In this paper, we analyze a model in which two divisions negotiate over an intrafirm transfer price for an intermediate product. Formally, we consider bargaining problems under incomplete information, since the upstream division’s (seller's) costs and downstream division's (buyer's) revenues are supposed to be private information. Assuming two possible types for buyer and seller each, we first establish that the bargaining problem is regular, regardless whether incentive and/or efficiency constraints are imposed. This allows us to apply the generalized Nash bargaining solution to determine transfer payments and transfer probabilities. Furthermore, we derive general properties of this solution for the transfer pricing problem and compare the model developed here with the existing literature for negotiated transfer pricing under incomplete information. In particular, we focus on the models presented in Wagenhofer (1994).","lang":"eng"}],"file":[{"access_level":"closed","file_id":"5148","file_name":"WP - Cooperative Transfer Price Negotiations under Incomplete Information.pdf","file_size":430826,"date_created":"2018-10-31T09:22:19Z","creator":"stela","date_updated":"2018-10-31T09:22:19Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"title":"Cooperative Transfer Price Negotiations under Incomplete Information","publisher":"CIE Working Paper Series, Paderborn University","date_created":"2018-10-31T09:20:15Z","year":"2013","file_date_updated":"2018-10-31T09:22:19Z","_id":"5146","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"7","name":"SFB 901 - Subproject A3"}],"department":[{"_id":"205"},{"_id":"475"}],"user_id":"477","series_title":"Working Papers CIE","status":"public","type":"working_paper","date_updated":"2022-01-06T07:01:39Z","volume":64,"author":[{"last_name":"Brangewitz","full_name":"Brangewitz, Sonja","first_name":"Sonja"},{"first_name":"Claus-Jochen","last_name":"Haake","full_name":"Haake, Claus-Jochen","id":"20801"}],"intvolume":"        64","citation":{"short":"S. Brangewitz, C.-J. Haake, Cooperative Transfer Price Negotiations under Incomplete Information, CIE Working Paper Series, Paderborn University, 2013.","bibtex":"@book{Brangewitz_Haake_2013, series={Working Papers CIE}, title={Cooperative Transfer Price Negotiations under Incomplete Information}, volume={64}, publisher={CIE Working Paper Series, Paderborn University}, author={Brangewitz, Sonja and Haake, Claus-Jochen}, year={2013}, collection={Working Papers CIE} }","mla":"Brangewitz, Sonja, and Claus-Jochen Haake. <i>Cooperative Transfer Price Negotiations under Incomplete Information</i>. Vol. 64, CIE Working Paper Series, Paderborn University, 2013.","apa":"Brangewitz, S., &#38; Haake, C.-J. (2013). <i>Cooperative Transfer Price Negotiations under Incomplete Information</i> (Vol. 64). CIE Working Paper Series, Paderborn University.","ama":"Brangewitz S, Haake C-J. <i>Cooperative Transfer Price Negotiations under Incomplete Information</i>. Vol 64. CIE Working Paper Series, Paderborn University; 2013.","chicago":"Brangewitz, Sonja, and Claus-Jochen Haake. <i>Cooperative Transfer Price Negotiations under Incomplete Information</i>. Vol. 64. Working Papers CIE. CIE Working Paper Series, Paderborn University, 2013.","ieee":"S. Brangewitz and C.-J. Haake, <i>Cooperative Transfer Price Negotiations under Incomplete Information</i>, vol. 64. CIE Working Paper Series, Paderborn University, 2013."},"has_accepted_license":"1"}]
