Refine
Year of publication
Document Type
- Conference Proceeding (68)
- Article (67)
- Part of a Book (13)
- Report (11)
- Doctoral Thesis (4)
- Book (2)
- Working Paper (2)
- Other (1)
Institute
- Forschungszentrum Business Informatics (168) (remove)
Is part of the Bibliography
- yes (168)
Keywords
- Evolution Strategies (5)
- Volatile organic compounds (5)
- Constrained Optimization (4)
- Stress testing (4)
- Evolution strategies (3)
- Evolution strategy (3)
- Fragmentation patterns (3)
- Global optimization (3)
- Humans (3)
- Optimization (3)
- Rastrigin function (3)
- Risk measures (3)
- Scenario analysis (3)
- evolution strategies (3)
- Aldehydes (2)
- Artificial Intelligence (incl. Robotics) (2)
- Breath gas analysis (2)
- Computational Intelligence (2)
- Computer Communication Networks (2)
- Covariance matrices (2)
- Data science (2)
- Engineering Economics, Organization, Logistics, Marketing (2)
- Gas Chromatography-Mass Spectrometry (2)
- Information Systems Applications (incl. Internet) (2)
- Male (2)
- Mathematical model (2)
- Minimization (2)
- Model risk (2)
- Multiple priors (2)
- NO+ reactions (2)
- PTR-MS (2)
- Progress rate (2)
- Relative entropy (2)
- SME (2)
- SRI-TOF-MS (2)
- Supply Chain Management (2)
- Systemic risk (2)
- Theoretical Analysis (2)
- VOCs (2)
- Value co-creation (2)
- Worst case (2)
- conically constrained problem (2)
- constrained optimization (2)
- elliptic constraint (2)
- hyperbolic constraint (2)
- meta-es (2)
- mutation strength (2)
- parabolic constraint (2)
- repair by projection (2)
- wind energy (2)
- +WAA 300 (1)
- +WBF 270 (1)
- +WBH 725 (1)
- 35P05, 34L40 (Primary) 34B20, 34B24 (Secondary) (1)
- 92C35 (1)
- 92C45 (1)
- 93B07 (1)
- 93C10 (1)
- Acetone (1)
- Active matrix adaptation evolution strategy (1)
- Adult (1)
- Agent based modeling (1)
- Air (1)
- Alkanes (1)
- Alkenes (1)
- Alternative routing (1)
- Anaesthetics (1)
- Anesthesia (1)
- Animals (1)
- Anonymizing recorded tracks (1)
- Application (1)
- Applications of Mathematics (1)
- Asset pricing (1)
- Authentication (1)
- Automatic Analyse Framework (1)
- Automobilindustrie (1)
- Benchmarking (1)
- Biochemistry, general (1)
- Biomarker (1)
- Biomedical monitoring (1)
- Biophysics and Biological Physics (1)
- Biotechnology (1)
- Black-box Optimization (1)
- Black-box optimization benchmarking (1)
- Blockchain (1)
- Blood (1)
- Blood analysis (1)
- Brain modeling (1)
- Breath Tests (1)
- Breath analysis (1)
- Bregman distance (1)
- Bregman distance ball (1)
- Business Information Systems (1)
- Cardiac Output (1)
- Cell Biology (1)
- Cell Line (1)
- Code Execution (1)
- Collaboration (1)
- Collaborative models (1)
- Communications Engineering, Networks (1)
- Computer Simulation (1)
- Computer System Implementation (1)
- Computer Systems Organization and Communication Networks (1)
- Computing methodologies (1)
- Conically constrained problem (1)
- Constrained optimization (1)
- Constraint Handling (1)
- Constraints (1)
- Continuous mathematics (1)
- Controlling : Allgemeines (1)
- Convex functions (1)
- Credit risk (1)
- Customs (1)
- Cyber-Physical Systems (1)
- D/H isotopic exchange (1)
- Data Mining and Knowledge Discovery (1)
- Data Sharing (1)
- Data models (1)
- Data visualization (1)
- Database Management (1)
- Databases (1)
- Deuterated volatile organic compounds (1)
- Didactics (1)
- Digital Business Ecosystems (1)
- Digital Ecosystems (1)
- Digital Transformation (1)
- Digital collaboration tools (1)
- Digitale Transformation (1)
- Digitale Ökosysteme (1)
- Digitisation (1)
- Distributed computing (1)
- Double auction (1)
- Duchenne muscular dystrophy (1)
- Dynamic systems (1)
- EC2 compatible cloud infrastructures (1)
- ESG (1)
- Earthquake (1)
- Electrical Engineering (1)
- Electronic mail (1)
- Ellipsoid model (1)
- Emission rate (1)
- End-stage renal disease (1)
- Entrapment (1)
- Entrapped victims (1)
- Entrepreneurship (1)
- Entropy (1)
