@article{17860,
  abstract     = {{Purpose
The purpose of this paper is to identify strategic options and challenges that arise when an industrial firm moves from providing smart service toward providing a platform.

Design/methodology/approach
This conceptual study takes on a multidisciplinary research perspective that integrates concepts, theories and insights from service management and marketing, information systems and platform economics.

Findings
The paper outlines three platform types – smart data platform, smart product platform and matching platform – as strategic options for firms that wish to evolve from smart service providers to platform providers.

Research limitations/implications
Investigating smart service platforms calls for launching interdisciplinary research initiatives. Promising research avenues are outlined to span boundaries that separate different research disciplines today.

Practical implications
Managing a successful transition from providing smart service toward providing a platform requires making significant investments in IT, platform-related capabilities and skills, as well as implement new approaches toward relationship management and brand-building.

Originality/value
The findings described in this paper are valuable to researchers in multiple disciplines seeking to develop and to justify theory related to platforms in industrial scenarios.}},
  author       = {{Beverungen, Daniel and Kundisch, Dennis and Wünderlich, Nancy}},
  issn         = {{507-532}},
  journal      = {{Journal of Service Management}},
  keywords     = {{Smart service, Platform, Interdisciplinary research, Manufacturing company, Smart service provider, Platform economics, Information systems, Multi-sided markets, Business-to-business (B2B) markets}},
  number       = {{4}},
  pages        = {{507--532}},
  publisher    = {{Emerald Insight}},
  title        = {{{Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers}}},
  doi          = {{10.1108/JOSM-03-2020-0066}},
  volume       = {{32}},
  year         = {{2021}},
}

@article{27841,
  abstract     = {{Verification of software and processor hardware usually proceeds separately, software analysis relying on the correctness of processors executing machine instructions. This assumption is valid as long as the software runs on standard CPUs that have been extensively validated and are in wide use. However, for processors exploiting custom instruction set extensions to meet performance and energy constraints the validation might be less extensive, challenging the correctness assumption. In this paper we present a novel formal approach for hardware/software co-verification targeting processors with custom instruction set extensions. We detail two different approaches for checking whether the hardware fulfills the requirements expected by the software analysis. The approaches are designed to explore a trade-off between generality of the verification and computational effort. Then, we describe the integration of software and hardware analyses for both techniques and describe a fully automated tool chain implementing the approaches. Finally, we demonstrate and compare the two approaches on example source code with custom instructions, using state-of-the-art software analysis and hardware verification techniques.}},
  author       = {{Jakobs, Marie-Christine and Pauck, Felix and Platzner, Marco and Wehrheim, Heike and Wiersema, Tobias}},
  journal      = {{IEEE Access}},
  keywords     = {{Software Analysis, Abstract Interpretation, Custom Instruction, Hardware Verification}},
  publisher    = {{IEEE}},
  title        = {{{Software/Hardware Co-Verification for Custom Instruction Set Processors}}},
  doi          = {{10.1109/ACCESS.2021.3131213}},
  year         = {{2021}},
}

@inproceedings{21238,
  author       = {{Pauck, Felix and Wehrheim, Heike}},
  booktitle    = {{Software Engineering 2021}},
  editor       = {{Koziolek, Anne and Schaefer, Ina and Seidl, Christoph}},
  pages        = {{ 83--84 }},
  publisher    = {{Gesellschaft für Informatik e.V.}},
  title        = {{{Cooperative Android App Analysis with CoDiDroid}}},
  doi          = {{10.18420/SE2021_30 }},
  year         = {{2021}},
}

@misc{39351,
  author       = {{Heinze, Erik}},
  title        = {{{Kollusion durch Plattformen - der Einfluss von Tank-Apps auf den Preiswettbewerb von Tankstellen in Deutschland}}},
  year         = {{2021}},
}

@misc{39358,
  author       = {{Rayhan, Shahi}},
  title        = {{{Big Data in Digital Markets - Challenges for Competition Policy to Protect Consumer Welfare}}},
  year         = {{2021}},
}

@misc{39356,
  author       = {{Joshan, Saeid}},
  title        = {{{Network Development of Low-Cost Carriers at German Airports}}},
  year         = {{2021}},
}

@misc{39962,
  author       = {{Ajredini, Zurkani}},
  title        = {{{Plattformgestaltungen auf digitalen Märkten - eine Analyse der Wohlfahrtseffekte}}},
  year         = {{2021}},
}

@misc{40465,
  author       = {{Kanne, Niklas}},
  title        = {{{Marktmachtmissbrauch digitaler Plattformen - eine Analyse anhand der zehnten Novelle des GWB}}},
  year         = {{2021}},
}

@misc{40466,
  author       = {{Klüppel, Pascal}},
  title        = {{{Marktmachtmissbrauch von Google – Eine wettbewerbspolitische Analyse}}},
  year         = {{2021}},
}

@misc{40473,
  author       = {{Yigitbas , Osman}},
  title        = {{{Preisabsprachen in der Automobilindustrie - eine wettbewerbspolitische Analyse}}},
  year         = {{2021}},
}

@misc{40470,
  author       = {{Schulte, Marcel}},
  title        = {{{Facebooks digitale Währung - eine wettbewerbspolitische Analyse}}},
  year         = {{2021}},
}

@inproceedings{29138,
  author       = {{Ahmed, Qazi Arbab}},
  booktitle    = {{2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)}},
  title        = {{{Hardware Trojans in Reconfigurable Computing}}},
  doi          = {{10.1109/vlsi-soc53125.2021.9606974}},
  year         = {{2021}},
}

