[{"publication":"Attention, Perception, & Psychophysics","abstract":[{"lang":"eng","text":"When two targets are presented in rapid succession, the first target (T1) is usually identified, but the second target (T2) is often missed. A remarkable exception to this 'attentional blink' occurs when T2 immediately follows the first T1, at lag 1. It is then often spared but reported in the wrong order—that is, before T1. These order reversals have led to the hypothesis that 'lag 1 sparing' occurs because the two targets merge into a single episodic representation. Here, we report evidence consistent with an alternative theory: T2 receives more attention than T1, leading to prior entry into working memory. Two experiments showed that the more T2 performance exceeded that for T1, the more order reversals were made. Furthermore, precuing T1 led to a shift in performance benefits from T2 to T1 and to an equivalent reduction in order reversals. We conclude that it is not necessary to assume episodic integration to explain lag 1 sparing or the accompanying order reversals. (PsycINFO Dat"}],"language":[{"iso":"eng"}],"keyword":["attentional blink","order reversals","prior entry","working memory","visual attention","attentional performance","Adolescent","Adult","Attention","Attentional Blink","Color Perception","Cues","Discrimination (Psychology)","Female","Humans","Male","Memory","Short-Term","Pattern Recognition","Visual","Psychophysics","Reaction Time","Reversal Learning","Sensory Gating","Serial Learning","Young Adult","Eyeblink Reflex","Stimulus Change","Stimulus Parameters","Visual Attention","Attentional Blink","Short Term Memory"],"issue":"1","year":"2011","date_created":"2018-12-10T07:06:31Z","title":"Prior entry explains order reversals in the attentional blink.","type":"journal_article","status":"public","user_id":"42165","department":[{"_id":"424"}],"_id":"6082","funded_apc":"1","publication_status":"published","publication_identifier":{"issn":["1943-3921"]},"citation":{"ama":"Olivers CNL, Hilkenmeier F, Scharlau I. Prior entry explains order reversals in the attentional blink. <i>Attention, Perception, &#38; Psychophysics</i>. 2011;73(1):53-67.","chicago":"Olivers, Christian N. L., Frederic Hilkenmeier, and Ingrid Scharlau. “Prior Entry Explains Order Reversals in the Attentional Blink.” <i>Attention, Perception, &#38; Psychophysics</i> 73, no. 1 (2011): 53–67.","ieee":"C. N. L. Olivers, F. Hilkenmeier, and I. Scharlau, “Prior entry explains order reversals in the attentional blink.,” <i>Attention, Perception, &#38; Psychophysics</i>, vol. 73, no. 1, pp. 53–67, 2011.","apa":"Olivers, C. N. L., Hilkenmeier, F., &#38; Scharlau, I. (2011). Prior entry explains order reversals in the attentional blink. <i>Attention, Perception, &#38; Psychophysics</i>, <i>73</i>(1), 53–67.","short":"C.N.L. Olivers, F. Hilkenmeier, I. Scharlau, Attention, Perception, &#38; Psychophysics 73 (2011) 53–67.","mla":"Olivers, Christian N. L., et al. “Prior Entry Explains Order Reversals in the Attentional Blink.” <i>Attention, Perception, &#38; Psychophysics</i>, vol. 73, no. 1, 2011, pp. 53–67.","bibtex":"@article{Olivers_Hilkenmeier_Scharlau_2011, title={Prior entry explains order reversals in the attentional blink.}, volume={73}, number={1}, journal={Attention, Perception, &#38; Psychophysics}, author={Olivers, Christian N. L. and Hilkenmeier, Frederic and Scharlau, Ingrid}, year={2011}, pages={53–67} }"},"page":"53 - 67","intvolume":"        73","author":[{"full_name":"Olivers, Christian N. L.","last_name":"Olivers","first_name":"Christian N. L."},{"last_name":"Hilkenmeier","full_name":"Hilkenmeier, Frederic","first_name":"Frederic"},{"first_name":"Ingrid","orcid":"0000-0003-2364-9489","last_name":"Scharlau","id":"451","full_name":"Scharlau, Ingrid"}],"volume":73,"oa":"1","date_updated":"2022-06-07T00:16:50Z","main_file_link":[{"url":"https://kw.uni-paderborn.de/fileadmin/fakultaet/Institute/psychologie/Kognitive_Psychologie/Publikationen/Olivers_etal__2011__AP_PProofs.pdf","open_access":"1"}]},{"keyword":["acoustic packaging","mother-child interaction","social learning","multimodal grounding in input","ecology of interactions","synchrony"],"language":[{"iso":"eng"}],"_id":"17246","user_id":"14931","department":[{"_id":"749"}],"status":"public","type":"journal_article","publication":"IEEE Transactions on Autonomous Mental Development","title":"Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds","doi":"10.1109/TAMD.2011.2140113","date_updated":"2023-02-01T12:54:33Z","publisher":"Institute of Electrical & Electronics Engineers (IEEE)","date_created":"2020-06-24T13:02:12Z","author":[{"last_name":"Nomikou","full_name":"Nomikou, Iris","first_name":"Iris"},{"first_name":"Katharina","full_name":"Rohlfing, Katharina","id":"50352","last_name":"Rohlfing"}],"volume":3,"year":"2011","citation":{"apa":"Nomikou, I., &#38; Rohlfing, K. (2011). Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds. <i>IEEE Transactions on Autonomous Mental Development</i>, <i>3</i>(2), 113–128. <a href=\"https://doi.org/10.1109/TAMD.2011.2140113\">https://doi.org/10.1109/TAMD.2011.2140113</a>","bibtex":"@article{Nomikou_Rohlfing_2011, title={Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds}, volume={3}, DOI={<a href=\"https://doi.org/10.1109/TAMD.2011.2140113\">10.1109/TAMD.2011.2140113</a>}, number={2}, journal={IEEE Transactions on Autonomous Mental Development}, publisher={Institute of Electrical &#38; Electronics Engineers (IEEE)}, author={Nomikou, Iris and Rohlfing, Katharina}, year={2011}, pages={113–128} }","short":"I. Nomikou, K. Rohlfing, IEEE Transactions on Autonomous Mental Development 3 (2011) 113–128.","mla":"Nomikou, Iris, and Katharina Rohlfing. “Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds.” <i>IEEE Transactions on Autonomous Mental Development</i>, vol. 3, no. 2, Institute of Electrical &#38; Electronics Engineers (IEEE), 2011, pp. 113–28, doi:<a href=\"https://doi.org/10.1109/TAMD.2011.2140113\">10.1109/TAMD.2011.2140113</a>.","chicago":"Nomikou, Iris, and Katharina Rohlfing. “Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds.” <i>IEEE Transactions on Autonomous Mental Development</i> 3, no. 2 (2011): 113–28. <a href=\"https://doi.org/10.1109/TAMD.2011.2140113\">https://doi.org/10.1109/TAMD.2011.2140113</a>.","ieee":"I. Nomikou and K. Rohlfing, “Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds,” <i>IEEE Transactions on Autonomous Mental Development</i>, vol. 3, no. 2, pp. 113–128, 2011, doi: <a href=\"https://doi.org/10.1109/TAMD.2011.2140113\">10.1109/TAMD.2011.2140113</a>.","ama":"Nomikou I, Rohlfing K. Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds. <i>IEEE Transactions on Autonomous Mental Development</i>. 2011;3(2):113-128. doi:<a href=\"https://doi.org/10.1109/TAMD.2011.2140113\">10.1109/TAMD.2011.2140113</a>"},"page":"113-128","intvolume":"         3","publication_identifier":{"issn":["1943-0612"]},"issue":"2"},{"date_updated":"2022-01-06T07:01:04Z","date_created":"2018-09-18T11:50:40Z","author":[{"first_name":"Tobias","last_name":"Jenert","full_name":"Jenert, Tobias"},{"first_name":"Anja","full_name":"Gebhardt, Anja","last_name":"Gebhardt"}],"title":"Zugänge zum Begriff der Lernkultur: Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen","year":"2010","citation":{"bibtex":"@book{Jenert_Gebhardt_2010, title={Zugänge zum Begriff der Lernkultur: Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen}, author={Jenert, Tobias and Gebhardt, Anja}, year={2010} }","short":"T. Jenert, A. Gebhardt, Zugänge Zum Begriff Der Lernkultur: Eine Systematisierung Auf Basis Kultur-Und Lerntheoretischer Überlegungen, 2010.","mla":"Jenert, Tobias, and Anja Gebhardt. <i>Zugänge Zum Begriff Der Lernkultur: Eine Systematisierung Auf Basis Kultur-Und Lerntheoretischer Überlegungen</i>. 2010.","apa":"Jenert, T., &#38; Gebhardt, A. (2010). <i>Zugänge zum Begriff der Lernkultur: Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen</i>.","ama":"Jenert T, Gebhardt A. <i>Zugänge Zum Begriff Der Lernkultur: Eine Systematisierung Auf Basis Kultur-Und Lerntheoretischer Überlegungen</i>.; 2010.","ieee":"T. Jenert and A. Gebhardt, <i>Zugänge zum Begriff der Lernkultur: Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen</i>. 2010.","chicago":"Jenert, Tobias, and Anja Gebhardt. <i>Zugänge Zum Begriff Der Lernkultur: Eine Systematisierung Auf Basis Kultur-Und Lerntheoretischer Überlegungen</i>, 2010."},"_id":"4448","user_id":"51057","department":[{"_id":"208"},{"_id":"282"}],"keyword":["Lernkultur","learning culture","culture theory","approaches to learning culture","culture of learning"],"extern":"1","type":"report","abstract":[{"text":"\"Lernkultur\" wird als Begriff häufig gebraucht und fast ebenso häufig definiert  das gilt für den betrieblichen Kontext ebenso wie für die Bereiche der Schul-, Hochschul-, Berufs- und Erwachsenenbildung (z. B. Wulf, Althans, Blaschke, Ferrin, Göhlich, Jörissen, Mattig et al., 2007; Jenert, Zellweger Moser, Dommen & Gebhardt, 2009; Kirchhöfer, 2004; Erpenbeck & Sauer, 2000). Trotz der grossen Aufmerksamkeit, die der Begriff in den letzten zwei Jahrzehnten erfahren hat, kann man nicht von einem in sich geschlossenen Forschungsprogramm sprechen. Die Zugänge zum Phänomenbereich Lernkultur sind ebenso vielfältig wie die hinter einzelnen Ansätzen stehenden Lernkulturkonstrukte. Den Autoren ist keine Publikation bekannt, welche unterschiedliche Ansätze der Lernkulturforschung systematisch aufarbeitet. Eine wichtige Referenzquelle ist der Bericht von Kuh und Whitt (1988) \"The Invisible Tapestry: Culture in American Colleges and Universities\". Ausgehend von einer fundierten Übersicht zu unterschiedlichen Zugängen zum Kulturbegriff (oft in starker Anlehnung an die Organisationskulturforschung (vgl. Allaire & Firsirotu, 1984)) stellen die Autoren ein Rahmenmodell zur Analyse von Hochschulkulturen vor (Kuh und Whitt, 1988, S. 56). Diese Arbeit erweist sich für ein besseres Verständnis unter-schiedlicher Zugänge zum Lernkulturbegriff als aufschlussreich, weil im Kontext Hoch-schule zwangsweise viele Aspekte des Lernens und Lehrens angesprochen werden. Allerdings fokussiert auch dieser Bericht nicht das Konstrukt der Lernkultur und bietet damit nur einen Ausgangspunkt für die Identifizierung unterschiedlicher Zugänge.","lang":"ger"}],"status":"public"},{"status":"public","publication":"Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning","type":"conference","language":[{"iso":"eng"}],"keyword":["tutoring interaction","social interaction","video signal processing","robot systems","paediatrics","neurophysiology","Learning","infant","feedback","biology computing","cognitive capabilities","cognition","children"],"department":[{"_id":"749"}],"user_id":"14931","_id":"17253","page":"76-81","citation":{"ieee":"A.-L. Vollmer, K. Pitsch, K. S. Lohan, J. Fritsch, K. Rohlfing, and B. Wrede, “Developing feedback: How children of different age contribute to a tutoring interaction with adults,” in <i>Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>, 2010, pp. 76–81.","chicago":"Vollmer, Anna-Lisa, Karola Pitsch, Katrin Solveig Lohan, Jannik Fritsch, Katharina Rohlfing, and Britta Wrede. “Developing Feedback: How Children of Different Age Contribute to a Tutoring Interaction with Adults.” In <i>Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>, 76–81, 2010.","ama":"Vollmer A-L, Pitsch K, Lohan KS, Fritsch J, Rohlfing K, Wrede B. Developing feedback: How children of different age contribute to a tutoring interaction with adults. In: <i>Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>. ; 2010:76-81.","apa":"Vollmer, A.-L., Pitsch, K., Lohan, K. S., Fritsch, J., Rohlfing, K., &#38; Wrede, B. (2010). Developing feedback: How children of different age contribute to a tutoring interaction with adults. <i>Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>, 76–81.","bibtex":"@inproceedings{Vollmer_Pitsch_Lohan_Fritsch_Rohlfing_Wrede_2010, title={Developing feedback: How children of different age contribute to a tutoring interaction with adults}, booktitle={Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning}, author={Vollmer, Anna-Lisa and Pitsch, Karola and Lohan, Katrin Solveig and Fritsch, Jannik and Rohlfing, Katharina and Wrede, Britta}, year={2010}, pages={76–81} }","short":"A.-L. Vollmer, K. Pitsch, K.S. Lohan, J. Fritsch, K. Rohlfing, B. Wrede, in: Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning, 2010, pp. 76–81.","mla":"Vollmer, Anna-Lisa, et al. “Developing Feedback: How Children of Different Age Contribute to a Tutoring Interaction with Adults.” <i>Development and Learning (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>, 2010, pp. 76–81."