[{"abstract":[{"text":"Children’s information-related internet use positively affects their acquisition of computer- and information-related skills. Nevertheless, this use still occurs predominantly in the family context. Parents’ support of their children’s internet use can motivate them to use the internet for information-related purposes. However, while parents’ support seems to be important, the quantity and quality of parental support have been shown to have different associations with children’s motivation. Thus, the goal of the current study was to examine the relationship between parents’ support (quantity and quality), children’s motivation to engage in information-related internet use, and children’s actual information-related internet use (practical and school- or learning-related use) using structural equation modeling. In addition, we examined the mediating effects of children’s motivation. Specifically, 492 12-year-old German children answered a paper-and-pencil questionnaire. We found positive associations between the quantity and quality of parents’ support and children’s intrinsic and extrinsic motivation, while only structure-giving support was found to be related to children’s intrinsic motivation. The quantity of support was directly related to children’s school- or learning-related use, while intrinsic motivation was associated with both forms of information-related internet use. Furthermore, we confirmed that children’s motivation is an important mediator in this context. The implications of these findings for parents and children are considered.","lang":"eng"}],"status":"public","type":"journal_article","publication":"Journal of Research in Childhood Education","article_type":"original","ddc":["150"],"keyword":["children's motivation","information-related internet use","quality of parental support","quantity of parental support"],"language":[{"iso":"eng"}],"project":[{"_id":"378","name":"DigHomE: DigHomE: Digital Home Learning Environment – Gelingensbedingungen elterlicher Unterstützung bei der informationsorientierten Internetnutzung"}],"_id":"55271","user_id":"38556","department":[{"_id":"427"}],"year":"2024","citation":{"ama":"Gruchel N, Kurock R, Bonanati S, Buhl HM. Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation. <i>Journal of Research in Childhood Education</i>. Published online 2024.","ieee":"N. Gruchel, R. Kurock, S. Bonanati, and H. M. Buhl, “Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation,” <i>Journal of Research in Childhood Education</i>, 2024.","chicago":"Gruchel, Nicole, Ricarda Kurock, Sabrina  Bonanati, and Heike M. Buhl. “Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation.” <i>Journal of Research in Childhood Education</i>, 2024.","apa":"Gruchel, N., Kurock, R., Bonanati, S., &#38; Buhl, H. M. (2024). Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation. <i>Journal of Research in Childhood Education</i>.","mla":"Gruchel, Nicole, et al. “Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation.” <i>Journal of Research in Childhood Education</i>, 2024.","bibtex":"@article{Gruchel_Kurock_Bonanati_Buhl_2024, title={Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation}, journal={Journal of Research in Childhood Education}, author={Gruchel, Nicole and Kurock, Ricarda and Bonanati, Sabrina  and Buhl, Heike M.}, year={2024} }","short":"N. Gruchel, R. Kurock, S. Bonanati, H.M. Buhl, Journal of Research in Childhood Education (2024)."},"title":"Children’s Information-Related Internet Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s Motivation","main_file_link":[{"url":"https://www.tandfonline.com/doi/full/10.1080/02568543.2024.2376099"}],"date_updated":"2026-01-22T08:21:34Z","author":[{"last_name":"Gruchel","full_name":"Gruchel, Nicole","id":"38556","first_name":"Nicole"},{"first_name":"Ricarda","last_name":"Kurock","full_name":"Kurock, Ricarda","id":"78797"},{"first_name":"Sabrina ","full_name":"Bonanati, Sabrina ","last_name":"Bonanati"},{"first_name":"Heike M.","last_name":"Buhl","full_name":"Buhl, Heike M.","id":"27152"}],"date_created":"2024-07-16T06:38:34Z"},{"keyword":["Boundary object","Internet of things","Service science","Smart products","Smart service"],"ddc":["380"],"language":[{"iso":"eng"}],"publication":"Electronic Markets","abstract":[{"text":"Recent years have seen the emergence of physical products that are digitally