---
_id: '55271'
abstract:
- lang: eng
  text: Children’s information-related internet use positively affects their acquisition
    of computer- and information-related skills. Nevertheless, this use still occurs
    predominantly in the family context. Parents’ support of their children’s internet
    use can motivate them to use the internet for information-related purposes. However,
    while parents’ support seems to be important, the quantity and quality of parental
    support have been shown to have different associations with children’s motivation.
    Thus, the goal of the current study was to examine the relationship between parents’
    support (quantity and quality), children’s motivation to engage in information-related
    internet use, and children’s actual information-related internet use (practical
    and school- or learning-related use) using structural equation modeling. In addition,
    we examined the mediating effects of children’s motivation. Specifically, 492
    12-year-old German children answered a paper-and-pencil questionnaire. We found
    positive associations between the quantity and quality of parents’ support and
    children’s intrinsic and extrinsic motivation, while only structure-giving support
    was found to be related to children’s intrinsic motivation. The quantity of support
    was directly related to children’s school- or learning-related use, while intrinsic
    motivation was associated with both forms of information-related internet use.
    Furthermore, we confirmed that children’s motivation is an important mediator
    in this context. The implications of these findings for parents and children are
    considered.
article_type: original
author:
- first_name: Nicole
  full_name: Gruchel, Nicole
  id: '38556'
  last_name: Gruchel
- first_name: Ricarda
  full_name: Kurock, Ricarda
  id: '78797'
  last_name: Kurock
- first_name: 'Sabrina '
  full_name: 'Bonanati, Sabrina '
  last_name: Bonanati
- first_name: Heike M.
  full_name: Buhl, Heike M.
  id: '27152'
  last_name: Buhl
citation:
  ama: 'Gruchel N, Kurock R, Bonanati S, Buhl HM. Children’s Information-Related Internet
    Use at Home: The Role of the Quantity and Quality of Parental Support and Children’s
    Motivation. <i>Journal of Research in Childhood Education</i>. Published online
    2024.'
  apa: 'Gruchel, N., Kurock, R., Bonanati, S., &#38; Buhl, H. M. (2024). Children’s
    Information-Related Internet Use at Home: The Role of the Quantity and Quality
    of Parental Support and Children’s Motivation. <i>Journal of Research in Childhood
    Education</i>.'
  bibtex: '@article{Gruchel_Kurock_Bonanati_Buhl_2024, title={Children’s Information-Related
    Internet Use at Home: The Role of the Quantity and Quality of Parental Support
    and Children’s Motivation}, journal={Journal of Research in Childhood Education},
    author={Gruchel, Nicole and Kurock, Ricarda and Bonanati, Sabrina  and Buhl, Heike
    M.}, year={2024} }'
  chicago: 'Gruchel, Nicole, Ricarda Kurock, Sabrina  Bonanati, and Heike M. Buhl.
    “Children’s Information-Related Internet Use at Home: The Role of the Quantity
    and Quality of Parental Support and Children’s Motivation.” <i>Journal of Research
    in Childhood Education</i>, 2024.'
  ieee: 'N. Gruchel, R. Kurock, S. Bonanati, and H. M. Buhl, “Children’s Information-Related
    Internet Use at Home: The Role of the Quantity and Quality of Parental Support
    and Children’s Motivation,” <i>Journal of Research in Childhood Education</i>,
    2024.'
  mla: 'Gruchel, Nicole, et al. “Children’s Information-Related Internet Use at Home:
    The Role of the Quantity and Quality of Parental Support and Children’s Motivation.”
    <i>Journal of Research in Childhood Education</i>, 2024.'
  short: N. Gruchel, R. Kurock, S. Bonanati, H.M. Buhl, Journal of Research in Childhood
    Education (2024).
date_created: 2024-07-16T06:38:34Z
date_updated: 2026-01-22T08:21:34Z
ddc:
- '150'
department:
- _id: '427'
keyword:
- children's motivation
- information-related internet use
- quality of parental support
- quantity of parental support
language:
- iso: eng
main_file_link:
- url: https://www.tandfonline.com/doi/full/10.1080/02568543.2024.2376099
project:
- _id: '378'
  name: 'DigHomE: DigHomE: Digital Home Learning Environment – Gelingensbedingungen
    elterlicher Unterstützung bei der informationsorientierten Internetnutzung'
publication: Journal of Research in Childhood Education
status: public
title: 'Children’s Information-Related Internet Use at Home: The Role of the Quantity
  and Quality of Parental Support and Children’s Motivation'
type: journal_article
user_id: '38556'
year: '2024'
...