- Evolution (biology) (1)
- Evolutionary Algorithms (1)
- Evolutionary algorithms (1)
- Execution environment (1)
- Exhalation (1)
- Exhaled breath analysis (1)
- Female (1)
- Financial institutions (1)
- Financial services (1)
- Finanzwirtschaft (1)
- Fire sales (1)
- Food Industry (1)
- Füllbildsimulation (1)
- GC–MS (1)
- Gaussian distribution (1)
- HOreactions (1)
- HUVEC (1)
- Halogenated ethers (1)
- HappyCat (1)
- Hemodialysis (1)
- Heterocyclic compounds (1)
- Human odor (1)
- Human scent (1)
- Human skin emanation (1)
- Human volatilome (1)
- I-divergence ball (1)
- IP networks (1)
- Image Processing and Computer Vision (1)
- Industrie 4.0K (1)
- Industry 4.0 (1)
- Information Security (1)
- Information Systems and Communication Service (1)
- Injection molding (1)
- Innovation management (1)
- Intrapreneurship (1)
- Isoflurane (1)
- Isoprene (1)
- KMU (1)
- Kerberos-based security concept (1)
- Levenberg-Marquardt algorithm (1)
- Leverage (1)
- Limit of Detection (1)
- Linear programming (1)
- Machine Learning (1)
- Machine learning (1)
- Manganese (1)
- Mathematical Physics (1)
- Mathematical and Computational Biology (1)
- Mathematics - Spectral Theory (1)
- Mathematics of computing (1)
- Matrix adaptation evolution strategy (1)
- Maximum loss (1)
- Meta evolution strategies (1)
- Middle Aged (1)
- Modeling (1)
- Models, Biological (1)
- Monitoring (1)
- Multimedia Information Systems (1)
- Muscle (1)
- Muscle Cells (1)
- Muscle, Skeletal (1)
- Mutation strength adaptation (1)
- Nanotechnology (1)
- Natural Language Processing (1)
- Needle trap (1)
- Open innovation (1)
- PTR-TOF-MS (1)
- PTR-ToF-MS (1)
- Parallel computing (1)
- Pharmacokinetics (1)
- Pharmacology/Toxicology (1)
- Pilot Projects (1)
- Problem Solving Environment (1)
- Product Safety Risk (1)
- Product design (1)
- Production/Logistics (1)
- Production/Logistics/Supply Chain Management (1)
- Progress rate analysis (1)
- Quadruple helix (1)
- Quadruple helix clusters (1)
- Quantum Information Technology, Spintronics (1)
- Random variables (1)
- Rapid service prototyping (1)
- Rats (1)
- Ray-ES algorithm (1)
- Release (1)
- Repair by projection (1)
- Reproducibility of Results (1)
- Rotated Klee-Minty Problem (1)
- SPME-GCMS (1)
- Scientific Data Preservation (1)
- Scientific Dataspace (1)
- Search and rescue operation (1)
- Search problems (1)
- Self-Adaptation (1)
- Self-Organisation (1)
- Servers (1)
- Service interaction (1)
- Service-dominant logic (1)
- Servitization (1)
- Simulation (1)
- Smart Government (1)
- Smart cities (1)
- Smart service (1)
- Smart service development (1)
- Smart services (1)
- Smart specialization (1)
- Smart systems Circular economy (1)
- Smarte Technologien (1)
- Social innovation (1)
- Software Engineering/Programming and Operating Systems (1)
- Software framework (1)
- Solid Phase Microextraction (1)
- Special Purpose and Application-Based Systems (1)
- Strategisches Management (1)
- Sustainability (1)
- Sustainable Smart Service (1)
- Systems Biology (1)
- Teaching support (1)
- Technological innovation (1)
- Theory of Computation (1)
- Time Factors (1)
- Time complexity (1)
- Tool selection (1)
- Trade on networks (1)
- Transportation mode detection (1)
- Travel behavior analysis (1)
- Upper bound (1)
- Uptake (1)
- Urban environment (1)
- Urban innovation (1)
- Uremic syndrome (1)
- VM-instances (1)
- VOC (1)
- Volatile marker (1)
- Volatile organic compound (1)
- Voluntary travel behavioral change (1)
- Worst case search (1)
- ad hoc networks (1)
- ad hoc optimization approach (1)
- adaptation (1)
- adaption (1)
- algorithm selection (1)
- ambiguity aversion (1)
- breath gas analysis community (1)
- classification (1)
- client authentication (1)
- cloud based analysis (1)
- cloud based e-science infrastructure (1)
- cloud computing (1)
- cloud-based code execution framework (1)
- clustering (1)
- constrained optimization problems (1)
