@article{4684, author = {{Beverungen, Daniel and Müller, Oliver and Matzner, Martin and Mendling, Jan and vom Brocke, Jan}}, issn = {{14228890}}, journal = {{Electronic Markets}}, keywords = {{Boundary object, Internet of things, Service science, Smart products, Smart service}}, pages = {{1----12}}, title = {{{Conceptualizing smart service systems}}}, doi = {{10.1007/s12525-017-0270-5}}, year = {{2019}}, } @inproceedings{1156, abstract = {{In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available.}}, author = {{Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}}, booktitle = {{Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}}, editor = {{Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, Victor}}, isbn = {{978-989-758-245-5}}, keywords = {{Wireless Sensor Network, Internet of Things, Stream Data, Air Pollution, DSMS, Real-time Data Processing}}, location = {{Porto, Portugal}}, pages = {{117--124}}, publisher = {{SCITEPRESS}}, title = {{{Internet of Things Architecture for Handling Stream Air Pollution Data}}}, doi = {{10.5220/0006354801170124}}, year = {{2017}}, } @inbook{50415, author = {{Riedl, Lars and Giesselmann, Marco}}, booktitle = {{Sozialwissenschaftliche Perspektiven der Fußballfanforschung}}, editor = {{Grau, Andreas and von der Heyde, Judith and Kotthaus, Jochem and Schmidt, Holger and Winands, Martin}}, keywords = {{Befragung, Demokratie, Entscheidung, Entscheidungsprozess, Fan, Fußballspiel, Gruppe, soziale, Internet, Interview, Kommunikation, Organisationssoziologie, Sozialwissenschaft, Sportsoziologie, Sportverein, Untersuchung, empirische Vereinsführung}}, pages = {{157--175}}, publisher = {{Beltz Juventa}}, title = {{{Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs}}}, year = {{2017}}, } @book{51808, author = {{Schmitt, Martin}}, isbn = {{978-3-8376-3681-9 978-3-8394-3681-3}}, keywords = {{Ost-West-Konflikt, Hochschulschrift, Internet, Geschichte, Netzwerk, Geschichte 1967-1975, Technikgeschichte, Computernetzwerk}}, publisher = {{transcript}}, title = {{{Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes}}}, year = {{2016}}, } @inproceedings{5598, abstract = {{Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia.}}, author = {{Volkamer, Melanie and Schryen, Guido}}, booktitle = {{Proceedings of the 23rd Bled eConference}}, keywords = {{distributed trust concepts, measuring etrust, Internet voting}}, title = {{{Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}}}, year = {{2010}}, } @article{5621, abstract = {{Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence.}}, author = {{Schryen, Guido and Rich, Eliot}}, journal = {{IEEE Transactions on Information Forensics \& Security}}, keywords = {{e-voting, Internet voting, Internet election, security, verifiability, RIES, Estonia, Neuch{\^a}tel}}, number = {{4 Part}}, pages = {{729--744}}, publisher = {{IEEE}}, title = {{{Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}}}, volume = {{4}}, year = {{2009}}, } @inproceedings{5649, abstract = {{The Estonian parliamentary election in 2007 is regarded as a success story of large-scale Internet elections. I use this election in a single case study on practical security to show that low quality of security and its management does not necessarily prevent large-scale Internet elections from being conducted. I also provide research propositions with regard to future challenges for large-scale Internet elections.}}, author = {{Schryen, Guido}}, booktitle = {{7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)}}, keywords = {{Internet voting, large-scale election, Estonian parliamen- tary election, security, security management}}, title = {{{Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia}}}, year = {{2008}}, } @article{11820, abstract = {{In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed.}}, author = {{Ion, Valentin and Haeb-Umbach, Reinhold}}, journal = {{IEEE Transactions on Audio, Speech, and Language Processing}}, keywords = {{automatic speech recognition, bit errors, codecs, communication links, corrupted observations, decoding, distributed speech recognition, error-prone communication network, feature vector sequence, hidden Markov model-based ASR, hidden Markov models, inter-frame correlation, Internet telephony, network speech recognition, packet loss, speech posterior, speech recognition, transmission error robust speech recognition, uncertainty decoding, voice-over-IP codecs}}, number = {{5}}, pages = {{1047--1060}}, title = {{{A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}}}, doi = {{10.1109/TASL.2008.925879}}, volume = {{16}}, year = {{2008}}, } @techreport{6287, abstract = {{Spamming remains a form of Internet abuse, which burdens the Internet infrastructure, is generally regarded as an annoyance, and is said to cause a huge economic harm. Many technological, organizational, and legislative anti-spam measures have already been proposed and implemented, but have not led to any substantial decrease in the number of spam e-mails. We propose a scalable and flexible infrastructure framework that integrates several anti-spam measures and that features both a technological and an organizational facet. The key element of our infrastructure is a new organizational unit that reliably and transparently limits the number of e-mails that can be sent per day and per account. We also analyze the proposed framework in terms of its theoretical effectiveness, the required resources, and its limitations.}}, author = {{Schryen, Guido}}, keywords = {{Email, Infrastructure, Internet, Spam}}, title = {{{Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework}}}, year = {{2007}}, } @inbook{5667, abstract = {{Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out.}}, author = {{Schryen, Guido}}, booktitle = {{Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}}, keywords = {{Internet Voting, Online polls, E-Democracy, Security}}, pages = {{1017--1021}}, publisher = {{IADIS Press}}, title = {{{E-Democracy: Internet Voting}}}, year = {{2003}}, } @inproceedings{5668, abstract = {{Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen.}}, author = {{Schryen, Guido}}, booktitle = {{6. Internationale Tagung Wirtschaftsinformatik}}, keywords = {{Internet-Wahlen, E-Democracy, Sicherheit, Kryptographie}}, pages = {{937--956}}, title = {{{Internet-Wahlen}}}, year = {{2003}}, } @inproceedings{39488, abstract = {{CSCW systems like BSCW (Basic Support for Cooperative Work), HyperNews, and Lotus Notes have been successfully introduced to support the cooperation of geographically distributed work groups. Unfortunately, some of these software systems are not flexible enough to be customized easily to the requirements of an individual user. Most of the environments can only be configured by experts through complex programming. In this article we introduce VIP space, a shared workspace space in the sense of exchanging and processing shared objects between members of distributed work groups. VIP space can be easily adapted to the user's individual views and needs by means of a visual programming language. In VIP space, objects of the shared workspace are moved by drag and drop between task fields. Task fields are programmed by visual "if-then" rules applying a combination of icon- and form-based techniques. When a document represented by an icon is dropped on a task field its rules are checked and actions of the selected rules are excited. VIP space is finally demonstrated in an Internet course application.}}, author = {{Dücker, M. and Müller, Wolfgang and Rubart, Jessica}}, booktitle = {{ Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences}}, isbn = {{0-7695-0001-3}}, keywords = {{Application software, Electronic mail, Computer networks, Collaborative work, Teleconferencing, Asynchronous communication, Software systems, Internet, Computer applications, Discussion forums}}, location = {{Maui, HI, USA }}, title = {{{Innovative Concepts for Configurating Shared Workspaces through Visual Programming}}}, doi = {{10.1109/HICSS.1999.773046}}, year = {{1999}}, }