[{"year":"2022","citation":{"ama":"Mirbabaie M, Brendel AB, Hofeditz L. Ethics and AI in Information Systems Research. <i>Communications of the Association for Information Systems</i>. 2022;50(1):726-753. doi:<a href=\"https://doi.org/10.17705/1cais.05034\">10.17705/1cais.05034</a>","apa":"Mirbabaie, M., Brendel, A. B., &#38; Hofeditz, L. (2022). Ethics and AI in Information Systems Research. <i>Communications of the Association for Information Systems</i>, <i>50</i>(1), 726–753. <a href=\"https://doi.org/10.17705/1cais.05034\">https://doi.org/10.17705/1cais.05034</a>","bibtex":"@article{Mirbabaie_Brendel_Hofeditz_2022, title={Ethics and AI in Information Systems Research}, volume={50}, DOI={<a href=\"https://doi.org/10.17705/1cais.05034\">10.17705/1cais.05034</a>}, number={1}, journal={Communications of the Association for Information Systems}, publisher={Association for Information Systems}, author={Mirbabaie, Milad and Brendel, Alfred B. and Hofeditz, Lennart}, year={2022}, pages={726–753} }","mla":"Mirbabaie, Milad, et al. “Ethics and AI in Information Systems Research.” <i>Communications of the Association for Information Systems</i>, vol. 50, no. 1, Association for Information Systems, 2022, pp. 726–53, doi:<a href=\"https://doi.org/10.17705/1cais.05034\">10.17705/1cais.05034</a>.","short":"M. Mirbabaie, A.B. Brendel, L. Hofeditz, Communications of the Association for Information Systems 50 (2022) 726–753.","ieee":"M. Mirbabaie, A. B. Brendel, and L. Hofeditz, “Ethics and AI in Information Systems Research,” <i>Communications of the Association for Information Systems</i>, vol. 50, no. 1, pp. 726–753, 2022, doi: <a href=\"https://doi.org/10.17705/1cais.05034\">10.17705/1cais.05034</a>.","chicago":"Mirbabaie, Milad, Alfred B. Brendel, and Lennart Hofeditz. “Ethics and AI in Information Systems Research.” <i>Communications of the Association for Information Systems</i> 50, no. 1 (2022): 726–53. <a href=\"https://doi.org/10.17705/1cais.05034\">https://doi.org/10.17705/1cais.05034</a>."},"intvolume":"        50","page":"726-753","publication_status":"published","publication_identifier":{"issn":["1529-3181"]},"issue":"1","title":"Ethics and AI in Information Systems Research","doi":"10.17705/1cais.05034","date_updated":"2023-01-18T07:57:38Z","publisher":"Association for Information Systems","date_created":"2023-01-17T15:27:25Z","author":[{"last_name":"Mirbabaie","full_name":"Mirbabaie, Milad","id":"88691","first_name":"Milad"},{"first_name":"Alfred B.","last_name":"Brendel","full_name":"Brendel, Alfred B."},{"first_name":"Lennart","last_name":"Hofeditz","full_name":"Hofeditz, Lennart"}],"volume":50,"status":"public","type":"journal_article","publication":"Communications of the Association for Information Systems","keyword":["Information Systems"],"language":[{"iso":"eng"}],"_id":"37147","user_id":"80546"},{"date_updated":"2023-01-18T07:56:32Z","publisher":"Springer Science and Business Media LLC","volume":64,"date_created":"2023-01-17T15:18:01Z","author":[{"id":"88691","full_name":"Mirbabaie, Milad","last_name":"Mirbabaie","first_name":"Milad"},{"first_name":"Stefan","last_name":"Stieglitz","full_name":"Stieglitz, Stefan"},{"full_name":"Marx, Julian","last_name":"Marx","first_name":"Julian"}],"title":"Catchword: Digital Detox","doi":"10.1007/s12599-022-00747-x","publication_identifier":{"issn":["2363-7005","1867-0202"]},"publication_status":"published","issue":"2","year":"2022","intvolume":"        64","page":"239-246","citation":{"ama":"Mirbabaie M, Stieglitz S, Marx J. Catchword: Digital Detox. <i>Business &#38; Information Systems Engineering</i>. 2022;64(2):239-246. doi:<a href=\"https://doi.org/10.1007/s12599-022-00747-x\">10.1007/s12599-022-00747-x</a>","ieee":"M. Mirbabaie, S. Stieglitz, and J. Marx, “Catchword: Digital Detox,” <i>Business &#38; Information Systems Engineering</i>, vol. 64, no. 2, pp. 239–246, 2022, doi: <a href=\"https://doi.org/10.1007/s12599-022-00747-x\">10.1007/s12599-022-00747-x</a>.","chicago":"Mirbabaie, Milad, Stefan Stieglitz, and Julian Marx. “Catchword: Digital Detox.” <i>Business &#38; Information Systems Engineering</i> 64, no. 2 (2022): 239–46. <a href=\"https://doi.org/10.1007/s12599-022-00747-x\">https://doi.org/10.1007/s12599-022-00747-x</a>.","bibtex":"@article{Mirbabaie_Stieglitz_Marx_2022, title={Catchword: Digital Detox}, volume={64}, DOI={<a href=\"https://doi.org/10.1007/s12599-022-00747-x\">10.1007/s12599-022-00747-x</a>}, number={2}, journal={Business &#38; Information Systems Engineering}, publisher={Springer Science and Business Media LLC}, author={Mirbabaie, Milad and Stieglitz, Stefan and Marx, Julian}, year={2022}, pages={239–246} }","short":"M. Mirbabaie, S. Stieglitz, J. Marx, Business &#38; Information Systems Engineering 64 (2022) 239–246.","mla":"Mirbabaie, Milad, et al. “Catchword: Digital Detox.” <i>Business &#38; Information Systems Engineering</i>, vol. 64, no. 2, Springer Science and Business Media LLC, 2022, pp. 239–46, doi:<a href=\"https://doi.org/10.1007/s12599-022-00747-x\">10.1007/s12599-022-00747-x</a>.","apa":"Mirbabaie, M., Stieglitz, S., &#38; Marx, J. (2022). Catchword: Digital Detox. <i>Business &#38; Information Systems Engineering</i>, <i>64</i>(2), 239–246. <a href=\"https://doi.org/10.1007/s12599-022-00747-x\">https://doi.org/10.1007/s12599-022-00747-x</a>"},"_id":"37139","user_id":"80546","keyword":["Information Systems"],"language":[{"iso":"eng"}],"publication":"Business & Information Systems Engineering","type":"journal_article","status":"public"},{"title":"Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces","doi":"10.1177/10946705221141925","publisher":"SAGE Publications","date_updated":"2023-01-31T15:41:29Z","date_created":"2023-01-31T15:40:03Z","author":[{"first_name":"Lena","last_name":"Steinhoff","full_name":"Steinhoff, Lena"},{"full_name":"Martin, Kelly D.","last_name":"Martin","first_name":"Kelly D."}],"year":"2022","citation":{"bibtex":"@article{Steinhoff_Martin_2022, title={Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces}, DOI={<a href=\"https://doi.org/10.1177/10946705221141925\">10.1177/10946705221141925</a>}, number={109467052211419}, journal={Journal of Service Research}, publisher={SAGE Publications}, author={Steinhoff, Lena and Martin, Kelly D.}, year={2022} }","mla":"Steinhoff, Lena, and Kelly D. Martin. “Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces.” <i>Journal of Service Research</i>, 109467052211419, SAGE Publications, 2022, doi:<a href=\"https://doi.org/10.1177/10946705221141925\">10.1177/10946705221141925</a>.","short":"L. Steinhoff, K.D. Martin, Journal of Service Research (2022).","apa":"Steinhoff, L., &#38; Martin, K. D. (2022). Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces. <i>Journal of Service Research</i>, Article 109467052211419. <a href=\"https://doi.org/10.1177/10946705221141925\">https://doi.org/10.1177/10946705221141925</a>","ama":"Steinhoff L, Martin KD. Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces. <i>Journal of Service Research</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1177/10946705221141925\">10.1177/10946705221141925</a>","chicago":"Steinhoff, Lena, and Kelly D. Martin. “Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces.” <i>Journal of Service Research</i>, 2022. <a href=\"https://doi.org/10.1177/10946705221141925\">https://doi.org/10.1177/10946705221141925</a>.","ieee":"L. Steinhoff and K. D. Martin, “Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces,” <i>Journal of Service Research</i>, Art. no. 109467052211419, 2022, doi: <a href=\"https://doi.org/10.1177/10946705221141925\">10.1177/10946705221141925</a>."