Filtern
Erscheinungsjahr
Dokumenttyp
- Masterarbeit (19)
- Ausgabe (Heft) zu einer Zeitschrift (13)
- Bachelorarbeit (11)
- Dissertation (6)
- Diplomarbeit (4)
Sprache
- Englisch (53) (entfernen)
Schlagworte
- Internet of Things (4)
- computer clusters (3)
- Beschaffung (2)
- Logistik (2)
- artificial neural networks (2)
- classification (2)
- framework (2)
- parallel algorithms (2)
- social simulation (2)
- Adaptive Services Grid (ASG) (1)
- Agentenorientiertes Software Engineering (1)
- Akzeptanz (1)
- BPM (1)
- BPMS (1)
- Bedarfsanalyse (1)
- Biometric Authentication (1)
- Business Process Management Recommender Systems Survey (1)
- Business Process Modeling (1)
- Business Rule Bases, Inconsistency Measurement (1)
- Bürgerbeiteiligung (1)
- COVID-19 (1)
- CSCW (1)
- Case Study Analysis (1)
- Cloud Computing (1)
- CodeBlue (1)
- Collaboration (1)
- Computer Supported Cooperative Work (1)
- Container Entity Modell (1)
- DMN (1)
- Datenaustausch (1)
- Diffusion (1)
- Documents (1)
- E-Partizipation (1)
- E-participation (1)
- EU (1)
- Einkauf (1)
- Empfehlungssystem (1)
- Enterprise 2.0 (1)
- Enterprise Systems (1)
- Europäischer Schadensbericht (1)
- Evaluierung (1)
- Fingerprint Recognition (1)
- Gamification (1)
- Grounded Theory (1)
- Gruppenarbeit (1)
- Health (1)
- Heimarbeit (1)
- IBM Bluemix (1)
- IT Outsourcing (1)
- IT Security (1)
- IT Services (1)
- Information Asset Register (1)
- Information Audit (1)
- Information Capturing Methods (1)
- Information system (1)
- Insurance (1)
- Internet Voting (1)
- Interoperability (1)
- Interoperabilität (1)
- IoT (1)
- Kollaboration (1)
- Multi-Agenten-Systeme (1)
- ODRL (1)
- OWL (1)
- Organizational Change (1)
- PEPPOL (1)
- Pan European Public Procurement OnLine (1)
- Probabilistic finite automata (1)
- RDF (1)
- Recommender System (1)
- Recommender Systems, Business Process Modeling, Literature Review (1)
- STOF Model (1)
- Security (1)
- Semantic Web (1)
- Sensing as a Service (1)
- Service-oriented Architectures (SOA) (1)
- Service-orientierte Architektur (1)
- Sozialwissenschaftliche Simulation (1)
- Speaker Recognition (1)
- Sustainability (1)
- Telearbeit (1)
- Tenneco Automotive (1)
- Transport (1)
- Umfrage (1)
- Umfrage in Koblenz (1)
- VCD (1)
- Verification (1)
- Virtual Company Dossier (1)
- WSN (1)
- Wearables (1)
- acceptance (1)
- adaptive resonance theory (1)
- analytics (1)
- artifcial neural networks (1)
- artififfcial neural networks (1)
- assessment model (1)
- blood analysis (1)
- business intelligence (1)
- categorisation (1)
- change (1)
- collaboration (1)
- cultural dimensions (1)
- data (1)
- diffusion (1)
- digital transformation (1)
- digital workplace (1)
- distributed information systems (1)
- e-service (1)
- e-service quality (1)
- eGovernment (1)
- eSourcing (1)
- enterprise collaboration platforms (1)
- enterprise collaboration systems (1)
- estimation of algorithm efficiency (1)
- evaluation (1)
- governance (1)
- gradient method of training weight coefficients (1)
- groupwork (1)
- hybrid work (1)
- information infrastructure (1)
- information system (1)
- internet of things (1)
- iot development platforms (1)
- logistic (1)
- longitudinal (1)
- mPayments (1)
- mathematical model (1)
- medical care (1)
- methodology (1)
- micro-agent (1)
- minimum self-contained graphs (1)
- mobile health care (1)
- modulares System (1)
- multi-agent systems (1)
- parallel calculations (1)
- regression analysis (1)
- remote work (1)
- requirements analysis (1)
- risk (1)
- social media (1)
- social object (1)
- survey in Koblenz (1)
- virtual goods (1)
- visualization (1)
- web-portal medical e-services (1)
- wireless sensor networks (1)
- work from anywhere (1)
- work from home (1)
Institut
- Institut für Wirtschafts- und Verwaltungsinformatik (53) (entfernen)
Geschäftsregeln sind zu einem wichtigen Instrument geworden, um die Einhaltung der Vorschriften in ihren Geschäftsprozessen zu gewährleisten. Aber die Sammlung dieser Geschäftsregeln kann verschiedene widersprüchliche Elemente beinhalten. Dies kann zu einer Verletzung der zu erreichenden Compliance führen. Diese widersprüchlichen Elemente sind daher eine Art Inkonsistenzen oder Quasi-Inkonsistenzen in der Geschäftsregelbasis. Ziel dieser Arbeit ist es, zu untersuchen, wie diese Quasi-Inkonsistenzen in Geschäftsregeln erkannt und analysiert werden können. Zu diesem Zweck entwickeln wir eine umfassende Bibliothek, die es ermöglicht, Ergebnisse aus dem wissenschaftlichen Bereich der Inkonsistenzmessung auf Geschäftsregelformalismen anzuwenden, die tatsächlich in der Praxis verwendet werden.
