Refine
Year of publication
Document Type
- Master's Thesis (19)
- Part of Periodical (13)
- Bachelor Thesis (11)
- Doctoral Thesis (6)
- Diploma Thesis (4)
Language
- English (53) (remove)
Keywords
- Internet of Things (4)
- computer clusters (3)
- Beschaffung (2)
- Logistik (2)
- artificial neural networks (2)
- classification (2)
- framework (2)
- parallel algorithms (2)
- social simulation (2)
- Adaptive Services Grid (ASG) (1)
- Agentenorientiertes Software Engineering (1)
- Akzeptanz (1)
- BPM (1)
- BPMS (1)
- Bedarfsanalyse (1)
- Biometric Authentication (1)
- Business Process Management Recommender Systems Survey (1)
- Business Process Modeling (1)
- Business Rule Bases, Inconsistency Measurement (1)
- Bürgerbeiteiligung (1)
- COVID-19 (1)
- CSCW (1)
- Case Study Analysis (1)
- Cloud Computing (1)
- CodeBlue (1)
- Collaboration (1)
- Computer Supported Cooperative Work (1)
- Container Entity Modell (1)
- DMN (1)
- Datenaustausch (1)
- Diffusion (1)
- Documents (1)
- E-Partizipation (1)
- E-participation (1)
- EU (1)
- Einkauf (1)
- Empfehlungssystem (1)
- Enterprise 2.0 (1)
- Enterprise Systems (1)
- Europäischer Schadensbericht (1)
- Evaluierung (1)
- Fingerprint Recognition (1)
- Gamification (1)
- Grounded Theory (1)
- Gruppenarbeit (1)
- Health (1)
- Heimarbeit (1)
- IBM Bluemix (1)
- IT Outsourcing (1)
- IT Security (1)
- IT Services (1)
- Information Asset Register (1)
- Information Audit (1)
- Information Capturing Methods (1)
- Information system (1)
- Insurance (1)
- Internet Voting (1)
- Interoperability (1)
- Interoperabilität (1)
- IoT (1)
- Kollaboration (1)
- Multi-Agenten-Systeme (1)
- ODRL (1)
- OWL (1)
- Organizational Change (1)
- PEPPOL (1)
- Pan European Public Procurement OnLine (1)
- Probabilistic finite automata (1)
- RDF (1)
- Recommender System (1)
- Recommender Systems, Business Process Modeling, Literature Review (1)
- STOF Model (1)
- Security (1)
- Semantic Web (1)
- Sensing as a Service (1)
- Service-oriented Architectures (SOA) (1)
- Service-orientierte Architektur (1)
- Sozialwissenschaftliche Simulation (1)
- Speaker Recognition (1)
- Sustainability (1)
- Telearbeit (1)
- Tenneco Automotive (1)
- Transport (1)
- Umfrage (1)
- Umfrage in Koblenz (1)
- VCD (1)
- Verification (1)
- Virtual Company Dossier (1)
- WSN (1)
- Wearables (1)
- acceptance (1)
- adaptive resonance theory (1)
- analytics (1)
- artifcial neural networks (1)
- artififfcial neural networks (1)
- assessment model (1)
- blood analysis (1)
- business intelligence (1)
- categorisation (1)
- change (1)
- collaboration (1)
- cultural dimensions (1)
- data (1)
- diffusion (1)
- digital transformation (1)
- digital workplace (1)
- distributed information systems (1)
- e-service (1)
- e-service quality (1)
- eGovernment (1)
- eSourcing (1)
- enterprise collaboration platforms (1)
- enterprise collaboration systems (1)
- estimation of algorithm efficiency (1)
- evaluation (1)
- governance (1)
- gradient method of training weight coefficients (1)
- groupwork (1)
- hybrid work (1)
- information infrastructure (1)
- information system (1)
- internet of things (1)
- iot development platforms (1)
- logistic (1)
- longitudinal (1)
- mPayments (1)
- mathematical model (1)
- medical care (1)
- methodology (1)
- micro-agent (1)
- minimum self-contained graphs (1)
- mobile health care (1)
- modulares System (1)
- multi-agent systems (1)
- parallel calculations (1)
- regression analysis (1)
- remote work (1)
- requirements analysis (1)
- risk (1)
- social media (1)
- social object (1)
- survey in Koblenz (1)
- virtual goods (1)
- visualization (1)
- web-portal medical e-services (1)
- wireless sensor networks (1)
- work from anywhere (1)
- work from home (1)
Institute
- Institut für Wirtschafts- und Verwaltungsinformatik (53) (remove)
Business rules have become an important tool to warrant compliance at their business processes. But the collection of these business rules can have various conflicting elements. This can lead to a violation of the compliance to be achieved. This conflicting elements are therefore a kind of inconsistencies, or quasi incon- sistencies in the business rule base. The target for this thesis is to investigate how those quasi inconsistencies in business rules can be detected and analyzed. To this aim, we develop a comprehensive library which allows to apply results from the scientific field of inconsistency measurement to business rule formalisms that are actually used in practice.