},"publication_identifier":{"issn":["1094-6705","1552-7379"]},"publication_status":"published","keyword":["Organizational Behavior and Human Resource Management","Sociology and Political Science","Information Systems"],"article_number":"109467052211419","language":[{"iso":"eng"}],"_id":"41317","user_id":"4336","abstract":[{"text":"<jats:p> Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda. </jats:p>","lang":"eng"}],"status":"public","publication":"Journal of Service Research","type":"journal_article"},{"status":"public","type":"journal_article","publication":"European Journal of Information Systems","language":[{"iso":"eng"}],"keyword":["Library and Information Sciences","Information Systems","Self-Tracking","User Behaviour","Discontinuance"],"user_id":"14931","department":[{"_id":"195"}],"_id":"36083","citation":{"chicago":"Constantiou, Ioanna, Alivelu Mukkamala, Mimmi Sjöklint, and Matthias Trier. “Engaging with Self-Tracking Applications: How Do Users Respond to Their Performance Data?” <i>European Journal of Information Systems</i>, 2022, 1–21. <a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">https://doi.org/10.1080/0960085x.2022.2081096</a>.","ieee":"I. Constantiou, A. Mukkamala, M. Sjöklint, and M. Trier, “Engaging with self-tracking applications: how do users respond to their performance data?,” <i>European Journal of Information Systems</i>, pp. 1–21, 2022, doi: <a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>.","ama":"Constantiou I, Mukkamala A, Sjöklint M, Trier M. Engaging with self-tracking applications: how do users respond to their performance data? <i>European Journal of Information Systems</i>. Published online 2022:1-21. doi:<a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>","bibtex":"@article{Constantiou_Mukkamala_Sjöklint_Trier_2022, title={Engaging with self-tracking applications: how do users respond to their performance data?}, DOI={<a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>}, journal={European Journal of Information Systems}, publisher={Informa UK Limited}, author={Constantiou, Ioanna and Mukkamala, Alivelu and Sjöklint, Mimmi and Trier, Matthias}, year={2022}, pages={1–21} }","short":"I. Constantiou, A. Mukkamala, M. Sjöklint, M. Trier, European Journal of Information Systems (2022) 1–21.","mla":"Constantiou, Ioanna, et al. “Engaging with Self-Tracking Applications: How Do Users Respond to Their Performance Data?” <i>European Journal of Information Systems</i>, Informa UK Limited, 2022, pp. 1–21, doi:<a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>.","apa":"Constantiou, I., Mukkamala, A., Sjöklint, M., &#38; Trier, M. (2022). Engaging with self-tracking applications: how do users respond to their performance data? <i>European Journal of Information Systems</i>, 1–21. <a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">https://doi.org/10.1080/0960085x.2022.2081096</a>"},"page":"1-21","year":"2022","publication_status":"published","publication_identifier":{"issn":["0960-085X","1476-9344"]},"doi":"10.1080/0960085x.2022.2081096","title":"Engaging with self-tracking applications: how do users respond to their performance data?","date_created":"2023-01-11T12:13:54Z","author":[{"first_name":"Ioanna","full_name":"Constantiou, Ioanna","last_name":"Constantiou"},{"first_name":"Alivelu","last_name":"Mukkamala","full_name":"Mukkamala, Alivelu"},{"last_name":"Sjöklint","full_name":"Sjöklint, Mimmi","first_name":"Mimmi"},{"last_name":"Trier","id":"72744","full_name":"Trier, Matthias","first_name":"Matthias"}],"date_updated":"2023-01-29T23:05:59Z","publisher":"Informa UK Limited"},{"year":"2022","citation":{"apa":"Constantiou, I., Mukkamala, A., Sjöklint, M., &#38; Trier, M. (2022). Engaging with self-tracking applications: how do users respond to their performance data? <i>European Journal of Information Systems</i>, 1–21. <a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">https://doi.org/10.1080/0960085x.2022.2081096</a>","short":"I. Constantiou, A. Mukkamala, M. Sjöklint, M. Trier, European Journal of Information Systems (2022) 1–21.","bibtex":"@article{Constantiou_Mukkamala_Sjöklint_Trier_2022, title={Engaging with self-tracking applications: how do users respond to their performance data?}, DOI={<a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>}, journal={European Journal of Information Systems}, publisher={Informa UK Limited}, author={Constantiou, Ioanna and Mukkamala, Alivelu and Sjöklint, Mimmi and Trier, Matthias}, year={2022}, pages={1–21} }","mla":"Constantiou, Ioanna, et al. “Engaging with Self-Tracking Applications: How Do Users Respond to Their Performance Data?” <i>European Journal of Information Systems</i>, Informa UK Limited, 2022, pp. 1–21, doi:<a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>.","ama":"Constantiou I, Mukkamala A, Sjöklint M, Trier M. Engaging with self-tracking applications: how do users respond to their performance data? <i>European Journal of Information Systems</i>. Published online 2022:1-21. doi:<a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>","ieee":"I. Constantiou, A. Mukkamala, M. Sjöklint, and M. Trier, “Engaging with self-tracking applications: how do users respond to their performance data?,” <i>European Journal of Information Systems</i>, pp. 1–21, 2022, doi: <a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">10.1080/0960085x.2022.2081096</a>.","chicago":"Constantiou, Ioanna, Alivelu Mukkamala, Mimmi Sjöklint, and Matthias Trier. “Engaging with Self-Tracking Applications: How Do Users Respond to Their Performance Data?” <i>European Journal of Information Systems</i>, 2022, 1–21. <a href=\"https://doi.org/10.1080/0960085x.2022.2081096\">https://doi.org/10.1080/0960085x.2022.2081096</a>."},"page":"1-21","publication_status":"published","publication_identifier":{"issn":["0960-085X","1476-9344"]},"title":"Engaging with self-tracking applications: how do users respond to their performance data?","doi":"10.1080/0960085x.2022.2081096","publisher":"Informa UK Limited","date_updated":"2023-01-29T23:05:08Z","author":[{"last_name":"Constantiou","full_name":"Constantiou, Ioanna","first_name":"Ioanna"},{"first_name":"Alivelu","last_name":"Mukkamala","full_name":"Mukkamala, Alivelu"},{"first_name":"Mimmi","full_name":"Sjöklint, Mimmi","last_name":"Sjöklint"},{"last_name":"Trier","full_name":"Trier, Matthias","id":"72744","first_name":"Matthias"}],"date_created":"2023-01-16T15:00:24Z","status":"public","type":"journal_article","publication":"European Journal of Information Systems","keyword":["Library and Information Sciences","Information Systems"],"language":[{"iso":"eng"}],"_id":"36960","user_id":"14931","department":[{"_id":"198"}]},{"language":[{"iso":"eng"}],"keyword":["Smart service","Platform","Interdisciplinary research","Manufacturing company","Smart service provider","Platform economics","Information systems","Multi-sided markets","Business-to-business (B2B) markets"],"ddc":["380"],"abstract":[{"lang":"eng","text":"Purpose\r\nThe purpose of this paper is to identify strategic options and challenges that arise when an industrial firm moves from providing smart service toward providing a platform.\r\n\r\nDesign/methodology/approach\r\nThis conceptual study takes on a multidisciplinary research perspective that integrates concepts, theories and insights from service management and marketing, information systems and platform economics.\r\n\r\nFindings\r\nThe paper outlines three platform types – smart data platform, smart product platform and matching platform – as strategic options for firms that wish to evolve from smart service providers to platform providers.\r\n\r\nResearch limitations/implications\r\nInvestigating smart service platforms calls for launching interdisciplinary research initiatives. Promising research avenues are outlined to span boundaries that separate different research disciplines today.\r\n\r\nPractical implications\r\nManaging a successful transition from providing smart service toward providing a platform requires making significant investments in IT, platform-related capabilities and skills, as well as implement new approaches toward relationship management and brand-building.\r\n\r\nOriginality/value\r\nThe findings described in this paper are valuable to researchers in multiple disciplines seeking to develop and to justify theory related to platforms in industrial scenarios."