Refine
Year of publication
Document Type
- Part of a Book (194)
- Article (unreviewed) (188)
- Conference Proceeding (115)
- Other (94)
- Contribution to a Periodical (48)
- Book (45)
- Article (reviewed) (13)
- Report (11)
- Doctoral Thesis (3)
- Periodical Part (3)
Conference Type
- Konferenzartikel (107)
- Konferenz-Poster (3)
- Konferenzband (3)
- Sonstiges (3)
- Konferenz-Abstract (1)
Has Fulltext
- no (717) (remove)
Is part of the Bibliography
- yes (717)
Keywords
- Digitalisierung (24)
- Bildung (13)
- Schule (13)
- Data Analytics (12)
- Industrie 4.0 (12)
- Social Media Marketing (12)
- Big Data (11)
- Fraud Analytics (11)
- Gamification (11)
- Smart City (11)
- Surveillance (11)
- Assistive Technology (8)
- Social Media (8)
- Management (7)
- Marketing (7)
- Recht (7)
- Urheberrecht (7)
- Human Computer Interaction (6)
- Controlling (5)
- Datenschutz (5)
- Deafblindness (5)
- Informatik (5)
- Kommunikation (5)
- Lernen (5)
- Optik (5)
- Roboter (5)
- Wearables (5)
- Werbung (5)
- Algorithmus (4)
- Autonomie (4)
- Education in Optics and Photonics (4)
- Games (4)
- Ganztagsschule (4)
- Internet (4)
- Learning Analytics (4)
- Licht (4)
- Photonik (4)
- Pädagogik (4)
- Risikomanagement (4)
- Virtual Reality (4)
- Affective Computing (3)
- Ausbildung (3)
- Bildungsmanagement (3)
- COVID-19 (3)
- Computer Games (3)
- Computerspiele (3)
- Datensicherung (3)
- Design (3)
- E-Learning (3)
- Game Design (3)
- Geothermie (3)
- Gesundheitswesen (3)
- Haptics (3)
- Human Resources (3)
- Journalismus (3)
- Massive Open Online Course (3)
- Medien (3)
- Netzwerk (3)
- Neue Medien (3)
- Psychometrie (3)
- Rezension (3)
- Robotics (3)
- Schweigepflicht (3)
- Social Robots (3)
- Tactile (3)
- Virtuelle Realität (3)
- Wirtschaft (3)
- research-oriented education (3)
- Astronomical events (2)
- Bildungscontrolling (2)
- Bloom filters (2)
- Cloud Computing (2)
- Computersicherheit (2)
- Context-Awareness (2)
- Corona (2)
- Corporate Governance (2)
- Deutschland (2)
- Dienstleistung (2)
- E-Commerce (2)
- Einkauf (2)
- Emotion Recognition (2)
- Entwicklung (2)
- Funktechnik (2)
- Hochschule (2)
- Hochschulpolitik (2)
- Impressum (2)
- Interaction metaphor (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Klang (2)
- Kontextbewusstsein (2)
- Kritik (2)
- Live Broadcasting (2)
- Markenpolitik (2)
- Medienforschung (2)
- Medienkompetenz (2)
- Multimedia (2)
- Navigation (2)
- Online-Marketing (2)
- Procedural Content Generation (2)
- Produktion (2)
- Rehabilitation (2)
- Sensortechnik (2)
- Smart Textiles (2)
- Soziale Roboter (2)
- Unterricht (2)
- Verlag (2)
- Verlagsrecht (2)
- Werberecht (2)
- Wettbewerb (2)
- datengestützte Schulentwicklung (2)
- e-mail (2)
- education and research (2)
- optics and photonics (2)
- 3D interaction (1)
- Abmahnung (1)
- Abonnement (1)
- Absatz (1)
- Akustik (1)
- Animationen im Web (1)
- Antrieb <Technik> (1)
- Anzeigenwerbung (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Art and Photonics (1)
- Assekuranz (1)
- Assistive Technologies (1)
- Assistive systems at the workplace (1)
- Astronomie (1)
- Aufführung (1)
- Aufklärung (1)
- Augmented Reality (1)
- Automata (1)
- Autonomes Arbeiten (1)
- Autonomy (1)
- BLIKK-Studie Medien (1)
- Baden-Württemberg (1)
- Balanced Scorecard (1)
- Banking (1)
- Bauteil (1)
- Bayern (1)
- Behaviorismus (1)
- Betriebliche Berufsbildung (1)
- Bewertung (1)
- Bild (1)
- Bildnis (1)
- Bildunsgcontrolling (1)
- Bioakustik (1)
- Biophonie (1)
- Biosignals (1)
- Blockchain (1)
- Break-even-Analyse (1)
- Bruchmechanik (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Collision Avoidance (1)
- Collision avoidance (1)
- Computer (1)