},"year":"2010","title":"Developing feedback: How children of different age contribute to a tutoring interaction with adults","date_created":"2020-06-24T13:02:20Z","author":[{"first_name":"Anna-Lisa","full_name":"Vollmer, Anna-Lisa","last_name":"Vollmer"},{"first_name":"Karola","last_name":"Pitsch","full_name":"Pitsch, Karola"},{"first_name":"Katrin Solveig","full_name":"Lohan, Katrin Solveig","last_name":"Lohan"},{"first_name":"Jannik","last_name":"Fritsch","full_name":"Fritsch, Jannik"},{"last_name":"Rohlfing","full_name":"Rohlfing, Katharina","id":"50352","first_name":"Katharina"},{"full_name":"Wrede, Britta","last_name":"Wrede","first_name":"Britta"}],"date_updated":"2023-02-01T13:00:15Z"},{"year":"2009","citation":{"apa":"Jenert, T., Zellweger, F., Dommen, J., &#38; Gebhardt, A. (2009). <i>Lernkulturen an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller, pädagogischer und organisationaler Perspektive</i>.","short":"T. Jenert, F. Zellweger, J. Dommen, A. Gebhardt, Lernkulturen an Hochschulen: Theoretische Überlegungen Zur Betrachtung Studentischen Lernens Unter Individueller, Pädagogischer Und Organisationaler Perspektive, 2009.","mla":"Jenert, Tobias, et al. <i>Lernkulturen an Hochschulen: Theoretische Überlegungen Zur Betrachtung Studentischen Lernens Unter Individueller, Pädagogischer Und Organisationaler Perspektive</i>. 2009.","bibtex":"@book{Jenert_Zellweger_Dommen_Gebhardt_2009, title={Lernkulturen an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller, pädagogischer und organisationaler Perspektive}, author={Jenert, Tobias and Zellweger, Franziska and Dommen, Jenny and Gebhardt, Anja}, year={2009} }","ama":"Jenert T, Zellweger F, Dommen J, Gebhardt A. <i>Lernkulturen an Hochschulen: Theoretische Überlegungen Zur Betrachtung Studentischen Lernens Unter Individueller, Pädagogischer Und Organisationaler Perspektive</i>.; 2009.","chicago":"Jenert, Tobias, Franziska Zellweger, Jenny Dommen, and Anja Gebhardt. <i>Lernkulturen an Hochschulen: Theoretische Überlegungen Zur Betrachtung Studentischen Lernens Unter Individueller, Pädagogischer Und Organisationaler Perspektive</i>, 2009.","ieee":"T. Jenert, F. Zellweger, J. Dommen, and A. Gebhardt, <i>Lernkulturen an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller, pädagogischer und organisationaler Perspektive</i>. 2009."},"title":"Lernkulturen an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller, pädagogischer und organisationaler Perspektive","date_updated":"2022-01-06T07:01:05Z","author":[{"full_name":"Jenert, Tobias","id":"71994","orcid":" https://orcid.org/0000-0001-9262-5646","last_name":"Jenert","first_name":"Tobias"},{"last_name":"Zellweger","full_name":"Zellweger, Franziska","first_name":"Franziska"},{"full_name":"Dommen, Jenny","last_name":"Dommen","first_name":"Jenny"},{"last_name":"Gebhardt","full_name":"Gebhardt, Anja","first_name":"Anja"}],"date_created":"2018-09-18T11:55:39Z","status":"public","type":"report","keyword":["Lernkultur","Hochschule","HEI","learning culture","higher education","teaching and learning","Hochschullehre"],"extern":"1","_id":"4450","user_id":"51057","department":[{"_id":"208"},{"_id":"282"}]},{"publication":"IEEE Transactions on Information Forensics \\& Security","file":[{"date_created":"2018-12-18T13:16:07Z","creator":"hsiemes","date_updated":"2018-12-18T13:16:07Z","file_id":"6316","access_level":"open_access","file_name":"JOURNAL VERSION.pdf","file_size":1544790,"content_type":"application/pdf","relation":"main_file"}],"abstract":[{"lang":"eng","text":"Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence."}],"language":[{"iso":"eng"}],"keyword":["e-voting","Internet voting","Internet election","security","verifiability","RIES","Estonia","Neuch{\\^a}tel"],"ddc":["000"],"issue":"4 Part","year":"2009","date_created":"2018-11-14T14:06:44Z","publisher":"IEEE","title":"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland","type":"journal_article","status":"public","department":[{"_id":"277"}],"user_id":"61579","_id":"5621","file_date_updated":"2018-12-18T13:16:07Z","extern":"1","has_accepted_license":"1","intvolume":"         4","page":"729-744","citation":{"ama":"Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>. 2009;4(4 Part):729-744.","chicago":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i> 4, no. 4 Part (2009): 729–44.","ieee":"G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744, 2009.","bibtex":"@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \\&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }","short":"G. Schryen, E. Rich, IEEE Transactions on Information Forensics \\&#38; Security 4 (2009) 729–744.","mla":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.","apa":"Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, <i>4</i>(4 Part), 729–744."},"volume":4,"author":[{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"full_name":"Rich, Eliot","last_name":"Rich","first_name":"Eliot"}],"date_updated":"2022-01-06T07:02:12Z","oa":"1"},{"publisher":"IEEE","date_updated":"2023-02-01T13:06:43Z","date_created":"2020-06-24T13:02:43Z","author":[{"first_name":"Anna-Lisa","last_name":"Vollmer","full_name":"Vollmer, Anna-Lisa"},{"full_name":"Lohan, Katrin Solveig","last_name":"Lohan","first_name":"Katrin Solveig"},{"first_name":"Kerstin","full_name":"Fischer, Kerstin","last_name":"Fischer"},{"first_name":"Yukie","last_name":"Nagai","full_name":"Nagai, Yukie"},{"last_name":"Pitsch","full_name":"Pitsch, Karola","first_name":"Karola"},{"first_name":"Jannik","last_name":"Fritsch","full_name":"Fritsch, Jannik"},{"last_name":"Rohlfing","full_name":"Rohlfing, Katharina","id":"50352","first_name":"Katharina"},{"first_name":"Britta","full_name":"Wrede, Britta","last_name":"Wrede"}],"title":"People modify their tutoring behavior in robot-directed interaction for action learning","doi":"10.1109/DEVLRN.2009.5175516","year":"2009","page":"1-6","citation":{"ieee":"A.-L. Vollmer <i>et al.