}],"publication":"Journal of Service Management","title":"Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers","date_created":"2020-08-12T12:12:36Z","publisher":"Emerald Insight","year":"2021","issue":"4","quality_controlled":"1","article_type":"original","department":[{"_id":"276"},{"_id":"181"}],"user_id":"59677","_id":"17860","project":[{"_id":"1","name":"SFB 901","grant_number":"160364472"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"status":"public","type":"journal_article","doi":"10.1108/JOSM-03-2020-0066","volume":32,"author":[{"first_name":"Daniel","last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677"},{"id":"21117","full_name":"Kundisch, Dennis","last_name":"Kundisch","first_name":"Dennis"},{"first_name":"Nancy","id":"36392","full_name":"Wünderlich, Nancy","last_name":"Wünderlich"}],"date_updated":"2024-04-18T12:46:37Z","page":"507-532","intvolume":"        32","citation":{"apa":"Beverungen, D., Kundisch, D., &#38; Wünderlich, N. (2021). Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers. <i>Journal of Service Management</i>, <i>32</i>(4), 507–532. <a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">https://doi.org/10.1108/JOSM-03-2020-0066</a>","mla":"Beverungen, Daniel, et al. “Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers.” <i>Journal of Service Management</i>, vol. 32, no. 4, Emerald Insight, 2021, pp. 507–32, doi:<a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>.","bibtex":"@article{Beverungen_Kundisch_Wünderlich_2021, title={Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers}, volume={32}, DOI={<a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>}, number={4}, journal={Journal of Service Management}, publisher={Emerald Insight}, author={Beverungen, Daniel and Kundisch, Dennis and Wünderlich, Nancy}, year={2021}, pages={507–532} }","short":"D. Beverungen, D. Kundisch, N. Wünderlich, Journal of Service Management 32 (2021) 507–532.","ama":"Beverungen D, Kundisch D, Wünderlich N. Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers. <i>Journal of Service Management</i>. 2021;32(4):507-532. doi:<a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>","chicago":"Beverungen, Daniel, Dennis Kundisch, and Nancy Wünderlich. “Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers.” <i>Journal of Service Management</i> 32, no. 4 (2021): 507–32. <a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">https://doi.org/10.1108/JOSM-03-2020-0066</a>.","ieee":"D. Beverungen, D. Kundisch, and N. Wünderlich, “Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers,” <i>Journal of Service Management</i>, vol. 32, no. 4, pp. 507–532, 2021, doi: <a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>."},"publication_identifier":{"issn":["507-532"]},"publication_status":"published"},{"title":"Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution","doi":"10.1007/s10796-021-10201-0","publisher":"Springer Science and Business Media LLC","date_updated":"2023-01-18T07:57:25Z","volume":24,"date_created":"2023-01-17T15:25:22Z","author":[{"last_name":"Stieglitz","full_name":"Stieglitz, Stefan","first_name":"Stefan"},{"full_name":"Mirbabaie, Milad","id":"88691","last_name":"Mirbabaie","first_name":"Milad"},{"full_name":"Möllmann, Nicholas R. J.","last_name":"Möllmann","first_name":"Nicholas R. J."},{"last_name":"Rzyski","full_name":"Rzyski, Jannik","first_name":"Jannik"}],"year":"2021","intvolume":"        24","page":"745-770","citation":{"bibtex":"@article{Stieglitz_Mirbabaie_Möllmann_Rzyski_2021, title={Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution}, volume={24}, DOI={<a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>}, number={3}, journal={Information Systems Frontiers}, publisher={Springer Science and Business Media LLC}, author={Stieglitz, Stefan and Mirbabaie, Milad and Möllmann, Nicholas R. J. and Rzyski, Jannik}, year={2021}, pages={745–770} }","short":"S. Stieglitz, M. Mirbabaie, N.R.J. Möllmann, J. Rzyski, Information Systems Frontiers 24 (2021) 745–770.","mla":"Stieglitz, Stefan, et al. “Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution.” <i>Information Systems Frontiers</i>, vol. 24, no. 3, Springer Science and Business Media LLC, 2021, pp. 745–70, doi:<a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>.","apa":"Stieglitz, S., Mirbabaie, M., Möllmann, N. R. J., &#38; Rzyski, J. (2021). Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution. <i>Information Systems Frontiers</i>, <i>24</i>(3), 745–770. <a href=\"https://doi.org/10.1007/s10796-021-10201-0\">https://doi.org/10.1007/s10796-021-10201-0</a>","ama":"Stieglitz S, Mirbabaie M, Möllmann NRJ, Rzyski J. Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution. <i>Information Systems Frontiers</i>. 2021;24(3):745-770. doi:<a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>","chicago":"Stieglitz, Stefan, Milad Mirbabaie, Nicholas R. J. Möllmann, and Jannik Rzyski. “Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution.” <i>Information Systems Frontiers</i> 24, no. 3 (2021): 745–70. <a href=\"https://doi.org/10.1007/s10796-021-10201-0\">https://doi.org/10.1007/s10796-021-10201-0</a>.","ieee":"S. Stieglitz, M. Mirbabaie, N. R. J. Möllmann, and J. Rzyski, “Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution,” <i>Information Systems Frontiers</i>, vol. 24, no. 3, pp. 745–770, 2021, doi: <a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>."},"publication_identifier":{"issn":["1387-3326","1572-9419"]},"publication_status":"published","issue":"3","keyword":["Computer Networks and Communications","Information Systems","Theoretical Computer Science","Software"],"language":[{"iso":"eng"}],"_id":"37146","user_id":"80546","abstract":[{"text":"<jats:title>Abstract</jats:title><jats:p>Organizations increasingly introduce collaborative technologies in form of virtual assistants (VAs) to save valuable resources, especially when employees are assisted with work-related tasks. However, the effect of VAs on virtual teams and collaboration remains uncertain, particularly whether employees show social loafing (SL) tendencies, i.e., applying less effort for collective tasks compared to working alone. While extant research indicates that VAs collaboratively working in teams exert greater results, less is known about SL in virtual collaboration and how responsibility attribution alters. An online experiment with N = 102 was conducted in which participants were assisted by a VA in solving a task. The results indicate SL tendencies in virtual collaboration with VAs and that participants tend to cede responsibility to the VA. This study makes a first foray and extends the information systems (IS) literature by analyzing SL and responsibility attribution thus updates our knowledge on virtual collaboration with VAs.