Forschungszentrum Business Informatics
Refine
Year of publication
Document Type
- Conference Proceeding (68)
- Article (67)
- Part of a Book (13)
- Report (11)
- Doctoral Thesis (4)
- Book (2)
- Working Paper (2)
- Other (1)
Institute
- Forschungszentrum Business Informatics (168)
- Technik | Engineering & Technology (66)
- Department of Computer Science (Ende 2021 aufgelöst; Integration in die übergeordnete OE Technik) (65)
- Wirtschaft (18)
- Josef Ressel Zentrum für Robuste Entscheidungen (8)
- Forschungszentrum Energie (3)
- Forschung (2)
- Forschungsgruppe Empirische Sozialwissenschaften (1)
- Forschungszentrum Human Centred Technologies (1)
Is part of the Bibliography
- yes (168)
Keywords
- Evolution Strategies (5)
- Volatile organic compounds (5)
- Constrained Optimization (4)
- Stress testing (4)
- Evolution strategies (3)
- Evolution strategy (3)
- Fragmentation patterns (3)
- Global optimization (3)
- Humans (3)
- Optimization (3)
- Rastrigin function (3)
- Risk measures (3)
- Scenario analysis (3)
- evolution strategies (3)
- Aldehydes (2)
- Artificial Intelligence (incl. Robotics) (2)
- Breath gas analysis (2)
- Computational Intelligence (2)
- Computer Communication Networks (2)
- Covariance matrices (2)
- Data science (2)
- Engineering Economics, Organization, Logistics, Marketing (2)
- Gas Chromatography-Mass Spectrometry (2)
- Information Systems Applications (incl. Internet) (2)
- Male (2)
- Mathematical model (2)
- Minimization (2)
- Model risk (2)
- Multiple priors (2)
- NO+ reactions (2)
- PTR-MS (2)
- Progress rate (2)
- Relative entropy (2)
- SME (2)
- SRI-TOF-MS (2)
- Supply Chain Management (2)
- Systemic risk (2)
- Theoretical Analysis (2)
- VOCs (2)
- Value co-creation (2)
- Worst case (2)
- conically constrained problem (2)
- constrained optimization (2)
- elliptic constraint (2)
- hyperbolic constraint (2)
- meta-es (2)
- mutation strength (2)
- parabolic constraint (2)
- repair by projection (2)
- wind energy (2)
- +WAA 300 (1)
- +WBF 270 (1)
- +WBH 725 (1)
- 35P05, 34L40 (Primary) 34B20, 34B24 (Secondary) (1)
- 92C35 (1)
- 92C45 (1)
- 93B07 (1)
- 93C10 (1)
- Acetone (1)
- Active matrix adaptation evolution strategy (1)
- Adult (1)
- Agent based modeling (1)
- Air (1)
- Alkanes (1)
- Alkenes (1)
- Alternative routing (1)
- Anaesthetics (1)
- Anesthesia (1)
- Animals (1)
- Anonymizing recorded tracks (1)
- Application (1)
- Applications of Mathematics (1)
- Asset pricing (1)
- Authentication (1)
- Automatic Analyse Framework (1)
- Automobilindustrie (1)
- Benchmarking (1)
- Biochemistry, general (1)
- Biomarker (1)
- Biomedical monitoring (1)
- Biophysics and Biological Physics (1)
- Biotechnology (1)
- Black-box Optimization (1)
- Black-box optimization benchmarking (1)
- Blockchain (1)
- Blood (1)
- Blood analysis (1)
- Brain modeling (1)
- Breath Tests (1)
- Breath analysis (1)
- Bregman distance (1)
- Bregman distance ball (1)
- Business Information Systems (1)
- Cardiac Output (1)
- Cell Biology (1)
- Cell Line (1)
- Code Execution (1)
- Collaboration (1)
- Collaborative models (1)
- Communications Engineering, Networks (1)
- Computer Simulation (1)
- Computer System Implementation (1)
- Computer Systems Organization and Communication Networks (1)
- Computing methodologies (1)
- Conically constrained problem (1)
- Constrained optimization (1)
- Constraint Handling (1)
- Constraints (1)
- Continuous mathematics (1)
- Controlling : Allgemeines (1)
- Convex functions (1)
- Credit risk (1)
- Customs (1)
- Cyber-Physical Systems (1)
- D/H isotopic exchange (1)
- Data Mining and Knowledge Discovery (1)
- Data Sharing (1)
- Data models (1)
- Data visualization (1)
- Database Management (1)
- Databases (1)
- Deuterated volatile organic compounds (1)
- Didactics (1)
- Digital Business Ecosystems (1)
- Digital Ecosystems (1)
- Digital Transformation (1)
- Digital collaboration tools (1)
