Informationstechnologie
Permanent URI for this collectionhttps://people.hochschule-burgenland.at/handle/20.500.11790/4
Browse
Browsing Informationstechnologie by Title
Now showing 1 - 20 of 231
- Results Per Page
- Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication 20 Tools für den Unterricht die Sie noch nicht kennenIn diesem Vortrag werden 20 "neue" Tools für den Unterricht und ihre didaktischen Einsatzmöglichkeiten vorgestellt: Classromscreen, DeepL, Open edX, Hootsuite, nuzzel, Feedly, Talkwalker Alerts, MailChimp, Flipgrid, kizoa, LICEcap, Typeform, Hemingway App, citavi, Cite This For Me, GoodReader, Microsoft Teams, Google Keep, IFTTT und Bullet Journal.603 2 - Some of the metrics are blocked by yourconsent settings
Publication 539 2 - Some of the metrics are blocked by yourconsent settings
Publication 155 1 - Some of the metrics are blocked by yourconsent settings
Publication A case study based approach to knowledge visualizationCase studies are proposed as a research method on knowledge visualization that can deal with the multidisciplinarity, the large variety of research targets and the complex correlations of this type of information visualization utilized for supporting tasks of knowledge management. A suitable case structure is presented that documents the analyzed cases and allows for a comparative analysis of multiple cases. To be able to systematically evaluate and compare the applied visualization techniques a set of evaluation criteria is introduced.1 424Scopus© Citations 6 - Some of the metrics are blocked by yourconsent settings
Publication A Feature-based Analysis of Open Source Tools for Enterprise 2.0: Open Source Tools for Team Collaboration in SMEs(KMIS 2011 – International Conference on Knowledge Management and Information Sharing, 2011-10-29); ; The marketplace of Enterprise 2.0 tools that support knowledge workers within companies to work together on cognitive tasks and share information and knowledge is diversified and offers commercial systems of varying complexity and functional range as well as open source software. Like commercial systems, open source tools for Enterprise 2.0 provide a broad range of functionality and offer a good alternative for organisations – especially for SMEs. This paper presents a study of the growing market for Enterprise 2.0 systems and focuses entirely on ones that are available under an open source license. We introduce a set of 97 individual features and criteria to assess a representative sample of open source Enterprise 2.0 tools. Our results show that the marketplace of open source tools for Enterprise 2.0 offers technically mature solutions with a broad range of functionality.522 236 - Some of the metrics are blocked by yourconsent settings
Publication A Framework for Measuring the Costs of Security at RuntimeIn Industry 4.0, Cyber-Physical Systems (CPS) are formed by components, which are interconnected with each other over the Internet of Things (IoT). The resulting capabilities of sensing and affecting the physical world offer a vast range of opportunities, yet, at the same time pose new security challenges. To address these challenges there are various IoT Frameworks, which offer solutions for managing and controlling IoT-components and their interactions. In this regard, providing security for an interaction usually requires performing additional security-related tasks (e.g. authorisation, encryption, etc.) to prevent possible security risks. Research currently focuses more on designing and developing these frameworks and does not satisfactorily provide methodologies for evaluating the resulting costs of providing security. In this paper we propose an initial approach for measuring the resulting costs of providing security for interacting IoT-components by using a Security Cost Modell ing Framework. Furthermore, we describe the necessary building blocks of the framework and provide an experimental design showing how it could be used to measure security costs at runtime.1 550Scopus© Citations 2 - Some of the metrics are blocked by yourconsent settings
Publication A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment(2019) ;Esfahani, A. ;Mantas, G. ;Matischek, R. ;Saghezchi, F.; ; ; ;Schmittner, Ch.Bastos, J.In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device's identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.563 287Scopus© Citations 254 - Some of the metrics are blocked by yourconsent settings
Publication A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology(2015) ;Hudic, A.; ;Loruenser, T. ;Krotsiani, M. ;Spanoudakis, G. ;Mauthe, A.Weippl, E.Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.3 159Scopus© Citations 8 - Some of the metrics are blocked by yourconsent settings
Publication A recommendation for suitable technologies for an indoor farming framework(Springer, 2020); ; ;Schmittner, Christoph; ;Christl, Korbinian ;Knapitsch, JohannesParapatits, MartinFacing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.612 77Scopus© Citations 10 - Some of the metrics are blocked by yourconsent settings