The Internet of Things is still one of the most relevant topics in the field of economics and research powered by the increasing demand of innovative services. Cost reductions in manufacturing of IoT hardware and the development of completely new communication ways has led to the point of bil-lions of devices connected to the internet. But in order to rule this new IoT landscape a standardized solution to conquer these challenges must be developed, the IoT Architecture.
This thesis examines the structure, purpose and requirements of IoT Architecture Models in the global IoT landscape and proposes an overview across the selected ones. For that purpose, a struc-tured literature analysis on this topic is conducted within this thesis, including an analysis on three existing research approaches trying to frame this topic and a tool supported evaluation of IoT Archi-tecture literature with over 200 accessed documents.
Furthermore, a coding of literature with the help of the specialised coding tool ATLAS.ti 8 is conduct-ed on 30 different IoT Architecture Models. In a final step these Architecture Models are categorized and compared to each other showing that the environment of IoT and its Architectures gets even more complex the further the research goes.
Die Entwicklung eines IT-gestützten europäischen Systems zur öffentlichen Auftragsvergabe ist ein wichtiges Ziel der EU um die Effizienz, Transparenz und Wettbewerbsfähigkeit im öffentlichen Beschaffungswesen des europäischen Binnenmarktes zu verbessern. Ein großes Hindernis für die grenzüberschreitende elektronische Abwicklung der Beschaffungsprozesse ist die Heterogenität der nationalen Beschaffungssysteme in Bezug auf technische, organisatorische und rechtliche Unterschiede. Zur Überwindung dieses Hindernisses finanziert die Europäische Kommission einige Initiativen, um grenzüberschreitend Interoperabilität der öffentlichen Beschaffungssysteme zu erreichen. Pan European Public Procurement OnLine (PEPPOL) ist ein solches Projekt, das die Pilotierung eines interoperablen pan-europäischen Systems zur elektronischen Unterstützung der öffentlichen Beschaffungsprozesse als Ziel hat. rnrnService-orientierte Architekturen(SOA) scheinen einen vielversprechenden Ansatz für die Realisierung solch verteilter Architekturen zu liefern, da sie die lose Kopplung und Interoperabilität zwischen Systemkomponenten fördert. Diese Masterarbeit diskutiert daher das SOA(Service-orientierte Architektur)-Konzept und die Fragestellung, wie seine Konzepte, Methoden und Technologien für die Entwicklung von interoperablen IT-Systemen für die elektronische Vergabe öffentlicher Aufträge verwendet werden können. Diese Diskussion wird durch eine praktische Anwendung des diskutierten service-orientierten Ansatzes erweitert, in dem die Konzeption und prototypische Implementierung eines Teilsystems der VCD Domäne durchgeführt wird. Zu diesem Zweck werden wichtige Aspekte bezüglich Interoperabilität und damit verbundener Standards und Technologien untersucht und im Kontext der öffentlichen Auftragsvergabe betrachtet.
Advanced Auditing of Inconsistencies in Declarative Process Models using Clustering Algorithms
(2021)
Um einen konformen Geschäftsprozess einer Organisation zu haben, ist es unerlässlich, eine konsistente Entscheidungsprozess sicherzustellen. Das Maß für die Überprüfung, ob ein Prozess konsistent ist oder nicht, hängt von den Geschäftsregeln eines Prozesses ab. Wenn der Prozess diesen Geschäftsregeln entspricht, ist der Prozess konform und effizient. Für große Prozesse ist dies eine ziemliche Herausforderung. Eine Inkonsistenz in einem Prozess kann sehr schnell zu einem nicht funktionierenden Prozess führen. Diese Arbeit präsentiert einen neuartigen Auditing-Ansatz für den Umgang mit Inkonsistenzen aus einer Post-Execution-Perspektive. Das Tool identifiziert die Laufzeitinkonsistenzen und visualisiert diese in Heatmaps. Diese Diagramme sollen Modellierern dabei helfen, die problematischsten Einschränkungen zu beobachten und die richtigen Umbauentscheidungen zu treffen. Die mit vielen Variablen unterstützten Modellierer können im Tool so eingestellt werden, dass eine andere Darstellung von Heatmaps angezeigt wird, die dabei hilft, alle Perspektiven des Problems zu erfassen. Die Heatmap sortiert und zeigt die Inkonsistenzmuster zur Laufzeit, sodass der Modellierer entscheiden kann, welche Einschränkungen sehr problematisch sind und eine Neumodellierung angehen sollten. Das Tool kann in angemessener Laufzeit auf reale Datensätze angewendet werden.