networked with other products and with information systems to enable complex business scenarios in manufacturing, mobility, or healthcare. These “smart products”, which enable the co-creation of “smart service” that is based on monitoring, optimization, remote control, and autonomous adaptation of products, profoundly transform service systems into what we call “smart service systems”. In a multi-method study that includes conceptual research and qualitative data from in-depth interviews, we conceptualize “smart service” and “smart service systems” based on using smart products as boundary objects that integrate service consumers’ and service providers’ resources and activities. Smart products allow both actors to retrieve and to analyze aggregated field evidence and to adapt service systems based on contextual data. We discuss the implications that the introduction of smart service systems have for foundational concepts of service science and conclude that smart service systems are characterized by technology-mediated, continuous, and routinized interactions.","lang":"eng"}],"file":[{"file_id":"53575","file_name":"Beverungen_et_al-Conceptualizing_Smart_Service_Systems.pdf","access_level":"closed","file_size":599681,"date_created":"2024-04-18T12:53:07Z","creator":"dabe","date_updated":"2024-04-18T12:53:07Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"publisher":"SpringerNature","date_created":"2018-10-12T08:24:45Z","title":"Conceptualizing smart service systems","quality_controlled":"1","year":"2019","_id":"4684","project":[{"grant_number":"645751","_id":"1070","name":"RISE_BPM: Propelling Business Process Management by Research and Innovation Staff Exchange","call_identifier":"MSCA-RISE-2014"}],"department":[{"_id":"195"}],"user_id":"59677","article_type":"original","file_date_updated":"2024-04-18T12:53:07Z","type":"journal_article","status":"public","date_updated":"2024-04-18T12:55:05Z","volume":29,"author":[{"first_name":"Daniel","id":"59677","full_name":"Beverungen, Daniel","last_name":"Beverungen"},{"first_name":"Oliver","last_name":"Müller","id":"72849","full_name":"Müller, Oliver"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"last_name":"Mendling","full_name":"Mendling, Jan","first_name":"Jan"},{"last_name":"vom Brocke","full_name":"vom Brocke, Jan","first_name":"Jan"}],"doi":"10.1007/s12525-017-0270-5","has_accepted_license":"1","publication_identifier":{"issn":["14228890"]},"publication_status":"published","page":"7-18","intvolume":"        29","jel":["L8"],"citation":{"apa":"Beverungen, D., Müller, O., Matzner, M., Mendling, J., &#38; vom Brocke, J. (2019). Conceptualizing smart service systems. <i>Electronic Markets</i>, <i>29</i>, 7–18. <a href=\"https://doi.org/10.1007/s12525-017-0270-5\">https://doi.org/10.1007/s12525-017-0270-5</a>","bibtex":"@article{Beverungen_Müller_Matzner_Mendling_vom Brocke_2019, title={Conceptualizing smart service systems}, volume={29}, DOI={<a href=\"https://doi.org/10.1007/s12525-017-0270-5\">10.1007/s12525-017-0270-5</a>}, journal={Electronic Markets}, publisher={SpringerNature}, author={Beverungen, Daniel and Müller, Oliver and Matzner, Martin and Mendling, Jan and vom Brocke, Jan}, year={2019}, pages={7–18} }","mla":"Beverungen, Daniel, et al. “Conceptualizing Smart Service Systems.” <i>Electronic Markets</i>, vol. 29, SpringerNature, 2019, pp. 7–18, doi:<a href=\"https://doi.org/10.1007/s12525-017-0270-5\">10.1007/s12525-017-0270-5</a>.","short":"D. Beverungen, O. Müller, M. Matzner, J. Mendling, J. vom Brocke, Electronic Markets 29 (2019) 7–18.","chicago":"Beverungen, Daniel, Oliver Müller, Martin Matzner, Jan Mendling, and Jan vom Brocke. “Conceptualizing Smart Service Systems.” <i>Electronic Markets</i> 29 (2019): 7–18. <a href=\"https://doi.org/10.1007/s12525-017-0270-5\">https://doi.org/10.1007/s12525-017-0270-5</a>.","ieee":"D. Beverungen, O. Müller, M. Matzner, J. Mendling, and J. vom Brocke, “Conceptualizing smart service systems,” <i>Electronic Markets</i>, vol. 29, pp. 7–18, 2019, doi: <a href=\"https://doi.org/10.1007/s12525-017-0270-5\">10.1007/s12525-017-0270-5</a>.","ama":"Beverungen D, Müller O, Matzner M, Mendling J, vom Brocke J. Conceptualizing smart service systems. <i>Electronic Markets</i>. 