Markus, Heike; Meuche, Thomas; Schulze, Anica; Henning, André (2022)
DOI: 10.57944/1051-128
Der digitale Wandel ist für die kommunale Verwaltung in ganz Deutschland eine Herausforderung. Während Politik und Gesellschaft Ansprüche an Online-Angebote und Bürgerservices stellen, verharren viele Verwaltungseinheiten in einem Zwiespalt zwischen neuen Technologien und bestehenden starren Strukturen. Onlinezugänge allein repräsentieren keine digitale Verwaltung, ähnlich wie die E-Akte und Dokumentenmanagementsysteme kein Garant für digitalisierte Prozesse sind. Um diesen Umstand auf die Technologiefokussierung in der deutschen Kommunalverwaltung wissenschaftlich zu belegen und den aktuellen Stand der Digitalisierung in den Behörden zu erfassen, hat das Kompetenzzentrum Digitale Verwaltung der Hochschule Hof vom 23.05.2022 bis 12.07.2022 eine deutschlandweite Umfrage durchgeführt. Eine gleichlautende Umfrage wurde bereits im Wintersemester 2021/22 bayernweit im Rahmen einer Bachelorarbeit durchgeführt. Aufgrund des großen Interesses an den Ergebnissen zeigte sich der Bedarf für eine bundesweite Erhebung.
Die Basis des Fragebogens ist das an der Hochschule Hof erarbeitete Digitale Reifegradmodell m², das die sieben Dimensionen Personal, Strategie, Steuerung, Prozesse, Technologie, Führung und Daten, die für die Digitalisierung eine Rolle spielen, umfasst. In den Ergebnissen konnte die oben aufgestellte These bestätigt und relevante Forschungserkenntnisse getroffen werden.
Henning, André; Schulze, Anica; Meuche, Thomas; Markus, Heike (2022)
Bericht.
DOI: 10.57944/1051-128
Der digitale Wandel ist für die kommunale Verwaltung in ganz Deutschland eine Herausforderung. Während Politik und Gesellschaft Ansprüche an Online-Angebote und Bürgerservices stellen, verharren viele Verwaltungseinheiten in einem Zwiespalt zwischen neuen Technologien und bestehenden starren Strukturen. Onlinezugänge allein repräsentieren keine digitale Verwaltung, ähnlich wie die E-Akte und Dokumentenmanagementsysteme kein Garant für digitalisierte Prozesse sind. Um diesen Umstand auf die Technologiefokussierung in der deutschen Kommunalverwaltung wissenschaftlich zu belegen und den aktuellen Stand der Digitalisierung in den Behörden zu erfassen, hat das Kompetenzzentrum Digitale Verwaltung der Hochschule Hof vom 23.05.2022 bis 12.07.2022 eine deutschlandweite Umfrage durchgeführt. Eine gleichlautende Umfrage wurde bereits im Wintersemester 2021/22 bayernweit im Rahmen einer Bachelorarbeit durchgeführt. Aufgrund des großen Interesses an den Ergebnissen zeigte sich der Bedarf für eine bundesweite Erhebung. Die Basis des Fragebogens...
The digital transformation is a challenge for local government throughout Germany. While politics and society are making demands on online offerings and citizen services, many administrative units remain caught in a dichotomy between recent technologies and existing rigid structures. Online access alone does not represent digital administration, just as electronic files and document management systems are no guarantee of digitized processes. To provide scientific evidence of this fact on the technology focus in German local government and to record the current state of digitization in public authorities, the Kompetenzzentrum Digitale Verwaltung der Hochschule Hof conducted a nationwide survey from May 23 to July 12, 2022. A similar survey was already conducted throughout Bavaria in winter semester 2021/22 as part of a bachelor's thesis. Due to the great interest in the results, the need for a nationwide survey became apparent. The basis of the questionnaire is the Digitales Reifegradmodell m² developed at Hochschule Hof, which…
Falkenreck, Christine; Wagner, Ralf (2022)
Proceedings for 38th Annual IMP Conference.
Very recently the relevance of critical infrastructure gained public awareness. We evaluated the buy process for critical infrastructure versus the buying processes of other B-2-B marketing contexts. In both data sets, the organization’s digitalization capabilities have an impact on the general satisfaction with digitalization processes. We found a positive relationship between satisfaction with digitalization processes, the general satisfaction with the supplier and towards relationship quality. We were able to explain 66% (CI data set) and 81% (non-CI dataset) of the drivers of relationship quality. Nevertheless, in the non-CI sample, the degree of satisfaction with the organization’s digitalization capabilities as well as the general degree of digitalization has an impact on trust in their supplier’s IoT credibility. This does not hold for the CI-related sample. Referring to CI operators’ data, there is a positive relationship between the general perception on the Usefulness of the IoT and Trust in their supplier’s IoT credibility. CI operators strongly rely on already existing trustful relationships to develop trust in a suppliers IoT credibility. This is not true for non-CI operators. CI members are influenced by different drivers and are more strongly relying on existing relationship trust.