</jats:p>","lang":"eng"}],"status":"public","publication":"Information Systems Frontiers","type":"journal_article"},{"publication":"Communications of the AIS","file":[{"relation":"main_file","content_type":"application/pdf","file_size":1146830,"file_name":"RA-18-198.pdf","access_level":"open_access","file_id":"16115","date_updated":"2020-03-05T10:36:15Z","date_created":"2020-02-26T18:12:29Z","creator":"schryen"}],"abstract":[{"text":"Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a\r\nlack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1)\r\nderive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs\r\nthat complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs\r\nwith different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published\r\nin 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development\r\nachieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant\r\nconceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge\r\nbuilding activities to achieve their goals with respect to theory.","lang":"eng"}],"language":[{"iso":"eng"}],"keyword":["Literature review","knowledge development","knowledge building activities","knowledge-based typology","information systems research"],"ddc":["000"],"year":"2020","date_created":"2019-07-12T12:01:02Z","title":"A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field","type":"journal_article","status":"public","department":[{"_id":"277"}],"user_id":"72850","_id":"11946","file_date_updated":"2020-03-05T10:36:15Z","has_accepted_license":"1","publication_identifier":{"issn":[" 1529-3181"]},"page":"134-186","intvolume":"        46","citation":{"ieee":"G. Schryen, G. Wagner, A. Benlian, and G. Paré, “A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field,” <i>Communications of the AIS</i>, vol. 46, pp. 134–186, 2020, doi: <a href=\"https://doi.org/10.17705/1CAIS.04607\">10.17705/1CAIS.04607</a>.","chicago":"Schryen, Guido, Gerit Wagner, Alexander Benlian, and Guy Paré. “A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field.” <i>Communications of the AIS</i> 46 (2020): 134–86. <a href=\"https://doi.org/10.17705/1CAIS.04607\">https://doi.org/10.17705/1CAIS.04607</a>.","ama":"Schryen G, Wagner G, Benlian A, Paré G. A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field. <i>Communications of the AIS</i>. 2020;46:134-186. doi:<a href=\"https://doi.org/10.17705/1CAIS.04607\">10.17705/1CAIS.04607</a>","apa":"Schryen, G., Wagner, G., Benlian, A., &#38; Paré, G. (2020). A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field. <i>Communications of the AIS</i>, <i>46</i>, 134–186. <a href=\"https://doi.org/10.17705/1CAIS.04607\">https://doi.org/10.17705/1CAIS.04607</a>","short":"G. Schryen, G. Wagner, A. Benlian, G. Paré, Communications of the AIS 46 (2020) 134–186.","bibtex":"@article{Schryen_Wagner_Benlian_Paré_2020, title={A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field}, volume={46}, DOI={<a href=\"https://doi.org/10.17705/1CAIS.04607\">10.17705/1CAIS.04607</a>}, journal={Communications of the AIS}, author={Schryen, Guido and Wagner, Gerit and Benlian, Alexander and Paré, Guy}, year={2020}, pages={134–186} }","mla":"Schryen, Guido, et al. “A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field.” <i>Communications of the AIS</i>, vol. 46, 2020, pp. 134–86, doi:<a href=\"https://doi.org/10.17705/1CAIS.04607\">10.17705/1CAIS.04607</a>."},"volume":46,"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"first_name":"Gerit","last_name":"Wagner","full_name":"Wagner, Gerit"},{"full_name":"Benlian, Alexander","last_name":"Benlian","first_name":"Alexander"},{"last_name":"Paré","full_name":"Paré, Guy","first_name":"Guy"}],"oa":"1","date_updated":"2022-06-10T06:38:58Z","doi":"10.17705/1CAIS.04607"},{"department":[{"_id":"477"}],"user_id":"90339","_id":"29246","extern":"1","file_date_updated":"2022-09-15T08:38:44Z","article_type":"original","type":"journal_article","status":"public","volume":36,"author":[{"first_name":"Isabel","full_name":"Steinhardt, Isabel","id":"90339","last_name":"Steinhardt","orcid":"https://orcid.org/0000-0002-2590-6189"}],"date_updated":"2022-09-15T08:39:32Z","oa":"1","doi":"10.3233/efi-190308","main_file_link":[{"open_access":"1"}],"publication_identifier":{"issn":["0167-8329","1875-8649"]},"has_accepted_license":"1","publication_status":"published","page":"263-279","intvolume":"        36","citation":{"ieee":"I. Steinhardt, “Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar,” <i>Education for Information</i>, vol. 36, no. 3, pp. 263–279, 2020, doi: <a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>.","chicago":"Steinhardt, Isabel. “Learning Open Science by Doing Open Science. A Reflection of a Qualitative Research Project-Based Seminar.” <i>Education for Information</i> 36, no. 3 (2020): 263–79. <a href=\"https://doi.org/10.3233/efi-190308\">https://doi.org/10.3233/efi-190308</a>.","ama":"Steinhardt I. Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar. <i>Education for Information</i>. 2020;36(3):263-279. doi:<a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>","bibtex":"@article{Steinhardt_2020, title={Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar}, volume={36}, DOI={<a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>}, number={3}, journal={Education for Information}, publisher={IOS Press}, author={Steinhardt, Isabel}, year={2020}, pages={263–279} }","short":"I. Steinhardt, Education for Information 36 (2020) 263–279.","mla":"Steinhardt, Isabel. “Learning Open Science by Doing Open Science. A Reflection of a Qualitative Research Project-Based Seminar.” <i>Education for Information</i>, vol. 36, no. 3, IOS Press, 2020, pp. 263–79, doi:<a href=\"https://doi.org/10.3233/efi-190308\">10.3233/efi-190308</a>.","apa":"Steinhardt, I. (2020). Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar. <i>Education for Information</i>, <i>36</i>(3), 263–279. <a href=\"https://doi.org/10.3233/efi-190308\">https://doi.org/10.3233/efi-190308</a>"},"language":[{"iso":"eng"}],"keyword":["Open Science","Open Education Practices","Library and Information Sciences","Education","Information Systems"],"ddc":["300"],"publication":"Education for Information","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":3745348,"file_id":"33376","access_level":"closed","file_name":"2020 Steinhardt Learning Open Science.pdf","date_updated":"2022-09-15T08:38:44Z","creator":"isste","date_created":"2022-09-15T08:38:44Z"}],"abstract":[{"lang":"eng","text":"<jats:p>Openness in science and education is increasing in importance within the digital knowledge society. So far, less attention has been paid to teaching Open Science in bachelor’s degrees or in qualitative methods. Therefore, the aim of this article is to use a seminar example to explore what Open Science practices can be taught in qualitative research and how digital tools can be involved. The seminar focused on the following practices: Open data practices, the practice of using the free and open source tool “Collaborative online Interpretation, the practice of participating, cooperating, collaborating and contributing through participatory technologies and in social (based) networks. To learn Open Science practices, the students were involved in a qualitative research project about “Use of digital technologies for the study and habitus of students”. The study shows the practices of Open Data are easy to teach, whereas the use of free and open source tools and participatory technologies for collaboration, participation, cooperation and contribution is more difficult. In addition, a cultural shift would have to take place within German universities to promote Open Science practices in general.</jats:p>"}],"date_created":"2022-01-11T15:56:37Z","publisher":"IOS Press","title":"Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar","issue":"3","quality_controlled":"1","year":"2020"},{"date_updated":"2022-01-06T07:01:18Z","author":[{"first_name":"Oliver","last_name":"Müller","full_name":"Müller, Oliver","id":"72849"},{"last_name":"Junglas","full_name":"Junglas, Iris","first_name":"Iris"},{"first_name":"Jan","last_name":"vom Brocke","full_name":"vom Brocke, Jan"},{"last_name":"Debortoli","full_name":"Debortoli, Stefan","first_name":"Stefan"}],"date_created":"2018-10-12T08:29:46Z","title":"Utilizing big data analytics for information systems research: Challenges, promises and guidelines","doi":"10.1057/ejis.2016.2","publication_identifier":{"isbn":["0960-085X"],"issn":["14769344"]},"issue":"4","year":"2016","citation":{"chicago":"Müller, Oliver, Iris Junglas, Jan vom Brocke, and Stefan Debortoli. “Utilizing Big Data Analytics for Information Systems Research: Challenges, Promises and Guidelines.” <i>European Journal of Information Systems</i>, no. 4 (2016): 289--302. <a href=\"https://doi.org/10.1057/ejis.2016.2\">https://doi.org/10.1057/ejis.2016.2</a>.","ieee":"O. Müller, I. Junglas, J. vom Brocke, and S. Debortoli, “Utilizing big data analytics for information systems research: Challenges, promises and guidelines,” <i>European Journal of Information Systems</i>, no. 4, pp. 289--302, 2016.","ama":"Müller O, Junglas I, vom Brocke J, Debortoli S. Utilizing big data analytics for information systems research: Challenges, promises and guidelines. <i>European Journal of Information Systems</i>. 