000 Allgemeines, Informatik, Informationswissenschaft
Refine
Year of publication
Document Type
- Bachelor Thesis (139)
- Master's Thesis (44)
- Conference Proceeding (35)
- Article (reviewed) (18)
- Part of a Book (13)
- Article (unreviewed) (13)
- Book (9)
- Contribution to a Periodical (7)
- Doctoral Thesis (2)
- Periodical Part (2)
Conference Type
- Konferenzartikel (31)
- Konferenzband (2)
- Konferenz-Abstract (1)
- Konferenz-Poster (1)
Keywords
- Künstliche Intelligenz (18)
- Internet der Dinge (11)
- Marketing (11)
- Webentwicklung (11)
- Maschinelles Lernen (10)
- IT-Sicherheit (9)
- Informatik (9)
- Datenqualität (8)
- Gamification (8)
- JavaScript (8)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (108)
- Fakultät Medien (M) (ab 22.04.2021) (69)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (49)
- Fakultät Wirtschaft (W) (23)
- ACI - Affective and Cognitive Institute (20)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (19)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (13)
- IMLA - Institute for Machine Learning and Analytics (10)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (3)
- IfTI - Institute for Trade and Innovation (2)
Open Access
- Closed Access (133)
- Open Access (88)
- Closed (58)
- Diamond (12)
- Bronze (5)
- Hybrid (4)
- Gold (2)
Gamification is increasingly successful in the field of education and health. However, beyond call-centers and applications in human resources, its utilization within companies remains limited. In this paper, we examine the acceptance of gamification in a large company (with over 17,000 employees) across three generations, namely X, Y, and Z. Furthermore, we investigate which gamification elements are suited for business contexts, such as the dissemination of company principles and facts, or the organization of work tasks. To this end, we conducted focus group discussions, developed the prototype of a gamified company app, and performed a large-scale evaluation with 367 company employees. The results reveal statistically significant intergenerational disparities in the acceptance of gamification: younger employees, especially those belonging to Generation Z, enjoy gamification more than older employees and are most likely to engage with a gamified app in the workplace. The results further show a nuanced range of preferences regarding gamification elements: avatars are popular among all generations, badges are predominantly appreciated by Generations Z and Y, while leaderboards are solely liked by Generation Z. Drawing upon these insights, we provide recommendations for future gamification projects within business contexts. We hope that the results of our study regarding the preferences of the gamification elements and understanding generational differences in acceptance and usage of gamification will help to create more engaging and effective apps, especially within the corporate landscape.
A report from the World Economic Forum (2019) stated loneliness as the third societal stressor in the world, mainly in western countries. Moreover, research shows that loneliness tends to be experienced more severely by young adults than other age groups (Rokach, 2000), which is the case of university students who face profound periods of loneliness when attending university in a new place (Diehl et al., 2018). Digital technology, especially mental health apps (MHapps), have been viewed as promising solutions to address this distress in universities, however, little evidence on this topic reveals uncertainty around how these resources impact individual well-being. Therefore, this research proposed to investigate how the gamified social mobile app Noneliness reduced loneliness rates and other associated mental health issues of students from a German university. As little work has focused on digital apps targeting loneliness, this project also proposed to describe and discuss the app’s design and development processes. A multimethod approach was adopted: literature review on high-efficacy MHapps design, gamification for mental health and loneliness interventions; User Experience Design and Human-centered Computing. Evaluations occurred according to the app’s development iterations, which assessed four versions (from prototype to Beta) through quantitative and qualitative studies with university students. The main results obtained regarding the design aspects were: users' preference for minimalistic interfaces; importance in maintaining privacy and establishing trust among users; students' willingness to use an online support space for emotional and educational support. Most used features were those related to group discussions, private chats and university social events. Preferred gamification elements were those that provided positive reinforcement to motivate social interactions (e.g. Points, Levels and Achievements). Results of a pilot randomized controlled trial with university students (N = 12), showed no statistically significant interactions in reducing loneliness among experimental group members (n = 7, x² = 3.500, p-value = 0.477, Cramer’s V = 0.27) who made continued use of the app for six weeks. On the other hand, the app showed effects of moderate magnitude on loneliness reduction in this group. The app also demonstrated relatively strong magnitude effects on other associated variables, such as depression and stress in the experimental group. In addition to motivating the conduct of further studies with larger samples, the findings point to a potential app effectiveness not only to reduce loneliness, but also other variables that may be associated with the distress.
Many sectors, like finance, medicine, manufacturing, and education, use blockchain applications to profit from the unique bundle of characteristics of this technology. Blockchain technology (BT) promises benefits in trustability, collaboration, organization, identification, credibility, and transparency. In this paper, we conduct an analysis in which we show how open science can benefit from this technology and its properties. For this, we determined the requirements of an open science ecosystem and compared them with the characteristics of BT to prove that the technology suits as an infrastructure. We also review literature and promising blockchain-based projects for open science to describe the current research situation. To this end, we examine the projects in particular for their relevance and contribution to open science and categorize them afterwards according to their primary purpose. Several of them already provide functionalities that can have a positive impact on current research workflows. So, BT offers promising possibilities for its use in science, but why is it then not used on a large-scale in that area? To answer this question, we point out various shortcomings, challenges, unanswered questions, and research potentials that we found in the literature and identified during our analysis. These topics shall serve as starting points for future research to foster the BT for open science and beyond, especially in the long-term.
