Search
Search Results
-
A Filtering-Based General Approach to Learning Rational Constraints of Epistemic Graphs
Epistemic graphs are a generalization of the epistemic approach to probabilistic argumentation. Hunter proposed a 2-way generalization framework to... -
Die kurze Geschichte des IT-Servicemanagement: Themen und Fragestellungen im Wandel der Zeit
IT-Servicemanagement (ITSM) stellt seit Jahren ein relevantes und spannendes Themenfeld dar, welches sowohl Unternehmen als auch Forscher auf... -
The Impact of Machine Learning-Based Techniques on the Scouting and Screening Processes of Early-Stage Venture Capital Firms
Early-stage venture capital (VC) is a risky type of financing activity due to startups’ extremely high failure rate and the many unknown variables... -
Step 6: Implementation—The IT Roadmap, Determination of the IT Budget and the IT Project Portfolio
In this sixth step, the implementation of the IT strategy begins. After the application strategy has been defined and it has been decided which IT... -
COPYCAT: Applying Serious Games in Industry for Defending Supply Chain Attack
Serious games have found their application in many cases for improving cybersecurity; one of those cases is for building a successful strategy for... -
Pattern Catalog
The 48 patterns in this pattern catalog chapter are intensively referenced in Chap. 5 , in which a generic design... -
Human Sustainability in Software Development
Human thriving and outsourcing can go hand in hand. This research aims to outline outsourcing approaches for facilitating human thriving by... -
Generating ICS vulnerability playbooks with open standards
Organizations face attacks on industrial control systems (ICS) as vulnerabilities are pervasive. However, patching vulnerable systems by simply...
-
Step 1: IT Status Quo Analysis
If you want to improve something, you have to know the starting point. This is step 1, an internal analysis of IT processes, organization, technology... -
Dynamic adaptive threshold based learning for noisy annotations robust facial expression recognition
The real-world facial expression recognition (FER) datasets suffer from noisy annotations due to crowd-sourcing, ambiguity in expressions, the...
-
A day at the races
Two major barriers to conducting user studies are the costs involved in recruiting participants and researcher time in performing studies. Typical...
-
Toward Charismatic Virtual Agents: How to Animate Your Speech and Be Charismatic
Charisma is a powerful device of communication and persuasion. Researchers have pinpointed specific behaviors that contribute to the perception of... -
IT-Backsourcing – Empirische Erkenntnisse und Handlungsempfehlungen für eine erfolgreiche Re-Integration der IT-Serviceerbringung
IT backsourcing describes the re-integration of previously outsourced IT services back to the outsourcing company. This paper presents the results of...
-
Start-Up Innovation and Growth in Health-Related Industries
Start-ups are recognised among the key contributors to the creation of patient-centric, digitalised and connected solutions leading to the so-called... -
Empowering Learner-Centered Instruction: Integrating ChatGPT Python API and Tinker Learning for Enhanced Creativity and Problem-Solving Skills
This paper proposes an integrated teaching strategy incorporating the ChatGPT Python API in education, aligning with Learner- Centered Instruction... -
Putting Users in the Loop: How User Research Can Guide AI Development for a Consumer-Oriented Self-service Portal
This study investigates three challenges for develo** machine learning-based self-service web apps for consumers. First, we argue that user... -
Big Data Analytics-based life cycle sustainability assessment for sustainable manufacturing enterprises evaluation
Recently, governments and organizations have repeatedly pressed manufacturing enterprises to promote the ethical and transparent use of natural...
-
Conclusion and Outlook
What stays behind? What were the key points on the way to the IT strategy? Which measures could already be implemented and which ones are difficult... -
Introduction to the Topic
The first chapter consists of an introduction to the world of IT strategy and clarifies basic questions: “What is an IT strategy, when and why is it... -
A Multi-objective Particle Swarm Optimization Framework for Operations Management
There is ongoing research on the problem of how to best combine predictive modeling and optimization. This is especially important in operations...