- Computereinsatz in Unterricht und Ausbildung (1)
- Computersimulation (1)
- Context-awareness (1)
- DMD (1)
- Data Integrity (1)
- Data privacy (1)
- Datenbanksystem (1)
- Datennetz (1)
- De-Humanisierung (1)
- Deaf-Blindness (1)
- Delphi-Analyse (1)
- Design Thinking im Controlling (1)
- Dienstleistungsbetrieb (1)
- Digital Storytelling (1)
- Digitale Bildung (1)
- Digitale Fotografie (1)
- Digitale Medien (1)
- Digitale Transformation (1)
- Digitalisierung als Dehumanisierung (1)
- Digitalisierung als Heilslehre (1)
- Digitalisierung von Untericht (1)
- Digitalpakt Schule (1)
- Digitalsierung von Schule und Unterricht (1)
- Digitaltechnik (1)
- Direktmarketing-Controlling (1)
- Disruption (1)
- Dokumentation (1)
- E-Commerce Controlling (1)
- E-Mail (1)
- Educations (1)
- Efficient Consumer Response (1)
- Einbau (1)
- Elektronische Unterschrift (1)
- Emotions (1)
- Empfehlung (1)
- Erfolgsfaktoren (1)
- Erweiterte Realität <Informatik> (1)
- Ethics of technology (1)
- Europa (1)
- Event-Controlling (1)
- Evidenz (1)
- Eyetracking (1)
- Facebook (1)
- Fachwissen (1)
- Fallsammlung (1)
- Farbe (1)
- Faseroptik (1)
- Faserstoff (1)
- Fernsehen (1)
- Filmen (1)
- Fläche (1)
- Flüssigkristall (1)
- Foresight (1)
- Formular (1)
- Forschung (1)
- Freier Beruf (1)
- Früherkennung (1)
- Future Studies (1)
- Fußball (1)
- Gamifizierung (1)
- Gehirn (1)
- Gender in Science and Technology Studies (STS), digitalization, interactive documentary, participation (1)
- Geografie (1)
- Geschäftsmodell (1)
- Gesellschaft (1)
- Gestaltung (1)
- Gewebe (1)
- Gewerbe (1)
- Globalisierung (1)
- Gut <Landwirtschaft> (1)
- Gästebuch (1)
- Gütesiegel (1)
- HR (1)
- Handelsrecht (1)
- Heilberuf (1)
- History of Technology (1)
- Hochschule Offenburg (1)
- Hotel (1)
- Human Computrer Interaction (1)
- Human-Robot Interaction (1)
- Humanismus (1)
- Hybrides Lernen (1)
- Hyperledger (1)
- Hyperlink (1)
- Hören (1)
- IT-Sicherheit (1)
- Image (1)
- Impairments (1)
- Informatik-Lehre (1)
- Information (1)
- Informationstechnik (1)
- Informationstechnologie (1)
- Infratruktur (1)
- Innovationscontrolling (1)
- Installation (1)
- Intelligenz (1)
- Interactive Documentary (1)
- Interaktivität (1)
- Internationales Recht (1)
- Internationales Steuerrecht (1)
- Journalist (1)
- Kaufpreis (1)
- Kennzahlen (1)
- Kennzeichnung (1)
- Kernkompetenzmanagement (1)
- Kinderkommission (1)
- Klarheit (1)
- Klein- und Mittelbetrieb (1)
- Kommunalmarketing (1)
- Kommunalpolitik (1)
- Kommunikationspolitik (1)
- Koppelanordnung (1)
- Korruption (1)
- Kosten-Nutzen-Analyse (1)
- Krankheit (1)
- Krisenmanagement (1)
- Kryptographie (1)
- Kundenbindung (1)
- Kunst (1)
- Kybernetik (1)
- Körper (1)
- Künstlerische Forschung, Taktilität, Medienökologie, Zwischenkörperlichkeit, Philosophie, Leiblichkeit, Interface, Experimentalsystem (1)
- Künstliche Intelligenz (1)
- Leap Motion Controller (1)
- Learning (1)
- Lebenslanges Lernen (1)
- Lehre (1)
- Leistungsbewertung (1)
- Lerntechnik (1)
- Linse (1)
- Lokalisation (1)
- MINT (1)
- Markenführung (1)
- Markenwert (1)
- Marketingcontrolling (1)
- Marktforschung (1)
- Maschinenbau (1)
- Mathematik (1)
- Media Ecology (1)
- Mediaplanung (1)
- Medien-Informatik (1)
- Medien-Konzeption (1)
- Medien-Produktion (1)
- Mediendesign (1)
- Medienkonvergenz (1)
- Medienpädagogik (1)
- Medientechnik (1)
- Medienwandel (1)
- Medienwirtschaft (1)
- Mehrwert (1)
- Mensa (1)
- Mensch (1)
- Mikrocontroller (1)
- Mobiles Endgerät (1)
- Mobilität (1)
- Musik (1)
- Mängelhaftung (1)
- Nachrichtennetz (1)
- Netzwerkarchitektur (1)
- Netzwerkmanagement (1)
- Neurodivergent (1)
- No-line Ansatz (1)
- Oberrhein (1)
- Objektverfolgung (1)
