@article{29246,
  abstract     = {{<jats:p>Openness in science and education is increasing in importance within the digital knowledge society. So far, less attention has been paid to teaching Open Science in bachelor’s degrees or in qualitative methods. Therefore, the aim of this article is to use a seminar example to explore what Open Science practices can be taught in qualitative research and how digital tools can be involved. The seminar focused on the following practices: Open data practices, the practice of using the free and open source tool “Collaborative online Interpretation, the practice of participating, cooperating, collaborating and contributing through participatory technologies and in social (based) networks. To learn Open Science practices, the students were involved in a qualitative research project about “Use of digital technologies for the study and habitus of students”. The study shows the practices of Open Data are easy to teach, whereas the use of free and open source tools and participatory technologies for collaboration, participation, cooperation and contribution is more difficult. In addition, a cultural shift would have to take place within German universities to promote Open Science practices in general.</jats:p>}},
  author       = {{Steinhardt, Isabel}},
  issn         = {{0167-8329}},
  journal      = {{Education for Information}},
  keywords     = {{Open Science, Open Education Practices, Library and Information Sciences, Education, Information Systems}},
  number       = {{3}},
  pages        = {{263--279}},
  publisher    = {{IOS Press}},
  title        = {{{Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar}}},
  doi          = {{10.3233/efi-190308}},
  volume       = {{36}},
  year         = {{2020}},
}

@article{33299,
  abstract     = {{The aim of this study was to find out whether teaching how to search for literature
would be more beneficial to students and teachers if done online through short videos
rather than in person during course time. To find out whether online videos are more
beneficial, two courses were asked to fill in questionnaires, one at the beginning and
one at the end of the semester. One of the courses received the input online via videos
and were given an exercise to put the newly learned skills to use, the other course
served as a control group and learned how to search for literature during the course.
The results show that while the difference between the two groups is not significant,
the videos can still be regarded as being more beneficial than teaching the necessary
skills during course time.}},
  author       = {{Hahn, Charlotte Anna}},
  issn         = {{ISSN 2199-8825}},
  journal      = {{die hochschullehre}},
  keywords     = {{E-Learning, information competence, literature, library, research}},
  number       = {{6}},
  title        = {{{Informationskompetenz durch E-Learning? Durch Lernvideos nach Literatur suchen}}},
  year         = {{2020}},
}

@techreport{13137,
  abstract     = {{Non-GAAP reporting is under debate as managers may opportunistically inflate non-GAAP earnings. By separating firms into groups based on exclusions of recurring expenses before material restatements occur this paper investigates whether market participants are misled based on ex-ante non-GAAP reporting. The results show a decline in cumulative abnormal returns (–11.8% aggressive non-GAAP Reporting vs. –2.7% non-aggressive non-GAAP reporting), reduction in overvaluation (–22.18% vs. no decline) and losses in the earnings response coefficient (–51.8% vs. no significant decline) for firms with prior aggressive non-GAAP reporting. Further, we document that investors are less responsive to aggressively reported non-GAAP earnings ex-post, indicating that increased attention enhances investor’s ability to see through the quality of non-GAAP exclusions. }},
  author       = {{Müller, Jens and Sievers, Sönke and Mehring, Oliver and Sofilkanitsch, Christian}},
  keywords     = {{Keywords: non-GAAP reporting, restatements, information content of earnings, firm value, overvaluation}},
  pages        = {{65}},
  title        = {{{Non-GAAP Reporting and Investor Attention: Are Investors Misled by Exclusions of Recurring Expenses from Non-GAAP Earnings before Restatement Announcements?}}},
  year         = {{2019}},
}

@inproceedings{8538,
  abstract     = {{This paper explores Finnish, German and Swedish older adults’ perceptions of a future welfare service with increased use of welfare technologies, specifically care robots. The issues are the rapid digitalization and development of health and welfare technology, which presently is mainly technology driven (not need or user driven), and the demographic challenge. The aim of the study was to explore older adults’ perception of the future use of welfare technology or care robots. A qualitative approach with focus group discussions was employed, followed by thematic analysis. The results are presented in four overall themes: the impact on daily life for older adults and professional caregivers, codes of practice and terms of use, dissemination of information and knowledge, and conditions for successful implementation. There were significant differences in the informants’ attitudes toward and knowledge about care robots. However, the informants’ attitudes appeared to change during the focus groups and in general, became more positive. Authentic needs, which care robots could support, refer to independence, safety and security, and the ability to manage or ease daily life or working life. The results suggest that older adults, after receiving relevant information, were open to the idea of being supported by care robots in their daily lives.}},
  author       = {{Johansson-Pajala, Rose-Marie and Thommes, Kirsten and Hoppe, Julia Amelie and Tuisku, Outi and Hennala, Lea and Pekkarinen, Satu and  Melkas, Helinä and Gustafsson, Christine }},
  booktitle    = {{HCII 2019}},
  editor       = {{Zhou, Jia and Salvendy, Gavriel}},
  isbn         = {{978-3-030-22011-2}},
  keywords     = {{Care robots, Older adults, Implementation, Information, Perceptions, Welfare technology}},
  location     = {{Orlando}},
  pages        = {{212--227}},
  publisher    = {{Springer}},
  title        = {{{Improved Knowledge Changes the Mindset: Older Adults’ Perceptions of Care Robots}}},
  doi          = {{10.1007/978-3-030-22012-9_16}},
  volume       = {{11592}},
  year         = {{2019}},
}

