@article{6082,
  abstract     = {{When two targets are presented in rapid succession, the first target (T1) is usually identified, but the second target (T2) is often missed. A remarkable exception to this 'attentional blink' occurs when T2 immediately follows the first T1, at lag 1. It is then often spared but reported in the wrong order—that is, before T1. These order reversals have led to the hypothesis that 'lag 1 sparing' occurs because the two targets merge into a single episodic representation. Here, we report evidence consistent with an alternative theory: T2 receives more attention than T1, leading to prior entry into working memory. Two experiments showed that the more T2 performance exceeded that for T1, the more order reversals were made. Furthermore, precuing T1 led to a shift in performance benefits from T2 to T1 and to an equivalent reduction in order reversals. We conclude that it is not necessary to assume episodic integration to explain lag 1 sparing or the accompanying order reversals. (PsycINFO Dat}},
  author       = {{Olivers, Christian N. L. and Hilkenmeier, Frederic and Scharlau, Ingrid}},
  issn         = {{1943-3921}},
  journal      = {{Attention, Perception, & Psychophysics}},
  keywords     = {{attentional blink, order reversals, prior entry, working memory, visual attention, attentional performance, Adolescent, Adult, Attention, Attentional Blink, Color Perception, Cues, Discrimination (Psychology), Female, Humans, Male, Memory, Short-Term, Pattern Recognition, Visual, Psychophysics, Reaction Time, Reversal Learning, Sensory Gating, Serial Learning, Young Adult, Eyeblink Reflex, Stimulus Change, Stimulus Parameters, Visual Attention, Attentional Blink, Short Term Memory}},
  number       = {{1}},
  pages        = {{53 -- 67}},
  title        = {{{Prior entry explains order reversals in the attentional blink.}}},
  volume       = {{73}},
  year         = {{2011}},
}

@article{17246,
  author       = {{Nomikou, Iris and Rohlfing, Katharina}},
  issn         = {{1943-0612}},
  journal      = {{IEEE Transactions on Autonomous Mental Development}},
  keywords     = {{acoustic packaging, mother-child interaction, social learning, multimodal grounding in input, ecology of interactions, synchrony}},
  number       = {{2}},
  pages        = {{113--128}},
  publisher    = {{Institute of Electrical & Electronics Engineers (IEEE)}},
  title        = {{{Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds}}},
  doi          = {{10.1109/TAMD.2011.2140113}},
  volume       = {{3}},
  year         = {{2011}},
}

@techreport{4448,
  abstract     = {{"Lernkultur" wird als Begriff häufig gebraucht und fast ebenso häufig definiert  das gilt für den betrieblichen Kontext ebenso wie für die Bereiche der Schul-, Hochschul-, Berufs- und Erwachsenenbildung (z. B. Wulf, Althans, Blaschke, Ferrin, Göhlich, Jörissen, Mattig et al., 2007; Jenert, Zellweger Moser, Dommen & Gebhardt, 2009; Kirchhöfer, 2004; Erpenbeck & Sauer, 2000). Trotz der grossen Aufmerksamkeit, die der Begriff in den letzten zwei Jahrzehnten erfahren hat, kann man nicht von einem in sich geschlossenen Forschungsprogramm sprechen. Die Zugänge zum Phänomenbereich Lernkultur sind ebenso vielfältig wie die hinter einzelnen Ansätzen stehenden Lernkulturkonstrukte. Den Autoren ist keine Publikation bekannt, welche unterschiedliche Ansätze der Lernkulturforschung systematisch aufarbeitet. Eine wichtige Referenzquelle ist der Bericht von Kuh und Whitt (1988) "The Invisible Tapestry: Culture in American Colleges and Universities". Ausgehend von einer fundierten Übersicht zu unterschiedlichen Zugängen zum Kulturbegriff (oft in starker Anlehnung an die Organisationskulturforschung (vgl. Allaire & Firsirotu, 1984)) stellen die Autoren ein Rahmenmodell zur Analyse von Hochschulkulturen vor (Kuh und Whitt, 1988, S. 56). Diese Arbeit erweist sich für ein besseres Verständnis unter-schiedlicher Zugänge zum Lernkulturbegriff als aufschlussreich, weil im Kontext Hoch-schule zwangsweise viele Aspekte des Lernens und Lehrens angesprochen werden. Allerdings fokussiert auch dieser Bericht nicht das Konstrukt der Lernkultur und bietet damit nur einen Ausgangspunkt für die Identifizierung unterschiedlicher Zugänge.}},
  author       = {{Jenert, Tobias and Gebhardt, Anja}},
  keywords     = {{Lernkultur, learning culture, culture theory, approaches to learning culture, culture of learning}},
  title        = {{{Zugänge zum Begriff der Lernkultur: Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen}}},
  year         = {{2010}},
}

