@techreport{10332, abstract = {{We analyze the incentives for retail bundling and the welfare effects of retail bundling in a decentralized distribution channel with two retailers and two monopolistic manufacturers. One manufacturer exclusively sells his good to one retailer, whereas the other manufacturer sells his good to both retailers. Thus, one retailer is a monopolist for one product but competes with the other retailer in the second product market. The two-product retailer has the option to bundle his goods or to sell them separately. We find that bundling aggravates the double marginalization problem for the bundling retailer. Nevertheless, when the retailers compete in prices, bundling can be more profitable than separate selling for the retailer as bundling softens the retail competition. The ultimate outcome depends on the manufacturers’ marginal costs. Given retail quantity competition, however, bundling is in no case the retailer’s best strategy. Furthermore, we show that profitable bundling reduces consumer and producer surplus in the equilibrium.}}, author = {{Heinzel, Joachim Maria Josef}}, keywords = {{retail bundling, leverage theory, double marginalization}}, publisher = {{CIE Working Paper Series}}, title = {{{Bundling in a Distribution Channel with Retail Competition}}}, year = {{2019}}, } @misc{10344, author = {{Pukrop, Simon}}, publisher = {{Universität Paderborn}}, title = {{{Scheduling Algorithms for Multi-Operation Jobs with Setups on a Single Machine}}}, year = {{2019}}, } @inproceedings{13554, abstract = {{We propose a novel personal reputation system for cross-platform reputation. We observe that, in certain usage scenarios, e.g. crowd work, the rater anonymity property typically imposed on reputation systems is not necessary. Instead, we propose a relaxed notion of rater anonymity that is more applicable in the crowd work scenario. This allows us to construct a secure personal reputation system from simple cryptographic primitives.}}, author = {{Blömer, Johannes and Löken, Nils}}, booktitle = {{Security and Trust Management, STM 2019}}, title = {{{Personal Cross-Platform Reputation}}}, doi = {{10.1007/978-3-030-31511-5_9}}, volume = {{11738}}, year = {{2019}}, } @inproceedings{13557, abstract = {{We present a searchable encryption scheme for dynamic document collections in a multi-user scenario. Our scheme features fine-grained access control to search results, as well as access control to operations such as adding documents to the document collection, or changing individual documents. The scheme features verifiability of search results. Our scheme also satisfies the forward privacy notion crucial for the security of dynamic searchable encryption schemes.}}, author = {{Blömer, Johannes and Löken, Nils}}, booktitle = {{12th International Symposium on Foundations and Practice of Security, FPS 2019}}, publisher = {{Springer}}, title = {{{Dynamic Searchable Encryption with Access Control}}}, volume = {{12056}}, year = {{2019}}, } @inproceedings{13585, author = {{Bohn, Nicolai and Kundisch, Dennis}}, booktitle = {{Proceedings of the 40th International Conference on Information Systems (ICIS)}}, location = {{Munich, Germany}}, title = {{{All Things Considered? – Technology Design Decision-making Characteristics in Digital Startups}}}, year = {{2019}}, } @inproceedings{13586, author = {{Seutter, Janina and Neumann, Jürgen}}, booktitle = {{Proceedings of the 40th International Conference on Information Systems (ICIS)}}, location = {{Munich, Germany}}, title = {{{Head over Feels? Differences in Online Rating Behavior for Utilitarian and Hedonic Service Aspects}}}, year = {{2019}}, } @inproceedings{13587, author = {{Gutt, Dominik and Neumann, Jürgen and Jabr, W. and Kundisch, Dennis}}, booktitle = {{Proceedings of the 40th International Conference on Information Systems (ICIS)}}, location = {{Munich, Germany}}, title = {{{The App Updating Conundrum: Implications of Platform’s Rating Resetting on Developers’ Behavior}}}, year = {{2019}}, } @misc{13592, author = {{Pilot, Matthias}}, publisher = {{Universität Paderborn}}, title = {{{Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java}}}, year = {{2019}}, } @inproceedings{13647, author = {{Claes, Leander and Johannesmann, Sarah and Baumhögger, Elmar and Henning, Bernd}}, booktitle = {{2019 International Congress on Ultrasonics}}, location = {{Bruges}}, title = {{{Quantification of frequency-dependent absorption phenomena}}}, doi = {{10.1121/2.0001043}}, year = {{2019}}, } @misc{13648, author = {{Scholz, Swante}}, publisher = {{Universität Paderborn}}, title = {{{Implementation and Comparison of Elliptic Curve Algorithms in Java}}}, year = {{2019}}, }