When writing semantic descriptions of programming languages, it is convenient to have tools for c... more When writing semantic descriptions of programming languages, it is convenient to have tools for checking the descriptions. With frameworks that use inductively defined semantic functions to map programs to their denotations, we would like to check that the semantic functions result in denotations with certain properties. In this paper we present a type system for a modular style of the action semantic framework that, given signatures of all the semantic functions used in a semantic equation defining a semantic function, performs a soft type check on the action in the semantic equation.<br /> <br />We introduce types for actions that describe different properties of the actions, like the type of data they expect and produce, whether they can fail or have side effects, etc. A type system for actions which uses these new action types is presented. Using the new action types in the signatures of semantic functions, the language describer can assert properties of semantic fun...
Die Verbreitung des Internets hat große Auswirkungen auf das Einkaufsver-halten von Menschen, was... more Die Verbreitung des Internets hat große Auswirkungen auf das Einkaufsver-halten von Menschen, was zu einer Vielzahl neuer Geschäftsmodelle geführt hat (vgl Kalakota and Whinston 1997, S. 7). Dabei gibt es allerdings große Unterschiede in der Nutzung eines Geschäfts und seines elektronischen Gegenstücks Beispielsweise wird die individuelle Vor-Ort-Beratung häufig nur durch einen Hilfe-Button auf der Homepage des Online-Shops ersetzt. Sensorische Eindrücke gehen bei der Visualisierung häufig verloren. Den ...
2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015
ABSTRACT The majority of applications use a prompt for a username and password. Passwords are rec... more ABSTRACT The majority of applications use a prompt for a username and password. Passwords are recommended to be unique, long, complex, alphanumeric and non-repetitive. These reasons that make passwords secure may prove to be a point of weakness. The complexity of the password provides a challenge for a user and they may choose to record it. This compromises the security of the password and takes away its advantage. An alternate method of security is Keystroke Biometrics. This approach uses the natural typing pattern of a user for authentication. This paper proposes a new method for reducing error rates and creating a robust technique. The new method makes use of multiple sensors to obtain information about a user. An artificial neural network is used to model a user&#39;s behavior as well as for retraining the system. An alternate user verification mechanism is used in case a user is unable to match their typing pattern.
In today’s world, no company can survive without innovation and nearly all modern forms of innova... more In today’s world, no company can survive without innovation and nearly all modern forms of innovation relay on IT in some way. It is the task of IS professionals, to cope with these trends and enable innovation. New teaching approaches are said to be required in order to empower IS professionals to become leaders in their business. The purpose of this paper is show how integrated teaching processes for developing IS leaders can do so. A combination of a Design Science Research (DSR) approach and a Product-Service Systems (PSS) Engineering Method is used to develop and evaluate this teaching approach. We present the product model, process models for the approach and a prototype that supports the processes as well as we explain the concept of integrated modules. The approach is evaluated by application in reality. Results show the usefulness of both, the applied methodology and the approach itself for research and practice.
Durch die sich permanent verändernde Informations- und Kommunikationstechnologie (IT) ist es für ... more Durch die sich permanent verändernde Informations- und Kommunikationstechnologie (IT) ist es für viele Berufstätige in diesem Bereich unabdingbar, auf dem neusten Wissensstand zu sein. Allerdings ist der Weiterbildungsmarkt sehr undurchsichtig und breit aufgestellt. Dies stellt vor allem Berufsanfänger vor die Herausforderung, die richtigen Veranstaltungen auszuwählen. Daher ist es notwendig, Methoden und Modelle zu entwickeln, die den Weiterbildungsmarkt nachvollziehbarer gestalten. In diesem Beitrag wird das Further Education Maturity Model (FEMM) beschrieben, welches Nutzern erlaubt, Veranstaltungen anhand ihrer spezifischen Charakteristika bestimmten Reifegradstufen zuzuordnen und so Entscheidungen über die Güte einer Weiterbildungsveranstaltung treffen zu können. Die Ergebnisse zeigen, dass das entwickelte Tool den Nutzer komfortabel unterstützt.