- Offentlichkeitsarbeit (1)
- Olympische Spiele (1)
- Onboarding (1)
- Online (1)
- Online-Marketing-Controlling (1)
- Optics and Photonics (1)
- PCG (1)
- Parasit (1)
- Partei (1)
- Performance (1)
- Personalberatung (1)
- Persönlichkeitsrecht (1)
- Phontonik (1)
- Physik (1)
- Populismus (1)
- Portal (1)
- Portrait (1)
- Predictive Analytics (1)
- Presse (1)
- Privatsphäre (1)
- Procedural Content (1)
- Produktpositionierung (1)
- Programmierung (1)
- Provider (1)
- Prüfung (1)
- Public Relation (1)
- Quellcode (1)
- Rahmenvertrag (1)
- Range Imaging (1)
- Range imaging RGB-D (1)
- Raum (1)
- Rechtsanwaltsvertrag (1)
- Rechtsberatung (1)
- Rechtswissenschaft (1)
- Recruiting (1)
- Recrutainment (1)
- Relaunch (1)
- Risk Assessment (1)
- RoboCup (1)
- Robot-Assisted Training (1)
- Roboterjournalismus (1)
- Robotik (1)
- Robots (1)
- Schreibschrift (1)
- Schulcloud (1)
- Schulkommunikation (1)
- Schulleitung (1)
- Schulmarketing (1)
- Schulorganisation (1)
- Schulverpflegung (1)
- Schulwerbung (1)
- Security Engineering (1)
- Segmentierung (1)
- Sicherheit (1)
- Simulation (1)
- Skype (1)
- Smart Grid (1)
- Smart wearables (1)
- Social CRM (1)
- Social Engineer (1)
- Social Interaction (1)
- Social Media Controlling (1)
- Social inclusion (1)
- Social-Media-Marketing (1)
- Software (1)
- Software Protection (1)
- Software Security (1)
- Soziale Medien (1)
- Soziales Netzwerk (1)
- Spektroskopie (1)
- Spiel (1)
- Spiele (1)
- Sportökonomie (1)
- Sprachkurs (1)
- Stadtmarketing (1)
- Steuer (1)
- Steuerrecht (1)
- Strategisches Marketing (1)
- Strömungsmechanik (1)
- Studium (1)
- Tanz (1)
- Task Analysis (1)
- Taxi (1)
- Taxonomy (1)
- Technikakzeptanz (1)
- Technisierung (1)
- Technology Acceptance (1)
- Teilen (1)
- Telefonverkauf (1)
- Telepresence (1)
- Temperaturmessung (1)
- Textile (1)
- Textmining (1)
- Threat Modeling (1)
- Topology (1)
- Touch (1)
- Toulouse-Lautrec, Henri (1)
- Tourism (1)
- Trauma (1)
- Trust (1)
- UX (1)
- Umwelt (1)
- Umweltforschung (1)
- Unterlassung (1)
- User Experience (1)
- User Studies (1)
- Veranstaltung (1)
- Verkehr (1)
- Vermessung des Menschen (1)
- Versicherungsmarkt (1)
- Versicherungswirtschaft (1)
- Vertrag (1)
- Vertrauen (1)
- Vertriebscontrolling (1)
- Vertriebsmarketing (1)
- Verwertung (1)
- Virtualisierung (1)
- Virtuelles Laboratorium (1)
- Visual Impairments (1)
- Visualisierung (1)
- Wasserrecht (1)
- Web-Applikation (1)
- Wein (1)
- Wettbewerbsrecht (1)
- Wettbewerbsverstoß (1)
- Widerruf (1)
- Widerrufsrecht (1)
- Wirbelsäule (1)
- Wirtschaftlichkeit (1)
- Wirtschaftsprüfung (1)
- Wirtschaftsrecht (1)
- Wissenschaft (1)
- Wissenschaftliche Weiterbildung (1)
- World Wide Web (1)
- Zahlung (1)
- Zeitung (1)
- Zenware (1)
- Zweiseitiger Markt (1)
- agent (1)
- agent based systems (1)
- approximate histograms (1)
- art (1)
- bio-inspired models (1)
- bloom filters (1)
- cloud computing (1)
- cloud security (1)
- color vision (1)
- data malleability (1)
- data processing (1)
- deglobalization (1)
- differential mode-delay (1)
- display technologies (1)
- distributed computing (1)
- eingebettetes Gerät (1)
- homomorphic encryption (1)
- kanal (1)
- kybernetische Pädagogik (1)
- learning scenario (1)
- media (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- outsourced computation (1)
- peer to peer network (1)
- power distribution (1)
- reliability (1)
- scroll-activated animation (1)
- self-organizing networks (1)
- sensor node (1)
- set operations (1)
- set relations (1)
- softwaregenerierter Code (1)
- teaching and learning culture (1)
- time series data (1)
- virtual reality (1)
- wireless sensor network (1)
- Öffentlichkeitsarbeit (1)
- Ökonomisierung der Bildung (1)