@article{42674,
  author       = {{Klowait, Nils}},
  issn         = {{1369-118X}},
  journal      = {{Information, Communication & Society}},
  keywords     = {{Library and Information Sciences, Communication}},
  number       = {{5}},
  pages        = {{605--621}},
  publisher    = {{Informa UK Limited}},
  title        = {{{Interactionism in the age of ubiquitous telecommunication}}},
  doi          = {{10.1080/1369118x.2019.1566487}},
  volume       = {{22}},
  year         = {{2019}},
}

@inproceedings{2332,
  abstract     = {{Ein wichtiges Element der Digitalen Transformation ist die Digitalisierung der Prozesse in Unternehmen. Eine Herausforderung besteht hierbei in der systematischen Erkennung von Digitalisierungspotenzialen in Prozessen. Bestehende Ansätze benötigen Experten, welche Potenziale über ihre Erfahrung oder zeitaufwendig mithilfe von Musterkatalogen identifizieren.
In diesem Artikel werden verschiedene Digitalisierungspotenziale klassifiziert und Muster für ein zukünftiges musterbasiertes Analyseverfahren zur automatisierten Identifikation von Digitalisierungspotenzialen in BPMN-Diagrammen beschrieben. Im Vergleich zu bestehenden Ansätzen erlaubt es Experten die Identifizierung von Digitalisierungspotenzialen effizienter und effektiver durchzuführen.}},
  author       = {{Rittmeier, Florian and Engels, Gregor and Teetz, Alexander}},
  booktitle    = {{Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.}},
  keywords     = {{Digitalisierungspotenziale, BPI, Digitale Transformation, Information Flow-Modellierung, Patterns, Requirements Engineering}},
  pages        = {{215----221}},
  publisher    = {{CEUR-WS.org}},
  title        = {{{Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes)}}},
  volume       = {{2060}},
  year         = {{2018}},
}

@article{5586,
  abstract     = {{The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. While the academic literature has provided valuable insights into these issues, there is a lack of empirical contributions. To address this lack, we conduct a theory-based exploratory multiple case study. Our case study reveals that (1) firms? investments in information security are largely driven by external environmental and industry-related factors, (2) firms do not implement standardized decision processes, (3) the security process is perceived to impact the business process in a disturbing way, (4) both the implementation of evaluation processes and the application of metrics are hardly existent and (5) learning activities mainly occur at an ad-hoc basis.}},
  author       = {{Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}},
  journal      = {{Computers & Security}},
  keywords     = {{Information Security Investments, Multiple Case Study, Organizations, Single Loop Learning, Double Loop Learning}},
  pages        = {{807 -- 823}},
  publisher    = {{Elsevier}},
  title        = {{{Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning}}},
  volume       = {{77}},
  year         = {{2018}},
}

@article{47481,
  author       = {{Münzmay, Andreas}},
  issn         = {{0044-2380}},
  journal      = {{Zeitschrift für Bibliothekswesen und Bibliographie (ZfBB)}},
  keywords     = {{Library and Information Sciences}},
  number       = {{2-3}},
  pages        = {{101--104}},
  publisher    = {{Klostermann}},
  title        = {{{Der FID Musikwissenschaft (Musiconn) in Lehre und Forschung. Kommentar aus Nutzer-Perspektive}}},
  doi          = {{10.3196/1864295018652390}},
  volume       = {{65}},
  year         = {{2018}},
}

@article{3490,
  abstract     = {{Digital interactions among businesses and consumers through powerful information systems and omnipresent connected devices establish today’s networked society. In this light, Service Science continues to take root as a research discipline that focuses on the integration of (digital) resources by service providers and service customers for value co-creation in service systems. Rapid advances in information technology allow for designing novel information systems that enable entirely new configurations of service systems. In turn, Service Science also leaves its mark on the design, adoption, and use of information systems and technology. With this special issue, we compile a set of timely papers that investigate selected facets of the complex interplay between information technology, information systems, and Service Science to design innovative IT artifacts for smart service. This editorial opens this special issue by elaborating on our understanding of smart service.<br}},
  author       = {{Beverungen, Daniel and Matzner, Martin and Janiesch, Christian}},
  journal      = {{Information Systems and E-Business Management}},
  keywords     = {{Information system, Smart service, Service system}},
  pages        = {{781–787}},
  title        = {{{Information systems for smart services}}},
  doi          = {{10.1007/s10257-017-0365-8}},
  year         = {{2017}},
}