Publication A Security Cost Modelling Framework for Cyber-Physical Systems(ACM, 2022-05); ; ;Gouglidis, Antonios ;Mauthe, AndreasCyber-Physical Systems (CPS) are formed through interconnected components capable of computation, communication, sensing and changing the physical world. The development of these systems poses a significant challenge since they have to be designed in a way to ensure cyber-security without impacting their performance. This article presents the Security Cost Modelling Framework (SCMF) and shows supported by an experimental study how it can be used to measure, normalise and aggregate the overall performance of a CPS. Unlike previous studies, our approach uses different metrics to measure the overall performance of a CPS and provides a methodology for normalising the measurement results of different units to a common Cost Unit. Moreover, we show how the Security Costs can be extracted from the overall performance measurements which allows to quantify the overhead imposed by performing security-related tasks. Furthermore, we describe the architecture of our experimental testbed and demonstrate the applicability of SCMF in an experimental study. Our results show that measuring the overall performance and extracting the security costs using SCMF can serve as basis to redesign interactions to achieve the same overall goal at less costs.2 171Scopus© Citations 2 - Some of the metrics are blocked by yourconsent settings
Publication A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments(2023); ;Thiede, Dominik ;Race, Nicholas ;Broadbent, MatthewGouglidis, AntoniosData Center (DC) network requirements. Virtualisation is one of the key drivers of that transformation and enables a massive deployment of computing resources, which exhausts server capacity limits. Furthermore, the increased network endpoints need to be handled dynamically and centrally to facilitate cloud computing functionalities. Traditional DCs barely satisfy those demands because of their inherent limitations based on the network topology. Software-Defined Networks (SDN) promise to meet the increasing network requirements for cloud applications by decoupling control functionalities from data forwarding. Although SDN solutions add more flexibility to DC networks, they also pose new vulnerabilities with a high impact due to the centralised architecture. In this paper we propose an evaluation framework for assessing the security level of SDN architectures in four different stages. Furthermore, we show in an experimental study, how the framework can be used for mapping SDN threats with associated vulnerabilities and necessary mitigations in conjunction with risk and impact classification. The proposed framework helps administrators to evaluate the network security level, to apply countermeasures for identified SDN threats, and to meet the networks security requirements.2 40Scopus© Citations 2 - Some of the metrics are blocked by yourconsent settings
Publication A Self-Organising Approach for Smart Meter Communication Systems(2014); ;Skopik, F. ;Hutchison, D.Bleier, T.2 155Scopus© Citations 1 - Some of the metrics are blocked by yourconsent settings
Publication Acceptance and Usability of Interactive Infographics in Online Newspapers(Information Visualisation Society Conference, 2017-07-13) ;Zwinger, Sandra ;Langer, JuliaInteractive infographics are a powerful tool to represent and communicate complex information. In data-driven journalism journalists use interactive infographics to explain new insights and facts while telling complex stories on the basis of retrieved data. However, readers of online news are still unexperienced while using interactive infographics. The results of a user survey among readers of online newspapers show how readers use and interact with interactive infographics in online newspapers. To improve the acceptance among users and to identify success factors of their utilization the results of a usability study of interactive infographics are presented.191 549Scopus© Citations 4 - Some of the metrics are blocked by yourconsent settings
Publication Adoption, Motivation and Success Factors of Social Media for Team Collaboration in SMEs(i-KNOW 2011 - 11th International Conference on Knowledge Management and Knowledge Technologies, 2011-09-09); In team collaboration we deal with collaboration among team members that may either belong to the same enterprise (intra-enterprise collaboration) or among team members belonging to different companies (e.g., in research projects). Social media provide an efficient and accessible means of encouraging and supporting team members working together on shared objects, i.e., performing collaborative tasks within these teams. Due to ease of use and access, especially small or medium-sized enterprises (SMEs) may profit a lot from social media in team collaboration. Based on a number of case studies on the application of social media in SMEs, we analyze the adoption and implementation, the motivation of team members and their benefit, and success factors of the utilization of social media for team collaboration. To provide a set of case studies that allow for detailed comparison and in-depth analysis of multiple case studies, a standardized case study structure is introduced.1 220Scopus© Citations 19 - Some of the metrics are blocked by yourconsent settings