- Ökonomisierung von Schule und Untericht (1)
- Ökosysteme (1)
- Übertragungsprotokoll (1)
- Überwachung (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (717) (remove)
Open Access
- Closed Access (363)
- Open Access (111)
- Closed (8)
- Bronze (6)
Marketingrecht
(2018)
SWOT-Analyse
(2018)
Portfolio-Analyse
(2018)
Business Reengineering
(2018)
Leuchtturmmarketing
(2019)
Online-Marketing-Controlling
(2021)
Vor dem Hintergrund der zentralen Bedeutung von Online-Marketing-Maßnahmen vor allem im Kontext der Kommunikationspolitik und den hieraus resultierenden steigenden Investitionen werden in dem vorliegenden Beitrag verschiedene Online-Marketing-Controlling-Instrumente vorgestellt. Die Darstellung baut auf einem Strukturierungsrahmen auf, um eine Kategorisierung und sinnvolle Beschreibung der Vielzahl an Instrumenten zu gewährleisten. Darüber hinaus wird in dem Beitrag ein umfassender Prozess für das Online-Marketing-Controlling dargestellt.
Strategische Analysetechniken ermöglichen langfristig eine strukturierte Erfassung unternehmensinterner Ressourcen in Ausrichtung auf den Markt. Die hier beschriebenen Basis-Techniken umfassen das Produkt-Lebenszyklusanalyse-Modell, verschiedene Typen der Portfolio-Analyse, die Wertketten-Analyse und die SWOT-Analyse. Diese Techniken unterstützen das Marketing-Controlling, Geschäftsfeld- und Marktanalysen für das Management zu erstellen und strategische Handlungsoptionen abzuleiten.
Social-Media-Controlling
(2021)
Social Media spielen in immer mehr Organisationen für unterschiedliche Zielsetzungen eine wichtige Rolle. Entsprechend wächst auch die Bedeutung der Kontrolle der in Social Media durchgeführten Aktivitäten. Im Rahmen dieses Beitrages werden zunächst die zentralen Funktionen eines Social-Media-Controllings vorgestellt und ein Prozess zu dessen sinnvoller Umsetzung beschrieben. Auf Basis einer Übersicht bestehender Kennzahlenmodelle wird dann im weiteren Verlauf ein umfassendes Kennzahlenmodell entwickelt.
Social Media-Controlling
(2017)
Online-Marketing-Controlling
(2017)
VR als Chance für Museen
(2020)
Predictive Analytics als Governance- und Managementanwendung - Zukunftsorientiertes Controlling
(2016)
Einleitung
(2018)
Social Media Marketing
(2020)
In diesem Beitrag wird ein Planungsprozess mit seinen einzelnen Phasen für ein Social Media Marketing vorgestellt. Darüber hinaus werden zentrale Implementierungsoptionen beschrieben. Hierzu gehören Werbung (über Plattformen und Influencer), Kundenservice, Community Management, Social Recruitment, interne Nutzung und Business Profile.
Benchmarking
(2018)
Online-Marktforschung
(2018)
Social CRM
(2018)
No-Line Ansatz
(2018)
Einführender Überblick
(2018)
Social Media Controlling
(2018)
Vor dem Hintergrund wachsender Herausforderungen wird ein professionelles Marketing für Städte und Gemeinden immer wichtiger. Zentrales Ziel dabei ist es, die Attraktivität einer Stadt für die eigene Bevölkerung, Unternehmen und Touristen zu erhöhen. Im vorliegenden Beitrag sollen zunächst einige Rahmenbedingungen des Stadtmarketing skizziert werden. Im Mittelpunkt steht die Vorstellung eines Prozesses, der eine strukturierte Planung und Durchführung des Stadtmarketing ermöglicht.
Das Markenmanagement spielt für das Stadtmarketing eine immer wichtigere Rolle. Im vorliegenden Beitrag wird dabei zunächst auf die Bedeutung und die Besonderheiten des Markenmanagements für Städte eingegangen. Im Mittelpunkt des Beitrages steht ein kompakter Überblick über die zentralen Aspekte des Markenmanagements für Städte. Schließlich wird in einem Exkurs die Bedeutung von Global Cities im Zusammenhang mit dem Markenmanagement vorgestellt.