---
_id: '4684'
abstract:
- lang: eng
  text: Recent years have seen the emergence of physical products that are digitally
    networked with other products and with information systems to enable complex business
    scenarios in manufacturing, mobility, or healthcare. These “smart products”, which
    enable the co-creation of “smart service” that is based on monitoring, optimization,
    remote control, and autonomous adaptation of products, profoundly transform service
    systems into what we call “smart service systems”. In a multi-method study that
    includes conceptual research and qualitative data from in-depth interviews, we
    conceptualize “smart service” and “smart service systems” based on using smart
    products as boundary objects that integrate service consumers’ and service providers’
    resources and activities. Smart products allow both actors to retrieve and to
    analyze aggregated field evidence and to adapt service systems based on contextual
    data. We discuss the implications that the introduction of smart service systems
    have for foundational concepts of service science and conclude that smart service
    systems are characterized by technology-mediated, continuous, and routinized interactions.
article_type: original
author:
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Oliver
  full_name: Müller, Oliver
  id: '72849'
  last_name: Müller
- first_name: Martin
  full_name: Matzner, Martin
  last_name: Matzner
- first_name: Jan
  full_name: Mendling, Jan
  last_name: Mendling
- first_name: Jan
  full_name: vom Brocke, Jan
  last_name: vom Brocke
citation:
  ama: Beverungen D, Müller O, Matzner M, Mendling J, vom Brocke J. Conceptualizing
    smart service systems. <i>Electronic Markets</i>. 2019;29:7-18. doi:<a href="https://doi.org/10.1007/s12525-017-0270-5">10.1007/s12525-017-0270-5</a>
  apa: Beverungen, D., Müller, O., Matzner, M., Mendling, J., &#38; vom Brocke, J.
    (2019). Conceptualizing smart service systems. <i>Electronic Markets</i>, <i>29</i>,
    7–18. <a href="https://doi.org/10.1007/s12525-017-0270-5">https://doi.org/10.1007/s12525-017-0270-5</a>
  bibtex: '@article{Beverungen_Müller_Matzner_Mendling_vom Brocke_2019, title={Conceptualizing
    smart service systems}, volume={29}, DOI={<a href="https://doi.org/10.1007/s12525-017-0270-5">10.1007/s12525-017-0270-5</a>},
    journal={Electronic Markets}, publisher={SpringerNature}, author={Beverungen,
    Daniel and Müller, Oliver and Matzner, Martin and Mendling, Jan and vom Brocke,
    Jan}, year={2019}, pages={7–18} }'
  chicago: 'Beverungen, Daniel, Oliver Müller, Martin Matzner, Jan Mendling, and Jan
    vom Brocke. “Conceptualizing Smart Service Systems.” <i>Electronic Markets</i>
    29 (2019): 7–18. <a href="https://doi.org/10.1007/s12525-017-0270-5">https://doi.org/10.1007/s12525-017-0270-5</a>.'
  ieee: 'D. Beverungen, O. Müller, M. Matzner, J. Mendling, and J. vom Brocke, “Conceptualizing
    smart service systems,” <i>Electronic Markets</i>, vol. 29, pp. 7–18, 2019, doi:
    <a href="https://doi.org/10.1007/s12525-017-0270-5">10.1007/s12525-017-0270-5</a>.'
  mla: Beverungen, Daniel, et al. “Conceptualizing Smart Service Systems.” <i>Electronic
    Markets</i>, vol. 29, SpringerNature, 2019, pp. 7–18, doi:<a href="https://doi.org/10.1007/s12525-017-0270-5">10.1007/s12525-017-0270-5</a>.
  short: D. Beverungen, O. Müller, M. Matzner, J. Mendling, J. vom Brocke, Electronic
    Markets 29 (2019) 7–18.
date_created: 2018-10-12T08:24:45Z
date_updated: 2024-04-18T12:55:05Z
ddc:
- '380'
department:
- _id: '195'
doi: 10.1007/s12525-017-0270-5
file:
- access_level: closed
  content_type: application/pdf
  creator: dabe
  date_created: 2024-04-18T12:53:07Z
  date_updated: 2024-04-18T12:53:07Z
  file_id: '53575'
  file_name: Beverungen_et_al-Conceptualizing_Smart_Service_Systems.pdf
  file_size: 599681
  relation: main_file
  success: 1
file_date_updated: 2024-04-18T12:53:07Z
has_accepted_license: '1'
intvolume: '        29'
jel:
- L8
keyword:
- Boundary object
- Internet of things
- Service science
- Smart products
- Smart service
language:
- iso: eng
page: 7-18
project:
- _id: '1070'
  call_identifier: MSCA-RISE-2014
  grant_number: '645751'
  name: 'RISE_BPM: Propelling Business Process Management by Research and Innovation
    Staff Exchange'
publication: Electronic Markets
publication_identifier:
  issn:
  - '14228890'
publication_status: published
publisher: SpringerNature
quality_controlled: '1'
status: public
title: Conceptualizing smart service systems
type: journal_article
user_id: '59677'
volume: 29
year: '2019'
...
---
_id: '1156'
abstract:
- lang: eng
  text: In this paper, we present an IoT architecture which handles stream sensor
    data of air pollution. Particle pollution is known as a serious threat to human
    health. Along with developments in the use of wireless sensors and the IoT, we
    propose an architecture that flexibly measures and processes stream data collected
    in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread
    network of wireless sensors that can follow changes in human behavior. Apart from
    stating reasons for the need of such a development and its requirements, we provide
    a conceptual design as well as a technological design of such an architecture.