Publication AI in academia: An overview of selected tools and their areas of application(2023)As a result of OpenAI's ChatGPT, there has been increasing interest in AI and web-based natural language processing (NLP), including in academia. In this article, we provide an overview of the tools that can be used for academic purposes. The overview was conducted from the perspective of a university educator and was intended to guide educators in higher education on emerging AI technologies. The tools discussed ranged from searching the literature and attributions to peer-reviewed articles, scientific writing, and academic writing and editing. The objective is to foster an informed approach to the integration of AI tools in academic settings, ensuring that educators are well-equipped to leverage these technologies to enhance the quality and output of academic work.21 148 - Some of the metrics are blocked by yourconsent settings
Publication Akzeptanz von digitalen Informations-Tools bei Digital Non-Natives(2023-10-13) ;Franc, Elisabeth; Futscher, FabianDigitale Informations-Tools werden in allen Bereichen der Wissensübertragung und Informationsbeschaffung eingesetzt. Beginnend bei Ausbildungsinstituten bis hin zu privaten Unternehmen sind Mitarbeitende dieser Organisationen damit konfrontiert, derartige Tools für die jeweiligen Zielgruppen attraktiv zu gestalten. Bei dieser Gestaltung gilt es, zwischen der Zielgruppe der Digital-Natives und der Digital Non-Natives zu unterscheiden. Die Akzeptanz digitaler Tools ist seitens der Digital Non-Natives oft geringer als die der Digital Natives. Im Rahmen dieser Studie wurde aus diesem Grund der Frage nachgegangen, welche Faktoren die Akzeptanz digitaler Informations-Tools durch Digital Non-Natives beeinflussen. Verschiedene Technologieakzeptanz-Modelle, welche derartige Faktoren beinhalten, werden in dieser Studie diskutiert und in einem konkreten Fallbeispiel bei der Schaffung einer Informationsplattform in Form eines Online Help Centers angewendet. Diese Studie hat gezeigt, dass es wichtig ist, Akzeptanzfaktoren bei der Entwicklung von digitalen Informationsangeboten zu berücksichtigen und dass dadurch eine gesteigerte Akzeptanz des Angebots bei der Zielgruppe der Digital Non-Natives zu erwarten ist.20 197 - Some of the metrics are blocked by yourconsent settings
Publication An Algorithm to Transform an Artificial Neural Network into its Open Equation Form and its Potential ApplicationsDuring the last decades artificial neural networks have evolved to an accepted and proven technology for modelling and function approximation. Different kinds of network architectures exist to support certain domains and applications in an efficient way. This paper assumes the traditional multilayer feedforward artificial neural network (ANN) architecture with one input layer, one or more fully interconnected hidden layers and one output layer. Each layer consists of several classic perceptron nodes using a differentiable transfer function like the logistics function. Very often it is useful to have an ANN model in an open equation form available, that allows a deeper analysis of the model and to do more complex experiments and simulations. The following paper presents an algorithm that makes it possible to transform an ANN into its open form equivalent, called process model architecture network or PMA network. It has been used as an integral part in several industrial control projects. A PMA network can be used for system simulation, scenario analyses or inverse model based control. An example application is discussed.174 1 - Some of the metrics are blocked by yourconsent settings
Publication 148 709 - Some of the metrics are blocked by yourconsent settings
Publication Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems(IEEE, 2021-06-30); ; ; ;Mauthe, AndreasGouglidis, AntoniosThe importance of Cyber Physical Systems (CPS) and Internet of Things (IoT) applications is constantly increasing, especially in the context of Industry 4.0. Architectural decisions are crucial not just for performance, security and resilience reasons but also regarding costs and resource usage. In this paper we analyse two of the fundamental approaches to design control loops (i.e. time-driven and event-driven), show how they can be realised and evaluate their power requirements. Through this the design criteria can be extended also considering the optimization of energy related aspects.162 1 - Some of the metrics are blocked by yourconsent settings
Publication Analysis of the Economical Impact by Introducing a new Indoor Farming SystemAt a time when food procurement, food shortage, the stagnation in available arable land and rising population numbers are rising at an alarming rate, the importance of indoor farming is increasing. Indoor farming is an approach that allows fruits and vegetables to grow food in halls in racks, which gave birth to the term vertical farming. Vertical agriculture allows the optimization of food production by setting up adapted parameters in such a hall, thereby manipulating and boosting plant growth. However, since the necessary conditions for the growth can only be perfectly regulated for one type of plant per hall, it was considered to reduce the size of this unit and to design a box that provides the same functionality. In this paper I present a first prototype, which was designed as a Cyber Physical System (CPS), including power measurements of the included components. Furthermore, it demonstrates an economic approach for establishing this box in the Austrian economy based on a use case, followed by the advantages and disadvantages this change would entail. Finally, a calculation of expected costs in the first five years is presented.146 1