2019;29:7-18. doi:<a href=\"https://doi.org/10.1007/s12525-017-0270-5\">10.1007/s12525-017-0270-5</a>"}},{"type":"conference","editor":[{"first_name":"Muthu","full_name":"Ramachandran, Muthu","last_name":"Ramachandran"},{"full_name":"Méndez Muñoz, Víctor","last_name":"Méndez Muñoz","first_name":"Víctor"},{"first_name":"Verena","full_name":"Kantere, Verena","last_name":"Kantere"},{"first_name":"Gary","full_name":"Wills, Gary","last_name":"Wills"},{"last_name":"Walters","full_name":"Walters, Robert","first_name":"Robert"},{"first_name":"Victor","full_name":"Chang, Victor","last_name":"Chang"}],"status":"public","_id":"1156","user_id":"58701","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"file_date_updated":"2020-09-18T09:09:27Z","publication_status":"published","has_accepted_license":"1","publication_identifier":{"isbn":["978-989-758-245-5"]},"place":"Setúbal, Portugal","citation":{"apa":"Kersting, J., Geierhos, M., Jung, H., &#38; Kim, T. (2017). Internet of Things Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, &#38; V. Chang (Eds.), <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i> (pp. 117–124). Setúbal, Portugal: SCITEPRESS. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>","short":"J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal, Portugal, 2017, pp. 117–124.","mla":"Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream Air Pollution Data.” <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS, 2017, pp. 117–24, doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>.","bibtex":"@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal}, title={Internet of Things Architecture for Handling Stream Air Pollution Data}, DOI={<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>}, booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, VictorEditors}, year={2017}, pages={117–124} }","ieee":"J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture for Handling Stream Air Pollution Data,” in <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, Porto, Portugal, 2017, pp. 117–124.","chicago":"Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet of Things Architecture for Handling Stream Air Pollution Data.” In <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills, Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>.","ama":"Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere V, Wills G, Walters R, Chang V, eds. <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS; 2017:117-124. doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>"},"page":"117-124","date_updated":"2022-01-06T06:51:03Z","author":[{"full_name":"Kersting, Joschka","id":"58701","last_name":"Kersting","first_name":"Joschka"},{"first_name":"Michaela","id":"42496","full_name":"Geierhos, Michaela","orcid":"0000-0002-8180-5606","last_name":"Geierhos"},{"last_name":"Jung","full_name":"Jung, Hanmin","first_name":"Hanmin"},{"first_name":"Taehong","full_name":"Kim, Taehong","last_name":"Kim"}],"conference":{"start_date":"2017-04-24","name":"2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017)","location":"Porto, Portugal","end_date":"2017-04-26"},"doi":"10.5220/0006354801170124","publication":"Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security","abstract":[{"lang":"eng","text":"In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available."}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"IoTBDS_2017_50_final.pdf","file_id":"19567","file_size":2612566,"date_created":"2020-09-18T09:09:27Z","creator":"jkers","date_updated":"2020-09-18T09:09:27Z"}],"ddc":["000"],"keyword":["Wireless Sensor Network","Internet of Things","Stream Data","Air Pollution","DSMS","Real-time Data Processing"],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2017","publisher":"SCITEPRESS","date_created":"2018-01-31T14:45:21Z","title":"Internet of Things Architecture for Handling Stream Air Pollution Data"},{"date_updated":"2024-12-19T10:44:31Z","publisher":"Beltz Juventa","author":[{"last_name":"Riedl","full_name":"Riedl, Lars","id":"31513","first_name":"Lars"},{"last_name":"Giesselmann","full_name":"Giesselmann, Marco","first_name":"Marco"}],"date_created":"2024-01-10T09:36:53Z","title":"Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs","publication_status":"published","year":"2017","place":"Weinheim, Basel","citation":{"ama":"Riedl L, Giesselmann M. Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs. In: Grau A, von der Heyde J, Kotthaus J, Schmidt H, Winands M, eds. <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i>. Beltz Juventa; 2017:157-175.","ieee":"L. Riedl and M. Giesselmann, “Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs,” in <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i>, A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, and M. Winands, Eds. Weinheim, Basel: Beltz Juventa, 2017, pp. 157–175.","chicago":"Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” In <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i>, edited by Andreas Grau, Judith von der Heyde, Jochem Kotthaus, Holger Schmidt, and Martin Winands, 157–75. Weinheim, Basel: Beltz Juventa, 2017.","bibtex":"@inbook{Riedl_Giesselmann_2017, place={Weinheim, Basel}, title={Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs}, booktitle={Sozialwissenschaftliche Perspektiven der Fußballfanforschung}, publisher={Beltz Juventa}, author={Riedl, Lars and Giesselmann, Marco}, editor={Grau, Andreas and von der Heyde, Judith and Kotthaus, Jochem and Schmidt, Holger and Winands, Martin}, year={2017}, pages={157–175} }","short":"L. Riedl, M. Giesselmann, in: A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, M. Winands (Eds.), Sozialwissenschaftliche Perspektiven der Fußballfanforschung, Beltz Juventa, Weinheim, Basel, 2017, pp. 157–175.","mla":"Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i>, edited by Andreas Grau et al., Beltz Juventa, 2017, pp. 157–75.","apa":"Riedl, L., &#38; Giesselmann, M. (2017). Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs. In A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, &#38; M. Winands (Eds.), <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i> (pp. 157–175). Beltz Juventa."},"page":"157-175","_id":"50415","user_id":"31513","department":[{"_id":"175"}],"keyword":["Befragung","Demokratie","Entscheidung","Entscheidungsprozess","Fan","Fußballspiel","Gruppe","soziale","Internet","Interview","Kommunikation","Organisationssoziologie","Sozialwissenschaft","Sportsoziologie","Sportverein","Untersuchung","empirische Vereinsführung"],"language":[{"iso":"ger"}],"type":"book_chapter","publication":"Sozialwissenschaftliche Perspektiven der Fußballfanforschung","editor":[{"first_name":"Andreas","full_name":"Grau, Andreas","last_name":"Grau"},{"first_name":"Judith","last_name":"von der Heyde","full_name":"von der Heyde, Judith"},{"full_name":"Kotthaus, Jochem","last_name":"Kotthaus","first_name":"Jochem"},{"full_name":"Schmidt, Holger","last_name":"Schmidt","first_name":"Holger"},{"first_name":"Martin","full_name":"Winands, Martin","last_name":"Winands"}],"status":"public"},{"citation":{"ieee":"M. Schmitt, <i>Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes</i>. Bielefeld: transcript, 2016.","chicago":"Schmitt, Martin. <i>Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes</i>. Histoire. Bielefeld: transcript, 2016.","ama":"Schmitt M. <i>Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes</i>. transcript; 2016.","bibtex":"@book{Schmitt_2016, place={Bielefeld}, series={Histoire}, title={Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes}, publisher={transcript}, author={Schmitt, Martin}, year={2016}, collection={Histoire} }","mla":"Schmitt, Martin. <i>Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes</i>. transcript, 2016.","short":"M. Schmitt, Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes, transcript, Bielefeld, 2016.","apa":"Schmitt, M. (2016). <i>Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes</i>. transcript."},"year":"2016","place":"Bielefeld","publication_identifier":{"isbn":["978-3-8376-3681-9 978-3-8394-3681-3"]},"title":"Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes","date_created":"2024-02-24T23:24:56Z","author":[{"id":"100968","full_name":"Schmitt, Martin","last_name":"Schmitt","first_name":"Martin"}],"publisher":"transcript","date_updated":"2024-02-25T00:00:21Z","status":"public","type":"book","language":[{"iso":"eng"}],"keyword":["Ost-West-Konflikt","Hochschulschrift","Internet","Geschichte","Netzwerk","Geschichte 1967-1975","Technikgeschichte","Computernetzwerk"],"user_id":"100968","series_title":"Histoire","_id":"51808"},{"year":"2010","citation":{"apa":"Volkamer, M., &#38; Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In <i>Proceedings of the 23rd Bled eConference</i>.","short":"M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.","bibtex":"@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}, booktitle={Proceedings of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido}, year={2010} }","mla":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” <i>Proceedings of the 23rd Bled EConference</i>, 2010.","ama":"Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: <i>Proceedings of the 23rd Bled EConference</i>. ; 2010.","ieee":"M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General Concept and Application to Internet Voting,” in <i>Proceedings of the 23rd Bled eConference</i>, 2010.","chicago":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” In <i>Proceedings of the 23rd Bled EConference</i>, 2010."