    The technological design consists of Kaa and Apache Storm which can collect air
    pollution information in real-time and solve various problems to process data
    such as missing data and synchronization. This enables us to add a simulation
    in which we provide issues that might come up when having our architecture in
    use. Together with these issues, we state r easons for choosing specific modules
    among candidates. Our architecture combines wireless sensors with the Kaa IoT
    framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management
    System among others. We even provide open-government data sets that are freely
    available.
author:
- first_name: Joschka
  full_name: Kersting, Joschka
  id: '58701'
  last_name: Kersting
- first_name: Michaela
  full_name: Geierhos, Michaela
  id: '42496'
  last_name: Geierhos
  orcid: 0000-0002-8180-5606
- first_name: Hanmin
  full_name: Jung, Hanmin
  last_name: Jung
- first_name: Taehong
  full_name: Kim, Taehong
  last_name: Kim
citation:
  ama: 'Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for
    Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere
    V, Wills G, Walters R, Chang V, eds. <i>Proceedings of the 2nd International Conference
    on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS;
    2017:117-124. doi:<a href="https://doi.org/10.5220/0006354801170124">10.5220/0006354801170124</a>'
  apa: 'Kersting, J., Geierhos, M., Jung, H., &#38; Kim, T. (2017). Internet of Things
    Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez
    Muñoz, V. Kantere, G. Wills, R. Walters, &#38; V. Chang (Eds.), <i>Proceedings
    of the 2nd International Conference on Internet of Things, Big Data and Security</i>
    (pp. 117–124). Setúbal, Portugal: SCITEPRESS. <a href="https://doi.org/10.5220/0006354801170124">https://doi.org/10.5220/0006354801170124</a>'
  bibtex: '@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal},
    title={Internet of Things Architecture for Handling Stream Air Pollution Data},
    DOI={<a href="https://doi.org/10.5220/0006354801170124">10.5220/0006354801170124</a>},
    booktitle={Proceedings of the 2nd International Conference on Internet of Things,
    Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and
    Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu
    and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert
    and Chang, VictorEditors}, year={2017}, pages={117–124} }'
  chicago: 'Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet
    of Things Architecture for Handling Stream Air Pollution Data.” In <i>Proceedings
    of the 2nd International Conference on Internet of Things, Big Data and Security</i>,
    edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills,
    Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017.
    <a href="https://doi.org/10.5220/0006354801170124">https://doi.org/10.5220/0006354801170124</a>.'
  ieee: J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture
    for Handling Stream Air Pollution Data,” in <i>Proceedings of the 2nd International
    Conference on Internet of Things, Big Data and Security</i>, Porto, Portugal,
    2017, pp. 117–124.
  mla: Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream
    Air Pollution Data.” <i>Proceedings of the 2nd International Conference on Internet
    of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS,
    2017, pp. 117–24, doi:<a href="https://doi.org/10.5220/0006354801170124">10.5220/0006354801170124</a>.
  short: 'J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez
    Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd
    International Conference on Internet of Things, Big Data and Security, SCITEPRESS,
    Setúbal, Portugal, 2017, pp. 117–124.'
conference:
  end_date: 2017-04-26
  location: Porto, Portugal
  name: 2nd International Conference on Internet of Things, Big Data and Security
    (IoTBDS 2017)
  start_date: 2017-04-24
date_created: 2018-01-31T14:45:21Z
date_updated: 2022-01-06T06:51:03Z
ddc:
- '000'
department:
- _id: '36'
- _id: '1'
- _id: '579'
doi: 10.5220/0006354801170124
editor:
- first_name: Muthu
  full_name: Ramachandran, Muthu
  last_name: Ramachandran
- first_name: Víctor
  full_name: Méndez Muñoz, Víctor
  last_name: Méndez Muñoz
- first_name: Verena
  full_name: Kantere, Verena
  last_name: Kantere
- first_name: Gary
  full_name: Wills, Gary
  last_name: Wills
- first_name: Robert
  full_name: Walters, Robert
  last_name: Walters
- first_name: Victor
  full_name: Chang, Victor
  last_name: Chang
file:
- access_level: closed
  content_type: application/pdf
  creator: jkers
  date_created: 2020-09-18T09:09:27Z
  date_updated: 2020-09-18T09:09:27Z
  file_id: '19567'
  file_name: IoTBDS_2017_50_final.pdf
  file_size: 2612566
  relation: main_file
  success: 1
file_date_updated: 2020-09-18T09:09:27Z
has_accepted_license: '1'
keyword:
- Wireless Sensor Network
- Internet of Things
- Stream Data
- Air Pollution
- DSMS
- Real-time Data Processing
language:
- iso: eng
page: 117-124
place: Setúbal, Portugal
publication: Proceedings of the 2nd International Conference on Internet of Things,
  Big Data and Security
publication_identifier:
  isbn:
  - 978-989-758-245-5
publication_status: published
publisher: SCITEPRESS
quality_controlled: '1'
status: public
title: Internet of Things Architecture for Handling Stream Air Pollution Data
type: conference
user_id: '58701'
year: '2017'
...
---
_id: '50415'
author:
- first_name: Lars
  full_name: Riedl, Lars
  id: '31513'
  last_name: Riedl
- first_name: Marco
  full_name: Giesselmann, Marco
  last_name: Giesselmann
citation:
  ama: 'Riedl L, Giesselmann M. Fans: Entscheider oder Supporter? Eine organisationssoziologische
    Analyse zur Mitbestimmung in Fußballclubs. In: Grau A, von der Heyde J, Kotthaus
    J, Schmidt H, Winands M, eds. <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i>.