- constraint handling (1)
- constraint handling by repair (1)
- convex integral functional (1)
- cryptographic protocols (1)
- cumulative step size adaptation (1)
- data governance (1)
- data sharing (1)
- data-driven organization and culture (1)
- data-driven value creation (1)
- differential evolution (1)
- discourse network analysis (1)
- dynamical systems approach (1)
- e-Commerce/e-business (1)
- e-Science Study Reproducibility (1)
- engineering design (1)
- evolution strategy (1)
- evolutionary computation (1)
- expected value minimization (1)
- f-divergence (1)
- f-divergence ball (1)
- finance (1)
- financial participation (1)
- fitness noise (1)
- forward Kerberos tickets (1)
- generalized exponential family (1)
- global convergence (1)
- global optimization (1)
- heterogeneous distributed e-science infrastructures (1)
- high-dimensional search space (1)
- information geometry (1)
- information theoretic multiple priors (1)
- intermediate recombination (1)
- large-scale collaborations (1)
- level set (1)
- matrix adaptation evolution strategy (1)
- maximum entropy principle (1)
- medical computing (1)
- message authentication (1)
- meta-evolution strategy (1)
- minimisation (1)
- multi-modal objective function (1)
- noisy ellipsoid model (1)
- nonlinear constraint (1)
- optimization (1)
- plausible prior distributions (1)
- pneumodynamics (1)
- population size (1)
- population size control (1)
- population sizing (1)
- power dynamics (1)
- prediction (1)
- probability (1)
- real-parameter optimization problem (1)
- renewable energy (1)
- risk management (1)
- risk measure (1)
- scientific private data (1)
- security credential injection (1)
- self-adaptation (1)
- sharp ridge function (1)
- simulation-based optimization (1)
- smart service ecosystems (1)
- social acceptance (1)
- socio-political acceptance (1)
- sphere model (1)
- stress-testing (1)
- stylenotupdated (1)
- technology legitimacy (1)
- theoretical analysis (1)
- user authentication (1)
- virtual machines (1)
Daten im B2B-Ökosystem teilen und nutzen: Wie KMU Voraussetzungen schaffen und Hürden überwinden
(2024)
«Big Data» haben ein großes Potenzial, um die Wertschöpfung effizienter zu gestalten oder um Innovationen hervorzubringen. Daten werden oft an der Schnittstelle zwischen mehreren Akteuren in Business-to-Business-Ökosystemen generiert und sie müssen zwischen den Akteuren geteilt werden. Unternehmen tun sich jedoch schwer damit, Daten in Werte zu transferieren und die Daten im Ökosystem zu teilen. Ursächlich sind weniger technische Gründe als organisationale Rahmenbedingungen. Der Beitrag identifiziert fünf Perspektiven, die Hürden und Voraussetzungen in diesem Prozess darstellen: (1) eine datengetriebene Organisationskultur, (2) Vertrauen zwischen den Akteuren, (3) die Konkretisierung des Wertes von Daten, (4) Datensicherheit und (5) rechtliche und Governance-Aspekte. Eine Fallstudie eines typischen Daten-Ökosystems um ein produzierendes KMU konkretisiert diese Voraussetzungen und Hürden. Es zeigt sich, dass sich Unternehmen, die Daten im Ökosystem teilen möchten, ganzheitlich verändern müssen.
In this paper, we consider the question of data aggregation using the practical example of emissions data for economic activities for the sustainability assessment of regional bank clients. Given the current scarcity of company-specific emission data, an approximation relies on using available public data. These data are reported in different standards in different sources. To determine a mapping between the different standards, an adaptation to the Covariance Matrix Self-Adaptation Evolution Strategy is proposed. The obtained results show that high-quality mappings are found. Nevertheless, our approach is transferable to other data compatibility problems. These can be found in the merging of emissions data for other countries, or in bridging the gap between completely different data sets.