The permanently changing information and communication technology (IT) makes it inevitable for IT... more The permanently changing information and communication technology (IT) makes it inevitable for IT professionals to keep up-to-date. However, the market for further education presents itself as being diversified and opaque at the same time. Especially for young professionals, the selection of the “right” training offering is difficult. This entails the necessity to develop methods and models to create the further education market in a more comprehensible and transparent way. This article describes the development of the Further Education Maturity Model (FEMM). It enables users to assign IT training offerings to certain maturity levels and consequently to make decisions about the quality of the further education offering. A proven procedure is used to develop the FEMM, implement it into an online tool, and evaluate it. Results show the appropriateness of the proposed model. Keywords Maturity Models, Continuing Education, Chief Information Officer, IT Consultant, Software Tool, Design Science INTRODUCTION The significance of information and communication technologies (IT) has continuously increased during the last decades. Parallel to the growing diversity and the accelerating development cycles of innovative technologies, the requirements and qualification demands on the employees in the companies grow (Luftman and Derksen, 2012). Hence, qualified employees working in the field of IT management and IT consulting (ITMC) are permanently looking for new opportunities for further education (Boehm, Stolze, Breitschwerdt, Zarvić and Thomas, 2011). This is not a trivial task since the type of skills required to move forward in the career depends on various career paths available in this field (Joseph, Boh, Ang and Slaughter, 2012). In literature, there is a comprehensive discussion on this issue by examination of existing and future skills of ITMC professionals, for example (Boehm, Stolze and Thomas, 2013). Further education (continuing education) can be understood as the resumption of organized learning after completion of a first period of education and subsequent employment or family business activities. In addition to the first education of professionals and university graduates, the permanent training and further education is daily routine for qualified personnel in the ITMC field (Agarwal and Ferratt, 2002). The aim is to increase competences covering a wide range of fields. Competence describes a person’s capacity which does not only consist of knowledge and abilities, but also of other skills, like, e.g., social or methodological competences (Wieringa, van Eck, Steghuis and Proper, 2009). It is nothing more than waste of funds if the wrong sort of training is done poorly at the wrong time (Berge, 2008). Results are often the questioning of training’s effectiveness and subsequently the reduction of financial resources for it. Problems also occur when selecting further educational offerings because the market is very diversified (Boehm et al., 2011). Nevertheless, attending useful training programs for safeguarding power and political situation within the company is especially required for ITMC professionals, like for example the Chief Information Officers (CIO) (Gerow, Grover and Thatcher, 2012). Boehm et al. The Further Education Maturity Model (FEMM) Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. 2 An adequate means in order to avoid the problem of conducting wrong training is to categorize training offerings in advance in a more transparent manner by means of a maturity model. By doing so, the selection process becomes more transparent and better training results will be visible. A maturity model represents a sequence of maturity levels for a class of objects (Becker, Knackstedt and Pöppelbuß, 2009). It describes an anticipated, requested, or typical development process of formerly selected objects. These objects are pictured in consecutive levels. The smallest level represents an early stage whereas the highest constitutes complete maturity. Although we conducted an extensive literature research, no maturity model helping to find a suitable further education offering could be identified. The following sections therefore describe how the Further Education Maturity Model (FEMM) has been systematically developed, implemented, and evaluated. METHOD The methodological basis for the development of the maturity model is a design-oriented approach which encompasses the principles of artifact design and evaluation (Hevner, March, Park and Ram, 2004). In general, the development process of maturity models as artifacts follows the phases of problem definition, construction and evaluation (Marx, Wortmann and Mayer, 2012). On this basis, de Bruin et al. (2005) derived the main steps Scope, Design, Populate, Test, Deploy, and Maintain for the general maturity model development (MMD). This serves as a basis for quite a number of detailed procedure models…
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2011
Page 1. ASDF: An Autonomous and Scalable Distributed File System ... In this paper, we propose a ... more Page 1. ASDF: An Autonomous and Scalable Distributed File System ... In this paper, we propose a distributed file system, called ASDF, to meet the demands of not only data-intensive applications but also end users, developers and administrators. ...
ABSTRACT In the past, there has been a lot of research on Product-Service Systems (PSS) – integra... more ABSTRACT In the past, there has been a lot of research on Product-Service Systems (PSS) – integrated bundles of products and services. However, the topic has been basically independently discussed by researchers of different disciplines. The purpose of this paper is to integrate the results of the fields of Information Systems, Business Management, and Engineering &amp; Design and hence to investigate the state-of-the-art in PSS research by conducting a structured literature review. In total 265 articles have been intensively analyzed. A unified core definition of the PSS term is derived as well as the notion of the concept in the three disciplines is explained and summarized. A meta-analysis of previous literature reviews completes the picture. Based on our data it is shown that the understanding of PSS is very different in the three disciplines. Therefore, a research agenda for future research is developed which includes for example the need for clarifying the terminology, changing perspectives, and conducting more evaluations.