    Beltz Juventa; 2017:157-175.'
  apa: 'Riedl, L., &#38; Giesselmann, M. (2017). Fans: Entscheider oder Supporter?
    Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs. In
    A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, &#38; M. Winands (Eds.), <i>Sozialwissenschaftliche
    Perspektiven der Fußballfanforschung</i> (pp. 157–175). Beltz Juventa.'
  bibtex: '@inbook{Riedl_Giesselmann_2017, place={Weinheim, Basel}, title={Fans: Entscheider
    oder Supporter? Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs},
    booktitle={Sozialwissenschaftliche Perspektiven der Fußballfanforschung}, publisher={Beltz
    Juventa}, author={Riedl, Lars and Giesselmann, Marco}, editor={Grau, Andreas and
    von der Heyde, Judith and Kotthaus, Jochem and Schmidt, Holger and Winands, Martin},
    year={2017}, pages={157–175} }'
  chicago: 'Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter?
    Eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” In
    <i>Sozialwissenschaftliche Perspektiven der Fußballfanforschung</i>, edited by
    Andreas Grau, Judith von der Heyde, Jochem Kotthaus, Holger Schmidt, and Martin
    Winands, 157–75. Weinheim, Basel: Beltz Juventa, 2017.'
  ieee: 'L. Riedl and M. Giesselmann, “Fans: Entscheider oder Supporter? Eine organisationssoziologische
    Analyse zur Mitbestimmung in Fußballclubs,” in <i>Sozialwissenschaftliche Perspektiven
    der Fußballfanforschung</i>, A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt,
    and M. Winands, Eds. Weinheim, Basel: Beltz Juventa, 2017, pp. 157–175.'
  mla: 'Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? Eine
    organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” <i>Sozialwissenschaftliche
    Perspektiven der Fußballfanforschung</i>, edited by Andreas Grau et al., Beltz
    Juventa, 2017, pp. 157–75.'
  short: 'L. Riedl, M. Giesselmann, in: A. Grau, J. von der Heyde, J. Kotthaus, H.
    Schmidt, M. Winands (Eds.), Sozialwissenschaftliche Perspektiven der Fußballfanforschung,
    Beltz Juventa, Weinheim, Basel, 2017, pp. 157–175.'
date_created: 2024-01-10T09:36:53Z
date_updated: 2024-12-19T10:44:31Z
department:
- _id: '175'
editor:
- first_name: Andreas
  full_name: Grau, Andreas
  last_name: Grau
- first_name: Judith
  full_name: von der Heyde, Judith
  last_name: von der Heyde
- first_name: Jochem
  full_name: Kotthaus, Jochem
  last_name: Kotthaus
- first_name: Holger
  full_name: Schmidt, Holger
  last_name: Schmidt
- first_name: Martin
  full_name: Winands, Martin
  last_name: Winands
keyword:
- Befragung
- Demokratie
- Entscheidung
- Entscheidungsprozess
- Fan
- Fußballspiel
- Gruppe
- soziale
- Internet
- Interview
- Kommunikation
- Organisationssoziologie
- Sozialwissenschaft
- Sportsoziologie
- Sportverein
- Untersuchung
- empirische Vereinsführung
language:
- iso: ger
page: 157-175
place: Weinheim, Basel
publication: Sozialwissenschaftliche Perspektiven der Fußballfanforschung
publication_status: published
publisher: Beltz Juventa
status: public
title: 'Fans: Entscheider oder Supporter? Eine organisationssoziologische Analyse
  zur Mitbestimmung in Fußballclubs'
type: book_chapter
user_id: '31513'
year: '2017'
...
---
_id: '51808'
author:
- first_name: Martin
  full_name: Schmitt, Martin
  id: '100968'
  last_name: Schmitt
citation:
  ama: 'Schmitt M. <i>Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes</i>.
    transcript; 2016.'
  apa: 'Schmitt, M. (2016). <i>Internet im Kalten Krieg: eine Vorgeschichte des globalen
    Kommunikationsnetzes</i>. transcript.'
  bibtex: '@book{Schmitt_2016, place={Bielefeld}, series={Histoire}, title={Internet
    im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes}, publisher={transcript},
    author={Schmitt, Martin}, year={2016}, collection={Histoire} }'
  chicago: 'Schmitt, Martin. <i>Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen
    Kommunikationsnetzes</i>. Histoire. Bielefeld: transcript, 2016.'
  ieee: 'M. Schmitt, <i>Internet im Kalten Krieg: eine Vorgeschichte des globalen
    Kommunikationsnetzes</i>. Bielefeld: transcript, 2016.'
  mla: 'Schmitt, Martin. <i>Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen
    Kommunikationsnetzes</i>. transcript, 2016.'
  short: 'M. Schmitt, Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes,
    transcript, Bielefeld, 2016.'
date_created: 2024-02-24T23:24:56Z
date_updated: 2024-02-25T00:00:21Z
keyword:
- Ost-West-Konflikt
- Hochschulschrift
- Internet
- Geschichte
- Netzwerk
- Geschichte 1967-1975
- Technikgeschichte
- Computernetzwerk
language:
- iso: eng
place: Bielefeld
publication_identifier:
  isbn:
  - 978-3-8376-3681-9 978-3-8394-3681-3
publisher: transcript
series_title: Histoire
status: public
title: 'Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes'
type: book
user_id: '100968'
year: '2016'
...
