Logo des Repositoriums
 

Wirtschaftsinformatik 47(6) - Dezember 2005

Autor*innen mit den meisten Dokumenten  

Auflistung nach:

Neueste Veröffentlichungen

1 - 10 von 16
  • Zeitschriftenartikel
    Wird XML/EDI traditionelles EDI ablösen?
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Buxmann, Peter; Wüstner, Erik; Kunze, Sylvi
    According to network effect theory, the benefit from using standards depends on the number of its users. In this article we examine, whether XML/EDI will replace traditional EDI and thus provide its users with positive network effects. Our contribution is based upon both network theory and the results of an empirical study among 130 major European companies. We conclude that most companies expect increasing diffusion of XML/EDI, with traditional EDI becoming less important at the same time. In addition, we believe that due to low setup and operating costs, XML/EDI will become increasingly attractive to small and medium-sized enterprises (SME). We reckon that the „penguin effect” will not circumvent the transition from traditional EDI to XML/EDI and that the latter will be the key technology for exchanging business data in the future.
  • Zeitschriftenartikel
    Buchbesprechungen
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Sarschar, Kamyar; Walser, Konrad; Deelmann, Thomas; Müller, Günter; Stary, Christian; Scheer, Christian
  • Zeitschriftenartikel
    Integrated Enterprise Balancing mit integrierten Ertrags- und Risikodatenbanken
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Faisst, Ulrich; Buhl, Hans Ulrich
    To support a value-based management and to satisfy regulatory transparency requirements and legal reporting obligations, corporations require a corporate-wide consistent database with return and risk information. Despite existing technical integration approaches, such as data warehouse or OLAP solutions, the development of corporate-wide consistent return and risk databases is so far impossible, as adequate financial methods and performance measurement systems are lacking.Integrated Enterprise Balancing enables corporations of all industries to control their business activities with corporate-wide consistent return and risk measures. The presented performance measurement system enables corporations to additively connect return and risk measures on arbitrary aggregation levels and to perform such an aggregation also within multiple dimensions. Hence, it is a conceptual solution for the development of integrated return and risk databases.
  • Zeitschriftenartikel
    Social Software
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Hippner, Hajo; Wilde, Thomas
  • Zeitschriftenartikel
    WI — Dissertationen
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005)
  • Zeitschriftenartikel
    Meinung/Dialog
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Buhl, Hans Ulrich; Schroeder, Nina; Bode, Arndt; Frankenberg, Peter; Jetter, Martin; Lamberti, Hermann-Josef; Radermacher, Franz Josef; Stratmann, Lutz
  • Zeitschriftenartikel
    Vergleichende Buchbesprechung
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Baurschmid, Michael
  • Zeitschriftenartikel
    Ranking ist nicht alles — aber ohne Ranking wird alles nichts
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) König, Wolfgang
  • Zeitschriftenartikel
    RFID: Verbraucherängste und verbraucherschutz
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005) Berthold, Oliver; Günther, Oliver; Spiekermann, Sarah
    RFID introduction is a hotly debated public policy issue. The technology enables physical environments to become more interactive and supportive by tagging each item with a chip that wirelessly communicates with a service-enriched backend infrastructure. Based on a number of user studies at Humboldt-Universität and at the Auto-ID Center, this article presents the major fears associated with RFID introduction. We show to what extent these fears are justified and derive a number of system requirements for giving users more control over an RFID-enabled IT infrastructure. After presenting several recent technical proposals for privacy protection, we focus on the question of controlled access to RFID tags. We conclude with a proposal for an easy-to-use private password model.
  • Zeitschriftenartikel
    Aus den hochschulen
    (Wirtschaftsinformatik: Vol. 47, No. 6, 2005)