When writing semantic descriptions of programming languages, it is convenient to have tools for c... more When writing semantic descriptions of programming languages, it is convenient to have tools for checking the descriptions. With frameworks that use inductively defined semantic functions to map programs to their denotations, we would like to check that the semantic functions result in denotations with certain properties. In this paper we present a type system for a modular style of the action semantic framework that, given signatures of all the semantic functions used in a semantic equation defining a semantic function, performs a soft type check on the action in the semantic equation.<br /> <br />We introduce types for actions that describe different properties of the actions, like the type of data they expect and produce, whether they can fail or have side effects, etc. A type system for actions which uses these new action types is presented. Using the new action types in the signatures of semantic functions, the language describer can assert properties of semantic fun...
Die Verbreitung des Internets hat große Auswirkungen auf das Einkaufsver-halten von Menschen, was... more Die Verbreitung des Internets hat große Auswirkungen auf das Einkaufsver-halten von Menschen, was zu einer Vielzahl neuer Geschäftsmodelle geführt hat (vgl Kalakota and Whinston 1997, S. 7). Dabei gibt es allerdings große Unterschiede in der Nutzung eines Geschäfts und seines elektronischen Gegenstücks Beispielsweise wird die individuelle Vor-Ort-Beratung häufig nur durch einen Hilfe-Button auf der Homepage des Online-Shops ersetzt. Sensorische Eindrücke gehen bei der Visualisierung häufig verloren. Den ...
2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015
ABSTRACT The majority of applications use a prompt for a username and password. Passwords are rec... more ABSTRACT The majority of applications use a prompt for a username and password. Passwords are recommended to be unique, long, complex, alphanumeric and non-repetitive. These reasons that make passwords secure may prove to be a point of weakness. The complexity of the password provides a challenge for a user and they may choose to record it. This compromises the security of the password and takes away its advantage. An alternate method of security is Keystroke Biometrics. This approach uses the natural typing pattern of a user for authentication. This paper proposes a new method for reducing error rates and creating a robust technique. The new method makes use of multiple sensors to obtain information about a user. An artificial neural network is used to model a user&#39;s behavior as well as for retraining the system. An alternate user verification mechanism is used in case a user is unable to match their typing pattern.
In today’s world, no company can survive without innovation and nearly all modern forms of innova... more In today’s world, no company can survive without innovation and nearly all modern forms of innovation relay on IT in some way. It is the task of IS professionals, to cope with these trends and enable innovation. New teaching approaches are said to be required in order to empower IS professionals to become leaders in their business. The purpose of this paper is show how integrated teaching processes for developing IS leaders can do so. A combination of a Design Science Research (DSR) approach and a Product-Service Systems (PSS) Engineering Method is used to develop and evaluate this teaching approach. We present the product model, process models for the approach and a prototype that supports the processes as well as we explain the concept of integrated modules. The approach is evaluated by application in reality. Results show the usefulness of both, the applied methodology and the approach itself for research and practice.
Durch die sich permanent verändernde Informations- und Kommunikationstechnologie (IT) ist es für ... more Durch die sich permanent verändernde Informations- und Kommunikationstechnologie (IT) ist es für viele Berufstätige in diesem Bereich unabdingbar, auf dem neusten Wissensstand zu sein. Allerdings ist der Weiterbildungsmarkt sehr undurchsichtig und breit aufgestellt. Dies stellt vor allem Berufsanfänger vor die Herausforderung, die richtigen Veranstaltungen auszuwählen. Daher ist es notwendig, Methoden und Modelle zu entwickeln, die den Weiterbildungsmarkt nachvollziehbarer gestalten. In diesem Beitrag wird das Further Education Maturity Model (FEMM) beschrieben, welches Nutzern erlaubt, Veranstaltungen anhand ihrer spezifischen Charakteristika bestimmten Reifegradstufen zuzuordnen und so Entscheidungen über die Güte einer Weiterbildungsveranstaltung treffen zu können. Die Ergebnisse zeigen, dass das entwickelte Tool den Nutzer komfortabel unterstützt.