The Internet of Things is still one of the most relevant topics in the field of economics and research powered by the increasing demand of innovative services. Cost reductions in manufacturing of IoT hardware and the development of completely new communication ways has led to the point of bil-lions of devices connected to the internet. But in order to rule this new IoT landscape a standardized solution to conquer these challenges must be developed, the IoT Architecture.
This thesis examines the structure, purpose and requirements of IoT Architecture Models in the global IoT landscape and proposes an overview across the selected ones. For that purpose, a struc-tured literature analysis on this topic is conducted within this thesis, including an analysis on three existing research approaches trying to frame this topic and a tool supported evaluation of IoT Archi-tecture literature with over 200 accessed documents.
Furthermore, a coding of literature with the help of the specialised coding tool ATLAS.ti 8 is conduct-ed on 30 different IoT Architecture Models. In a final step these Architecture Models are categorized and compared to each other showing that the environment of IoT and its Architectures gets even more complex the further the research goes.
The development of a pan-European public E-Procurement system is an important target of the European Union to enhance the efficiency, transparency and competitiveness of public procurement procedures conducted within the European single market. A great obstacle for cross-border electronic procurement is the heterogeneity of national procurement systems in terms of technical, organizational and legal differences. To overcome this obstacle the European Commission funds several initiatives that contribute to the aim of achieving interoperability for pan-European public procurement. Pan European Public Procurement OnLine (PEPPOL) is one of these initiatives that aims at piloting an interoperable pan-European E-Procurement solution to support businesses and public purchasing entities from different member states to conduct their procurement processes electronically.rnrnAs interoperability and inter-connection of distributed heterogeneous information systems are the major requirements in the European procurement domain, and the VCD sub-domain in particular, service-oriented architecture (SOA) seems to provide a promising approach to realize such an architecture, as it promotes loose coupling and interoperability. This master thesis therefore discusses the SOA approach and how its concepts, methodologies and technologies can be used for the development of interoperable IT systems for electronic public procurement. This discussion is enhanced through a practical application of the discussed SOA methodologies by conceptualizing and prototyping of a sub-system derived from the overall system domain of the Virtual Company Dossier. For that purpose, important aspects of interoperability and related standards and technologies will be examined and put into the context of public electronic procurement. Furthermore, the paradigm behind SOA will be discussed, including the derivation of a top-down development methodology for service-oriented systems.
Advanced Auditing of Inconsistencies in Declarative Process Models using Clustering Algorithms
(2021)
To have a compliant business process of an organization, it is essential to ensure a onsistent process. The measure of checking if a process is consistent or not depends on the business rules of a process. If the process adheres to these business rules, then the process is compliant and efficient. For huge processes, this is quite a challenge. Having an inconsistency in a process can yield very quickly to a non-functional process, and that’s a severe problem for organizations. This thesis presents a novel auditing approach for handling inconsistencies from a post-execution perspective. The tool identifies the run-time inconsistencies and visualizes them in heatmaps. These plots aim to help modelers observe the most problematic constraints and help them make the right remodeling decisions. The modelers assisted with many variables can be set in the tool to see a different representation of heatmaps that help grasp all the perspectives of the problem. The heatmap sort and shows the run-time inconsistency patterns, so that modeler can decide which constraints are highly problematic and should address a re-model. The tool can be applied to real-life data sets in a reasonable run-time.