@techreport{20868,
  abstract     = {{This study proposes a simple theoretical framework that allows for assessing financial distress up to five years in advance. We jointly model financial distress by using two of its key driving factors: declining cash-generating ability and insufficient liquidity reserves. The model is based on stochastic processes and incorporates firm-level and industry-sector developments. A large-scale empirical implementation for US-listed firms over the period of 1980-2010 shows important improvements in the discriminatory accuracy and demonstrates incremental information content beyond state-of-the-art accounting and market-based prediction models. Consequently, this study might provide important ex ante warning signals for investors, regulators and practitioners.}},
  author       = {{Sievers, Sönke and Klobucnik, Jan and Miersch, David}},
  keywords     = {{Financial distress prediction, probability of default, accounting information, stochastic processes, simulation}},
  pages        = {{84}},
  title        = {{{Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence}}},
  doi          = {{10.2139/ssrn.2237757}},
  year         = {{2017}},
}

@article{5199,
  abstract     = {{This study proposes a simple theoretical framework that allows for assessing financial distress up to five years in advance. We jointly model financial distress by using two of its key driving factors: declining cash-generating ability and insufficient liquidity reserves. The model is based on stochastic processes and incorporates firm-level and industry-sector developments. A large-scale empirical implementation for US-listed firms over the period of 1980-2010 shows important improvements in the discriminatory accuracy and demonstrates incremental information content beyond state-of-the-art accounting and market-based prediction models. Consequently, this study might provide important ex ante warning signals for investors, regulators and practitioners. }},
  author       = {{Klobucnik, Jan and Miersch, David and Sievers, Sönke}},
  journal      = {{SSRN Electronic Journal}},
  keywords     = {{Financial distress prediction, probability of default, accounting information, stochastic processes, simulation}},
  title        = {{{Predicting Early Warning Signals of Financial Distress: Theory and Empirical Evidence}}},
  year         = {{2017}},
}

@article{4689,
  author       = {{Müller, Oliver and Junglas, Iris and vom Brocke, Jan and Debortoli, Stefan}},
  isbn         = {{0960-085X}},
  issn         = {{14769344}},
  journal      = {{European Journal of Information Systems}},
  keywords     = {{analytics, big data, data source, information systems research, methodology}},
  number       = {{4}},
  pages        = {{289----302}},
  title        = {{{Utilizing big data analytics for information systems research: Challenges, promises and guidelines}}},
  doi          = {{10.1057/ejis.2016.2}},
  year         = {{2016}},
}

@article{52747,
  author       = {{Borgwardt, Stefan and Mailis, Theofilos and Peñaloza, Rafael and Turhan, Anni-Yasmin}},
  issn         = {{1861-2032}},
  journal      = {{Journal on Data Semantics}},
  keywords     = {{Artificial Intelligence, Computer Networks and Communications, Information Systems}},
  number       = {{2}},
  pages        = {{55--75}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies}}},
  doi          = {{10.1007/s13740-015-0055-y}},
  volume       = {{5}},
  year         = {{2016}},
}

@article{52803,
  author       = {{Borgwardt, Stefan and Mailis, Theofilos and Peñaloza, Rafael and Turhan, Anni-Yasmin}},
  issn         = {{1861-2032}},
  journal      = {{Journal on Data Semantics}},
  keywords     = {{Artificial Intelligence, Computer Networks and Communications, Information Systems}},
  number       = {{2}},
  pages        = {{55--75}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies}}},
  doi          = {{10.1007/s13740-015-0055-y}},
  volume       = {{5}},
  year         = {{2016}},
}

@inproceedings{5588,
  abstract     = {{The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples.}},
  author       = {{Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}},
  booktitle    = {{International Conference on Information Systems}},
  keywords     = {{Information Security, Investment, Literature review, Resource-based View, Organi-zational Learning Theory, Multi-theoretical Perspective}},
  title        = {{{A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory}}},
  year         = {{2015}},
}

@inproceedings{5590,
  abstract     = {{Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview.}},
  author       = {{Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}},
  booktitle    = {{2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}},
  keywords     = {{Identity and Access Management, Economic Decision Making, Information Systems, Information Security Investment, Decision Theory}},
  title        = {{{Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}}},
  year         = {{2015}},
}