Städte und Gemeinden müssen sich heute den veränderten Informations- und Kommunikationsverhalten in der Gesellschaft anpassen und entsprechend den Kommunikationsmix erweitern beziehungsweise neu ausrichten. Dabei bieten insbesondere die Online-Kommunikationsmaßnahmen zahlreiche neue Möglichkeiten, zum Beispiel das Targeting. Der folgende Beitrag gibt zunächst einen Überblick über den Kommunikationsprozess und das Content-Marketing. Im Anschluss werden einige wichtige Kommunikationsinstrumente für das Stadtmarketing näher vorgestellt.
The aim of the smart grid is to achieve more efficient, distributed and secure supply of energy over the traditional power grid by using a bidirectional information flow between the grid agents (e.g. generator node, customer). One of the key optimization problems in smart grid is to produce power among generator nodes with a minimum cost while meeting the customer demand, known as Economic Dispatch Problem (EDP). In recent years, many distributed approaches to solve EDP have been proposed. However, protecting the privacy-sensitive data of individual generator nodes has been largely overlooked in the existing solutions. In this work, we show an attack against an existing auction-based EDP protocol considering a non-colluding semi-honest adversary. We briefly introduce our approach to a practical privacy-preserving EDP solution as our work in progress.
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
Practical exercises are a crucial part of many curricula. Even simple exercises can improve the understanding of the underlying subject. Most experimental setups require special hardware. To carry out e. g. a lens experiments the students need access to an optical bench, various lenses, light sources, apertures and a screen. In our previous publication we demonstrated the use of augmented reality visualization techniques in order to let the students prepare with a simulated experimental setup. Within the context of our intended blended learning concept we want to utilize augmented or virtual reality techniques for stationary laboratory exercises. Unlike applications running on mobile devices, stationary setups can be extended more easily with additional interfaces and thus allow for more complex interactions and simulations in virtual reality (VR) and augmented reality (AR). The most significant difference is the possibility to allow interactions beyond touching a screen. The LEAP Motion controller is a small inexpensive device that allows for the tracking of the user’s hands and fingers in three dimensions. It is conceivable to allow the user to interact with the simulation’s virtual elements by the user’s very hand position, movement and gesture. In this paper we evaluate possible applications of the LEAP Motion controller for simulated experiments in augmented and virtual reality. We pay particular attention to the devices strengths and weaknesses and want to point out useful and less useful application scenarios. © (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
In many scientific studies lens experiments are part of the curriculum. The conducted experiments are meant to give the students a basic understanding for the laws of optics and its applications. Most of the experiments need special hardware like e.g. an optical bench, light sources, apertures and different lens types. Therefore it is not possible for the students to conduct any of the experiments outside of the university’s laboratory. Simple optical software simulators enabling the students to virtually perform lens experiments already exist, but are mostly desktop or web browser based.
Augmented Reality (AR) is a special case of mediated and mixed reality concepts, where computers are used to add, subtract or modify one’s perception of reality. As a result of the success and widespread availability of handheld mobile devices, like e.g. tablet computers and smartphones, mobile augmented reality applications are easy to use. Augmented reality can be easily used to visualize a simulated optical bench. The students can interactively modify properties like e.g. lens type, lens curvature, lens diameter, lens refractive index and the positions of the instruments in space. Light rays can be visualized and promote an additional understanding of the laws of optics. An AR application like this is ideally suited to prepare the actual laboratory sessions and/or recap the teaching content.
The authors will present their experience with handheld augmented reality applications and their possibilities for light and optic experiments without the needs for specialized optical hardware.
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
Szenario-Technik
(2018)
Delphi-Technik
(2018)
Kundenbindung
(2018)
Kundenbindungscontrolling
(2018)
Die Mittelbayerische Zeitung ist ein Verlagsbeispiel, das deutlich macht, wie mithilfe einer kontinuierlichen und systematischen Marktbearbeitung auch in stagnierenden Printmärkten eine Stabilisierung der Kundenstruktur möglich ist. Die Kombination mit digitalen Angeboten und die ebenfalls kombinierte Nutzung von unterschiedlichen, teilweise digitalen Kommunikations- und Absatzkanälen sind dabei zentrale Erfolgsfaktoren.
UNIKOPS : Universell konfigurierbare Sicherheitslösung für Cyber-Physikalische heterogene Systeme
(2016)
Ziel von UNIKOPS (Universell konfigurierbare Sicherheitslösung für Cyberphysikalische heterogene Systeme) ist es, hochflexible Software- und teilweise auch Hardwarelösungen mit sehr hohem Sicherheitsniveau zu entwickeln, die in einer Vielzahl von CPS-Anwendungsfeldern, insbesondere mit Sensorknoten, einsetzbar sind.