</i>, “People modify their tutoring behavior in robot-directed interaction for action learning,” in <i>Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>, 2009, pp. 1–6, doi: <a href=\"https://doi.org/10.1109/DEVLRN.2009.5175516\">10.1109/DEVLRN.2009.5175516</a>.","chicago":"Vollmer, Anna-Lisa, Katrin Solveig Lohan, Kerstin Fischer, Yukie Nagai, Karola Pitsch, Jannik Fritsch, Katharina Rohlfing, and Britta Wrede. “People Modify Their Tutoring Behavior in Robot-Directed Interaction for Action Learning.” In <i>Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>, 1–6. IEEE, 2009. <a href=\"https://doi.org/10.1109/DEVLRN.2009.5175516\">https://doi.org/10.1109/DEVLRN.2009.5175516</a>.","bibtex":"@inproceedings{Vollmer_Lohan_Fischer_Nagai_Pitsch_Fritsch_Rohlfing_Wrede_2009, title={People modify their tutoring behavior in robot-directed interaction for action learning}, DOI={<a href=\"https://doi.org/10.1109/DEVLRN.2009.5175516\">10.1109/DEVLRN.2009.5175516</a>}, booktitle={Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning}, publisher={IEEE}, author={Vollmer, Anna-Lisa and Lohan, Katrin Solveig and Fischer, Kerstin and Nagai, Yukie and Pitsch, Karola and Fritsch, Jannik and Rohlfing, Katharina and Wrede, Britta}, year={2009}, pages={1–6} }","mla":"Vollmer, Anna-Lisa, et al. “People Modify Their Tutoring Behavior in Robot-Directed Interaction for Action Learning.” <i>Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>, IEEE, 2009, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/DEVLRN.2009.5175516\">10.1109/DEVLRN.2009.5175516</a>.","short":"A.-L. Vollmer, K.S. Lohan, K. Fischer, Y. Nagai, K. Pitsch, J. Fritsch, K. Rohlfing, B. Wrede, in: Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning, IEEE, 2009, pp. 1–6.","ama":"Vollmer A-L, Lohan KS, Fischer K, et al. People modify their tutoring behavior in robot-directed interaction for action learning. In: <i>Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>. IEEE; 2009:1-6. doi:<a href=\"https://doi.org/10.1109/DEVLRN.2009.5175516\">10.1109/DEVLRN.2009.5175516</a>","apa":"Vollmer, A.-L., Lohan, K. S., Fischer, K., Nagai, Y., Pitsch, K., Fritsch, J., Rohlfing, K., &#38; Wrede, B. (2009). People modify their tutoring behavior in robot-directed interaction for action learning. <i>Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>, 1–6. <a href=\"https://doi.org/10.1109/DEVLRN.2009.5175516\">https://doi.org/10.1109/DEVLRN.2009.5175516</a>"},"_id":"17272","department":[{"_id":"749"}],"user_id":"14931","keyword":["robot simulation","hand movement velocity","robotic interaction partner","robotic agent","robot-directed interaction","multimodal analysis","Motionese","Motherese","intelligent tutoring systems","immature cognitive capability","human computer interaction","eye gaze","child-directed speech","child-directed motion","bottom-up system","bottom-up saliency-based attention model","adult-robot interaction","adult-child interaction","adult-adult interaction","human-robot interaction","action learning","social learning scenario","social robotics","software agents","top-down feedback structures","tutoring behavior"],"language":[{"iso":"eng"}],"publication":"Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference on Development and Learning","type":"conference","abstract":[{"lang":"eng","text":"In developmental research, tutoring behavior has been identified as scaffolding infants' learning processes. It has been defined in terms of child-directed speech (Motherese), child-directed motion (Motionese), and contingency. In the field of developmental robotics, research often assumes that in human-robot interaction (HRI), robots are treated similar to infants, because their immature cognitive capabilities benefit from this behavior. However, according to our knowledge, it has barely been studied whether this is true and how exactly humans alter their behavior towards a robotic interaction partner. In this paper, we present results concerning the acceptance of a robotic agent in a social learning scenario obtained via comparison to adults and 8-11 months old infants in equal conditions. These results constitute an important empirical basis for making use of tutoring behavior in social robotics. In our study, we performed a detailed multimodal analysis of HRI in a tutoring situation using the example of a robot simulation equipped with a bottom-up saliency-based attention model. Our results reveal significant differences in hand movement velocity, motion pauses, range of motion, and eye gaze suggesting that for example adults decrease their hand movement velocity in an Adult-Child Interaction (ACI), opposed to an Adult-Adult Interaction (AAI) and this decrease is even higher in the Adult-Robot Interaction (ARI). We also found important differences between ACI and ARI in how the behavior is modified over time as the interaction unfolds. These findings indicate the necessity of integrating top-down feedback structures into a bottom-up system for robots to be fully accepted as interaction partners."}],"status":"public"},{"extern":"1","alternative_title":["Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik DeLFI 2007"],"keyword":["E-Portfolios","Lerngemeinschaften","Praxisgemeinschaften","Projektgruppen","Hochschulstudium","informelles Lernen"],"department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","_id":"4494","status":"public","publication":"DeLFI Workshops","type":"conference","conference":{"start_date":"2007-09-17","name":"DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik e.V.","location":"Siegen","end_date":"2007-09-17"},"title":"Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.","date_created":"2018-09-19T09:08:18Z","author":[{"full_name":"Sporer, Thomas","last_name":"Sporer","first_name":"Thomas"},{"id":"71994","full_name":"Jenert, Tobias","last_name":"Jenert","orcid":" https://orcid.org/0000-0001-9262-5646","first_name":"Tobias"},{"first_name":"Bernhard","last_name":"Strehl","full_name":"Strehl, Bernhard"},{"full_name":"Noack, Patrick Ole","last_name":"Noack","first_name":"Patrick Ole"}],"date_updated":"2022-01-06T07:01:06Z","publisher":"Logos Verlag","page":"19--26","citation":{"chicago":"Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.","ieee":"T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI Workshops</i>, Siegen, 2007, pp. 19--26.","ama":"Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>. Logos Verlag; 2007:19--26.","apa":"Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag.","bibtex":"@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }","short":"T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos Verlag, 2007, pp. 19--26.","mla":"Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag, 2007, pp. 19--26."