},"has_accepted_license":"1","title":"Measuring eTrust in distributed systems - General Concept and Application to Internet Voting","date_updated":"2022-01-06T07:02:06Z","oa":"1","date_created":"2018-11-14T11:49:50Z","author":[{"first_name":"Melanie","last_name":"Volkamer","full_name":"Volkamer, Melanie"},{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"abstract":[{"lang":"eng","text":"Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia."}],"status":"public","file":[{"access_level":"open_access","file_name":"06_Schryen.pdf","file_id":"6185","file_size":243413,"creator":"hsiemes","date_created":"2018-12-11T15:14:05Z","date_updated":"2018-12-13T15:16:50Z","relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 23rd Bled eConference","type":"conference","keyword":["distributed trust concepts","measuring etrust","Internet voting"],"ddc":["000"],"file_date_updated":"2018-12-13T15:16:50Z","language":[{"iso":"eng"}],"extern":"1","_id":"5598","department":[{"_id":"277"}],"user_id":"61579"},{"extern":"1","file_date_updated":"2018-12-18T13:16:07Z","_id":"5621","department":[{"_id":"277"}],"user_id":"61579","status":"public","type":"journal_article","oa":"1","date_updated":"2022-01-06T07:02:12Z","volume":4,"author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"},{"full_name":"Rich, Eliot","last_name":"Rich","first_name":"Eliot"}],"intvolume":"         4","page":"729-744","citation":{"ama":"Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>. 2009;4(4 Part):729-744.","ieee":"G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744, 2009.","chicago":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i> 4, no. 4 Part (2009): 729–44.","mla":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.","bibtex":"@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \\&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }","short":"G. Schryen, E. Rich, IEEE Transactions on Information Forensics \\&#38; Security 4 (2009) 729–744.","apa":"Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, <i>4</i>(4 Part), 729–744."},"has_accepted_license":"1","keyword":["e-voting","Internet voting","Internet election","security","verifiability","RIES","Estonia","Neuch{\\^a}tel"],"ddc":["000"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence."}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"6316","file_name":"JOURNAL VERSION.pdf","file_size":1544790,"date_created":"2018-12-18T13:16:07Z","creator":"hsiemes","date_updated":"2018-12-18T13:16:07Z"}],"publication":"IEEE Transactions on Information Forensics \\& Security","title":"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland","publisher":"IEEE","date_created":"2018-11-14T14:06:44Z","year":"2009","issue":"4 Part"},{"author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"}],"date_created":"2018-11-14T14:43:23Z","oa":"1","date_updated":"2022-01-06T07:02:20Z","title":"Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia","has_accepted_license":"1","citation":{"apa":"Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In <i>7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)</i>.","short":"G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.","mla":"Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.” <i>7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business)</i>, 2008.","bibtex":"@inproceedings{Schryen_2008, title={Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia}, booktitle={7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)}, author={Schryen, Guido}, year={2008} }","ama":"Schryen G. Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In: <i>7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business)</i>. ; 2008.","chicago":"Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.” In <i>7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business)</i>, 2008.","ieee":"G. Schryen, “Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia,” in <i>7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)</i>, 2008."