Why do some countries assign a major role to wind energy in decarbonizing their electricity systems, while others are much less committed to this technology? We argue that processes of (de-)legitimation, driven by discourse coalitions who strategically employ certain storylines in public debates, provide part of the answer. To illustrate our approach, we comparatively investigate public discourses surrounding wind energy in Austria and Switzerland, two countries that differ strongly in wind energy deployment. By combining a qualitative content analysis and a discourse network analysis of 808 newspaper articles published 2010–2020, we identify four distinct sets of storylines used to either delegitimize or legitimize the technology. Our study indicates that low deployment rates in Switzerland can be related to the prominence of delegitimizing storylines in the public discourse, which result in a rather low socio-political acceptance of wind energy. In Austria, by contrast, there is more consistent support for wind energy by discourse coalitions using a broad set of legitimizing storylines. By bridging the related but separate literatures of technology legitimacy and social acceptance, our study contributes to a better understanding of socio-political conflict and divergence in low-carbon technological pathways.
A step change is needed in the deployment of renewable energy if the triple challenge of ensuring climate change mitigation, energy security, and energy affordability is to be met. Yet, social acceptance of infrastructure projects and policies remains a key concern. While there has been decades of fruitful research on the social acceptance of wind energy and other renewables, much of the extant research is cross-sectional in nature, failing to capture the important dynamic processes that can make or break renewable energy projects. This paper introduces a Special Issue of Energy Policy which focuses on the neglected topic of the dynamics of social acceptance of renewable energy, drawing on contributions made at an international research conference held in St. Gallen (Switzerland) in June 2022. In addition to introducing these papers and drawing out common themes, we also seek to offer some conceptual clarity on the issue of dynamics in social acceptance, taking into account the influence of time, power, and scale in shaping decision-making processes. We conclude by highlighting a number of avenues of potential future research.
In 2021, a prominent Austria dairy producer suffered from an IT attack and was completely paralysed. Without clearly defined mitigation measures in place, major disruptions were caused alongside the whole supply chain, including logistics service providers, governmental food safety bodies, as well as retailers (i.e., supermarkets and convenience stores). In this paper, we ask the question how digitisation and digital transformation impact IT security, especially when considering the complex company ecosystems of food production and food supply chains in Austria. The problem statement stems from a gap in knowledge of key differences in approaches towards IT security, resilience, risk management and especially business interfaces between food suppliers, supermarkets, distributors, logistics and other service providers. In order to answer related research questions, firstly, the authors conduct literature research, and highlight common guidelines and standardisation as well as look at state-based recommendations for critical infrastructure. In a second step, the paper describes a quantitative and qualitative survey with Austrian food companies (producers and retailers) which is described in detail in the paper. A description of recommended measures for the industry, further steps, as well as an outlook conclude the paper.
Creating a schedule to perform certain actions in a realworld environment typically involves multiple types of uncertainties. To create a plan which is robust towards uncertainties, it must stay flexible while attempting to be reliable and as close to optimal as possible. A plan is reliable if an adjustment to accommodate for a new requirement causes only a few disruptions. The system needs to be able to adapt to the schedule if unforeseen circumstances make planned actions impossible, or if an unlikely event would enable the system to follow a better path. To handle uncertainties, the used methods need to be dynamic and adaptive. The planning algorithms must be able to re-schedule planned actions and need to adapt the previously created plan to accommodate new requirements without causing critical disruptions to other required actions.
Das Forschungsprojekt Data Sharing Framework untersuchte Data Sharing im Kontext von datenbasierten Services und Produkten in Ökosystemen aus fünf Perspektiven: Kultur, Vertrauen, Wert, Recht & Governance, Sicherheit. Die Forschungsergebnisse bestätigen die Relevanz dieser Perspektiven und es hat sich gezeigt, dass diese Aspekte sowohl Barrieren als auch Treiber für Datennutzung und -austausch zwi- schen Unternehmen darstellen.
Ausgangspunkt waren die folgenden forschungs- und praxisleitenden Annahmen:
• These 1: KMU können durch die Nutzung und das
Teilen von Daten Mehrwerte in Form neuer Produkte und Services generieren. Aus wissenschaftlicher Sicht liegt der Fokus des Themas Daten und Data Science bisher überwiegend auf der technischen Umsetzung datenintensiver Geschäftsmodelle und Kooperationen durch die Unternehmen.