Lawall, Alexander; Schaller, Thomas (2022)
International Journal on Cryptography and Information Security (IJCIS) 2022, 12 (3), S. 1-11.
DOI: 10.5121/ijcis.2022.12301
Wolff, Dietmar (2022)
Wolff, Dietmar (2022)
Workshop auf See 2022, Redline Data, Oslo-Kiel 01.09.2022.
Wolff, Dietmar (2022)
Wolff, Dietmar (2022)
Workshop auf See 2022, Redline Data, Kiel-Oslo 31.08.2022.
Dreissig, Felix; Röckl, Jonas; Müller, Tilo (2022)
Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022), S. 1-10.
DOI: 10.1145/3538969.3538972
To optimally utilize Intel SGX, programs must be partitioned into trusted and untrusted parts. Writing the trusted part of a program with Intel’s SDK, however, requires manual effort that often becomes an obstacle for programmers. In this work, we investigate how compiler-level tooling can assist with the semi-automatic separation of code into a trusted and an untrusted partition. We present Cadote, a solution that generates SGX enclaves from programs written in Rust. Application developers are expected to mark functions as trusted, for which enclaves are then generated automatically. All other functions remain untrusted and are executed outside Intel SGX in the normal world. We implemented this concept using compiler optimization passes of the LLVM framework. Targeting Rust as input language allows us to benefit from high-level concepts, such as memory safety, which enable us to safely copy function parameters between the normal and trusted world in practice.
Scharnagl, Bastian; Groth, Christian (2022)
5th International Conference on Artificial Intelligence for Industries (AI4I). 2022.
EEG classification is a promising approach to facilitate the life of handicapped people and to generate future human-computer-interfaces. In this paper we want to compare the effectiveness of current state of the art deep learning techniques for EEG classification. Therefore, we applied different approaches on various datasets and did a crosscomparison of the results in order to get more knowledge on the generalization capabilities. Additionally, we created a new EEG dataset and made it available for further research.
Drescher, Johannes; Gaul, Charly; Kropp, Peter; Siebenhaar, Yannic; Reinel, Dirk; Scheidt, Jörg (2022)
Drescher, Johannes; Gaul, Charly; Kropp, Peter; Siebenhaar, Yannic; Reinel, Dirk...
OBM Neurobiology 2022 6 (3).
DOI: 10.21926/obm.neurobiol.2203131
This citizen science project CLUE compared the attack frequency between school and vacation periods among adolescents. The data collection process adopted in citizen science projects opens up the possibility of conducting analyses by including a large number of participants over a long period and across different regions. The data on 684 migraine attacks reported by 68 adolescents aged 16 to 19 years were collected using an online platform and smartphone apps. A Fisher’s exact test was used to compare the distributions of the migraine attack frequency during vacation and school periods in two different scenarios. In both scenarios, the attack frequency during school periods was significantly higher than that during vacation periods. The use of web-based data collection has some methodological limitations; however, it enabled the measurement of relative migraine attack frequency in students during vacation and school periods. The higher prevalence of migraine during school periods indicates the requirement of increasing headache awareness among children.
Atzenbeck, Claus; Rubart, Jessica (2022)
33rd ACM Conference on Hypertext and Social Media (HT'22).
DOI: 10.1145/3538882
Human Factors in Hypertext 2022 (HUMAN'22) is the 5th workshop in this series. It is sponsored by ACM SIGWEB and is associated to the ACM Conference on Hypertext and Social Media 2022 (HT'22), which takes place between June 28th and July 1st in Barcelona, Spain as a hybrid event. HUMAN'22 takes place on June 28th—the conference's workshop day.
After two years of pandemic-caused virtual workshops, HUMAN'22 is organized as a hybrid event, which is in line with the organization of the main conference. We see this as a chance to allow in-presence meetings while providing remote participants the opportunity to get in touch by low registration costs and a reduced carbon footprint. Today's digital media enables us to communicate over distance or even attend larger meetings online and the Corona pandemic has taught us to use these tools in our daily life. This puts a special focus on the role of hypertext in our communication and information exchange demands, in particular from a human's perspective.
