Logo des Repositoriums

Wirtschaftsinformatik 45(6) - Dezember 2003

Autor*innen mit den meisten Dokumenten  

Auflistung nach:

Neueste Veröffentlichungen

1 - 6 von 6
  • Zeitschriftenartikel
    (Wirtschaftsinformatik: Vol. 45, No. 6, 2003) Weinhardt, Christof; Holtmann, Carsten; Neumann, Dirk
  • Zeitschriftenartikel
    Ubiquitous Computing aus betriebswirtschaftlicher Sicht
    (Wirtschaftsinformatik: Vol. 45, No. 6, 2003) Fleisch, Elgar; Dierkes, Markus
    This paper identifies and analyses potential business benefits of ubiquitous computing (ubicomp). Its aim is to challenge whether the growing visibility of topics such as ubiquitous or pervasive computing, automatic identification (Auto-ID) and radio frequency identification (RFID) can be justified from a business perspective. To do so it analyses the business contribution of existing ubicomp applications, reconstructs their development phases, introduces the business relevant base-functionalities and discusses implications on the design of products, processes and services using ubicomp applications.The creation of an alternative and rather cost efficient machine-machine-relation between already established information systems and the real world things they try to manage has been identified as the main source of business benefit. However, before businesses can systematically leverage all potential benefits, some technical and political questions, such as creating robust solutions and solving privacy issues, have to be answered.
  • Zeitschriftenartikel
    Strukturieren mit Multitrees: Ein Fachkonzept zur verbesserten Navigation in Hypermedia
    (Wirtschaftsinformatik: Vol. 45, No. 6, 2003) Feldmann, Martin; Wagner, Ralf
    Hypermedia are more and more common in business practice. Insufficient navigation frequently leads to the phenomenon of ‘lost in hyperspace’.In addition to recent contributions in web-engineering, we suggest an assessment of navigational efforts in alternative structured hypermedia. The main advantage is its applicability previous to implementation. Different topologies are evaluated with respect to three criteria: movements burden and choices burden for the user, and the complexity of the resulting graphs. A sophisticated concept for structuring hypermedia by multi-trees is suggested. In contrast to competing concepts, e.g., the hyperbolic tree, the multi-tree offers improvements for both the provider as well as the user. The provider benefits from an increased flexibility for designing access paths. Moreover, the user takes advantage of decreased navigational efforts. The implementation of the concept is demonstrated by means of the prototype DYMU-tree.
  • Zeitschriftenartikel
    Outsourcing, ASP und Managed Services
    (Wirtschaftsinformatik: Vol. 45, No. 6, 2003) Knolmayer, Gerhard; Mittermayer, Marc-André
    In this paper we provide an overview about information which can be retrieved about “outsourcing” from the Web. We show that some terms related to outsourcing should also be considered. The supply of information is dominated by service providers and consultancies and by media companies providing portals and specialized online journals.
  • Zeitschriftenartikel
    Aufwandsschätzung von Software-Reengineering-Projekten
    (Wirtschaftsinformatik: Vol. 45, No. 6, 2003) Sneed, Harry M.
    Prediction of costs and duration of software reengineering projects Costs and duration of projects to reengineer existing software are much easier to predict than the respective figures for software development projects. Moreover, in reengineering projects costs, risks and duration are much smaller. This article presents a tool-based method to calculate the three most important reengineering project types: encapsulation projects, renovation projects, and conversion projects. The method comprises eight consecutive steps — starting from reengineering requirements and ending with risk assessments and adjustments. A set of well-known prediction methods are incorporated, among them COCOMO, component analysis, function point analysis, data point analysis, and object point analysis. The method lays particular focus on the size of the projected software as well as on its complexity and quality.