• These 2: Die technische Umsetzung ist eine notwendige Bedingung für die datenbasierte Leistun- gen, sie reicht jedoch nicht aus, um eine Kooperations- und Teilbereitschaft bei KMU hinsichtlich ihrer Daten (Daten-Teilbereitschaft) auszulösen. Zahlreiche Stakeholder zögern, Daten zu teilen, vor allem in einem grenzüberschreitenden Kontext, wie z.B. in der Programmregion.
• These 3: KMU benötigen Data Access und Data Trust Strukturen, um mögliche Kooperationspotenziale tatsächlich zu heben. Dies erfordert u.a. gemeinsa- me Standards, ein annäherndes Verständnis vom Wert der Daten, Data-Governance in Kombination mit zu definierenden Trust-Standards, welche die erforderliche formelle und informelle Sicherheit bieten.
Nachfolgend wird ein Überblick über die hieraus hervorgegangenen Ergebnisse gegeben:
Kultur
Die Perspektive der Organisationskultur stellt das Denken und Handeln im Unternehmen und im Ökosystem in den Mittelpunkt. Eine Organisationskultur, welche die Arbeit mit Daten, Data Science Praktiken und vor allem das Teilen von Daten ermöglicht, stellt Daten in den Mittelpunkt des Wertschöpfungsprozesses. Dies erfordert eine generelle Sensibilisierung
für das Thema Daten, durchlässige Grenzen im und zwischen Unternehmen, ebenso wie ein neues Verständnis von Rollen, Strukturen und Prozessen im Unternehmen.
Vertrauen
Das Vertrauen ist im Ökosystem von großer Bedeutung. Das Einbeziehen von internen Stakeholdern und das Starten mit kleineren Pilotprojekten wird vorgeschlagen, um Vertrauen innerhalb der Organisation und mit externen Partnern zu schaffen.
Wert
Als notwendige Voraussetzung wird der Wert der Daten hervorgehoben. Unternehmen sollten den potenziellen Wert der Datenflüsse kennen, bevor sie sich entscheiden, ob sie diese Daten teilen und nutzen möchten. Es wird empfohlen, eine grobe Quanti- fizierung des Wertflusses vorzunehmen oder gegebe- nenfalls eine detailliertere Analyse durchzuführen.
Recht & Governance
Für die Berücksichtigung rechtlicher Rahmenbedingungen gemeinsamer Datennutzung sollten Organisationen zunächst eine interne Data Governance etablieren, um auf neue regulatorische Entwicklungen reagieren zu können. Die Einrichtung von Data-Asset-Management, Data-IP und -Compliance-Ma-nagement und Data-Contract-Management wird hier empfohlen.
Datensicherheit
Im Sicherheitskontext sind Methoden zur Gewährleistung der Datenintegrität, Privatsphäre und Sicherheit entscheidend. Es wird empfohlen, einen kollaborativen Ansatz zur Implementierung von Sicherheitsstandards zu verfolgen und dabei IKT-Experten einzubeziehen. Anfänglich können Best Practices ausreichen, aber längerfristig sollte eine kontinuierliche Sicherheitsrisikobewertung und Ge- schäftsprozessintegration angestrebt werden.
Im vorliegenden Paper wird ein Vergleich zwischen Produktions-und Simulationsdaten präsentiert welches im Rahmen einer größeren Initiative zur Verwendung von Shopfloor Daten bei einem Projektpartner in der Automobilindustrie umgesetzt wurde. In diesem Projekt wurden die Daten die während der Füllbildsimulation entstehen mit den Daten aus der finalen Werkzeugabnahme verglichen um zu analysieren, wie genau diese miteinander über einstimmen. Je besser die Simulation ist, desto schneller kann der gesamte Werkzeugentwicklungsprozess abgewickelt werden, welcher als Kernprozess massives Einsparungspotenzial und damit Wettbewerbsvorteil mit sich bringt.
The usage of data gathered for Industry 4.0 and smart factory scenarios continues to be a problem for companies of all sizes. This is often the case because they aim to start with complicated and time-intensive Machine Learning scenarios. This work evaluates the Process Capability Analysis (PCA) as a pragmatic, easy and quick way of leveraging the gathered machine data from the production process. The area of application considered is injection molding. After describing all the required domain knowledge, the paper presents an approach for a continuous analysis of all parts produced. Applying PCA results in multiple key performance indicators that allow for fast and comprehensible process monitoring. The corresponding visualizations provide the quality department with a tool to efficiently choose where and when quality checks need to be performed. The presented case study indicates the benefit of analyzing whole process data instead of considering only selected production samples. The use of machine data enables additional insights to be drawn about process stability and the associated product quality.