},"year":"2008","department":[{"_id":"277"}],"user_id":"61579","_id":"5649","language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:18:21Z","extern":"1","keyword":["Internet voting","large-scale election","Estonian parliamen- tary election","security","security management"],"ddc":["000"],"publication":"7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)","type":"conference","status":"public","file":[{"file_id":"6320","access_level":"open_access","file_name":"Schryen - Practical Security of Large-scale Elections - LNBIP - web version.pdf","file_size":273231,"date_created":"2018-12-18T13:18:21Z","creator":"hsiemes","date_updated":"2018-12-18T13:18:21Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"The Estonian parliamentary election in 2007 is regarded as a success story of large-scale Internet elections. I use this election in a single case study on practical security to show that low quality of security and its management does not necessarily prevent large-scale Internet elections from being conducted. I also provide research propositions with regard to future challenges for large-scale Internet elections.","lang":"eng"}]},{"user_id":"44006","department":[{"_id":"54"}],"_id":"11820","language":[{"iso":"eng"}],"keyword":["automatic speech recognition","bit errors","codecs","communication links","corrupted observations","decoding","distributed speech recognition","error-prone communication network","feature vector sequence","hidden Markov model-based ASR","hidden Markov models","inter-frame correlation","Internet telephony","network speech recognition","packet loss","speech posterior","speech recognition","transmission error robust speech recognition","uncertainty decoding","voice-over-IP codecs"],"type":"journal_article","publication":"IEEE Transactions on Audio, Speech, and Language Processing","status":"public","abstract":[{"text":"In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed.","lang":"eng"}],"author":[{"first_name":"Valentin","full_name":"Ion, Valentin","last_name":"Ion"},{"first_name":"Reinhold","id":"242","full_name":"Haeb-Umbach, Reinhold","last_name":"Haeb-Umbach"}],"date_created":"2019-07-12T05:28:53Z","volume":16,"oa":"1","date_updated":"2022-01-06T06:51:10Z","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf","open_access":"1"}],"doi":"10.1109/TASL.2008.925879","title":"A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition","issue":"5","citation":{"ieee":"V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition,” <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, pp. 1047–1060, 2008.","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions on Audio, Speech, and Language Processing</i> 16, no. 5 (2008): 1047–60. <a href=\"https://doi.org/10.1109/TASL.2008.925879\">https://doi.org/10.1109/TASL.2008.925879</a>.","ama":"Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech, and Language Processing</i>. 2008;16(5):1047-1060. doi:<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>","apa":"Ion, V., &#38; Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, <i>16</i>(5), 1047–1060. <a href=\"https://doi.org/10.1109/TASL.2008.925879\">https://doi.org/10.1109/TASL.2008.925879</a>","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, 2008, pp. 1047–60, doi:<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>.","short":"V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language Processing 16 (2008) 1047–1060.","bibtex":"@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}, volume={16}, DOI={<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>}, number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060} }"},"page":"1047-1060","intvolume":"        16","year":"2008"},{"file":[{"date_created":"2018-12-18T13:23:40Z","creator":"hsiemes","date_updated":"2018-12-18T13:23:40Z","file_id":"6322","file_name":"anti_spam_framework.pdf","access_level":"open_access","file_size":456755,"content_type":"application/pdf","relation":"main_file"}],"status":"public","abstract":[{"text":"Spamming remains a form of Internet abuse, which burdens the Internet infrastructure, is generally regarded as an annoyance, and is said to cause a huge economic harm. Many