2016;(4):289--302. doi:<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>","short":"O. Müller, I. Junglas, J. vom Brocke, S. Debortoli, European Journal of Information Systems (2016) 289--302.","mla":"Müller, Oliver, et al. “Utilizing Big Data Analytics for Information Systems Research: Challenges, Promises and Guidelines.” <i>European Journal of Information Systems</i>, no. 4, 2016, pp. 289--302, doi:<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>.","bibtex":"@article{Müller_Junglas_vom Brocke_Debortoli_2016, title={Utilizing big data analytics for information systems research: Challenges, promises and guidelines}, DOI={<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>}, number={4}, journal={European Journal of Information Systems}, author={Müller, Oliver and Junglas, Iris and vom Brocke, Jan and Debortoli, Stefan}, year={2016}, pages={289--302} }","apa":"Müller, O., Junglas, I., vom Brocke, J., &#38; Debortoli, S. (2016). Utilizing big data analytics for information systems research: Challenges, promises and guidelines. <i>European Journal of Information Systems</i>, (4), 289--302. <a href=\"https://doi.org/10.1057/ejis.2016.2\">https://doi.org/10.1057/ejis.2016.2</a>"},"page":"289--302","_id":"4689","user_id":"72849","keyword":["analytics","big data","data source","information systems research","methodology"],"language":[{"iso":"eng"}],"extern":"1","type":"journal_article","publication":"European Journal of Information Systems","status":"public"},{"status":"public","publication":"Journal on Data Semantics","type":"journal_article","language":[{"iso":"eng"}],"keyword":["Artificial Intelligence","Computer Networks and Communications","Information Systems"],"user_id":"9503","_id":"52747","intvolume":"         5","page":"55-75","citation":{"bibtex":"@article{Borgwardt_Mailis_Peñaloza_Turhan_2016, title={Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies}, volume={5}, DOI={<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>}, number={2}, journal={Journal on Data Semantics}, publisher={Springer Science and Business Media LLC}, author={Borgwardt, Stefan and Mailis, Theofilos and Peñaloza, Rafael and Turhan, Anni-Yasmin}, year={2016}, pages={55–75} }","mla":"Borgwardt, Stefan, et al. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i>, vol. 5, no. 2, Springer Science and Business Media LLC, 2016, pp. 55–75, doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","short":"S. Borgwardt, T. Mailis, R. Peñaloza, A.-Y. Turhan, Journal on Data Semantics 5 (2016) 55–75.","apa":"Borgwardt, S., Mailis, T., Peñaloza, R., &#38; Turhan, A.-Y. (2016). Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>, <i>5</i>(2), 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>","chicago":"Borgwardt, Stefan, Theofilos Mailis, Rafael Peñaloza, and Anni-Yasmin Turhan. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i> 5, no. 2 (2016): 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>.","ieee":"S. Borgwardt, T. Mailis, R. Peñaloza, and A.-Y. Turhan, “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies,” <i>Journal on Data Semantics</i>, vol. 5, no. 2, pp. 55–75, 2016, doi: <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","ama":"Borgwardt S, Mailis T, Peñaloza R, Turhan A-Y. Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>. 2016;5(2):55-75. doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>"},"year":"2016","issue":"2","publication_identifier":{"issn":["1861-2032","1861-2040"]},"publication_status":"published","doi":"10.1007/s13740-015-0055-y","title":"Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies","volume":5,"date_created":"2024-03-25T08:10:54Z","author":[{"full_name":"Borgwardt, Stefan","last_name":"Borgwardt","first_name":"Stefan"},{"last_name":"Mailis","full_name":"Mailis, Theofilos","first_name":"Theofilos"},{"first_name":"Rafael","full_name":"Peñaloza, Rafael","last_name":"Peñaloza"},{"first_name":"Anni-Yasmin","last_name":"Turhan","full_name":"Turhan, Anni-Yasmin"}],"date_updated":"2024-03-25T08:23:55Z","publisher":"Springer Science and Business Media LLC"},{"type":"journal_article","publication":"Journal on Data Semantics","status":"public","user_id":"9503","department":[{"_id":"888"}],"_id":"52803","language":[{"iso":"eng"}],"keyword":["Artificial Intelligence","Computer Networks and Communications","Information Systems"],"issue":"2","publication_status":"published","publication_identifier":{"issn":["1861-2032","1861-2040"]},"citation":{"ieee":"S. Borgwardt, T. Mailis, R. Peñaloza, and A.-Y. Turhan, “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies,” <i>Journal on Data Semantics</i>, vol. 5, no. 2, pp. 55–75, 2016, doi: <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","chicago":"Borgwardt, Stefan, Theofilos Mailis, Rafael Peñaloza, and Anni-Yasmin Turhan. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i> 5, no. 2 (2016): 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>.","ama":"Borgwardt S, Mailis T, Peñaloza R, Turhan A-Y. Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>. 2016;5(2):55-75. doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>","apa":"Borgwardt, S., Mailis, T., Peñaloza, R., &#38; Turhan, A.-Y. (2016). Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies. <i>Journal on Data Semantics</i>, <i>5</i>(2), 55–75. <a href=\"https://doi.org/10.1007/s13740-015-0055-y\">https://doi.org/10.1007/s13740-015-0055-y</a>","short":"S. Borgwardt, T. Mailis, R. Peñaloza, A.-Y. Turhan, Journal on Data Semantics 5 (2016) 55–75.","mla":"Borgwardt, Stefan, et al. “Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies.” <i>Journal on Data Semantics</i>, vol. 5, no. 2, Springer Science and Business Media LLC, 2016, pp. 55–75, doi:<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>.","bibtex":"@article{Borgwardt_Mailis_Peñaloza_Turhan_2016, title={Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies}, volume={5}, DOI={<a href=\"https://doi.org/10.1007/s13740-015-0055-y\">10.1007/s13740-015-0055-y</a>}, number={2}, journal={Journal on Data Semantics}, publisher={Springer Science and Business Media LLC}, author={Borgwardt, Stefan and Mailis, Theofilos and Peñaloza, Rafael and Turhan, Anni-Yasmin}, year={2016}, pages={55–75} }"},"page":"55-75","intvolume":"         5","year":"2016","author":[{"full_name":"Borgwardt, Stefan","last_name":"Borgwardt","first_name":"Stefan"},{"first_name":"Theofilos","full_name":"Mailis, Theofilos","last_name":"Mailis"},{"full_name":"Peñaloza, Rafael","last_name":"Peñaloza","first_name":"Rafael"},{"last_name":"Turhan","full_name":"Turhan, Anni-Yasmin","id":"104470","first_name":"Anni-Yasmin"}],"date_created":"2024-03-25T09:23:39Z","volume":5,"publisher":"Springer Science and Business Media LLC","date_updated":"2024-03-25T13:50:33Z","doi":"10.1007/s13740-015-0055-y","title":"Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies"},{"abstract":[{"lang":"eng","text":"Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview."}],"file":[{"file_size":166015,"file_name":"Towards an Economic Approach to IAMS.PDF","file_id":"6040","access_level":"open_access","date_updated":"2018-12-13T15:09:54Z","date_created":"2018-12-07T11:46:28Z","creator":"hsiemes","relation":"main_file","content_type":"application/pdf"}],"status":"public","type":"conference","publication":"2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)","ddc":["000"],"keyword":["Identity and Access Management","Economic Decision Making","Information Systems","Information Security Investment","Decision Theory"],"file_date_updated":"2018-12-13T15:09:54Z","language":[{"iso":"eng"}],"extern":"1","_id":"5590","user_id":"61579","department":[{"_id":"277"}],"year":"2015","citation":{"short":"E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.","mla":"Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","bibtex":"@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015, title={Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}, booktitle={2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}, year={2015} }","apa":"Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>.","chicago":"Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","ieee":"E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>, 2015.","ama":"Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015."