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
While prospect of tracking mobile devices' users is widely discussed all over European countries to counteract COVID-19 propagation, we propose a Bloom filter based construction providing users' location privacy and preventing mass surveillance.
We apply a solution based on Bloom filters data structure that allows a third party, a government agency, to perform some privacy-preserving set relations on a mobile telco's access logfile.
By computing set relations, the government agency, given the knowledge of two identified persons, has an instrument that provides a (possible) infection chain from the initial to the final infected user no matter at which location on a worldwide scale they are.
The benefit of our approach is that intermediate possible infected users can be identified and subsequently contacted by the agency. With such approach, we state that solely identities of possible infected users will be revealed and location privacy of others will be preserved. To this extent, it meets General Data Protection Regulation (GDPR)requirements in this area.
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit nachweisbar ausgenutzter Angriffsvektoren auf verschiedenste Komponenten mobiler drahtloser Geräte sowie den teilweise inhärent sicherheitskritischen Aktivitäten moderner mobiler OS. Eine für Laien wie Sicherheitsarchitekten gleichermaßen fesselnde Lektüre, die das Vertrauen in sichere mobile Systeme stark einschränken dürfte.
Der Inhalt
Verwundbarkeit von 802.15.4: PiP-Injektion
Verwundbarkeit von WLAN: KRACK-Angriff auf WPA2
Verwundbarkeit von Bluetooth: Blueborne und Co.
Verwundbarkeiten von NFC und durch NFC
Angriffe über das Baseband
Android Sicherheitsarchitektur
Horizontale Rechteausweitung
Techniken zu Obfuskierung und De-Obfuskierung von Apps
Apps mit erhöhten Sicherheitsbedarf: Banking Apps
Positionsbestimmung durch Swarm-Mapping
Seitenkanäle zur Überwindung des ‚Air-gap‘
Ausblick: 5G Sicherheitsarchitektur
Die Zielgruppen: Studierende der Informatik, Wirtschaftsinformatik, Elektrotechnik oder verwandter Studiengänge Praktiker, IT-Sicherheitsbeauftragte, Datenschutzbeauftragte, Entscheidungsträger, Nutzer drahtloser Geräte, die an einem ‚Blick unter die Motorhaube‘ interessiert sind.
Qualitative Wissenschaft, künstlerisches Forschen und forschendes Lernen verbinden Erkenntnis aus Praxis und Erfahrung. In der Autoethnographie der eigenen Werkstatt des Hörens wie der Kultur in Studios anderer, wird die noch neue Interdisziplin Sound (Studies) erprobt und vertieft, mit Impulsen für die Praxis und Theorie, von der noch wenig bekannten A/r/t ographie heute, hin zu einer künftig A/R/Tophonie, dem künstlerischen Forschen in der Musik, ebenso wie durch Klang Komposition, Radio Kunst und visuelle Musik.
MonteVideo Soundscapes
(2016)
'Natural Sound'
(2009)
Signal detection and bandwidth estimation, also known as channel segmentation or information channel estimation, is a perpetual topic in communication systems. In the field of radio monitoring this issue is extremely challenging, since unforeseeable effects like fading occur accidentally. In addition, most radio monitoring devices normally scan a wide frequency range of several hundred MHz and have to detect a multitude of different signals, varying in signal power, bandwidth and spectral shape. Since narrowband sensing techniques cannot be directly applied, most radio monitoring devices use Nyquist wideband sensing to discover the huge frequency range. In practice, sensing is normally conducted by an FFT sweep spectrum analyzer that delivers the power spectral density (PSD) values to the radio monitoring system. The channel segmentation is the initial step of a comprehensive signal analysis in a radio monitoring system based on the PSD values. In this paper, a novel approach for channel segmentation is presented that is based on a quantization and a histogram evaluation of the measured PSD. It will be shown that only the combination of both evaluations will lead to an successful automatic channel segmentation. The performance of the proposed algorithm is shown in a real radio monitoring szenario.
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
The Paper presents the design and development of a blended learning concept for an engineering course in the field of color representation and display technologies. A suitable learning environment is crucial for the success of the teaching scenario. A mixture of theoretical lectures and hands-on activities with practical applications and experiments, combined with the advantages of modern digital media is the main topic of the paper. Blended learning describes the didactical change of attendance periods and online periods. The e-learning environment for the online period is designed toward an easy access and interaction. Present digital media extends the established teaching scenarios and enables the presentation of videos, animations and augmented reality (AR). Visualizations are effective tools to impart learning contents with lasting effect. The preparation and evaluation of the theoretical lectures and the hands-on activities are stimulated and affects positively the attendance periods. The tasks and experiments require the students to work independently and to develop individual solution strategies. This engages and motivates the students, deepens the knowledge. The authors will present their experience with the implemented blended learning scenario in this field of optics and photonics. All aspects of the learning environment will be introduced.