- Digitale Transformation (1)
- Digitale Ökosysteme (1)
- Digitisation (1)
- Distributed computing (1)
- Double auction (1)
- Duchenne muscular dystrophy (1)
- Dynamic systems (1)
- EC2 compatible cloud infrastructures (1)
- ESG (1)
- Earthquake (1)
- Electrical Engineering (1)
- Electronic mail (1)
- Ellipsoid model (1)
- Emission rate (1)
- End-stage renal disease (1)
- Entrapment (1)
- Entrapped victims (1)
- Entrepreneurship (1)
- Entropy (1)
- Evolution (biology) (1)
- Evolutionary Algorithms (1)
- Evolutionary algorithms (1)
- Execution environment (1)
- Exhalation (1)
- Exhaled breath analysis (1)
- Female (1)
- Financial institutions (1)
- Financial services (1)
- Finanzwirtschaft (1)
- Fire sales (1)
- Food Industry (1)
- Füllbildsimulation (1)
- GC–MS (1)
- Gaussian distribution (1)
- HOreactions (1)
- HUVEC (1)
- Halogenated ethers (1)
- HappyCat (1)
- Hemodialysis (1)
- Heterocyclic compounds (1)
- Human odor (1)
- Human scent (1)
- Human skin emanation (1)
- Human volatilome (1)
- I-divergence ball (1)
- IP networks (1)
- Image Processing and Computer Vision (1)
- Industrie 4.0K (1)
- Industry 4.0 (1)
- Information Security (1)
- Information Systems and Communication Service (1)
- Injection molding (1)
- Innovation management (1)
- Intrapreneurship (1)
- Isoflurane (1)
- Isoprene (1)
- KMU (1)
- Kerberos-based security concept (1)
- Levenberg-Marquardt algorithm (1)
- Leverage (1)
- Limit of Detection (1)
- Linear programming (1)
- Machine Learning (1)
- Machine learning (1)
- Manganese (1)
- Mathematical Physics (1)
- Mathematical and Computational Biology (1)
- Mathematics - Spectral Theory (1)
- Mathematics of computing (1)
- Matrix adaptation evolution strategy (1)
- Maximum loss (1)
- Meta evolution strategies (1)
- Middle Aged (1)
- Modeling (1)
- Models, Biological (1)
- Monitoring (1)
- Multimedia Information Systems (1)
- Muscle (1)
- Muscle Cells (1)
- Muscle, Skeletal (1)
- Mutation strength adaptation (1)
- Nanotechnology (1)
- Natural Language Processing (1)
- Needle trap (1)
- Open innovation (1)
- PTR-TOF-MS (1)
- PTR-ToF-MS (1)
- Parallel computing (1)
- Pharmacokinetics (1)
- Pharmacology/Toxicology (1)
- Pilot Projects (1)
- Problem Solving Environment (1)
- Product Safety Risk (1)
- Product design (1)
- Production/Logistics (1)
- Production/Logistics/Supply Chain Management (1)
- Progress rate analysis (1)
- Quadruple helix (1)
- Quadruple helix clusters (1)
- Quantum Information Technology, Spintronics (1)
- Random variables (1)
- Rapid service prototyping (1)
- Rats (1)
- Ray-ES algorithm (1)
- Release (1)
- Repair by projection (1)
- Reproducibility of Results (1)
- Rotated Klee-Minty Problem (1)
- SPME-GCMS (1)
- Scientific Data Preservation (1)
- Scientific Dataspace (1)
- Search and rescue operation (1)
- Search problems (1)
- Self-Adaptation (1)
- Self-Organisation (1)
- Servers (1)
- Service interaction (1)
- Service-dominant logic (1)
- Servitization (1)
- Simulation (1)
- Smart Government (1)
- Smart cities (1)
- Smart service (1)
- Smart service development (1)
- Smart services (1)
- Smart specialization (1)
- Smart systems Circular economy (1)
- Smarte Technologien (1)
- Social innovation (1)
- Software Engineering/Programming and Operating Systems (1)
- Software framework (1)
- Solid Phase Microextraction (1)
- Special Purpose and Application-Based Systems (1)
- Strategisches Management (1)
- Sustainability (1)
- Sustainable Smart Service (1)
- Systems Biology (1)
- Teaching support (1)
- Technological innovation (1)
- Theory of Computation (1)
- Time Factors (1)
- Time complexity (1)
- Tool selection (1)
- Trade on networks (1)
- Transportation mode detection (1)
- Travel behavior analysis (1)
- Upper bound (1)
- Uptake (1)
- Urban environment (1)
- Urban innovation (1)
- Uremic syndrome (1)
- VM-instances (1)
- VOC (1)
- Volatile marker (1)
