Autor*innen mit den meisten Dokumenten
Neueste Veröffentlichungen
- ZeitschriftenartikelÖkonomie der elektronischen Literaturversorgung Optimale Tarifwahl beim Bezug elektronischer Zeitschriften(Wirtschaftsinformatik: Vol. 46, No. 4, 2004) Fladung, Rainer B.; Dugall, Berndt; König, WolfgangHow can academic library consortia provide access to literature despite increasing costs and decreasing budgets?In this paper, it is shown that making the fixed subscription rate variable by combining two relevant tariff models (flat-rate licence and pay-per-view) is an advantageous approach for consortia to react to the increasing (subscription) prices.A decision-making model is developed that considers the relevant parameters of pay-perview costs and user growth. The model is then applied to the Hessian library consortium (HeBIS). The empirical analysis shows that an optimal mix of rates for the publisher’s journals portfolio attains savings between 2% and 17% compared to a basic flat-rate licence.
- ZeitschriftenartikelSysteme für das Management digitaler Rechte(Wirtschaftsinformatik: Vol. 46, No. 4, 2004) Hess, Thomas; Ünlü, VuralMedia companies and producers of intellectual property are currently threatened with massive information product piracy. Digital Rights Management Systems (DRMS) offer technical copyright protection measures to protect content against digital piracy. The authors give an overview about the status quo of DRMS from a functional, technical and architectural perspective. Apart from purely technological issues, it is also essential to take the economic aspects of DRMS into consideration. The trade-off between content protection and total cost of ownership of a DRMS installation will require the determination of a suitable level of technical copyright protection for a given context.
- ZeitschriftenartikelKonstruktion von Referenzmodellierungssprachen Ein Ordnungsrahmen zur Spezifikation von Adaptionsmechanismen für Informationsmodelle(Wirtschaftsinformatik: Vol. 46, No. 4, 2004) Becker, Jörg; Delfmann, Patrick; Knackstedt, RalfConstruction of Reference Modeling Languages — A Framework for the Specification of Adaptation Mechanisms for Conceptual Information Models Reference modeling languages differ from each other as they use different model types (such as process or data models) and as they provide different mechanisms that allow an adaptation of the reference model to specific contexts. The developer of the reference modeling language has to decide which adaptation technique he wants to use (e. g. configuration, aggregation, instantiation, specialization or analogy construction) and which of these techniques he wants to integrate into the language specification. In this paper, these adaptation techniques are compared, and reference solutions for the specification of extended reference modeling languages are proposed. The introduced solutions are structured by a methodical framework that assigns modeling examples and meta-models as well as meta-meta-models to the different adaptation techniques. Based on this framework, possible combinations of configurative adaptation mechanisms with aggregative, instantiation based, specialization based and analogy construction based mechanisms are discussed.
- ZeitschriftenartikelUnternehmensweites Berechtigungsmanagement(Wirtschaftsinformatik: Vol. 46, No. 4, 2004) Herwig, Volker; Schlabitz, LarsThe central coordination of access control management is crucial especially for companies that are engaged in cooperative processes with other companies. Most critical is to respect the security needs that arise with the “opening“ towards other partners. The central coordination of access control is indispensable in order to protect the company’s resources.If access control management is to be oriented directly towards the corporate goals in contrast to a merely technical view there is a need for extended concepts — like role based access control (RBAC).The first software products that make use of the RBAC-concept for a centrally coordinated access control management are available and can be used in practice.
- ZeitschriftenartikelEffektivität von Lösungsansätzen zur Bekämpfung von Spam(Wirtschaftsinformatik: Vol. 46, No. 4, 2004) Schryen, GuidoSpam as unsolicited email has certainly crossed the border of just being bothersome. In 2003, it surpassed legitimate email — growing to more than 50% of all Internet emails. Annually, it causes economic harms of several billion Euros. Fighting spam, beside legal approaches especially technical means are deployed in practical systems, mainly focussing on blocking and filtering mechanisms.This article introduces into the spam field and describes, assesses, and classifies the currently most important approaches against spam.