},"year":"2007"},{"extern":"1","alternative_title":["Information in Wissenschaft, Bildung und Wirtschaft"],"keyword":["Wissenschaftliches Arbeiten","Blended Learning","Tutoring"],"department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","_id":"4496","status":"public","publication":"Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis: Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis","type":"conference","conference":{"start_date":"2007-10-10","name":"29. Online-Tagung der DGI","location":"Frankfurt am Main ","end_date":"2007-10-12"},"title":"Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität Augsburg","volume":9,"date_created":"2018-09-19T09:17:23Z","author":[{"full_name":"Heinze, Nina","last_name":"Heinze","first_name":"Nina"},{"full_name":"Sporer, Thomas","last_name":"Sporer","first_name":"Thomas"},{"first_name":"Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","last_name":"Jenert","full_name":"Jenert, Tobias","id":"71994"}],"date_updated":"2022-01-06T07:01:06Z","page":"319-328","intvolume":"         9","citation":{"apa":"Heinze, N., Sporer, T., &#38; Jenert, T. (2007). Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität Augsburg. In <i>Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis: Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis</i> (Vol. 9, pp. 319–328). Frankfurt am Main .","short":"N. Heinze, T. Sporer, T. Jenert, in: Deutsche Gesellschaft Für Informationswissenschaft Und Informationspraxis: Tagungen Der Deutschen Gesellschaft Für Informationswissenschaft Und Informationspraxis, Frankfurt am Main , 2007, pp. 319–328.","bibtex":"@inproceedings{Heinze_Sporer_Jenert_2007, place={Frankfurt am Main }, title={Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität Augsburg}, volume={9}, booktitle={Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis: Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis}, author={Heinze, Nina and Sporer, Thomas and Jenert, Tobias}, year={2007}, pages={319–328} }","mla":"Heinze, Nina, et al. “Semivirtuelle Lernumgebung Zum Wissenschaftlichen Arbeiten Als Ergänzung Des Studienangebots Der Universität Augsburg.” <i>Deutsche Gesellschaft Für Informationswissenschaft Und Informationspraxis: Tagungen Der Deutschen Gesellschaft Für Informationswissenschaft Und Informationspraxis</i>, vol. 9, 2007, pp. 319–28.","ama":"Heinze N, Sporer T, Jenert T. Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität Augsburg. In: <i>Deutsche Gesellschaft Für Informationswissenschaft Und Informationspraxis: Tagungen Der Deutschen Gesellschaft Für Informationswissenschaft Und Informationspraxis</i>. Vol 9. Frankfurt am Main ; 2007:319-328.","chicago":"Heinze, Nina, Thomas Sporer, and Tobias Jenert. “Semivirtuelle Lernumgebung Zum Wissenschaftlichen Arbeiten Als Ergänzung Des Studienangebots Der Universität Augsburg.” In <i>Deutsche Gesellschaft Für Informationswissenschaft Und Informationspraxis: Tagungen Der Deutschen Gesellschaft Für Informationswissenschaft Und Informationspraxis</i>, 9:319–28. Frankfurt am Main , 2007.","ieee":"N. Heinze, T. Sporer, and T. Jenert, “Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität Augsburg,” in <i>Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis: Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis</i>, Frankfurt am Main , 2007, vol. 9, pp. 319–328."},"year":"2007","place":"Frankfurt am Main ","publication_identifier":{"isbn":["978-3-925474-60-6"]}},{"year":"2007","citation":{"chicago":"Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” 2007.","ieee":"T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta , 2007.","ama":"Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". In: ; 2007.","apa":"Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta .","mla":"Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"</i>. 2007.","bibtex":"@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"}, author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi}, year={2007} }","short":"T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007."},"title":"Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"","conference":{"name":"Second European Conference on Technology Enhanced Learning (EC-TEL) 2007","start_date":"2007-06-17","end_date":"2007-06-20 ","location":"Kreta "},"date_updated":"2022-01-06T07:01:06Z","date_created":"2018-09-19T09:22:02Z","author":[{"first_name":"Thomas","last_name":"Sporer","full_name":"Sporer, Thomas"},{"first_name":"Nina","last_name":"Heinze","full_name":"Heinze, Nina"},{"first_name":"Tobias","full_name":"Jenert, Tobias","id":"71994","orcid":" https://orcid.org/0000-0001-9262-5646","last_name":"Jenert"},{"full_name":"Reinmann, Gabi","last_name":"Reinmann","first_name":"Gabi"}],"status":"public","type":"conference","keyword":["Problem Solving Competencies","E-Portfolio"],"extern":"1","alternative_title":["Creating New Learning Experiences on a Global Scale"],"_id":"4497","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057"},{"issue":"2","year":"2007","date_created":"2018-11-14T14:51:41Z","title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)","abstract":[{"lang":"eng","text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment."}],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":100448,"file_id":"6324","access_level":"open_access","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","date_updated":"2018-12-18T13:25:12Z","creator":"hsiemes","date_created":"2018-12-18T13:25:12Z"}],"ddc":["000"],"keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"language":[{"iso":"eng"}],"has_accepted_license":"1","citation":{"apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }","short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90.","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.","ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>. 2007;3(2):66-90.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.","ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007."