Monitors are in the center of media productions and hold an important function as the main visual interface. Tablets and smartphones are becoming more and more important work tools in the media industry. As an extension to our lecture contents an intensive discussion of different display technologies and its applications is taking place now. The established LCD (Liquid Crystal Display) technology and the promising OLED (Organic Light Emitting Diode) technology are in the focus.
The classic LCD is currently the most important display technology. The paper will present how the students should develop sense for display technologies besides the theoretical scientific basics. The workshop focuses increasingly on the technical aspects of the display technology and has the goal of deepening the students understanding of the functionality by building simple Liquid Crystal Displays by themselves.
The authors will present their experience in the field of display technologies. A mixture of theoretical and practical lectures has the goal of a deeper understanding in the field of digital color representation and display technologies. The design and development of a suitable learning environment with the required infrastructure is crucial. The main focus of this paper is on the hands-on optics workshop “Liquid Crystal Display in the do-it-yourself”.
This paper explains the realization of a concept for research-oriented photonics education. Using the example of the integration of an actual PhD project, it is shown how students are familiarized with the topic of research and scientific work in the first semesters. Typical research activities are included as essential parts of the learning process. Research should be made visible and tangible for the students. The authors will present all aspects of the learning environment, their impressions and experiences with the implemented scenario, as well as first evaluation results of the students.
The authors explain a developed concept for research-oriented education in optics and photonics. It is presented which goals are to be achieved, which strategies have been developed and how these can be implemented in a blended learning scenario. The goal of our education is the best possible qualification of the students on the basis of a strong scientific and research-oriented education, which also includes the acquisition of important interdisciplinary competences. All phases of a research process are to be mapped in the learning process and offer students an insight into current research topics in optics and photonics.
Increased knowledge transfer through the integration of research projects into university teaching
(2019)
This paper describes the integration of the research project "Characterization of Color Vision using Spectroscopy and Nanotechnology: Application to Media Photonics" into an engineering course in the field of media technology. The aim is to develop the existing learning concept towards a more research-oriented teaching. Involving students in research projects as part of the learning process provides a deeper insight into current research topics and the key elements of scientific work. This makes it easier for students to recognize the importance of the acquired theoretical knowledge for the practice, which enables them to derive new insights of their own.
We generalize the fluid flow problem of an oscillating flat plate (II. Stokes problem) in two directions. We discuss first the oscillating porous flat plate with superimposed blowing or suction. The second generalization is concerned with an increasing or decreasing velocity amplitude of the oscillating flat plate. Finally we show that a combination of both effects is possible as well.
In this article, we present a taxonomy in Robot-Assisted Training; a growing body of research in Human–Robot Interaction which focuses on how robotic agents and devices can be used to enhance user’s performance during a cognitive or physical training task. Robot-Assisted Training systems have been successfully deployed to enhance the effects of a training session in various contexts, i.e., rehabilitation systems, educational environments, vocational settings, etc. The proposed taxonomy suggests a set of categories and parameters that can be used to characterize such systems, considering the current research trends and needs for the design, development and evaluation of Robot-Assisted Training systems. To this end, we review recent works and applications in Robot-Assisted Training systems, as well as related taxonomies in Human–Robot Interaction. The goal is to identify and discuss open challenges, highlighting the different aspects of a Robot-Assisted Training system, considering both robot perception and behavior control.
Deafblindness, also known as dual sensory loss, is the combination of sight and hearing impairments of such extent that it becomes difficult for one sense to compensate for the other. Communication issues are a key concern for the Deafblind community. We present the design and technical implementation of the Tactile Board: a mobile Augmentative and Alternative Communication (AAC) device for individuals with deafblindness. The Tactile Board allows text and speech to be translated into vibrotactile signs that are displayed real-time to the user via a haptic wearable. Our aim is to facilitate communication for the deafblind community, creating opportunities for these individuals to initiate and engage in social interactions with other people without the direct need of an intervener.
Co-Designing Assistive Tools to Support Social Interactions by Individuals Living with Deafblindness
(2020)
Deafblindness is a dual sensory impairment that affects many aspects of life, including mobility, access to information, communication, and social interactions. Furthermore, individuals living with deafblindness are under a high risk of social isolation. Therefore, we identified opportunities for applying assistive tools to support social interactions through co-ideation activities with members of the deafblind community. This work presents our co-design approach, lessons learned and directions for designing meaningful assistive tools for dual sensory loss.
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relations as inclusiveness and disjointness based ao Bloom filters. We propose to compose them in a slightly different way by applying a keyed hash function. Besides discussing the correctness of set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. Indeed, our solution proposes to bring another layer of privacy on the sizes. We are in particular interested how the overlapping bits of a Bloom filter impact the privacy level of our approach. We concretely apply our solution to a use case of cloud security audit on access control and present our results with real-world parameters.