},"has_accepted_license":"1","title":"Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory","oa":"1","date_updated":"2022-01-06T07:02:04Z","date_created":"2018-11-14T11:27:20Z","author":[{"last_name":"Weishäupl","full_name":"Weishäupl, Eva","first_name":"Eva"},{"first_name":"Michael","full_name":"Kunz, Michael","last_name":"Kunz"},{"first_name":"Emrah","last_name":"Yasasin","full_name":"Yasasin, Emrah"},{"first_name":"Gerit","last_name":"Wagner","full_name":"Wagner, Gerit"},{"first_name":"Julian","last_name":"Prester","full_name":"Prester, Julian"},{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"},{"first_name":"Günther","last_name":"Pernul","full_name":"Pernul, Günther"}]},{"publication":"Journal of Service Research","type":"journal_article","abstract":[{"lang":"eng","text":"<jats:p> In service industries, hierarchical loyalty programs are common relationship marketing instruments that award elevated status to customers who exceed a certain spending level (e.g., gold membership). In practice, service companies offer elevated status to some customers who do not meet the required spending level, in an attempt to profit from the profound allure of status. Relying on social psychology research and a mixed-method approach, this study analyzes the loyalty impact of status endowments, defined as awards of elevated status to customers who are not entitled to it. An exploratory qualitative study identifies customer gratitude and customer skepticism as positive and negative mediators, respectively, of customers’ attitudinal responses to endowed status. Quantitative studies—two experimental and one survey—substantiate these bright and dark sides of endowed status. The efficacy of status endowment is contingent on the context. To alleviate the dark-side effect, managers can allow target customers to actively choose whether to be endowed, especially those who are close to achieving the status already, and provide valuable preferential treatment to customers elevated by either endowment or achievement. These insights offer guidelines for whether and how to use status endowment in hierarchical loyalty programs. </jats:p>"}],"status":"public","_id":"41297","user_id":"4336","keyword":["Organizational Behavior and Human Resource Management","Sociology and Political Science","Information Systems"],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["1094-6705","1552-7379"]},"publication_status":"published","issue":"2","year":"2015","intvolume":"        18","page":"210-228","citation":{"ama":"Eggert A, Steinhoff L, Garnefeld I. Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs. <i>Journal of Service Research</i>. 2015;18(2):210-228. doi:<a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>","ieee":"A. Eggert, L. Steinhoff, and I. Garnefeld, “Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs,” <i>Journal of Service Research</i>, vol. 18, no. 2, pp. 210–228, 2015, doi: <a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>.","chicago":"Eggert, Andreas, Lena Steinhoff, and Ina Garnefeld. “Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs.” <i>Journal of Service Research</i> 18, no. 2 (2015): 210–28. <a href=\"https://doi.org/10.1177/1094670514566797\">https://doi.org/10.1177/1094670514566797</a>.","apa":"Eggert, A., Steinhoff, L., &#38; Garnefeld, I. (2015). Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs. <i>Journal of Service Research</i>, <i>18</i>(2), 210–228. <a href=\"https://doi.org/10.1177/1094670514566797\">https://doi.org/10.1177/1094670514566797</a>","mla":"Eggert, Andreas, et al. “Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs.” <i>Journal of Service Research</i>, vol. 18, no. 2, SAGE Publications, 2015, pp. 210–28, doi:<a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>.","bibtex":"@article{Eggert_Steinhoff_Garnefeld_2015, title={Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs}, volume={18}, DOI={<a href=\"https://doi.org/10.1177/1094670514566797\">10.1177/1094670514566797</a>}, number={2}, journal={Journal of Service Research}, publisher={SAGE Publications}, author={Eggert, Andreas and Steinhoff, Lena and Garnefeld, Ina}, year={2015}, pages={210–228} }","short":"A. Eggert, L. Steinhoff, I. Garnefeld, Journal of Service Research 18 (2015) 210–228."},"publisher":"SAGE Publications","date_updated":"2023-01-31T15:30:31Z","volume":18,"author":[{"first_name":"Andreas","full_name":"Eggert, Andreas","last_name":"Eggert"},{"last_name":"Steinhoff","full_name":"Steinhoff, Lena","first_name":"Lena"},{"first_name":"Ina","full_name":"Garnefeld, Ina","last_name":"Garnefeld"}],"date_created":"2023-01-31T15:29:06Z","title":"Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs","doi":"10.1177/1094670514566797"},{"volume":17,"author":[{"full_name":"Eggert, Andreas","last_name":"Eggert","first_name":"Andreas"},{"last_name":"Hogreve","full_name":"Hogreve, Jens","first_name":"Jens"},{"last_name":"Ulaga","full_name":"Ulaga, Wolfgang","first_name":"Wolfgang"},{"full_name":"Münkhoff, Eva","id":"3043","last_name":"Münkhoff","orcid":"0000-0001-6053-1012","first_name":"Eva"}],"date_created":"2023-02-01T08:31:19Z","date_updated":"2023-09-01T10:08:03Z","publisher":"SAGE Publications","doi":"10.1177/1094670513485823","title":"Revenue and Profit Implications of Industrial Service Strategies","issue":"1","publication_identifier":{"issn":["1094-6705","1552-7379"]},"publication_status":"published","page":"23-39","intvolume":"        17","citation":{"mla":"Eggert, Andreas, et al. “Revenue and Profit Implications of Industrial Service Strategies.” <i>Journal of Service Research</i>, vol. 17, no. 1, SAGE Publications, 2014, pp. 23–39, doi:<a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>.","short":"A. Eggert, J. Hogreve, W. Ulaga, E. Münkhoff, Journal of Service Research 17 (2014) 23–39.","bibtex":"@article{Eggert_Hogreve_Ulaga_Münkhoff_2014, title={Revenue and Profit Implications of Industrial Service Strategies}, volume={17}, DOI={<a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>}, number={1}, journal={Journal of Service Research}, publisher={SAGE Publications}, author={Eggert, Andreas and Hogreve, Jens and Ulaga, Wolfgang and Münkhoff, Eva}, year={2014}, pages={23–39} }","apa":"Eggert, A., Hogreve, J., Ulaga, W., &#38; Münkhoff, E. (2014). Revenue and Profit Implications of Industrial Service Strategies. <i>Journal of Service Research</i>, <i>17</i>(1), 23–39. <a href=\"https://doi.org/10.1177/1094670513485823\">https://doi.org/10.1177/1094670513485823</a>","ama":"Eggert A, Hogreve J, Ulaga W, Münkhoff E. Revenue and Profit Implications of Industrial Service Strategies. <i>Journal of Service Research</i>. 2014;17(1):23-39. doi:<a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>","chicago":"Eggert, Andreas, Jens Hogreve, Wolfgang Ulaga, and Eva Münkhoff. “Revenue and Profit Implications of Industrial Service Strategies.” <i>Journal of Service Research</i> 17, no. 1 (2014): 23–39. <a href=\"https://doi.org/10.1177/1094670513485823\">https://doi.org/10.1177/1094670513485823</a>.","ieee":"A. Eggert, J. Hogreve, W. Ulaga, and E. Münkhoff, “Revenue and Profit Implications of Industrial Service Strategies,” <i>Journal of Service Research</i>, vol. 17, no. 1, pp. 23–39, 2014, doi: <a href=\"https://doi.org/10.1177/1094670513485823\">10.1177/1094670513485823</a>."