},"intvolume":"         3","page":"66-90","date_updated":"2022-01-06T07:02:22Z","oa":"1","author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"volume":3,"type":"journal_article","status":"public","_id":"5655","user_id":"61579","department":[{"_id":"277"}],"extern":"1","file_date_updated":"2018-12-18T13:25:12Z"},{"abstract":[{"text":"Robots have to deal with an enormous amount of sensory stimuli. One solution in making sense of them is to enable a robot system to actively search for cues that help structuring the information. Studies with infants reveal that parents support the learning-process by modifying their interaction style, dependent on their child's developmental age. In our study, in which parents demonstrated everyday actions to their preverbal children (8-11 months old), our aim was to identify objective parameters for multimodal action modification. Our results reveal two action parameters being modified in adult-child interaction: roundness and pace. Furthermore, we found that language has the power to help children structuring actions sequences by synchrony and emphasis. These insights are discussed with respect to the built-in attention architecture of a socially interactive robot, which enables it to understand demonstrated actions. Our algorithmic approach towards automatically detecting the task structure in child-designed input demonstrates the potential impact of insights from developmental learning on robotics. The presented findings pave the way to automatically detect when to imitate in a demonstration","lang":"eng"}],"publication":"Advanced Robotics","language":[{"iso":"eng"}],"keyword":["multi-modal motherese","child-directed input","motionese","learning mechanisms"],"year":"2006","issue":"10","title":"How can multimodal cues from child-directed interaction reduce learning complexity in robots?","date_created":"2020-06-24T13:03:02Z","publisher":"VSP BV","status":"public","type":"journal_article","department":[{"_id":"749"}],"user_id":"14931","_id":"17289","intvolume":"        20","page":"1183-1199","citation":{"chicago":"Rohlfing, Katharina, Jannik Fritsch, Britta Wrede, and Tanja Jungmann. “How Can Multimodal Cues from Child-Directed Interaction Reduce Learning Complexity in Robots?” <i>Advanced Robotics</i> 20, no. 10 (2006): 1183–99. <a href=\"https://doi.org/10.1163/156855306778522532\">https://doi.org/10.1163/156855306778522532</a>.","ieee":"K. Rohlfing, J. Fritsch, B. Wrede, and T. Jungmann, “How can multimodal cues from child-directed interaction reduce learning complexity in robots?,” <i>Advanced Robotics</i>, vol. 20, no. 10, pp. 1183–1199, 2006, doi: <a href=\"https://doi.org/10.1163/156855306778522532\">10.1163/156855306778522532</a>.","ama":"Rohlfing K, Fritsch J, Wrede B, Jungmann T. How can multimodal cues from child-directed interaction reduce learning complexity in robots? <i>Advanced Robotics</i>. 2006;20(10):1183-1199. doi:<a href=\"https://doi.org/10.1163/156855306778522532\">10.1163/156855306778522532</a>","bibtex":"@article{Rohlfing_Fritsch_Wrede_Jungmann_2006, title={How can multimodal cues from child-directed interaction reduce learning complexity in robots?}, volume={20}, DOI={<a href=\"https://doi.org/10.1163/156855306778522532\">10.1163/156855306778522532</a>}, number={10}, journal={Advanced Robotics}, publisher={VSP BV}, author={Rohlfing, Katharina and Fritsch, Jannik and Wrede, Britta and Jungmann, Tanja}, year={2006}, pages={1183–1199} }","short":"K. Rohlfing, J. Fritsch, B. Wrede, T. Jungmann, Advanced Robotics 20 (2006) 1183–1199.","mla":"Rohlfing, Katharina, et al. “How Can Multimodal Cues from Child-Directed Interaction Reduce Learning Complexity in Robots?” <i>Advanced Robotics</i>, vol. 20, no. 10, VSP BV, 2006, pp. 1183–99, doi:<a href=\"https://doi.org/10.1163/156855306778522532\">10.1163/156855306778522532</a>.","apa":"Rohlfing, K., Fritsch, J., Wrede, B., &#38; Jungmann, T. (2006). How can multimodal cues from child-directed interaction reduce learning complexity in robots? <i>Advanced Robotics</i>, <i>20</i>(10), 1183–1199. <a href=\"https://doi.org/10.1163/156855306778522532\">https://doi.org/10.1163/156855306778522532</a>"},"publication_identifier":{"issn":["1568-5535"]},"doi":"10.1163/156855306778522532","volume":20,"author":[{"first_name":"Katharina","last_name":"Rohlfing","id":"50352","full_name":"Rohlfing, Katharina"},{"last_name":"Fritsch","full_name":"Fritsch, Jannik","first_name":"Jannik"},{"last_name":"Wrede","full_name":"Wrede, Britta","first_name":"Britta"},{"first_name":"Tanja","last_name":"Jungmann","full_name":"Jungmann, Tanja"}],"date_updated":"2023-02-01T13:14:36Z"},{"has_accepted_license":"1","page":"37-41","citation":{"apa":"Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i> (pp. 37–41). Westpoint.","mla":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, Westpoint, 2005, pp. 37–41.","short":"G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41.","bibtex":"@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses}, booktitle={Proceedings of the 6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen, Guido}, year={2005}, pages={37–41} }","ieee":"G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 2005, pp. 37–41.","chicago":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 37–41. Westpoint, 2005.","ama":"Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>. Westpoint; 2005:37-41."},"oa":"1","date_updated":"2022-01-06T07:02:24Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"type":"conference","status":"public","_id":"5661","department":[{"_id":"277"}],"user_id":"61579","extern":"1","file_date_updated":"2018-12-18T13:31:41Z","year":"2005","publisher":"Westpoint","date_created":"2018-11-14T14:55:48Z","title":"An e-mail honeypot addressing spammers' behavior in collecting and applying addresses","publication":"Proceedings of the 6th IEEE Information Assurance Workshop","abstract":[{"text":"Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.","lang":"eng"}],"file":[{"file_name":"Schryen - An e-mail honeypot addressing spammers' behavior in collecting and applying addresses.pdf","access_level":"open_access","file_id":"6331","file_size":119362,"date_created":"2018-12-18T13:31:41Z","creator":"hsiemes","date_updated":"2018-12-18T13:31:41Z","relation":"main_file","content_type":"application/pdf"}],"keyword":["Spam","ham","e-mail","honeypot","address obscuring technique","address taxonomy"],"ddc":["000"],"language":[{"iso":"eng"}]},{"year":"2004","issue":"4","title":"Effektivität von Lösungsansätzen zur Bekämpfung von Spam","date_created":"2018-11-14T14:56:51Z","publisher":"Springer","file":[{"date_updated":"2018-12-18T13:36:34Z","creator":"hsiemes","date_created":"2018-12-18T13:36:34Z","file_size":288686,"access_level":"open_access","file_id":"6338","file_name":"Verlagsversion Guido_Schryen__281__288.pdf","content_type":"application/pdf","relation":"main_file"}],"abstract":[{"text":"Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam.","lang":"eng"}],"publication":"Wirtschaftsinformatik","language":[{"iso":"eng"}],"keyword":["Spam","E-Mail","Spoofing","Blockieren","Filtern","Lightweight Mail Transfer Agent Authentication Protocol (LMAP)"],"ddc":["000"],"page":"281-288","intvolume":"        46","citation":{"ama":"Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>. 