The permanently changing information and communication technology (IT) makes it inevitable for IT... more The permanently changing information and communication technology (IT) makes it inevitable for IT professionals to keep up-to-date. However, the market for further education presents itself as being diversified and opaque at the same time. Especially for young professionals, the selection of the “right” training offering is difficult. This entails the necessity to develop methods and models to create the further education market in a more comprehensible and transparent way. This article describes the development of the Further Education Maturity Model (FEMM). It enables users to assign IT training offerings to certain maturity levels and consequently to make decisions about the quality of the further education offering. A proven procedure is used to develop the FEMM, implement it into an online tool, and evaluate it. Results show the appropriateness of the proposed model. Keywords Maturity Models, Continuing Education, Chief Information Officer, IT Consultant, Software Tool, Design Science INTRODUCTION The significance of information and communication technologies (IT) has continuously increased during the last decades. Parallel to the growing diversity and the accelerating development cycles of innovative technologies, the requirements and qualification demands on the employees in the companies grow (Luftman and Derksen, 2012). Hence, qualified employees working in the field of IT management and IT consulting (ITMC) are permanently looking for new opportunities for further education (Boehm, Stolze, Breitschwerdt, Zarvić and Thomas, 2011). This is not a trivial task since the type of skills required to move forward in the career depends on various career paths available in this field (Joseph, Boh, Ang and Slaughter, 2012). In literature, there is a comprehensive discussion on this issue by examination of existing and future skills of ITMC professionals, for example (Boehm, Stolze and Thomas, 2013). Further education (continuing education) can be understood as the resumption of organized learning after completion of a first period of education and subsequent employment or family business activities. In addition to the first education of professionals and university graduates, the permanent training and further education is daily routine for qualified personnel in the ITMC field (Agarwal and Ferratt, 2002). The aim is to increase competences covering a wide range of fields. Competence describes a person’s capacity which does not only consist of knowledge and abilities, but also of other skills, like, e.g., social or methodological competences (Wieringa, van Eck, Steghuis and Proper, 2009). It is nothing more than waste of funds if the wrong sort of training is done poorly at the wrong time (Berge, 2008). Results are often the questioning of training’s effectiveness and subsequently the reduction of financial resources for it. Problems also occur when selecting further educational offerings because the market is very diversified (Boehm et al., 2011). Nevertheless, attending useful training programs for safeguarding power and political situation within the company is especially required for ITMC professionals, like for example the Chief Information Officers (CIO) (Gerow, Grover and Thatcher, 2012). Boehm et al. The Further Education Maturity Model (FEMM) Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. 2 An adequate means in order to avoid the problem of conducting wrong training is to categorize training offerings in advance in a more transparent manner by means of a maturity model. By doing so, the selection process becomes more transparent and better training results will be visible. A maturity model represents a sequence of maturity levels for a class of objects (Becker, Knackstedt and Pöppelbuß, 2009). It describes an anticipated, requested, or typical development process of formerly selected objects. These objects are pictured in consecutive levels. The smallest level represents an early stage whereas the highest constitutes complete maturity. Although we conducted an extensive literature research, no maturity model helping to find a suitable further education offering could be identified. The following sections therefore describe how the Further Education Maturity Model (FEMM) has been systematically developed, implemented, and evaluated. METHOD The methodological basis for the development of the maturity model is a design-oriented approach which encompasses the principles of artifact design and evaluation (Hevner, March, Park and Ram, 2004). In general, the development process of maturity models as artifacts follows the phases of problem definition, construction and evaluation (Marx, Wortmann and Mayer, 2012). On this basis, de Bruin et al. (2005) derived the main steps Scope, Design, Populate, Test, Deploy, and Maintain for the general maturity model development (MMD). This serves as a basis for quite a number of detailed procedure models…
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2011
Page 1. ASDF: An Autonomous and Scalable Distributed File System ... In this paper, we propose a ... more Page 1. ASDF: An Autonomous and Scalable Distributed File System ... In this paper, we propose a distributed file system, called ASDF, to meet the demands of not only data-intensive applications but also end users, developers and administrators. ...
ABSTRACT In the past, there has been a lot of research on Product-Service Systems (PSS) – integra... more ABSTRACT In the past, there has been a lot of research on Product-Service Systems (PSS) – integrated bundles of products and services. However, the topic has been basically independently discussed by researchers of different disciplines. The purpose of this paper is to integrate the results of the fields of Information Systems, Business Management, and Engineering &amp; Design and hence to investigate the state-of-the-art in PSS research by conducting a structured literature review. In total 265 articles have been intensively analyzed. A unified core definition of the PSS term is derived as well as the notion of the concept in the three disciplines is explained and summarized. A meta-analysis of previous literature reviews completes the picture. Based on our data it is shown that the understanding of PSS is very different in the three disciplines. Therefore, a research agenda for future research is developed which includes for example the need for clarifying the terminology, changing perspectives, and conducting more evaluations.
Uploads