@inproceedings{17253,
  author       = {{Vollmer, Anna-Lisa and Pitsch, Karola and Lohan, Katrin Solveig and Fritsch, Jannik and Rohlfing, Katharina and Wrede, Britta}},
  booktitle    = {{Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning}},
  keywords     = {{tutoring interaction, social interaction, video signal processing, robot systems, paediatrics, neurophysiology, Learning, infant, feedback, biology computing, cognitive capabilities, cognition, children}},
  pages        = {{76--81}},
  title        = {{{Developing feedback: How children of different age contribute to a tutoring interaction with adults}}},
  year         = {{2010}},
}

@techreport{4450,
  author       = {{Jenert, Tobias and Zellweger, Franziska and Dommen, Jenny and Gebhardt, Anja}},
  keywords     = {{Lernkultur, Hochschule, HEI, learning culture, higher education, teaching and learning, Hochschullehre}},
  title        = {{{Lernkulturen an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller, pädagogischer und organisationaler Perspektive}}},
  year         = {{2009}},
}

@article{5621,
  abstract     = {{Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence.}},
  author       = {{Schryen, Guido and Rich, Eliot}},
  journal      = {{IEEE Transactions on Information Forensics \& Security}},
  keywords     = {{e-voting, Internet voting, Internet election, security, verifiability, RIES, Estonia, Neuch{\^a}tel}},
  number       = {{4 Part}},
  pages        = {{729--744}},
  publisher    = {{IEEE}},
  title        = {{{Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}}},
  volume       = {{4}},
  year         = {{2009}},
}

@inproceedings{17272,
  abstract     = {{In developmental research, tutoring behavior has been identified as scaffolding infants' learning processes. It has been defined in terms of child-directed speech (Motherese), child-directed motion (Motionese), and contingency. In the field of developmental robotics, research often assumes that in human-robot interaction (HRI), robots are treated similar to infants, because their immature cognitive capabilities benefit from this behavior. However, according to our knowledge, it has barely been studied whether this is true and how exactly humans alter their behavior towards a robotic interaction partner. In this paper, we present results concerning the acceptance of a robotic agent in a social learning scenario obtained via comparison to adults and 8-11 months old infants in equal conditions. These results constitute an important empirical basis for making use of tutoring behavior in social robotics. In our study, we performed a detailed multimodal analysis of HRI in a tutoring situation using the example of a robot simulation equipped with a bottom-up saliency-based attention model. Our results reveal significant differences in hand movement velocity, motion pauses, range of motion, and eye gaze suggesting that for example adults decrease their hand movement velocity in an Adult-Child Interaction (ACI), opposed to an Adult-Adult Interaction (AAI) and this decrease is even higher in the Adult-Robot Interaction (ARI). We also found important differences between ACI and ARI in how the behavior is modified over time as the interaction unfolds. These findings indicate the necessity of integrating top-down feedback structures into a bottom-up system for robots to be fully accepted as interaction partners.}},
  author       = {{Vollmer, Anna-Lisa and Lohan, Katrin Solveig and Fischer, Kerstin and Nagai, Yukie and Pitsch, Karola and Fritsch, Jannik and Rohlfing, Katharina and Wrede, Britta}},
  booktitle    = {{Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning}},
  keywords     = {{robot simulation, hand movement velocity, robotic interaction partner, robotic agent, robot-directed interaction, multimodal analysis, Motionese, Motherese, intelligent tutoring systems, immature cognitive capability, human computer interaction, eye gaze, child-directed speech, child-directed motion, bottom-up system, bottom-up saliency-based attention model, adult-robot interaction, adult-child interaction, adult-adult interaction, human-robot interaction, action learning, social learning scenario, social robotics, software agents, top-down feedback structures, tutoring behavior}},
  pages        = {{1--6}},
  publisher    = {{IEEE}},
  title        = {{{People modify their tutoring behavior in robot-directed interaction for action learning}}},
  doi          = {{10.1109/DEVLRN.2009.5175516}},
  year         = {{2009}},
}