},"year":"2014","department":[{"_id":"785"}],"user_id":"49063","_id":"41341","language":[{"iso":"eng"}],"keyword":["Organizational Behavior and Human Resource Management","Sociology and Political Science","Information Systems"],"publication":"Journal of Service Research","type":"journal_article","status":"public","abstract":[{"lang":"eng","text":"<jats:p> In many business markets, manufacturers seek service-led growth to secure their existing positions and continue to grow in increasingly competitive environments. Using longitudinal data from 513 German mechanical engineering companies and latent growth curve modeling, this study offers a fine-grained view of the financial performance implications of industrial service strategies. By disentangling the revenue and profit implications of industrial service strategies, findings reveal that such strategies increase both the level and the growth of manufacturing firms’ revenue streams. In contrast, they reduce the level but improve the growth of manufacturers’ profits. Results further suggest that services supporting the clients’ actions (SSC) and services supporting the supplier’s product (SSP) affect performance outcomes in different ways. SSCs directly affect revenue and profit streams. In turn, SSPs display only indirect effects on financial performance mediated through SSCs. A moderator analysis identifies two organizational contingencies that facilitate service business success: Only companies with decentralized decision-making processes and a high share of loyal customers can expect favorable financial results from industrial service strategies. In summary, this research provides significant insights and managerial guidance for turning service strategies into financial successes. </jats:p>"}]},{"keyword":["Abstraction","Affordances","Design Science Research","Design Theory","Information Systems Development","Reflection","Theorizing"],"extern":"1","language":[{"iso":"eng"}],"_id":"4698","user_id":"72849","status":"public","publication":"European Conference on Information Systems","type":"conference","title":"Reflection, abstraction and theorizing in design and development research","main_file_link":[{"url":"https://aisel.aisnet.org/ecis2013_cr/74/"}],"date_updated":"2022-01-06T07:01:18Z","date_created":"2018-10-12T08:30:49Z","author":[{"full_name":"Gregor, Shirley","last_name":"Gregor","first_name":"Shirley"},{"id":"72849","full_name":"Müller, Oliver","last_name":"Müller","first_name":"Oliver"},{"last_name":"Seidel","full_name":"Seidel, Stefan","first_name":"Stefan"}],"year":"2013","citation":{"short":"S. Gregor, O. Müller, S. Seidel, in: European Conference on Information Systems, 2013.","mla":"Gregor, Shirley, et al. “Reflection, Abstraction and Theorizing in Design and Development Research.” <i>European Conference on Information Systems</i>, 2013.","bibtex":"@inproceedings{Gregor_Müller_Seidel_2013, title={Reflection, abstraction and theorizing in design and development research}, booktitle={European Conference on Information Systems}, author={Gregor, Shirley and Müller, Oliver and Seidel, Stefan}, year={2013} }","apa":"Gregor, S., Müller, O., &#38; Seidel, S. (2013). Reflection, abstraction and theorizing in design and development research. In <i>European Conference on Information Systems</i>.","ama":"Gregor S, Müller O, Seidel S. Reflection, abstraction and theorizing in design and development research. In: <i>European Conference on Information Systems</i>. ; 2013.","chicago":"Gregor, Shirley, Oliver Müller, and Stefan Seidel. “Reflection, Abstraction and Theorizing in Design and Development Research.” In <i>European Conference on Information Systems</i>, 2013.","ieee":"S. Gregor, O. Müller, and S. Seidel, “Reflection, abstraction and theorizing in design and development research,” in <i>European Conference on Information Systems</i>, 2013."}},{"ddc":["000"],"keyword":["Literature review","Business value","Information systems","Methodology","Theory"],"file_date_updated":"2018-12-13T15:17:00Z","extern":"1","language":[{"iso":"eng"}],"_id":"5643","user_id":"61579","department":[{"_id":"277"}],"abstract":[{"lang":"eng","text":"Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research."}],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-11T15:14:51Z","date_updated":"2018-12-13T15:17:00Z","file_id":"6186","file_name":"2010_Book_ScandinavianInformationSystems - Schryen.pdf","access_level":"open_access","file_size":302340}],"status":"public","type":"conference","publication":"Proceedings of the First Scandinavian Conference on Information Systems (SCIS)","title":"An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness","date_updated":"2022-01-06T07:02:18Z","oa":"1","date_created":"2018-11-14T14:36:26Z","author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"year":"2010","citation":{"chicago":"Schryen, Guido. “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness.” In <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>, 2010.","ieee":"G. Schryen, “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness,” in <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>, 2010.","ama":"Schryen G. An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In: <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>. ; 2010.","apa":"Schryen, G. (2010). An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>.","mla":"Schryen, Guido. “An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness.” <i>Proceedings of the First Scandinavian Conference on Information Systems (SCIS)</i>, 2010.","short":"G. Schryen, in: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 2010.","bibtex":"@inproceedings{Schryen_2010, title={An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness}, booktitle={Proceedings of the First Scandinavian Conference on Information Systems (SCIS)}, author={Schryen, Guido}, year={2010} }"},"has_accepted_license":"1"},{"issue":"4","year":"2010","publisher":"Springer","date_created":"2018-11-14T14:38:02Z","title":"Preserving knowledge on IS business value: what literature reviews have done","publication":"Business \\& Information Systems Engineering (BISE)","abstract":[{"lang":"eng","text":"The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 90s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research."}],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-11T15:19:37Z","creator":"hsiemes","date_updated":"2018-12-13T15:17:12Z","file_name":"BISE-PreservingknowledgeonISbusinessvalue-Manuscript-1.pdf","access_level":"open_access","file_id":"6187","file_size":525443}],"ddc":["000"],"keyword":["Business value","Information systems","Literature review","Meta review"],"language":[{"iso":"eng"}],"has_accepted_license":"1","citation":{"short":"G. Schryen, Business \\&#38; Information Systems Engineering (BISE) 52 (2010) 225–237.","mla":"Schryen, Guido. “Preserving Knowledge on IS Business Value: What Literature Reviews Have Done.” <i>Business \\&#38; Information Systems Engineering (BISE)</i>, vol. 52, no. 4, Springer, 2010, pp. 225–37.","bibtex":"@article{Schryen_2010, title={Preserving knowledge on IS business value: what literature reviews have done}, volume={52}, number={4}, journal={Business \\&#38; Information Systems Engineering (BISE)}, publisher={Springer}, author={Schryen, Guido}, year={2010}, pages={225–237} }","apa":"Schryen, G. (2010). Preserving knowledge on IS business value: what literature reviews have done. <i>Business \\&#38; Information Systems Engineering (BISE)</i>, <i>52</i>(4), 225–237.","ama":"Schryen G. Preserving knowledge on IS business value: what literature reviews have done. <i>Business \\&#38; Information Systems Engineering (BISE)</i>. 2010;52(4):225-237.","chicago":"Schryen, Guido. “Preserving Knowledge on IS Business Value: What Literature Reviews Have Done.” <i>Business \\&#38; Information Systems Engineering (BISE)</i> 52, no. 4 (2010): 225–37.","ieee":"G. Schryen, “Preserving knowledge on IS business value: what literature reviews have done,” <i>Business \\&#38; Information Systems Engineering (BISE)</i>, vol. 52, no. 4, pp. 225–237, 2010."