This Thesis contributes by reporting on the current state of diffusion of collaboration information technology (CIT). The investigation concludes, with a high degree of certainty, that today we have a "satisfactory" diffusion level of some level-A CITs (mostly e-Mail, distantly followed by Audio Conferencing), and a "dissatisfactory" diffusion level of higher-level CITs (i.e. those requiring significant collaboration and cooperation among users, like Meeting Support Systems, Group Decision Support Systems, etc.). The potential benefits of the latter seem to be far from fully realised due to lack of user acceptance. This conclusion has gradually developed along the research cycle " it was suggested by Empirical Study I, and tested through Empirical Studies II and III. An additional, unplanned and rather interesting, finding from this study has been the recognition of large [mostly business] reporting on numerous Web 2.0 user-community produced collaboration technologies (most of them belonging to the category of "social software") and their metamorphosis from autonomous, "bottom-up" solutions into enterprise-supported infrastructures. Another contribution of this Thesis " again suggested by Empirical Study I, and tested through Empirical Studies II and III " pertains to the "process structure" of CIT diffusion. I have found that collaboration technology has historically diffused following two distinct (interdependent but orthogonal) diffusion paths " top-down (authority-based) and bottom-up. The authority-based diffusion path seems to be characterised by efforts aimed at "imposing" technologies on employees, the primary concern being to make sure that technology seamlessly and easily integrates into the organisational IT infrastructure. On the other hand, the bottom-up diffusion trail seems to be successful. The contribution of this investigation may be summarised as threefold: 1. This investigation consolidates most of the findings to date, pertaining to CIT adoption and diffusion, which have been produced by the CIT research community. Thus, it tells a coherent story of the dynamics of the community focus and the collective wisdom gathered over a period of (at least) one decade. 2. This work offers a meaningful framework within which to analyse existing knowledge " and indeed extends that knowledge base by identifying persistent problems of collaboration technology acceptance, adoption and diffusion. These problems have been repeatedly observed in practice, though the pattern does not seem to have been recognised and internalised by the community. Many of these problems have been observed in cases of CIT use one decade ago, five years ago, three years ago, and continue to be observed today in structurally the same form despite what is unarguably "rapid technological development". This gives me reason to believe that, at least some of the persistent problems of CIT diffusion can be hypothesised as "determining factors". My contribution here is to identify these factors, discuss them in detail, and thus tackle the theme of CIT diffusion through a structured historical narrative. 3. Through my contribution (2) above, I characterise a "knowledge-action gap" in the field of CIT and illuminate a potential path through which the research community might hope to bridge this gap. The gap may be operationalised as cognitive distance between CIT "knowledge" and CIT "action".
Mobile payment has been a payment option in the market for a long time now and was predicted to become a widely used payment method. However, over the years, the market penetration rate of mPayments has been relatively low, despite it having all characteristics required of a convenient payment method. The primaryrnreason for this has been cited as a lack of customer acceptance mainly caused due to the lack of perceived security by the end-user. Although biometric authentication is not a new technology, it is experiencing a revival in the light of the present day terror threats and increased security requirements in various industries. The application of biometric authentication in mPayments is analysed here and a suitable biometric authentication method for use with mPayments is recommended. The issue of enrolment, human and technical factors to be considered are discussed and the STOF business model is applied to a BiMoP (biometric mPayment) application.
The aim of this paper is to identify and understand the risks and issues companies are experiencing from the business use of social media and to develop a framework for describing and categorising those social media risks. The goal is to contribute to the evolving theorisation of social media risk and to provide a foundation for the further development of social media risk management strategies and processes. The study findings identify thirty risk types organised into five categories (technical, human, content, compliance and reputational). A risk-chain is used to illustrate the complex interrelated, multi-stakeholder nature of these risks and directions for future work are identified.
Cloud Computing is a topic that has gained momentum in the last years. Current studies show that an increasing number of companies is evaluating the promised advantages and considering making use of cloud services. In this paper we investigate the phenomenon of cloud computing and its importance for the operation of ERP systems. We argue that the phenomenon of cloud computing could lead to a decisive change in the way business software is deployed in companies. Our reference framework contains three levels (IaaS, PaaS, SaaS) and clarifies the meaning of public, private and hybrid clouds. The three levels of cloud computing and their impact on ERP systems operation are discussed. From the literature we identify areas for future research and propose a research agenda.
An estimation of the number of multiplication and addition operations for training artififfcial neural networks by means of consecutive and parallel algorithms on a computer cluster is carried out. The evaluation of the efficiency of these algorithms is developed. The multilayer perceptron, the Volterra network and the cascade-correlation network are used as structures of artififfcial neural networks. Different methods of non-linear programming such as gradient and non-gradient methods are used for the calculation of the weight coefficients.