- Volatile organic compound (1)
- Voluntary travel behavioral change (1)
- Worst case search (1)
- ad hoc networks (1)
- ad hoc optimization approach (1)
- adaptation (1)
- adaption (1)
- algorithm selection (1)
- ambiguity aversion (1)
- breath gas analysis community (1)
- classification (1)
- client authentication (1)
- cloud based analysis (1)
- cloud based e-science infrastructure (1)
- cloud computing (1)
- cloud-based code execution framework (1)
- clustering (1)
- constrained optimization problems (1)
- constraint handling (1)
- constraint handling by repair (1)
- convex integral functional (1)
- cryptographic protocols (1)
- cumulative step size adaptation (1)
- data governance (1)
- data sharing (1)
- data-driven organization and culture (1)
- data-driven value creation (1)
- differential evolution (1)
- discourse network analysis (1)
- dynamical systems approach (1)
- e-Commerce/e-business (1)
- e-Science Study Reproducibility (1)
- engineering design (1)
- evolution strategy (1)
- evolutionary computation (1)
- expected value minimization (1)
- f-divergence (1)
- f-divergence ball (1)
- finance (1)
- financial participation (1)
- fitness noise (1)
- forward Kerberos tickets (1)
- generalized exponential family (1)
- global convergence (1)
- global optimization (1)
- heterogeneous distributed e-science infrastructures (1)
- high-dimensional search space (1)
- information geometry (1)
- information theoretic multiple priors (1)
- intermediate recombination (1)
- large-scale collaborations (1)
- level set (1)
- matrix adaptation evolution strategy (1)
- maximum entropy principle (1)
- medical computing (1)
- message authentication (1)
- meta-evolution strategy (1)
- minimisation (1)
- multi-modal objective function (1)
- noisy ellipsoid model (1)
- nonlinear constraint (1)
- optimization (1)
- plausible prior distributions (1)
- pneumodynamics (1)
- population size (1)
- population size control (1)
- population sizing (1)
- power dynamics (1)
- prediction (1)
- probability (1)
- real-parameter optimization problem (1)
- renewable energy (1)
- risk management (1)
- risk measure (1)
- scientific private data (1)
- security credential injection (1)
- self-adaptation (1)
- sharp ridge function (1)
- simulation-based optimization (1)
- smart service ecosystems (1)
- social acceptance (1)
- socio-political acceptance (1)
- sphere model (1)
- stress-testing (1)
- stylenotupdated (1)
- technology legitimacy (1)
- theoretical analysis (1)
- user authentication (1)
- virtual machines (1)
Why do some countries assign a major role to wind energy in decarbonizing their electricity systems, while others are much less committed to this technology? We argue that processes of (de-)legitimation, driven by discourse coalitions who strategically employ certain storylines in public debates, provide part of the answer. To illustrate our approach, we comparatively investigate public discourses surrounding wind energy in Austria and Switzerland, two countries that differ strongly in wind energy deployment. By combining a qualitative content analysis and a discourse network analysis of 808 newspaper articles published 2010–2020, we identify four distinct sets of storylines used to either delegitimize or legitimize the technology. Our study indicates that low deployment rates in Switzerland can be related to the prominence of delegitimizing storylines in the public discourse, which result in a rather low socio-political acceptance of wind energy. In Austria, by contrast, there is more consistent support for wind energy by discourse coalitions using a broad set of legitimizing storylines. By bridging the related but separate literatures of technology legitimacy and social acceptance, our study contributes to a better understanding of socio-political conflict and divergence in low-carbon technological pathways.
