Logo des Repositoriums
 

BISE 06(6) - December 2014

Autor*innen mit den meisten Dokumenten  

Auflistung nach:

Neueste Veröffentlichungen

1 - 10 von 10
  • Zeitschriftenartikel
    Imprint
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014)
  • Zeitschriftenartikel
    Architectural Thinking
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Winter, Robert
  • Zeitschriftenartikel
    Multilevel Modeling
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Frank, Ulrich
    Domain-specific modeling languages (DSMLs) promise clear advantages over general-purpose modeling languages. However, their design poses a fundamental challenge. While economies of scale advocate the development of DSMLs that can be used in a wide range of cases, modeling productivity demands more specific language concepts tuned to individual requirements. Inspired by the actual use of technical languages (German: “Fachsprachen”), this paper presents a novel multilevel modeling approach to conceptual modeling and to the design of information systems. Unlike traditional language architectures such as Meta Object Facility (MOF), it features a recursive architecture that allows for an arbitrary number of classification levels and, hence, for the design of hierarchies of DSMLs ranging from reference DSMLs to “local” DSMLs. It can not only diminish the conflict inherent in designing DSMLs, but enables the reuse and integration of software artifacts in general. It also helps reduce modeling complexity by relaxing the rigid dichotomy between specialization and instantiation. Furthermore, it integrates a meta-modeling language with a metamodel of a reflective meta-programming language, thereby allowing for executable models. The specification of the language architecture is supplemented by the description of use scenarios that illustrate the potential of multilevel modeling and a critical discussion of its peculiarities.
  • Zeitschriftenartikel
    Value-in-Use and Mobile Technologies
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Bruns, Katherina; Jacob, Frank
    The increasing number of offerings that support consumers’ daily routines has led to a growing discussion in scientific research about consumers’ usage processes. A theoretical foundation for this discussion is offered by the service-dominant logic of marketing. The central idea is that value creation for a consumer is not based on mere product ownership but rather evolves through the usage of various offerings in terms of value-in-use. However, there is no universally accepted method to capture usage processes and analyze them with regard to value-in-use. The article therefore suggests a method for capturing value-in-use. For this purpose the repertory grid method is applied which is further adapted according to the underlying theoretical assumptions and empirically tested in a qualitative study on smartphone usage. On the basis of the findings, a specific value-in-use scale is then developed. Finally, this scale is validated in a quantitative study. The results indicate that the adapted repertory grid method is a promising approach to capture usage processes and the value-in-use created through these processes.
  • Zeitschriftenartikel
    Language Change
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Bichler, Martin
  • Zeitschriftenartikel
    Diversity and Quality in BISE Research
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Bichler, Martin; Heinzl, Armin; Winter, Robert
  • Zeitschriftenartikel
    The Economic Impact of Privacy Violations and Security Breaches
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Nofer, Michael; Hinz, Oliver; Muntermann, Jan; Roßnagel, Heiko
    Privacy and security incidents represent a serious threat for a company’s business success. While previous research in this area mainly investigated second-order effects (e.g., capital market reactions to privacy or security incidents), this study focuses on first-order effects, that is, the direct consumer reaction. In a laboratory experiment, the authors distinguish between the impact of privacy violations and security breaches on the subjects’ trust and behavior. They provide evidence for the so-called “privacy paradox” which describes that people’s intentions, with regard to privacy, differ from their actual behavior. While privacy is of prime importance for building trust, the actual behavior is affected less and customers value security higher when it comes to actual decision making. According to the results, consumers’ privacy related intention-behavior gap persists after the privacy breach occurred.
  • Zeitschriftenartikel
    BISE – Call for Papers Issue 5/2016
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Abramowicz, Witold; Auer, Sören; Heath, Tom
  • Zeitschriftenartikel
    Interview with Peter Schnaebele on “User Experience”
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Mädche, Alexander
  • Zeitschriftenartikel
    Are Requirements for Graduates of Master and PhD Programs in Business and Information Systems Engineering Changing?
    (Business & Information Systems Engineering: Vol. 6, No. 6, 2014) Eymann, Torsten; Kundisch, Dennis; Wehrmann, Alexander; Legner, Christine; Schell, Axel; Weitzel, Tim