@misc{44234,
  author       = {{Berger, Thilo Frederik}},
  title        = {{{Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation}}},
  year         = {{2021}},
}

@misc{44233,
  author       = {{Pranger, Sebastian}},
  title        = {{{Online k-Facility Reallocation using k-Server Algorithms}}},
  year         = {{2021}},
}

@inproceedings{20681,
  abstract     = {{The battle of developing hardware Trojans and corresponding countermeasures has taken adversaries towards ingenious ways of compromising hardware designs by circumventing even advanced testing and verification methods. Besides conventional methods of inserting Trojans into a design by a malicious entity, the design flow for field-programmable gate arrays (FPGAs) can also be surreptitiously compromised to assist the attacker to perform a successful malfunctioning or information leakage attack. The advanced stealthy malicious look-up-table (LUT) attack activates a Trojan only when generating the FPGA bitstream and can thus not be detected by register transfer and gate level testing and verification. However, also this attack was recently revealed by a bitstream-level proof-carrying hardware (PCH) approach. In this paper, we present a novel attack that leverages malicious routing of the inserted Trojan circuit to acquire a dormant state even in the generated and transmitted bitstream. The Trojan's payload is connected to primary inputs/outputs of the FPGA via a programmable interconnect point (PIP). The Trojan is detached from inputs/outputs during place-and-route and re-connected only when the FPGA is being programmed, thus activating the Trojan circuit without any need for a trigger logic. Since the Trojan is injected in a post-synthesis step and remains unconnected in the bitstream, the presented attack can currently neither be prevented by conventional testing and verification methods nor by recent bitstream-level verification techniques.}},
  author       = {{Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}},
  booktitle    = {{2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)}},
  location     = {{Alpexpo | Grenoble, France}},
  publisher    = {{2021 Design, Automation and Test in Europe Conference (DATE)}},
  title        = {{{Malicious Routing: Circumventing Bitstream-level Verification for FPGAs}}},
  doi          = {{10.23919/DATE51398.2021.9474026}},
  year         = {{2021}},
}

@article{44896,
  abstract     = {{<jats:p>This study uniquely employs a fuzzy-set qualitative comparative analysis (fsQCA) technique to account for complex relationships in consumption. The fsQCA technique assumes that relationships are based on a set–subset relationship. This assumption is fundamental when decision-makers are affected by information asymmetry and are, thus, required to jointly evaluate the credibility and reliability of a range of external signals. This issue also affects consumers in markets for cultural goods, where the quality of products is not known with certainty in advance of the purchase decision. Our study uses fsQCA to establish the effect of different quality signals on consumption in the US market for video game software. Our results show that reviews from professional critics alongside brand extension and multi-platform release strategies act as signals of product quality and, therefore, lead to high sales performance.</jats:p>}},
  author       = {{Kaimann, Daniel and Cox, Joe}},
  issn         = {{2071-1050}},
  journal      = {{Sustainability}},
  keywords     = {{Management, Monitoring, Policy and Law, Renewable Energy, Sustainability and the Environment, Geography, Planning and Development}},
  number       = {{23}},
  publisher    = {{MDPI AG}},
  title        = {{{A Comparative Analysis of Consumption: Evidence from a Cultural Goods Market}}},
  doi          = {{10.3390/su132313275}},
  volume       = {{13}},
  year         = {{2021}},
}

@article{21289,
  author       = {{Kaimann, Daniel and Tanneberg, Ilka and Cox, Joe}},
  issn         = {{0143-6570}},
  journal      = {{Managerial and Decision Economics}},
  number       = {{1}},
  pages        = {{3--20}},
  title        = {{{“I will survive”: Online streaming and the chart survival of music tracks}}},
  doi          = {{10.1002/mde.3226}},
  volume       = {{42}},
  year         = {{2021}},
}

@article{44899,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Changes in winery ratings in leading wine guides, that is, improvements as well as deteriorations, are typically attributed to corresponding changes in the quality of the wines produced by the respective winery. What remains unexplored in this context is changes in editorship and/or changes in the composition of the wine tasting teams working for the respective guide. Using data from two particularly prestigious German wine guides (Gault Millau and Vinum), this paper shows that these latter changes have a rather small, yet statistically significant impact on changes in winery ratings. Thus, consumers are well-advised to consider these changes before making their purchasing decision. (JEL Classifications: L21, M30, Q13)</jats:p>}},
  author       = {{Frick, Bernd}},
  issn         = {{1931-4361}},
  journal      = {{Journal of Wine Economics}},
  keywords     = {{Horticulture, General Business, Management and Accounting, Food Science}},
  number       = {{4}},
  pages        = {{370--377}},
  publisher    = {{Cambridge University Press (CUP)}},
  title        = {{{The Legacy of Gurus: The Impact of Armin Diel and Joel Payne on Winery Ratings in Germany}}},
  doi          = {{10.1017/jwe.2020.36}},
  volume       = {{15}},
  year         = {{2021}},
}

@misc{42317,
  author       = {{N., N.}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Die Aufteilung der Barentsseegebiete mithilfe des Adjusted Winner Verfahrens bei asymmetrischen Machtverhältnissen}}},
  year         = {{2021}},
}

@misc{42315,
  author       = {{N., N.}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Versionisierung von Serviceleistungen auf Videoplattformen}}},
  year         = {{2021}},
}