In this paper, we consider the question of data aggregation using the practical example of emissions data for economic activities for the sustainability assessment of regional bank clients. Given the current scarcity of company-specific emission data, an approximation relies on using available public data. These data are reported in different standards in different sources. To determine a mapping between the different standards, an adaptation to the Covariance Matrix Self-Adaptation Evolution Strategy is proposed. The obtained results show that high-quality mappings are found. Nevertheless, our approach is transferable to other data compatibility problems. These can be found in the merging of emissions data for other countries, or in bridging the gap between completely different data sets.
Daten im B2B-Ökosystem teilen und nutzen: Wie KMU Voraussetzungen schaffen und Hürden überwinden
(2024)
«Big Data» haben ein großes Potenzial, um die Wertschöpfung effizienter zu gestalten oder um Innovationen hervorzubringen. Daten werden oft an der Schnittstelle zwischen mehreren Akteuren in Business-to-Business-Ökosystemen generiert und sie müssen zwischen den Akteuren geteilt werden. Unternehmen tun sich jedoch schwer damit, Daten in Werte zu transferieren und die Daten im Ökosystem zu teilen. Ursächlich sind weniger technische Gründe als organisationale Rahmenbedingungen. Der Beitrag identifiziert fünf Perspektiven, die Hürden und Voraussetzungen in diesem Prozess darstellen: (1) eine datengetriebene Organisationskultur, (2) Vertrauen zwischen den Akteuren, (3) die Konkretisierung des Wertes von Daten, (4) Datensicherheit und (5) rechtliche und Governance-Aspekte. Eine Fallstudie eines typischen Daten-Ökosystems um ein produzierendes KMU konkretisiert diese Voraussetzungen und Hürden. Es zeigt sich, dass sich Unternehmen, die Daten im Ökosystem teilen möchten, ganzheitlich verändern müssen.
Das Forschungsprojekt Data Sharing Framework untersuchte Data Sharing im Kontext von datenbasierten Services und Produkten in Ökosystemen aus fünf Perspektiven: Kultur, Vertrauen, Wert, Recht & Governance, Sicherheit. Die Forschungsergebnisse bestätigen die Relevanz dieser Perspektiven und es hat sich gezeigt, dass diese Aspekte sowohl Barrieren als auch Treiber für Datennutzung und -austausch zwi- schen Unternehmen darstellen.
Ausgangspunkt waren die folgenden forschungs- und praxisleitenden Annahmen:
• These 1: KMU können durch die Nutzung und das
Teilen von Daten Mehrwerte in Form neuer Produkte und Services generieren. Aus wissenschaftlicher Sicht liegt der Fokus des Themas Daten und Data Science bisher überwiegend auf der technischen Umsetzung datenintensiver Geschäftsmodelle und Kooperationen durch die Unternehmen.
• These 2: Die technische Umsetzung ist eine notwendige Bedingung für die datenbasierte Leistun- gen, sie reicht jedoch nicht aus, um eine Kooperations- und Teilbereitschaft bei KMU hinsichtlich ihrer Daten (Daten-Teilbereitschaft) auszulösen. Zahlreiche Stakeholder zögern, Daten zu teilen, vor allem in einem grenzüberschreitenden Kontext, wie z.B. in der Programmregion.
• These 3: KMU benötigen Data Access und Data Trust Strukturen, um mögliche Kooperationspotenziale tatsächlich zu heben. Dies erfordert u.a. gemeinsa- me Standards, ein annäherndes Verständnis vom Wert der Daten, Data-Governance in Kombination mit zu definierenden Trust-Standards, welche die erforderliche formelle und informelle Sicherheit bieten.