@article{41297,
  abstract     = {{<jats:p> In service industries, hierarchical loyalty programs are common relationship marketing instruments that award elevated status to customers who exceed a certain spending level (e.g., gold membership). In practice, service companies offer elevated status to some customers who do not meet the required spending level, in an attempt to profit from the profound allure of status. Relying on social psychology research and a mixed-method approach, this study analyzes the loyalty impact of status endowments, defined as awards of elevated status to customers who are not entitled to it. An exploratory qualitative study identifies customer gratitude and customer skepticism as positive and negative mediators, respectively, of customers’ attitudinal responses to endowed status. Quantitative studies—two experimental and one survey—substantiate these bright and dark sides of endowed status. The efficacy of status endowment is contingent on the context. To alleviate the dark-side effect, managers can allow target customers to actively choose whether to be endowed, especially those who are close to achieving the status already, and provide valuable preferential treatment to customers elevated by either endowment or achievement. These insights offer guidelines for whether and how to use status endowment in hierarchical loyalty programs. </jats:p>}},
  author       = {{Eggert, Andreas and Steinhoff, Lena and Garnefeld, Ina}},
  issn         = {{1094-6705}},
  journal      = {{Journal of Service Research}},
  keywords     = {{Organizational Behavior and Human Resource Management, Sociology and Political Science, Information Systems}},
  number       = {{2}},
  pages        = {{210--228}},
  publisher    = {{SAGE Publications}},
  title        = {{{Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs}}},
  doi          = {{10.1177/1094670514566797}},
  volume       = {{18}},
  year         = {{2015}},
}

@article{41341,
  abstract     = {{<jats:p> In many business markets, manufacturers seek service-led growth to secure their existing positions and continue to grow in increasingly competitive environments. Using longitudinal data from 513 German mechanical engineering companies and latent growth curve modeling, this study offers a fine-grained view of the financial performance implications of industrial service strategies. By disentangling the revenue and profit implications of industrial service strategies, findings reveal that such strategies increase both the level and the growth of manufacturing firms’ revenue streams. In contrast, they reduce the level but improve the growth of manufacturers’ profits. Results further suggest that services supporting the clients’ actions (SSC) and services supporting the supplier’s product (SSP) affect performance outcomes in different ways. SSCs directly affect revenue and profit streams. In turn, SSPs display only indirect effects on financial performance mediated through SSCs. A moderator analysis identifies two organizational contingencies that facilitate service business success: Only companies with decentralized decision-making processes and a high share of loyal customers can expect favorable financial results from industrial service strategies. In summary, this research provides significant insights and managerial guidance for turning service strategies into financial successes. </jats:p>}},
  author       = {{Eggert, Andreas and Hogreve, Jens and Ulaga, Wolfgang and Münkhoff, Eva}},
  issn         = {{1094-6705}},
  journal      = {{Journal of Service Research}},
  keywords     = {{Organizational Behavior and Human Resource Management, Sociology and Political Science, Information Systems}},
  number       = {{1}},
  pages        = {{23--39}},
  publisher    = {{SAGE Publications}},
  title        = {{{Revenue and Profit Implications of Industrial Service Strategies}}},
  doi          = {{10.1177/1094670513485823}},
  volume       = {{17}},
  year         = {{2014}},
}

@inproceedings{4698,
  author       = {{Gregor, Shirley and Müller, Oliver and Seidel, Stefan}},
  booktitle    = {{European Conference on Information Systems}},
  keywords     = {{Abstraction, Affordances, Design Science Research, Design Theory, Information Systems Development, Reflection, Theorizing}},
  title        = {{{Reflection, abstraction and theorizing in design and development research}}},
  year         = {{2013}},
}

@techreport{5146,
  abstract     = {{In this paper, we analyze a model in which two divisions negotiate over an intrafirm transfer price for an intermediate product. Formally, we consider bargaining problems under incomplete information, since the upstream division’s (seller's) costs and downstream division's (buyer's) revenues are supposed to be private information. Assuming two possible types for buyer and seller each, we first establish that the bargaining problem is regular, regardless whether incentive and/or efficiency constraints are imposed. This allows us to apply the generalized Nash bargaining solution to determine transfer payments and transfer probabilities. Furthermore, we derive general properties of this solution for the transfer pricing problem and compare the model developed here with the existing literature for negotiated transfer pricing under incomplete information. In particular, we focus on the models presented in Wagenhofer (1994).}},
  author       = {{Brangewitz, Sonja and Haake, Claus-Jochen}},
  keywords     = {{Transfer Pricing, Negotiation, Generalized Nash Bargaining Solution, Incomplete Information}},
  publisher    = {{CIE Working Paper Series, Paderborn University}},
  title        = {{{Cooperative Transfer Price Negotiations under Incomplete Information}}},
  volume       = {{64}},
  year         = {{2013}},
}