---
_id: '5598'
abstract:
- lang: eng
  text: Emerging digital environments and infrastructures, such as distributed services
    and computing services, have generated new options of communication, information
    sharing, and resource utilization in past years. Different distributed trust concepts
    are applied to increase trust in such systems. However, these concepts yield to
    rather complex architectures which make it difficult to determine which component
    or system needs to be trusted. This paper presents a novel trust measurement method
    for distributed systems which enables the t identification of weak points in the
    overall system architecture. The measurement method includes the specification
    of a formal trust language and its representation by means of propositional logic
    formulas. The applicability of the proposed concepts is demonstrated by conducting
    a case study on the Internet voting system that was used in the 2007 parliamentary
    elections in Estonia.
author:
- first_name: Melanie
  full_name: Volkamer, Melanie
  last_name: Volkamer
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept
    and Application to Internet Voting. In: <i>Proceedings of the 23rd Bled EConference</i>.
    ; 2010.'
  apa: Volkamer, M., &#38; Schryen, G. (2010). Measuring eTrust in distributed systems
    - General Concept and Application to Internet Voting. In <i>Proceedings of the
    23rd Bled eConference</i>.
  bibtex: '@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed
    systems - General Concept and Application to Internet Voting}, booktitle={Proceedings
    of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido},
    year={2010} }'
  chicago: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed
    Systems - General Concept and Application to Internet Voting.” In <i>Proceedings
    of the 23rd Bled EConference</i>, 2010.
  ieee: M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General
    Concept and Application to Internet Voting,” in <i>Proceedings of the 23rd Bled
    eConference</i>, 2010.
  mla: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems
    - General Concept and Application to Internet Voting.” <i>Proceedings of the 23rd
    Bled EConference</i>, 2010.
  short: 'M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.'
date_created: 2018-11-14T11:49:50Z
date_updated: 2022-01-06T07:02:06Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-11T15:14:05Z
  date_updated: 2018-12-13T15:16:50Z
  file_id: '6185'
  file_name: 06_Schryen.pdf
  file_size: 243413
  relation: main_file
file_date_updated: 2018-12-13T15:16:50Z
has_accepted_license: '1'
keyword:
- distributed trust concepts
- measuring etrust
- Internet voting
language:
- iso: eng
oa: '1'
publication: Proceedings of the 23rd Bled eConference
status: public
title: Measuring eTrust in distributed systems - General Concept and Application to
  Internet Voting
type: conference
user_id: '61579'
year: '2010'
...
---
_id: '5621'
abstract:
- lang: eng
  text: Remote voting through the Internet provides convenience and access to the
    electorate. At the same time, the security concerns facing any distributed application
    are magnified when the task is so crucial to democratic society. In addition,
    some of the electoral process loses transparency when it is encapsulated in information
    technology. In this paper, we examine the public record of three recent elections
    that used Internet voting. Our specific goal is to identify any potential flaws
    that security experts would recognize, but may have not been identified in the
    rush to implement technology. To do this, we present a multiple exploratory case
    study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands,
    and Switzerland. These elections were selected as particularly interesting and
    accessible, and each presents its own technical and security challenges. The electoral
    environment, technical design and process for each election are described, including
    reconstruction of details which are implied but not specified within the source
    material. We found that all three elections warrant significant concern about
    voter security, verifiability, and transparency. Usability, our fourth area of
    focus, seems to have been well-addressed in these elections. While our analysis
    is based on public documents and previously published reports, and therefore lacking
    access to any confidential materials held by electoral officials, this comparative
    analysis provides interesting insight and consistent questions across all these
    cases. Effective review of Internet voting requires an aggressive stance towards
    identifying potential security and operational flaws, and we encourage the use
    of third party reviews with critical technology skills during design, programming,
    and voting to reduce the changes of failure or fraud that would undermine public
    confidence.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Eliot
  full_name: Rich, Eliot
  last_name: Rich
citation:
  ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>. 2009;4(4 Part):729-744.'
  apa: 'Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, <i>4</i>(4
    Part), 729–744.'
  bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland},
    volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics
    \&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009},
    pages={729–744} }'
  chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i> 4, no. 4 Part
    (2009): 729–44.'
  ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744,
    2009.'
  mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, vol. 4, no.
    4 Part, IEEE, 2009, pp. 729–44.'
  short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \&#38; Security
    4 (2009) 729–744.
date_created: 2018-11-14T14:06:44Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:16:07Z
  date_updated: 2018-12-18T13:16:07Z
  file_id: '6316'
  file_name: JOURNAL VERSION.pdf
  file_size: 1544790
  relation: main_file
file_date_updated: 2018-12-18T13:16:07Z
has_accepted_license: '1'
intvolume: '         4'
issue: 4 Part
keyword:
- e-voting
- Internet voting
- Internet election
- security
- verifiability
- RIES
- Estonia
- Neuch{\^a}tel
language:
- iso: eng
oa: '1'
page: 729-744
publication: IEEE Transactions on Information Forensics \& Security
publisher: IEEE
status: public
title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections
  in Estonia, The Netherlands, and Switzerland'
type: journal_article
user_id: '61579'
volume: 4
year: '2009'
...