technological, organizational, and legislative anti-spam measures have already been proposed and implemented, but have not led to any substantial decrease in the number of spam e-mails. We propose a scalable and flexible infrastructure framework that integrates several anti-spam measures and that features both a technological and an organizational facet. The key element of our infrastructure is a new organizational unit that reliably and transparently limits the number of e-mails that can be sent per day and per account. We also analyze the proposed framework in terms of its theoretical effectiveness, the required resources, and its limitations.","lang":"eng"}],"type":"report","file_date_updated":"2018-12-18T13:23:40Z","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Email","Infrastructure","Internet","Spam"],"user_id":"61579","department":[{"_id":"277"}],"_id":"6287","citation":{"ama":"Schryen G. <i>Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework</i>.; 2007.","chicago":"Schryen, Guido. <i>Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework</i>, 2007.","ieee":"G. Schryen, <i>Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework</i>. 2007.","mla":"Schryen, Guido. <i>Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework</i>. 2007.","bibtex":"@book{Schryen_2007, title={Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework}, author={Schryen, Guido}, year={2007} }","short":"G. Schryen, Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework, 2007.","apa":"Schryen, G. (2007). <i>Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework</i>."},"year":"2007","has_accepted_license":"1","title":"Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"date_created":"2018-12-18T12:50:22Z","date_updated":"2022-01-06T07:03:00Z","oa":"1"},{"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T15:01:49Z","publisher":"IADIS Press","date_updated":"2022-01-06T07:02:25Z","title":"E-Democracy: Internet Voting","citation":{"ama":"Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.","chicago":"Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve: IADIS Press, 2003.","ieee":"G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press, 2003, pp. 1017–1021.","short":"G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.","bibtex":"@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting}, booktitle={Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021} }","mla":"Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp. 1017–21.","apa":"Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021). Algarve: IADIS Press."},"page":"1017-1021","year":"2003","place":"Algarve","user_id":"61579","department":[{"_id":"277"}],"_id":"5667","extern":"1","language":[{"iso":"eng"}],"keyword":["Internet Voting","Online polls","E-Democracy","Security"],"type":"book_chapter","publication":"Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2","status":"public","abstract":[{"text":"Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out.","lang":"eng"}]},{"language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:40:14Z","extern":"1","ddc":["000"],"keyword":["Internet-Wahlen","E-Democracy","Sicherheit","Kryptographie"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5668","file":[{"access_level":"open_access","file_name":"Schryen - Internet-Wahlen.pdf","file_id":"6340","file_size":364380,"creator":"hsiemes","date_created":"2018-12-18T13:40:14Z","date_updated":"2018-12-18T13:40:14Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"text":"Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen.","lang":"eng"}],"type":"conference","publication":"6. Internationale Tagung Wirtschaftsinformatik","title":"Internet-Wahlen","author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"date_created":"2018-11-14T15:03:15Z","oa":"1","date_updated":"2022-01-06T07:02:26Z","citation":{"short":"G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–956.","mla":"Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–56.","bibtex":"@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956} }","apa":"Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i> (pp. 937–956).","ieee":"G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–956.","chicago":"Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 937–56, 2003.","ama":"Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>. ; 2003:937-956."