2004;46(4):281-288.","ieee":"G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, pp. 281–288, 2004.","chicago":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.","bibtex":"@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido}, year={2004}, pages={281–288} }","short":"G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.","mla":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.","apa":"Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288."},"has_accepted_license":"1","volume":46,"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"date_updated":"2022-01-06T07:02:24Z","oa":"1","status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-18T13:36:34Z","department":[{"_id":"277"}],"user_id":"61579","_id":"5662"},{"title":"Fighting Spam: Motivating an Account-based Approach","date_created":"2018-11-14T14:59:03Z","publisher":"IADIS Press","year":"2004","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["e-mail","spam","filtering","blocking","LMAP","SMTP account"],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":46083,"file_id":"6333","access_level":"open_access","file_name":"Fighting Spam_Motivating an account-based approach.pdf","date_updated":"2018-12-18T13:33:30Z","creator":"hsiemes","date_created":"2018-12-18T13:33:30Z"}],"abstract":[{"lang":"eng","text":"Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted."}],"publication":"Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2","author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"date_updated":"2022-01-06T07:02:25Z","oa":"1","citation":{"ieee":"G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp. 937–940.","chicago":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.","ama":"Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.","apa":"Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.","short":"G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.","bibtex":"@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating an Account-based Approach}, booktitle={Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }","mla":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, IADIS Press, 2004, pp. 937–40."},"page":"937-940","place":"Madrid","has_accepted_license":"1","extern":"1","file_date_updated":"2018-12-18T13:33:30Z","user_id":"61579","department":[{"_id":"277"}],"_id":"5663","status":"public","editor":[{"last_name":"Isaias","full_name":"Isaias, Pedro","first_name":"Pedro"}],"type":"conference"},{"publication_status":"published","publication_identifier":{"issn":["0340-0727"]},"issue":"4","year":"2004","citation":{"ama":"Scharlau I. Evidence against response bias in temporal order tasks with attention manipulation by masked primes. <i>Psychological Research</i>. 2004;68(4):224-236.","chicago":"Scharlau, Ingrid. “Evidence against Response Bias in Temporal Order Tasks with Attention Manipulation by Masked Primes.” <i>Psychological Research</i> 68, no. 4 (2004): 224–36.","ieee":"I. Scharlau, “Evidence against response bias in temporal order tasks with attention manipulation by masked primes.,” <i>Psychological Research</i>, vol. 68, no. 4, pp. 224–236, 2004.","apa":"Scharlau, I. (2004). Evidence against response bias in temporal order tasks with attention manipulation by masked primes. <i>Psychological Research</i>, <i>68</i>(4), 224–236.","short":"I. Scharlau, Psychological Research 68 (2004) 224–236.","mla":"Scharlau, Ingrid. “Evidence against Response Bias in Temporal Order Tasks with Attention Manipulation by Masked Primes.” <i>Psychological Research</i>, vol. 68, no. 4, 2004, pp. 224–36.","bibtex":"@article{Scharlau_2004, title={Evidence against response bias in temporal order tasks with attention manipulation by masked primes.}, volume={68}, number={4}, journal={Psychological Research}, author={Scharlau, Ingrid}, year={2004}, pages={224–236} }"},"page":"224 - 236","intvolume":"        68","date_updated":"2022-06-07T00:25:03Z","oa":"1","author":[{"full_name":"Scharlau, Ingrid","id":"451","last_name":"Scharlau","orcid":"0000-0003-2364-9489","first_name":"Ingrid"}],"date_created":"2018-12-10T07:03:30Z","volume":68,"title":"Evidence against response bias in temporal order tasks with attention manipulation by masked primes.","main_file_link":[{"open_access":"1","url":"https://kw.uni-paderborn.de/fileadmin/fakultaet/Institute/psychologie/Kognitive_Psychologie/Publikationen/Scharlau2004PsychResResponseBiasFinal.pdf"}],"type":"journal_article","publication":"Psychological Research","abstract":[{"lang":"eng","text":"Attending to a location shortens the perceptual latency of stimuli appearing at this location (perceptual latency priming). According to attentional explanations, perceptual latency priming relies on the speeded transfer of attended visual information into an internal model. However, doubts about the attentional origin have repeatedly been raised because efforts to minimize response bias have been insufficient in most studies. Five experiments investigated the contribution of a response bias to perceptual latency priming (judgment bias due to the two-alternative forced-choice method and due to the existence of the prime, criterion effects or second-order bias, sensorimotor priming). If any, only small response biases were found. The results thus support the attentional explanation. (PsycINFO Database Record (c) 2016 APA, all rights reserved)"}],"status":"public","_id":"6068","user_id":"42165","department":[{"_id":"424"}],"keyword":["response bias","temporal order tasks","attention manipulation","masked