---
_id: '5649'
abstract:
- lang: eng
  text: The Estonian parliamentary election in 2007 is regarded as a success story
    of large-scale Internet elections. I use this election in a single case study
    on practical security to show that low quality of security and its management
    does not necessarily prevent large-scale Internet elections from being conducted.
    I also provide research propositions with regard to future challenges for large-scale
    Internet elections.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Practical Security of Large-scale Elections: An Exploratory Case
    Study of Internet Voting in Estonia. In: <i>7th Workshop on E-Business (WEB 2008,
    AIS Special Interest Group on E-Business)</i>. ; 2008.'
  apa: 'Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory
    Case Study of Internet Voting in Estonia. In <i>7th Workshop on e-Business (WEB
    2008, AIS Special Interest Group on E-Business)</i>.'
  bibtex: '@inproceedings{Schryen_2008, title={Practical Security of Large-scale Elections:
    An Exploratory Case Study of Internet Voting in Estonia}, booktitle={7th Workshop
    on e-Business (WEB 2008, AIS Special Interest Group on E-Business)}, author={Schryen,
    Guido}, year={2008} }'
  chicago: 'Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory
    Case Study of Internet Voting in Estonia.” In <i>7th Workshop on E-Business (WEB
    2008, AIS Special Interest Group on E-Business)</i>, 2008.'
  ieee: 'G. Schryen, “Practical Security of Large-scale Elections: An Exploratory
    Case Study of Internet Voting in Estonia,” in <i>7th Workshop on e-Business (WEB
    2008, AIS Special Interest Group on E-Business)</i>, 2008.'
  mla: 'Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory
    Case Study of Internet Voting in Estonia.” <i>7th Workshop on E-Business (WEB
    2008, AIS Special Interest Group on E-Business)</i>, 2008.'
  short: 'G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest
    Group on E-Business), 2008.'
date_created: 2018-11-14T14:43:23Z
date_updated: 2022-01-06T07:02:20Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:18:21Z
  date_updated: 2018-12-18T13:18:21Z
  file_id: '6320'
  file_name: Schryen - Practical Security of Large-scale Elections - LNBIP - web version.pdf
  file_size: 273231
  relation: main_file
file_date_updated: 2018-12-18T13:18:21Z
has_accepted_license: '1'
keyword:
- Internet voting
- large-scale election
- Estonian parliamen- tary election
- security
- security management
language:
- iso: eng
oa: '1'
publication: 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)
status: public
title: 'Practical Security of Large-scale Elections: An Exploratory Case Study of
  Internet Voting in Estonia'
type: conference
user_id: '61579'
year: '2008'
...
---
_id: '11820'
abstract:
- lang: eng
  text: In this paper, we derive an uncertainty decoding rule for automatic speech
    recognition (ASR), which accounts for both corrupted observations and inter-frame
    correlation. The conditional independence assumption, prevalent in hidden Markov
    model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned
    on the complete observed feature vector sequence. This is a more informative posterior
    than one conditioned only on the current observation. The novel decoding is used
    to obtain a transmission-error robust remote ASR system, where the speech capturing
    unit is connected to the decoder via an error-prone communication network. We
    show how the clean speech posterior can be computed for communication links being
    characterized by either bit errors or packet loss. Recognition results are presented
    for both distributed and network speech recognition, where in the latter case
    common voice-over-IP codecs are employed.
author:
- first_name: Valentin
  full_name: Ion, Valentin
  last_name: Ion
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to
    Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech,
    and Language Processing</i>. 2008;16(5):1047-1060. doi:<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>
  apa: Ion, V., &#38; Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With
    Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions
    on Audio, Speech, and Language Processing</i>, <i>16</i>(5), 1047–1060. <a href="https://doi.org/10.1109/TASL.2008.925879">https://doi.org/10.1109/TASL.2008.925879</a>
  bibtex: '@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule
    With Applications to Transmission Error Robust Speech Recognition}, volume={16},
    DOI={<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>},
    number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing},
    author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060}
    }'
  chicago: 'Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding
    Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE
    Transactions on Audio, Speech, and Language Processing</i> 16, no. 5 (2008): 1047–60.
    <a href="https://doi.org/10.1109/TASL.2008.925879">https://doi.org/10.1109/TASL.2008.925879</a>.'
  ieee: V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications
    to Transmission Error Robust Speech Recognition,” <i>IEEE Transactions on Audio,
    Speech, and Language Processing</i>, vol. 16, no. 5, pp. 1047–1060, 2008.
  mla: Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule
    With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions
    on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, 2008, pp. 1047–60,
    doi:<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>.
  short: V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language
    Processing 16 (2008) 1047–1060.
date_created: 2019-07-12T05:28:53Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1109/TASL.2008.925879
intvolume: '        16'
issue: '5'
keyword:
- automatic speech recognition
- bit errors
- codecs
- communication links
- corrupted observations
- decoding
- distributed speech recognition
- error-prone communication network
- feature vector sequence
- hidden Markov model-based ASR
- hidden Markov models
- inter-frame correlation
- Internet telephony
- network speech recognition
- packet loss
- speech posterior
- speech recognition
- transmission error robust speech recognition
- uncertainty decoding
- voice-over-IP codecs
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf
oa: '1'
page: 1047-1060
publication: IEEE Transactions on Audio, Speech, and Language Processing
status: public
title: A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust
  Speech Recognition
type: journal_article
user_id: '44006'
volume: 16
year: '2008'
...