@inproceedings{4494,
  author       = {{Sporer, Thomas and Jenert, Tobias and Strehl, Bernhard and Noack, Patrick Ole}},
  booktitle    = {{DeLFI Workshops}},
  keywords     = {{E-Portfolios, Lerngemeinschaften, Praxisgemeinschaften, Projektgruppen, Hochschulstudium, informelles Lernen}},
  location     = {{Siegen}},
  pages        = {{19----26}},
  publisher    = {{Logos Verlag}},
  title        = {{{Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}}},
  year         = {{2007}},
}

@inproceedings{4496,
  author       = {{Heinze, Nina and Sporer, Thomas and Jenert, Tobias}},
  booktitle    = {{Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis: Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis}},
  isbn         = {{978-3-925474-60-6}},
  keywords     = {{Wissenschaftliches Arbeiten, Blended Learning, Tutoring}},
  location     = {{Frankfurt am Main }},
  pages        = {{319--328}},
  title        = {{{Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität Augsburg}}},
  volume       = {{9}},
  year         = {{2007}},
}

@inproceedings{4497,
  author       = {{Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi}},
  keywords     = {{Problem Solving Competencies, E-Portfolio}},
  location     = {{Kreta }},
  title        = {{{Student Learning Communities in the Project-Centered Study Program" Problem-Solving Competencies"}}},
  year         = {{2007}},
}

@article{5655,
  abstract     = {{Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.}},
  author       = {{Schryen, Guido}},
  journal      = {{The Journal of Information Systems Security (AIS Special Interest Group in Security)}},
  keywords     = {{e-mail, spam, e-mail infrastructure, anti-spam measures, spamming options}},
  number       = {{2}},
  pages        = {{66--90}},
  title        = {{{Do anti-spam measures effectively cover the e-mail communication network? A formal approach}}},
  volume       = {{3}},
  year         = {{2007}},
}

@article{17289,
  abstract     = {{Robots have to deal with an enormous amount of sensory stimuli. One solution in making sense of them is to enable a robot system to actively search for cues that help structuring the information. Studies with infants reveal that parents support the learning-process by modifying their interaction style, dependent on their child's developmental age. In our study, in which parents demonstrated everyday actions to their preverbal children (8-11 months old), our aim was to identify objective parameters for multimodal action modification. Our results reveal two action parameters being modified in adult-child interaction: roundness and pace. Furthermore, we found that language has the power to help children structuring actions sequences by synchrony and emphasis. These insights are discussed with respect to the built-in attention architecture of a socially interactive robot, which enables it to understand demonstrated actions. Our algorithmic approach towards automatically detecting the task structure in child-designed input demonstrates the potential impact of insights from developmental learning on robotics. The presented findings pave the way to automatically detect when to imitate in a demonstration}},
  author       = {{Rohlfing, Katharina and Fritsch, Jannik and Wrede, Britta and Jungmann, Tanja}},
  issn         = {{1568-5535}},
  journal      = {{Advanced Robotics}},
  keywords     = {{multi-modal motherese, child-directed input, motionese, learning mechanisms}},
  number       = {{10}},
  pages        = {{1183--1199}},
  publisher    = {{VSP BV}},
  title        = {{{How can multimodal cues from child-directed interaction reduce learning complexity in robots?}}},
  doi          = {{10.1163/156855306778522532}},
  volume       = {{20}},
  year         = {{2006}},
}

@inproceedings{5661,
  abstract     = {{Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the 6th IEEE Information Assurance Workshop}},
  keywords     = {{Spam, ham, e-mail, honeypot, address obscuring technique, address taxonomy}},
  pages        = {{37--41}},
  publisher    = {{Westpoint}},
  title        = {{{An e-mail honeypot addressing spammers' behavior in collecting and applying addresses}}},
  year         = {{2005}},
}

@article{5662,
  abstract     = {{Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam.}},
  author       = {{Schryen, Guido}},
  journal      = {{Wirtschaftsinformatik}},
  keywords     = {{Spam, E-Mail, Spoofing, Blockieren, Filtern, Lightweight Mail Transfer Agent Authentication Protocol (LMAP)}},
  number       = {{4}},
  pages        = {{281--288}},
  publisher    = {{Springer}},
  title        = {{{Effektivität von Lösungsansätzen zur Bekämpfung von Spam}}},
  volume       = {{46}},
  year         = {{2004}},
}