},"page":"937-956","year":"2003","has_accepted_license":"1"},{"_id":"39488","department":[{"_id":"672"}],"user_id":"5786","keyword":["Application software","Electronic mail","Computer networks","Collaborative work","Teleconferencing","Asynchronous communication","Software systems","Internet","Computer applications","Discussion forums"],"language":[{"iso":"eng"}],"publication":" Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences","type":"conference","abstract":[{"text":"CSCW systems like BSCW (Basic Support for Cooperative Work), HyperNews, and Lotus Notes have been successfully introduced to support the cooperation of geographically distributed work groups. Unfortunately, some of these software systems are not flexible enough to be customized easily to the requirements of an individual user. Most of the environments can only be configured by experts through complex programming. In this article we introduce VIP space, a shared workspace space in the sense of exchanging and processing shared objects between members of distributed work groups. VIP space can be easily adapted to the user's individual views and needs by means of a visual programming language. In VIP space, objects of the shared workspace are moved by drag and drop between task fields. Task fields are programmed by visual \"if-then\" rules applying a combination of icon- and form-based techniques. When a document represented by an icon is dropped on a task field its rules are checked and actions of the selected rules are excited. VIP space is finally demonstrated in an Internet course application.","lang":"eng"}],"status":"public","date_updated":"2023-01-24T11:35:52Z","author":[{"first_name":"M.","full_name":"Dücker, M.","last_name":"Dücker"},{"full_name":"Müller, Wolfgang","id":"16243","last_name":"Müller","first_name":"Wolfgang"},{"first_name":"Jessica","last_name":"Rubart","full_name":"Rubart, Jessica"}],"date_created":"2023-01-24T11:35:47Z","title":"Innovative Concepts for Configurating Shared Workspaces through Visual Programming","doi":"10.1109/HICSS.1999.773046","conference":{"location":"Maui, HI, USA ","name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32"},"publication_identifier":{"isbn":["0-7695-0001-3"]},"year":"1999","place":"Maui, HI, USA ","citation":{"chicago":"Dücker, M., Wolfgang Müller, and Jessica Rubart. “Innovative Concepts for Configurating Shared Workspaces through Visual Programming.” In <i> Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences</i>. Maui, HI, USA , 1999. <a href=\"https://doi.org/10.1109/HICSS.1999.773046\">https://doi.org/10.1109/HICSS.1999.773046</a>.","ieee":"M. Dücker, W. Müller, and J. Rubart, “Innovative Concepts for Configurating Shared Workspaces through Visual Programming,” presented at the Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32, Maui, HI, USA , 1999, doi: <a href=\"https://doi.org/10.1109/HICSS.1999.773046\">10.1109/HICSS.1999.773046</a>.","ama":"Dücker M, Müller W, Rubart J. Innovative Concepts for Configurating Shared Workspaces through Visual Programming. In: <i> Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences</i>. ; 1999. doi:<a href=\"https://doi.org/10.1109/HICSS.1999.773046\">10.1109/HICSS.1999.773046</a>","bibtex":"@inproceedings{Dücker_Müller_Rubart_1999, place={Maui, HI, USA }, title={Innovative Concepts for Configurating Shared Workspaces through Visual Programming}, DOI={<a href=\"https://doi.org/10.1109/HICSS.1999.773046\">10.1109/HICSS.1999.773046</a>}, booktitle={ Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences}, author={Dücker, M. and Müller, Wolfgang and Rubart, Jessica}, year={1999} }","mla":"Dücker, M., et al. “Innovative Concepts for Configurating Shared Workspaces through Visual Programming.” <i> Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences</i>, 1999, doi:<a href=\"https://doi.org/10.1109/HICSS.1999.773046\">10.1109/HICSS.1999.773046</a>.","short":"M. Dücker, W. Müller, J. Rubart, in:  Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, Maui, HI, USA , 1999.","apa":"Dücker, M., Müller, W., &#38; Rubart, J. (1999). Innovative Concepts for Configurating Shared Workspaces through Visual Programming. <i> Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences</i>. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32, Maui, HI, USA . <a href=\"https://doi.org/10.1109/HICSS.1999.773046\">https://doi.org/10.1109/HICSS.1999.773046</a>"}}]