primes","perceptual latency priming","Adult","Attention","Discrimination Learning","Female","Humans","Male","Memory","Short-Term","Orientation","Pattern Recognition","Visual","Perceptual Masking","Psychomotor Performance","Psychophysics","Reaction Time","Serial Learning","Attention","Latent Learning","Priming","Response Bias","Visual Perception","Response Latency","Temporal Order (Judgment)"],"extern":"1","language":[{"iso":"eng"}]},{"author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T15:01:49Z","publisher":"IADIS Press","date_updated":"2022-01-06T07:02:25Z","title":"E-Democracy: Internet Voting","page":"1017-1021","citation":{"ama":"Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.","chicago":"Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve: IADIS Press, 2003.","ieee":"G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press, 2003, pp. 1017–1021.","apa":"Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021). Algarve: IADIS Press.","bibtex":"@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting}, booktitle={Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021} }","mla":"Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp. 1017–21.","short":"G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021."},"year":"2003","place":"Algarve","department":[{"_id":"277"}],"user_id":"61579","_id":"5667","language":[{"iso":"eng"}],"extern":"1","keyword":["Internet Voting","Online polls","E-Democracy","Security"],"publication":"Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2","type":"book_chapter","status":"public","abstract":[{"text":"Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out.","lang":"eng"}]},{"author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T15:03:15Z","date_updated":"2022-01-06T07:02:26Z","oa":"1","title":"Internet-Wahlen","has_accepted_license":"1","citation":{"short":"G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–956.","mla":"Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–56.","bibtex":"@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956} }","apa":"Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i> (pp. 937–956).","chicago":"Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 937–56, 2003.","ieee":"G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>, 2003, pp. 937–956.","ama":"Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>. ; 2003:937-956."},"page":"937-956","year":"2003","user_id":"61579","department":[{"_id":"277"}],"_id":"5668","file_date_updated":"2018-12-18T13:40:14Z","language":[{"iso":"eng"}],"extern":"1","ddc":["000"],"keyword":["Internet-Wahlen","E-Democracy","Sicherheit","Kryptographie"],"type":"conference","publication":"6. Internationale Tagung Wirtschaftsinformatik","file":[{"relation":"main_file","content_type":"application/pdf","file_size":364380,"access_level":"open_access","file_name":"Schryen - Internet-Wahlen.pdf","file_id":"6340","date_updated":"2018-12-18T13:40:14Z","creator":"hsiemes","date_created":"2018-12-18T13:40:14Z"}],"status":"public","abstract":[{"lang":"eng","text":"Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen."}]},{"date_created":"2018-11-14T14:08:02Z","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"},{"first_name":"Jürgen","last_name":"Karla","full_name":"Karla, Jürgen"}],"volume":44,"oa":"1","date_updated":"2022-01-06T07:02:12Z","publisher":"Springer","title":"Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum","issue":"6","has_accepted_license":"1","citation":{"ieee":"G. Schryen and J. Karla, “Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum,” <i>Wirtschaftsinformatik</i>, vol. 44, no. 6, pp. 567–574, 2002.","chicago":"Schryen, Guido, and Jürgen Karla. “Elektronisches Papier - Display-Technologie Mit Weitem Anwendungsspektrum.” <i>Wirtschaftsinformatik</i> 44, no. 6 (2002): 567–74.","ama":"Schryen G, Karla J. Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum. <i>Wirtschaftsinformatik</i>. 2002;44(6):567-574.","mla":"Schryen, Guido, and Jürgen Karla. “Elektronisches Papier - Display-Technologie Mit Weitem Anwendungsspektrum.” <i>Wirtschaftsinformatik</i>, vol. 44, no. 6, Springer, 2002, pp. 567–74.","bibtex":"@article{Schryen_Karla_2002, title={Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum}, volume={44}, number={6}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido and Karla, Jürgen}, year={2002}, pages={567–574} }","short":"G. Schryen, J. Karla, Wirtschaftsinformatik 44 (2002) 567–574.","apa":"Schryen, G., &#38; Karla, J. (2002). Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum. <i>Wirtschaftsinformatik</i>, <i>44</i>(6), 567–574."},"page":"567-574","intvolume":"        44","year":"2002","user_id":"61579","department":[{"_id":"277"}],"_id":"5623","language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:43:09Z","extern":"1","ddc":["000"],"keyword":["Elektronisches Papier","Elektronische Tinte","E Ink","Gyricon Media","Displays","Mobile Endger{\\"],"type":"journal_article","publication":"Wirtschaftsinformatik","file":[{"file_id":"6344","access_level":"open_access","file_name":"Schryen Karla - ElektronischesPapier.pdf","file_size":415354,"date_created":"2018-12-18T13:43:09Z","creator":"hsiemes","date_updated":"2018-12-18T13:43:09Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"text":"Mit dem elektronischen Papier wird in der Displayforschung ein neuer materialtechnologischer Ansatz verfolgt: Elektronisches Papier besteht aus einer dünnen, flexiblen Folie, in der farbige Pigmente mittels elektrischer Felder ausgerichtet werden. Die Vorteile gegenüber traditionellen Technologien wie beispielsweise LCD-Displays bestehen zum einen in niedrigeren Herstellungskosten (niedrigere Produktionskosten und geringere Materialkosten) und einem geringeren Gewicht. Zum anderen entsteht eine bessere Lesbarkeit, da sich Reflexion, Kontrast und mögliche Betrachtungswinkel verbessern bzw. vergrößern. Diese Potenziale können bei Anzeigetafeln, Computerdisplays und mobilen Endgeräten ausgeschöpft werden. Mit der Eigenschaft, fast beliebige Materialien als Trägermedium zu verwenden, öffnet sich auch die Anwendungsmöglichkeit des biegsamen, elektronischen Mediums für Zeitungen und Zeitschriften. Die US-Unternehmen E Ink und Gyricon Media bieten eine zunehmend größere Produktpalette mit elektronischem Papier an.","lang":"eng"}]}]