---
_id: '6287'
abstract:
- lang: eng
  text: Spamming remains a form of Internet abuse, which burdens the Internet infrastructure,
    is generally regarded as an annoyance, and is said to cause a huge economic harm.
    Many technological, organizational, and legislative anti-spam measures have already
    been proposed and implemented, but have not led to any substantial decrease in
    the number of spam e-mails. We propose a scalable and flexible infrastructure
    framework that integrates several anti-spam measures and that features both a
    technological and an organizational facet. The key element of our infrastructure
    is a new organizational unit that reliably and transparently limits the number
    of e-mails that can be sent per day and per account. We also analyze the proposed
    framework in terms of its theoretical effectiveness, the required resources, and
    its limitations.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. <i>Preventing E-Mail Spam: The Conceptualization and the Analysis
    of an Infrastructure Framework</i>.; 2007.'
  apa: 'Schryen, G. (2007). <i>Preventing E-mail Spam: The Conceptualization and the
    Analysis of an Infrastructure Framework</i>.'
  bibtex: '@book{Schryen_2007, title={Preventing E-mail Spam: The Conceptualization
    and the Analysis of an Infrastructure Framework}, author={Schryen, Guido}, year={2007}
    }'
  chicago: 'Schryen, Guido. <i>Preventing E-Mail Spam: The Conceptualization and the
    Analysis of an Infrastructure Framework</i>, 2007.'
  ieee: 'G. Schryen, <i>Preventing E-mail Spam: The Conceptualization and the Analysis
    of an Infrastructure Framework</i>. 2007.'
  mla: 'Schryen, Guido. <i>Preventing E-Mail Spam: The Conceptualization and the Analysis
    of an Infrastructure Framework</i>. 2007.'
  short: 'G. Schryen, Preventing E-Mail Spam: The Conceptualization and the Analysis
    of an Infrastructure Framework, 2007.'
date_created: 2018-12-18T12:50:22Z
date_updated: 2022-01-06T07:03:00Z
ddc:
- '000'
department:
- _id: '277'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:23:40Z
  date_updated: 2018-12-18T13:23:40Z
  file_id: '6322'
  file_name: anti_spam_framework.pdf
  file_size: 456755
  relation: main_file
file_date_updated: 2018-12-18T13:23:40Z
has_accepted_license: '1'
keyword:
- Email
- Infrastructure
- Internet
- Spam
language:
- iso: eng
oa: '1'
status: public
title: 'Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure
  Framework'
type: report
user_id: '61579'
year: '2007'
...
---
_id: '5667'
abstract:
- lang: eng
  text: Voting via the Internet is part of electronic government and electronic democracy.
    However, there are many obstacles which have to be overcome, especially legal
    restrictions have to be transformed into technical and security solutions. In
    the first part the article discusses advantages and disadvantages of Internet
    elections, shows different application fields, and presents important international
    pilot schemes (political and business ones). in the second part, due to democratic
    basic principles, technological security aspects are worked out.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International
    Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.'
  apa: 'Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the
    IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021).
    Algarve: IADIS Press.'
  bibtex: '@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting},
    booktitle={Proceedings of the IADIS International Conference WWW Internet 2003.
    vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021}
    }'
  chicago: 'Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the
    IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve:
    IADIS Press, 2003.'
  ieee: 'G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS
    International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press,
    2003, pp. 1017–1021.'
  mla: 'Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS
    International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp.
    1017–21.'
  short: 'G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet
    2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.'
date_created: 2018-11-14T15:01:49Z
date_updated: 2022-01-06T07:02:25Z
department:
- _id: '277'
extern: '1'
keyword:
- Internet Voting
- Online polls
- E-Democracy
- Security
language:
- iso: eng
page: 1017-1021
place: Algarve
publication: Proceedings of the IADIS International Conference WWW Internet 2003.
  vol. 2
publisher: IADIS Press
status: public
title: 'E-Democracy: Internet Voting'
type: book_chapter
user_id: '61579'
year: '2003'
...
---
_id: '5668'
abstract:
- lang: eng
  text: 'Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen
    diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger
    Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen
    wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden
    anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen
    herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte
    herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität
    der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell
    vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems
    systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem
    Ausblick auf notwendige Untersuchungen.'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>.
    ; 2003:937-956.'
  apa: Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i>
    (pp. 937–956).
  bibtex: '@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale
    Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956}
    }'
  chicago: Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    937–56, 2003.
  ieee: G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    2003, pp. 937–956.
  mla: Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    2003, pp. 937–56.
  short: 'G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp.