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
Das vorliegende Buch richtet sich vorwiegend an Webentwickler und Webinteressierte. Zunächst wird ein Überblick über Digital Storytelling, seine Geschichte und die verschiedenen heutigen Ausprägungen gegeben. Dabei liegt der Fokus auf Digital Storytelling im Web auf Basis von Animation.
Besonders die Idee der scroll-activated animation als zeitgemäßes Konzept für das Storytelling wird in diesem Buch in den Mittelpunkt gestellt.
Als technische Möglichkeiten zur Umsetzung von Webanimationen werden CSS3, SVG und HTML5-Canvas vorgestellt und diese in der Folge detailliert beschrieben.
Im Rahmen eines umfangreich dokumentierten Demoprojekts wird intensiv auf die Konzeption einer scroll-actived animation basierten Website und deren technische Umsetzung mittels HTML5, CSS3, JavaScript/jQuery und ScrollMagic sowie die damit verbundenen Herausforderungen eingegangen. Dies erlaubt dem Leser das detaillierte Nachvollziehen der Erstellung und die davon abgeleitete Entwicklung eigener Projekte.
Der Inhalt des Buches
- Definition, Entwicklung und psychologische Wirkungsweisen
- Medienformen
- Digital Storytelling
- Animationen im Web
- Technische Umsetzung
Die Zielgruppen des Buches
- Konzepter
- Webentwickler
- Mediengestalter
- Studenten, Azubis
- Webinteressierte
Autonome Systeme im Consumerbereich - Was bedeutet die Autonomie technischer Systeme für den Kunden
(2018)
In this work we describe the implementation details of a protocol suite for a secure and reliable over-the-air reprogramming of wireless restricted devices. Although, recently forward error correction codes aiming at a robust transmission over a noisy wireless medium have extensively been discussed and evaluated, we believe that the clear value of the contribution at hand is to share our experience when it comes to a meaningful combination and implementation of various multihop (broadcast) transmission protocols and custom-fit security building blocks: For a robust and reliable data transmission we make use of fountain codes a.k.a. rateless erasure codes and show how to combine such schemes with an underlying medium access control protocol, namely a distributed low duty cycle medium access control (DLDC-MAC). To handle the well known problem of packet pollution of forward-error-correction approaches where an attacker bogusly modifies or infiltrates some minor number of encoded packets and thus pollutes the whole data stream at the receiver side, we apply homomorphic message authentication codes (HomMAC). We discuss implementation details and the pros and cons of the two currently available HomMAC candidates for our setting. Both require as the core cryptographic primitive a symmetric block cipher for which, as we will argue later, we have opted for the PRESENT, PRIDE and PRINCE (exchangeable) ciphers in our implementation.
Das Ziel der Arbeit ist es, die Wirkung von datenschutzbezogenen Gütesiegeln auf das Vertrauen, die Teilnahmebereitschaft und die freiwillige Datenbekanntgabe in Webbefragungen zu untersuchen. Hierbei soll der unternehmerische Nutzen im Kontext der deutschen Markt-, Medien- und Sozialforschung transparent gemacht werden. Da sich an diesem Markt überwiegend kleine und mittlere Forschungseinrichtungen befinden, werden die wirtschaftlichen Belange dieser Unternehmen besonders berücksichtigt. Insgesamt beschäftigt sich die Arbeit durch den besonderen Branchenbezug zur deutschen Markt-, Medien- und Sozialforschung mit einem neuartigen Forschungsfeld. Vor diesem Hintergrund werden die konzeptionellen und theoretischen Grundlagen, die zum Einsatz von Gütesiegeln im E-Commerce vorliegen, in einem neuen Licht betrachtet. Dabei liegt die Besonderheit der Arbeit darin, dass sie sich mit der freiwilligen Bekanntgabe von persönlichen Daten auf der Basis von intrinsisch motivierten Faktoren befasst.
Entscheidungstechniken
(2018)
Vom Studenten zum Chef
(2016)
Dos and Don’ts im Dashboard-Design: Wie Eyetracking-Verfahren bei der Datenvisualisierung helfen
(2016)
Video game developers continuously increase the degree of details and realism in games to create more human-like characters. But increasing the human-likeness becomes a problem in regard to the Uncanny Valley phenomenon that predicts negative feelings of people towards artificial entities. We developed an avatar creation system to examine preferences towards parametrized faces and explore in regard to the Uncanny Valley phenomenon how people design faces that they like or reject. Based on the 3D model of the Caucasian average face, 420 participants generate 1341 faces of positively and negatively associated concepts of both gender. The results show that some characteristics associated with the Uncanny Valley are used to create villains or repulsive faces. Heroic faces get attractive features but are rarely and little stylized. A voluntarily designed face is very similar to the heroine. This indicates that there is a tendency of users to design feminine and attractive but still credible faces.