This Thesis contributes by reporting on the current state of diffusion of collaboration information technology (CIT). The investigation concludes, with a high degree of certainty, that today we have a "satisfactory" diffusion level of some level-A CITs (mostly e-Mail, distantly followed by Audio Conferencing), and a "dissatisfactory" diffusion level of higher-level CITs (i.e. those requiring significant collaboration and cooperation among users, like Meeting Support Systems, Group Decision Support Systems, etc.). The potential benefits of the latter seem to be far from fully realised due to lack of user acceptance. This conclusion has gradually developed along the research cycle " it was suggested by Empirical Study I, and tested through Empirical Studies II and III. An additional, unplanned and rather interesting, finding from this study has been the recognition of large [mostly business] reporting on numerous Web 2.0 user-community produced collaboration technologies (most of them belonging to the category of "social software") and their metamorphosis from autonomous, "bottom-up" solutions into enterprise-supported infrastructures. Another contribution of this Thesis " again suggested by Empirical Study I, and tested through Empirical Studies II and III " pertains to the "process structure" of CIT diffusion. I have found that collaboration technology has historically diffused following two distinct (interdependent but orthogonal) diffusion paths " top-down (authority-based) and bottom-up. The authority-based diffusion path seems to be characterised by efforts aimed at "imposing" technologies on employees, the primary concern being to make sure that technology seamlessly and easily integrates into the organisational IT infrastructure. On the other hand, the bottom-up diffusion trail seems to be successful. The contribution of this investigation may be summarised as threefold: 1. This investigation consolidates most of the findings to date, pertaining to CIT adoption and diffusion, which have been produced by the CIT research community. Thus, it tells a coherent story of the dynamics of the community focus and the collective wisdom gathered over a period of (at least) one decade. 2. This work offers a meaningful framework within which to analyse existing knowledge " and indeed extends that knowledge base by identifying persistent problems of collaboration technology acceptance, adoption and diffusion. These problems have been repeatedly observed in practice, though the pattern does not seem to have been recognised and internalised by the community. Many of these problems have been observed in cases of CIT use one decade ago, five years ago, three years ago, and continue to be observed today in structurally the same form despite what is unarguably "rapid technological development". This gives me reason to believe that, at least some of the persistent problems of CIT diffusion can be hypothesised as "determining factors". My contribution here is to identify these factors, discuss them in detail, and thus tackle the theme of CIT diffusion through a structured historical narrative. 3. Through my contribution (2) above, I characterise a "knowledge-action gap" in the field of CIT and illuminate a potential path through which the research community might hope to bridge this gap. The gap may be operationalised as cognitive distance between CIT "knowledge" and CIT "action".
Mobile payment has been a payment option in the market for a long time now and was predicted to become a widely used payment method. However, over the years, the market penetration rate of mPayments has been relatively low, despite it having all characteristics required of a convenient payment method. The primaryrnreason for this has been cited as a lack of customer acceptance mainly caused due to the lack of perceived security by the end-user. Although biometric authentication is not a new technology, it is experiencing a revival in the light of the present day terror threats and increased security requirements in various industries. The application of biometric authentication in mPayments is analysed here and a suitable biometric authentication method for use with mPayments is recommended. The issue of enrolment, human and technical factors to be considered are discussed and the STOF business model is applied to a BiMoP (biometric mPayment) application.
The aim of this paper is to identify and understand the risks and issues companies are experiencing from the business use of social media and to develop a framework for describing and categorising those social media risks. The goal is to contribute to the evolving theorisation of social media risk and to provide a foundation for the further development of social media risk management strategies and processes. The study findings identify thirty risk types organised into five categories (technical, human, content, compliance and reputational). A risk-chain is used to illustrate the complex interrelated, multi-stakeholder nature of these risks and directions for future work are identified.
Cloud Computing is a topic that has gained momentum in the last years. Current studies show that an increasing number of companies is evaluating the promised advantages and considering making use of cloud services. In this paper we investigate the phenomenon of cloud computing and its importance for the operation of ERP systems. We argue that the phenomenon of cloud computing could lead to a decisive change in the way business software is deployed in companies. Our reference framework contains three levels (IaaS, PaaS, SaaS) and clarifies the meaning of public, private and hybrid clouds. The three levels of cloud computing and their impact on ERP systems operation are discussed. From the literature we identify areas for future research and propose a research agenda.
An estimation of the number of multiplication and addition operations for training artififfcial neural networks by means of consecutive and parallel algorithms on a computer cluster is carried out. The evaluation of the efficiency of these algorithms is developed. The multilayer perceptron, the Volterra network and the cascade-correlation network are used as structures of artififfcial neural networks. Different methods of non-linear programming such as gradient and non-gradient methods are used for the calculation of the weight coefficients.