    937–956.'
date_created: 2018-11-14T15:03:15Z
date_updated: 2022-01-06T07:02:26Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:40:14Z
  date_updated: 2018-12-18T13:40:14Z
  file_id: '6340'
  file_name: Schryen - Internet-Wahlen.pdf
  file_size: 364380
  relation: main_file
file_date_updated: 2018-12-18T13:40:14Z
has_accepted_license: '1'
keyword:
- Internet-Wahlen
- E-Democracy
- Sicherheit
- Kryptographie
language:
- iso: eng
oa: '1'
page: 937-956
publication: 6. Internationale Tagung Wirtschaftsinformatik
status: public
title: Internet-Wahlen
type: conference
user_id: '61579'
year: '2003'
...
---
_id: '39488'
abstract:
- lang: eng
  text: CSCW systems like BSCW (Basic Support for Cooperative Work), HyperNews, and
    Lotus Notes have been successfully introduced to support the cooperation of geographically
    distributed work groups. Unfortunately, some of these software systems are not
    flexible enough to be customized easily to the requirements of an individual user.
    Most of the environments can only be configured by experts through complex programming.
    In this article we introduce VIP space, a shared workspace space in the sense
    of exchanging and processing shared objects between members of distributed work
    groups. VIP space can be easily adapted to the user's individual views and needs
    by means of a visual programming language. In VIP space, objects of the shared
    workspace are moved by drag and drop between task fields. Task fields are programmed
    by visual "if-then" rules applying a combination of icon- and form-based techniques.
    When a document represented by an icon is dropped on a task field its rules are
    checked and actions of the selected rules are excited. VIP space is finally demonstrated
    in an Internet course application.
author:
- first_name: M.
  full_name: Dücker, M.
  last_name: Dücker
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
- first_name: Jessica
  full_name: Rubart, Jessica
  last_name: Rubart
citation:
  ama: 'Dücker M, Müller W, Rubart J. Innovative Concepts for Configurating Shared
    Workspaces through Visual Programming. In: <i> Proceedings of the 32nd Annual
    Hawaii International Conference on Systems Sciences</i>. ; 1999. doi:<a href="https://doi.org/10.1109/HICSS.1999.773046">10.1109/HICSS.1999.773046</a>'
  apa: Dücker, M., Müller, W., &#38; Rubart, J. (1999). Innovative Concepts for Configurating
    Shared Workspaces through Visual Programming. <i> Proceedings of the 32nd Annual
    Hawaii International Conference on Systems Sciences</i>. Proceedings of the 32nd
    Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32, Maui,
    HI, USA . <a href="https://doi.org/10.1109/HICSS.1999.773046">https://doi.org/10.1109/HICSS.1999.773046</a>
  bibtex: '@inproceedings{Dücker_Müller_Rubart_1999, place={Maui, HI, USA }, title={Innovative
    Concepts for Configurating Shared Workspaces through Visual Programming}, DOI={<a
    href="https://doi.org/10.1109/HICSS.1999.773046">10.1109/HICSS.1999.773046</a>},
    booktitle={ Proceedings of the 32nd Annual Hawaii International Conference on
    Systems Sciences}, author={Dücker, M. and Müller, Wolfgang and Rubart, Jessica},
    year={1999} }'
  chicago: Dücker, M., Wolfgang Müller, and Jessica Rubart. “Innovative Concepts for
    Configurating Shared Workspaces through Visual Programming.” In <i> Proceedings
    of the 32nd Annual Hawaii International Conference on Systems Sciences</i>. Maui,
    HI, USA , 1999. <a href="https://doi.org/10.1109/HICSS.1999.773046">https://doi.org/10.1109/HICSS.1999.773046</a>.
  ieee: 'M. Dücker, W. Müller, and J. Rubart, “Innovative Concepts for Configurating
    Shared Workspaces through Visual Programming,” presented at the Proceedings of
    the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32,
    Maui, HI, USA , 1999, doi: <a href="https://doi.org/10.1109/HICSS.1999.773046">10.1109/HICSS.1999.773046</a>.'
  mla: Dücker, M., et al. “Innovative Concepts for Configurating Shared Workspaces
    through Visual Programming.” <i> Proceedings of the 32nd Annual Hawaii International
    Conference on Systems Sciences</i>, 1999, doi:<a href="https://doi.org/10.1109/HICSS.1999.773046">10.1109/HICSS.1999.773046</a>.
  short: 'M. Dücker, W. Müller, J. Rubart, in:  Proceedings of the 32nd Annual Hawaii
    International Conference on Systems Sciences, Maui, HI, USA , 1999.'
conference:
  location: 'Maui, HI, USA '
  name: Proceedings of the 32nd Annual Hawaii International Conference on Systems
    Sciences. 1999. HICSS-32
date_created: 2023-01-24T11:35:47Z
date_updated: 2023-01-24T11:35:52Z
department:
- _id: '672'
doi: 10.1109/HICSS.1999.773046
keyword:
- Application software
- Electronic mail
- Computer networks
- Collaborative work
- Teleconferencing
- Asynchronous communication
- Software systems
- Internet
- Computer applications
- Discussion forums
language:
- iso: eng
place: 'Maui, HI, USA '
publication: ' Proceedings of the 32nd Annual Hawaii International Conference on Systems
  Sciences'
publication_identifier:
  isbn:
  - 0-7695-0001-3
status: public
title: Innovative Concepts for Configurating Shared Workspaces through Visual Programming
type: conference
user_id: '5786'
year: '1999'
...