@inproceedings{5663,
  abstract     = {{Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}},
  editor       = {{Isaias, Pedro}},
  keywords     = {{e-mail, spam, filtering, blocking, LMAP, SMTP account}},
  pages        = {{937--940}},
  publisher    = {{IADIS Press}},
  title        = {{{Fighting Spam: Motivating an Account-based Approach}}},
  year         = {{2004}},
}

@article{6068,
  abstract     = {{Attending to a location shortens the perceptual latency of stimuli appearing at this location (perceptual latency priming). According to attentional explanations, perceptual latency priming relies on the speeded transfer of attended visual information into an internal model. However, doubts about the attentional origin have repeatedly been raised because efforts to minimize response bias have been insufficient in most studies. Five experiments investigated the contribution of a response bias to perceptual latency priming (judgment bias due to the two-alternative forced-choice method and due to the existence of the prime, criterion effects or second-order bias, sensorimotor priming). If any, only small response biases were found. The results thus support the attentional explanation. (PsycINFO Database Record (c) 2016 APA, all rights reserved)}},
  author       = {{Scharlau, Ingrid}},
  issn         = {{0340-0727}},
  journal      = {{Psychological Research}},
  keywords     = {{response bias, temporal order tasks, attention manipulation, masked primes, perceptual latency priming, Adult, Attention, Discrimination Learning, Female, Humans, Male, Memory, Short-Term, Orientation, Pattern Recognition, Visual, Perceptual Masking, Psychomotor Performance, Psychophysics, Reaction Time, Serial Learning, Attention, Latent Learning, Priming, Response Bias, Visual Perception, Response Latency, Temporal Order (Judgment)}},
  number       = {{4}},
  pages        = {{224 -- 236}},
  title        = {{{Evidence against response bias in temporal order tasks with attention manipulation by masked primes.}}},
  volume       = {{68}},
  year         = {{2004}},
}

@inbook{5667,
  abstract     = {{Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}},
  keywords     = {{Internet Voting, Online polls, E-Democracy, Security}},
  pages        = {{1017--1021}},
  publisher    = {{IADIS Press}},
  title        = {{{E-Democracy: Internet Voting}}},
  year         = {{2003}},
}

@inproceedings{5668,
  abstract     = {{Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{6. Internationale Tagung Wirtschaftsinformatik}},
  keywords     = {{Internet-Wahlen, E-Democracy, Sicherheit, Kryptographie}},
  pages        = {{937--956}},
  title        = {{{Internet-Wahlen}}},
  year         = {{2003}},
}

@article{5623,
  abstract     = {{Mit dem elektronischen Papier wird in der Displayforschung ein neuer materialtechnologischer Ansatz verfolgt: Elektronisches Papier besteht aus einer dünnen, flexiblen Folie, in der farbige Pigmente mittels elektrischer Felder ausgerichtet werden. Die Vorteile gegenüber traditionellen Technologien wie beispielsweise LCD-Displays bestehen zum einen in niedrigeren Herstellungskosten (niedrigere Produktionskosten und geringere Materialkosten) und einem geringeren Gewicht. Zum anderen entsteht eine bessere Lesbarkeit, da sich Reflexion, Kontrast und mögliche Betrachtungswinkel verbessern bzw. vergrößern. Diese Potenziale können bei Anzeigetafeln, Computerdisplays und mobilen Endgeräten ausgeschöpft werden. Mit der Eigenschaft, fast beliebige Materialien als Trägermedium zu verwenden, öffnet sich auch die Anwendungsmöglichkeit des biegsamen, elektronischen Mediums für Zeitungen und Zeitschriften. Die US-Unternehmen E Ink und Gyricon Media bieten eine zunehmend größere Produktpalette mit elektronischem Papier an.}},
  author       = {{Schryen, Guido and Karla, Jürgen}},
  journal      = {{Wirtschaftsinformatik}},
  keywords     = {{Elektronisches Papier, Elektronische Tinte, E Ink, Gyricon Media, Displays, Mobile Endger{\}},
  number       = {{6}},
  pages        = {{567--574}},
  publisher    = {{Springer}},
  title        = {{{Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum}}},
  volume       = {{44}},
  year         = {{2002}},
}