Nachfolgend wird ein Überblick über die hieraus hervorgegangenen Ergebnisse gegeben:
Kultur
Die Perspektive der Organisationskultur stellt das Denken und Handeln im Unternehmen und im Ökosystem in den Mittelpunkt. Eine Organisationskultur, welche die Arbeit mit Daten, Data Science Praktiken und vor allem das Teilen von Daten ermöglicht, stellt Daten in den Mittelpunkt des Wertschöpfungsprozesses. Dies erfordert eine generelle Sensibilisierung
für das Thema Daten, durchlässige Grenzen im und zwischen Unternehmen, ebenso wie ein neues Verständnis von Rollen, Strukturen und Prozessen im Unternehmen.
Vertrauen
Das Vertrauen ist im Ökosystem von großer Bedeutung. Das Einbeziehen von internen Stakeholdern und das Starten mit kleineren Pilotprojekten wird vorgeschlagen, um Vertrauen innerhalb der Organisation und mit externen Partnern zu schaffen.
Wert
Als notwendige Voraussetzung wird der Wert der Daten hervorgehoben. Unternehmen sollten den potenziellen Wert der Datenflüsse kennen, bevor sie sich entscheiden, ob sie diese Daten teilen und nutzen möchten. Es wird empfohlen, eine grobe Quanti- fizierung des Wertflusses vorzunehmen oder gegebe- nenfalls eine detailliertere Analyse durchzuführen.
Recht & Governance
Für die Berücksichtigung rechtlicher Rahmenbedingungen gemeinsamer Datennutzung sollten Organisationen zunächst eine interne Data Governance etablieren, um auf neue regulatorische Entwicklungen reagieren zu können. Die Einrichtung von Data-Asset-Management, Data-IP und -Compliance-Ma-nagement und Data-Contract-Management wird hier empfohlen.
Datensicherheit
Im Sicherheitskontext sind Methoden zur Gewährleistung der Datenintegrität, Privatsphäre und Sicherheit entscheidend. Es wird empfohlen, einen kollaborativen Ansatz zur Implementierung von Sicherheitsstandards zu verfolgen und dabei IKT-Experten einzubeziehen. Anfänglich können Best Practices ausreichen, aber längerfristig sollte eine kontinuierliche Sicherheitsrisikobewertung und Ge- schäftsprozessintegration angestrebt werden.
Creating a schedule to perform certain actions in a realworld environment typically involves multiple types of uncertainties. To create a plan which is robust towards uncertainties, it must stay flexible while attempting to be reliable and as close to optimal as possible. A plan is reliable if an adjustment to accommodate for a new requirement causes only a few disruptions. The system needs to be able to adapt to the schedule if unforeseen circumstances make planned actions impossible, or if an unlikely event would enable the system to follow a better path. To handle uncertainties, the used methods need to be dynamic and adaptive. The planning algorithms must be able to re-schedule planned actions and need to adapt the previously created plan to accommodate new requirements without causing critical disruptions to other required actions.
The role of entrepreneurs and intrapreneurs in the current zeitgeist is to drive innovation, re-shape rigid, established processes in business as well as for consumers. They use new viewpoints to pioneer new (business) models which focus on ‘smartness’ rather than the purely monetary and short-sighted models of yesteryear. Fostering and supporting the culture of this current zeitgeist is a mayor challenge for entre- and intrapreneurial support infrastructures, namely startup centres and innovation hubs of universities and other public institutions as well as innovation centres of private companies. Hereby, support may range from access to funding over provision of resources such as offices or computing hardware to coaching in the development of business ideas and strategic roadmaps for product and service deployment. In this paper, we focus on describing the status-quo of afore- mentioned support infrastructures in Vorarlberg and the Lake Constance region, then extend the scope to existing (international) approaches for aiding founders and inno- vators in the development of smart services. An analysis of success stories of the Vorarlberg startup centre ‘startupstube’ and other initiatives including their compar- ison to international counterparts builds the basis for a methodological framework for (service science) coaching in entre- and intrapreneurial support infrastructures. The paper is concluded by the description of a framework for choosing the right methods and tools to create service value in entre-/intrapreneurship based upon tested, proven know-how and for defining support infrastructure needs based upon pre-defined stakeholder and target groups as well as the (industry) sectors of the innovators.