It is generally agreed that the development and deployment of an important amount of IoT devices throughout the world has revolutionized our lives in a way that we can rely on these devices to complete certain tasks that may have not been possible just years ago which also brought a new level of convenience and value to our lives.
This technology is allowing us in a smart home environment to remotely control doors, windows, and fridges, purchase online, stream music easily with the use of voice assistants such as Amazon Echo Alexa, also close a garage door from anywhere in the world to cite some examples as this technology has added value to several domains ranging from household environments, cites, industries by exchanging and transferring data between these devices and customers. Many of these devices’ sensors, collect and share information in real-time which enables us to make important business decisions.
However, these devices pose some risks and also some security and privacy challenges that need to be addressed to reach their full potential or be considered to be secure. That is why, comprehensive risk analysis techniques are essential to enhance the security posture of IoT devices as they can help evaluate the robustness and reliability towards potential susceptibility to risks, and vulnerabilities that IoT devices in a smart home setting might possess.
This approach relies on the basis of ISO/IEC 27005 methodology and risk matrix method to highlight the level of risks, impact, and likelihood that an IoT device in smart home settings can have, map the related vulnerability, threats and risks and propose the necessary mitigation strategies or countermeasures that can be taken to secure a device and therefore satisfying some security principles. Around 30 risks were identified on Amazon Echo and the related IoT system using the methodology. A detailed list of countermeasures is proposed as a result of the risk analysis. These results, in turn, can be used to elevate the security posture of the device.
In this article, we present a taxonomy in Robot-Assisted Training; a growing body of research in Human–Robot Interaction which focuses on how robotic agents and devices can be used to enhance user’s performance during a cognitive or physical training task. Robot-Assisted Training systems have been successfully deployed to enhance the effects of a training session in various contexts, i.e., rehabilitation systems, educational environments, vocational settings, etc. The proposed taxonomy suggests a set of categories and parameters that can be used to characterize such systems, considering the current research trends and needs for the design, development and evaluation of Robot-Assisted Training systems. To this end, we review recent works and applications in Robot-Assisted Training systems, as well as related taxonomies in Human–Robot Interaction. The goal is to identify and discuss open challenges, highlighting the different aspects of a Robot-Assisted Training system, considering both robot perception and behavior control.
This chapter portrays the historical and mathematical background of dynamic and procedural content generation (PCG). We portray and compare various PCG methods and analyze which mathematical approach is suited for typical applications in game design. In the next step, a structural overview of games applying PCG as well as types of PCG is presented. As abundant PCG content can be overwhelming, we discuss context-aware adaptation as a way to adapt the challenge to individual players’ requirements. Finally, we take a brief look at the future of PCG.
In pandemic times, the possibilities for conventional sports activities are severely limited; many sports facilities are closed or can only be used with restrictions. To counteract this lack of health activities and social exchange, people are increasingly adopting new digital sports solutions—a behavior change that had already started with the trend towards fitness apps and activity trackers. Existing research suggests that digital solutions increase the motivation to move and stay active. This work further investigates the potentials of digital sports incorporating the dimensions gender and preference for team sports versus individual sports. The study focuses on potential users, who were mostly younger professionals and academics. The results show that the SARS-CoV-19 pandemic had a significant negative impact on sports activity, particularly on persons preferring team sports. To compensate, most participants use more digital sports than before, and there is a positive correlation between the time spent physically active during the pandemic and the increase in motivation through digital sports. Nevertheless, there is still considerable skepticism regarding the potential of digital sports solutions to increase the motivation to do sports, increase performance, or raise a sense of team spirit when done in groups.
The progress in machine learning has led to advanced deep neural networks. These networks are widely used in computer vision tasks and safety-critical applications. The automotive industry, in particular, has experienced a significant transformation with the integration of deep learning techniques and neural networks. This integration contributes to the realization of autonomous driving systems. Object detection is a crucial element in autonomous driving. It contributes to vehicular safety and operational efficiency. This technology allows vehicles to perceive and identify their surroundings. It detects objects like pedestrians, vehicles, road signs, and obstacles. Object detection has evolved from being a conceptual necessity to an integral part of advanced driver assistance systems (ADAS) and the foundation of autonomous driving technologies. These advancements enable vehicles to make real-time decisions based on their understanding of the environment, improving safety and driving experiences. However, the increasing reliance on deep neural networks for object detection and autonomous driving has brought attention to potential vulnerabilities within these systems. Recent research has highlighted the susceptibility of these systems to adversarial attacks. Adversarial attacks are well-designed inputs that exploit weaknesses in the deep learning models underlying object detection. Successful attacks can cause misclassifications and critical errors, posing a significant threat to the functionality and safety of autonomous vehicles. With the rapid development of object detection systems, the vulnerability to adversarial attacks has become a major concern. These attacks manipulate inputs to deceive the target system, significantly compromising the reliability and safety of autonomous vehicles. In this study, we focus on analyzing adversarial attacks on state-of-the-art object detection models. We create adversarial examples to test the models’ robustness. We also check if the attacks work on a different object detection model meant for similar tasks. Additionally, we extensively evaluate recent defense mechanisms to see how effective they are in protecting deep neural networks (DNNs) from adversarial attacks and provide a comprehensive overview of the most commonly used defense strategies against adversarial attacks, highlighting how they can be implemented practically in real-world situations.