},"intvolume":"        52","page":"225-237","oa":"1","date_updated":"2022-01-06T07:02:19Z","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"volume":52,"type":"journal_article","status":"public","_id":"5644","user_id":"61579","department":[{"_id":"277"}],"extern":"1","file_date_updated":"2018-12-13T15:17:12Z"},{"editor":[{"full_name":"French, Simon","last_name":"French","first_name":"Simon"},{"first_name":"Brian","last_name":"Tomaszewski","full_name":"Tomaszewski, Brian"},{"first_name":"Chris","full_name":"Zobel, Chris","last_name":"Zobel"}],"status":"public","type":"conference","publication":"ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management","keyword":["Command and control process","Command and control systems","Design and modeling","Domain ontologies","Emergency response","Fire extinguishers","Fire protection","Heterogeneous domains","Information analysis","Information sharing","Information systems","Interoperability","Ontology language","Semantic technologies","Semantic Web","Semantics"],"language":[{"iso":"eng"}],"_id":"24065","user_id":"405","place":"Seattle, WA","year":"2010","citation":{"chicago":"Pottebaum, Jens, Anna Maria Japs, Stephan Prödel, and Rainer Koch. “Design and Modeling of a Domain Ontology for Fire Protection.” In <i>ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management</i>, edited by Simon French, Brian Tomaszewski, and Chris Zobel. Seattle, WA, 2010.","ieee":"J. Pottebaum, A. M. Japs, S. Prödel, and R. Koch, “Design and modeling of a domain ontology for fire protection,” in <i>ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management</i>, 2010.","ama":"Pottebaum J, Japs AM, Prödel S, Koch R. Design and modeling of a domain ontology for fire protection. In: French S, Tomaszewski B, Zobel C, eds. <i>ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management</i>. ; 2010.","apa":"Pottebaum, J., Japs, A. M., Prödel, S., &#38; Koch, R. (2010). Design and modeling of a domain ontology for fire protection. In S. French, B. Tomaszewski, &#38; C. Zobel (Eds.), <i>ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management</i>.","short":"J. Pottebaum, A.M. Japs, S. Prödel, R. Koch, in: S. French, B. Tomaszewski, C. Zobel (Eds.), ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management, Seattle, WA, 2010.","bibtex":"@inproceedings{Pottebaum_Japs_Prödel_Koch_2010, place={Seattle, WA}, title={Design and modeling of a domain ontology for fire protection}, booktitle={ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management}, author={Pottebaum, Jens and Japs, Anna Maria and Prödel, Stephan and Koch, Rainer}, editor={French, Simon and Tomaszewski, Brian and Zobel, Chris}, year={2010} }","mla":"Pottebaum, Jens, et al. “Design and Modeling of a Domain Ontology for Fire Protection.” <i>ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management</i>, edited by Simon French et al., 2010."},"quality_controlled":"1","title":"Design and modeling of a domain ontology for fire protection","main_file_link":[{"open_access":"1","url":"http://idl.iscram.org/files/pottebaum/2010/847_Pottebaum_etal2010.pdf"}],"date_updated":"2026-03-31T03:52:00Z","oa":"1","date_created":"2021-09-09T12:27:14Z","author":[{"full_name":"Pottebaum, Jens","id":"405","last_name":"Pottebaum","orcid":"http://orcid.org/0000-0001-8778-2989","first_name":"Jens"},{"last_name":"Japs","full_name":"Japs, Anna Maria","first_name":"Anna Maria"},{"full_name":"Prödel, Stephan","last_name":"Prödel","first_name":"Stephan"},{"first_name":"Rainer","last_name":"Koch","full_name":"Koch, Rainer"}]},{"publication_identifier":{"isbn":["0-8186-8712-6"]},"year":"1998","place":"Halifax, NS, Canada ","citation":{"apa":"Dücker, M., Müller, W., &#38; Rubart, J. (1998). VIPspace - A Visually Programmable Shared Workspace. <i> Proceedings. 1998 IEEE Symposium on Visual Languages </i>. 1998 IEEE Symposium on Visual Languages , Halifax, NS, Canada . <a href=\"https://doi.org/10.1109/VL.1998.706150\">https://doi.org/10.1109/VL.1998.706150</a>","mla":"Dücker, M., et al. “VIPspace - A Visually Programmable Shared Workspace.” <i> Proceedings. 1998 IEEE Symposium on Visual Languages </i>, 1998, doi:<a href=\"https://doi.org/10.1109/VL.1998.706150\">10.1109/VL.1998.706150</a>.","bibtex":"@inproceedings{Dücker_Müller_Rubart_1998, place={Halifax, NS, Canada }, title={VIPspace - A Visually Programmable Shared Workspace}, DOI={<a href=\"https://doi.org/10.1109/VL.1998.706150\">10.1109/VL.1998.706150</a>}, booktitle={ Proceedings. 1998 IEEE Symposium on Visual Languages }, author={Dücker, M. and Müller, Wolfgang and Rubart, Jessica}, year={1998} }","short":"M. Dücker, W. Müller, J. Rubart, in:  Proceedings. 1998 IEEE Symposium on Visual Languages , Halifax, NS, Canada , 1998.","chicago":"Dücker, M., Wolfgang Müller, and Jessica Rubart. “VIPspace - A Visually Programmable Shared Workspace.” In <i> Proceedings. 1998 IEEE Symposium on Visual Languages </i>. Halifax, NS, Canada , 1998. <a href=\"https://doi.org/10.1109/VL.1998.706150\">https://doi.org/10.1109/VL.1998.706150</a>.","ieee":"M. Dücker, W. Müller, and J. Rubart, “VIPspace - A Visually Programmable Shared Workspace,” presented at the 1998 IEEE Symposium on Visual Languages , Halifax, NS, Canada , 1998, doi: <a href=\"https://doi.org/10.1109/VL.1998.706150\">10.1109/VL.1998.706150</a>.","ama":"Dücker M, Müller W, Rubart J. VIPspace - A Visually Programmable Shared Workspace. In: <i> Proceedings. 1998 IEEE Symposium on Visual Languages </i>. ; 1998. doi:<a href=\"https://doi.org/10.1109/VL.1998.706150\">10.1109/VL.1998.706150</a>"},"date_updated":"2023-01-24T11:42:31Z","author":[{"full_name":"Dücker, M.","last_name":"Dücker","first_name":"M."},{"id":"16243","full_name":"Müller, Wolfgang","last_name":"Müller","first_name":"Wolfgang"},{"full_name":"Rubart, Jessica","last_name":"Rubart","first_name":"Jessica"}],"date_created":"2023-01-24T11:42:25Z","title":"VIPspace - A Visually Programmable Shared Workspace","doi":"10.1109/VL.1998.706150","conference":{"location":"Halifax, NS, Canada ","name":"1998 IEEE Symposium on Visual Languages "},"type":"conference","publication":" Proceedings. 1998 IEEE Symposium on Visual Languages ","abstract":[{"text":"With the wide availability of network supporting hard-and software cooperative computer-based environments became extremely popular. A wide range of CSCW (Computer Supported Cooperative Work) tools with video conferencing, electronic mail, shared whiteboards, discussion forums, and shared information systems are already part of daily business. In contrast to the unstructured linear stream of information in electronic mails shared workspaces provide structured administration of electronic information like documents, voice, pictures, and movies. Popular examples of shared workspaces are BSCW (Basic Support for Cooperative Work), Hypernews, Lotus Notes, Alta Vista Forum, Lifelink, Microsoft Exchange and Webshare. Currently, all these systems are not flexible enough to get easily customized to the requirements of the individual application and user only supporting a limited set of predefined different views and functionality. This article introduces VIPspace (Visually Programmable Workspace). VIPspace can be easily customized to the individual needs of an user through VIPrule, a combination of a form- and icon-based visual programming language. VIPrule is based on an easy-to-use drag and drop paradigm. Direct manipulation via drag and drop allows easy access to local file systems as well as manipulation, exchange, and publication of shared multimedia documents. As VIPspace is implemented in Java it nicely integrates with other web-applications and provides a platform independent environment with a uniform graphical user interface.","lang":"eng"}],"status":"public","_id":"39496","user_id":"5786","department":[{"_id":"672"}],"keyword":["Collaborative work","Electronic mail","Computer networks","Video sharing","Videoconference","Discussion forums","Information systems","Streaming media","Motion pictures","Computer languages"],"language":[{"iso":"eng"}]}]