Drossel, Matthias (2022)
PFLEGEZeitschrift.
Wolff, Dietmar; Neeb, Désirée (2022)
SOZIALwirtschaft aktuell 2022 (14), S. 1-3.
Wolff, Dietmar (2022)
Fachtag DiCariO, Caritas und Diakonie.
Schiller, Katharina; Adamsky, Florian (2022)
11th International Workshop on Socio-Technical Aspects in Security affiliated with the 26th European Symposium on Research in Computer Security (ESORICS 2021), S. 182-193.
DOI: 10.1007/978-3-031-10183-0_9
E-mail is nearly 50 years old and is still one of the most used communication protocols nowadays. However, it has no support for End-to-end encryption (E2EE) by default, which makes it inappropriate for sending sensitive information. This is why two e-mail encryption standards have been developed—namely, Secure/Multipurpose Internet Mail Extensions (S/MIME) and OpenPGP. Previous studies found that bad usability of encryption software can lead to software that is incorrectly used or not at all. Both consequences have a fatal impact on users’ security and privacy. In recent years, the number of e-mails that are read and written on mobile devices has increased drastically. In this paper, we conduct to the best of our knowledge, the first usability study of e-mail encryption apps on smartphones. We tested two mobile apps, one uses OpenPGP on Android and one uses S/MIME on iOS. In our usability study, we tested both apps with eleven participants and evaluated the usability with the System Usability Scale (SUS) and the Short Version of User Experience Questionnaire (UEQ-S). Our study shows that both apps have several usability issues which partly led to unencrypted e-mails and participants sending their passphrase instead of their public key.
Ruscheweyh, Ruth; Klonowski, Theresa; Goßrau, Gudrun; Kraya, Torsten; Gaul, Charly; Straube, Andreas; Jürgens, Tim Patrick; Scheidt, Jörg; Förderreuther, Stefanie (2022)
Ruscheweyh, Ruth; Klonowski, Theresa; Goßrau, Gudrun; Kraya, Torsten; Gaul, Charly...
The Journal of Headache and Pain 2022 23 (74).
DOI: 10.1186/s10194-022-01447-3
Although good treatment options exist for many headache disorders, not all patients benefit and disability continues to be large. To design strategies for improving headache care, real-world data observing standard care is necessary. Therefore, the German Migraine and Headache Society (DMKG) has established the DMKG Headache Registry. Here we present methods and baseline data.
Schilling, Joschua; Müller, Tilo (2022)
19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2022) 13358, S. 96–115.
DOI: 10.1007/978-3-031-09484-2_6
Abstract. While modern-day static analysis tools are capable of finding standard vulnerabilities as well as complex patterns, implementing those tools is expensive regarding both development time and runtime performance. During the last years, domain specific languages like Datalog have gained popularity as they simplify the development process of analyses and rule sets dramatically. Similarly, intermediate representations like LLVM-IR are used to facilitate static source code analysis. In this paper, we present VANDALIR, a vulnerability analyzer and detector based on Datalog and LLVM-IR. VANDALIR is a static source code analyzer that allows to define and customize detection rules in a high-level, declarative way. We implement VANDALIR as a comprehensive static analysis tool, aiming to simplify vulnerability detection by a new combination of modern technologies. Besides the novel design of VANDALIR, we present a predefined detection rule set covering stack-based memory corruption, double free and format string vulnerabilities. As we show, our rule set achieves a detection rate of over 90% on test cases from the Juliet Test Suite, outperforming well-established vulnerability scanners such as the Clang Static Analyzer. Furthermore, we evaluated VANDALIR on open source projects and could reproduce existing vulnerabilities as well as identify previously unknown vulnerabilities.
Wagener, Andreas (2022)
Nerdwärts.de, 29.06.2022, https://nerdwaerts.de/2022/06/churn-management-und-kundenrueckgewinnung-mit-ki/.
In vielen Branchen gilt immer noch das Paradigma, dass es deutlich kostengünstiger sei, bestehende Kunden zu binden, als neue zu gewinnen. In diesem Kontext kommt einem zielgerichteten, analytischen Churn Management eine besondere Bedeutung zu. KI und Methoden des maschinellen Lernens scheinen dafür wie geschaffen.
Schlingensiepen, Jörg; Boos, Franz-Xaver (2022)
Die neue Hochschule, 2022 (3), S. S. 18-21.
Alfons-Goppel-Platz 1
95028 Hof
T +49 9281 409 - 4690
valentin.plenk[at]hof-university.de