PUMA publications for /user/iteg/systemshttps://puma.uni-kassel.de/user/iteg/systemsPUMA RSS feed for /user/iteg/systems2024-03-29T11:08:11+01:00Systems and Data Protection Legislation in Germanyhttps://puma.uni-kassel.de/bibtex/27627a5b63966fd4530f1974c35d6703a/itegiteg2011-11-22T10:26:32+01:00Biometric Data Germany Legislation Protection Systems and gerrit hornung in itegpub myown roßnagel <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Gerrit Hornung" itemprop="url" href="/author/Gerrit%20Hornung"><span itemprop="name">G. Hornung</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"> </span>(<em><span>2008<meta content="2008" itemprop="datePublished"/></span></em>)Tue Nov 22 10:26:32 CET 20111088-1093Systems and Data Protection Legislation in Germany2008Biometric Data Germany Legislation Protection Systems and gerrit hornung in itegpub myown roßnagel A Re-Classification of IS security analysis approacheshttps://puma.uni-kassel.de/bibtex/29dbf731d4765bf17dd192be709d72855/itegiteg2011-11-22T10:26:32+01:00Information Management Risk Security Standards Systems itegpub myown pub_jml <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Sunyaev" itemprop="url" href="/author/A.%20Sunyaev"><span itemprop="name">A. Sunyaev</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="F. Tremmel" itemprop="url" href="/author/F.%20Tremmel"><span itemprop="name">F. Tremmel</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="C. Mauro" itemprop="url" href="/author/C.%20Mauro"><span itemprop="name">C. Mauro</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Krcmar" itemprop="url" href="/author/H.%20Krcmar"><span itemprop="name">H. Krcmar</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Proceedings of the Fifteenth Americas Conference on Information Systems (AMCIS)</span>, </em></span><em>San Francisco, USA, </em>(<em><span>2009<meta content="2009" itemprop="datePublished"/></span></em>)<em>127 (11-09).</em>Tue Nov 22 10:26:32 CET 2011San Francisco, USAProceedings of the Fifteenth Americas Conference on Information Systems (AMCIS)127 (11-09)A Re-Classification of IS security analysis approaches2009Information Management Risk Security Standards Systems itegpub myown pub_jml From medical processes to workflows: modeling of clinical pathways with the unified modeling languagehttps://puma.uni-kassel.de/bibtex/213794296f5ff12a9b4b5806a756bd451/itegiteg2011-11-22T10:26:32+01:00Clinical Management Modeling Pathways Process Systems UML Workflow Workflows itegpub myown pub_jml <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="C. Mauro" itemprop="url" href="/author/C.%20Mauro"><span itemprop="name">C. Mauro</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="T. Happle" itemprop="url" href="/author/T.%20Happle"><span itemprop="name">T. Happle</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Sunyaev" itemprop="url" href="/author/A.%20Sunyaev"><span itemprop="name">A. Sunyaev</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M.Leimeister" itemprop="url" href="/author/J.%20M.Leimeister"><span itemprop="name">J. M.Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Krcmar" itemprop="url" href="/author/H.%20Krcmar"><span itemprop="name">H. Krcmar</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">3. International Conference on Health Informatics (HealthInf) 2010</span>, </em></span><em>Valencia, Spain, </em>(<em><span>2010<meta content="2010" itemprop="datePublished"/></span></em>)<em>161 (9-10).</em>Tue Nov 22 10:26:32 CET 2011Valencia, Spain3. International Conference on Health Informatics (HealthInf) 2010161 (9-10)From medical processes to workflows: modeling of clinical pathways with the unified modeling language2010Clinical Management Modeling Pathways Process Systems UML Workflow Workflows itegpub myown pub_jml Open security issues in German healthcare telematicshttps://puma.uni-kassel.de/bibtex/2c24c956a2d2f5471cfa7c8637baa2cd0/itegiteg2011-11-22T10:26:32+01:00Analysis Card Electronic Health Healthcare IS Information Security Systems Telematics itegpub myown pub_jml <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Sunyaev" itemprop="url" href="/author/A.%20Sunyaev"><span itemprop="name">A. Sunyaev</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Krcmar" itemprop="url" href="/author/H.%20Krcmar"><span itemprop="name">H. Krcmar</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">3. International Conference on Health Informatics (HealthInf) 2010</span>, </em></span><em>Valencia, Spain, </em>(<em><span>2010<meta content="2010" itemprop="datePublished"/></span></em>)<em>162 (10-10).</em>Tue Nov 22 10:26:32 CET 2011Valencia, Spain3. International Conference on Health Informatics (HealthInf) 2010162 (10-10)Open security issues in German healthcare telematics2010Analysis Card Electronic Health Healthcare IS Information Security Systems Telematics itegpub myown pub_jml Tag Recommendations in Social Bookmarking Systemshttps://puma.uni-kassel.de/bibtex/2955bcf14f3272ba6eaf3dadbef6c0b10/itegiteg2011-11-22T10:26:32+01:002.0 2008 Recommendations bookmarking itegpub logsonomies myown recommendations recommender social systems tag tagorapub tags web web2.0 web20 <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Robert Jäschke" itemprop="url" href="/author/Robert%20J%c3%a4schke"><span itemprop="name">R. Jäschke</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Leandro Marinho" itemprop="url" href="/author/Leandro%20Marinho"><span itemprop="name">L. Marinho</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Andreas Hotho" itemprop="url" href="/author/Andreas%20Hotho"><span itemprop="name">A. Hotho</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Lars Schmidt-Thieme" itemprop="url" href="/author/Lars%20Schmidt-Thieme"><span itemprop="name">L. Schmidt-Thieme</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Gerd Stumme" itemprop="url" href="/author/Gerd%20Stumme"><span itemprop="name">G. Stumme</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>AI Communications</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">21 </span></span>(<span itemprop="issueNumber">4</span>):
<span itemprop="pagination">231-247</span></em> </span>(<em><span>2008<meta content="2008" itemprop="datePublished"/></span></em>)Tue Nov 22 10:26:32 CET 2011AmsterdamAI Communications4231-247Tag Recommendations in Social Bookmarking Systems2120082.0 2008 Recommendations bookmarking itegpub logsonomies myown recommendations recommender social systems tag tagorapub tags web web2.0 web20 Collaborative tagging systems allow users to assign keywords - so called "tags" - to resources. Tags are used for navigation, finding resources and serendipitous browsing and thus provide an immediate benefit for users. These systems usually include tag recommendation mechanisms easing the process of finding good tags for a resource, but also consolidating the tag vocabulary across users. In practice, however, only very basic recommendation strategies are applied.
In this paper we evaluate and compare several recommendation algorithms on large-scale real life datasets: an adaptation of
user-based collaborative filtering, a graph-based recommender built on top of the FolkRank algorithm, and simple methods based on counting tag occurences. We show that both FolkRank and Collaborative Filtering provide better results than non-personalized baseline methods. Moreover, since methods based on counting tag occurrences are computationally cheap, and thus usually preferable for real time scenarios, we discuss simple approaches for improving the performance of such methods. We show, how a simple recommender based on counting tags from users and resources can perform almost as good as the best recommender.
LocaTag - An NFC-based system enhancing instant messaging tools with real-time user locationhttps://puma.uni-kassel.de/bibtex/2d443fdea0d4b6d9b75285c52f8c0961d/itegiteg2011-11-22T10:26:32+01:00Awareness Communication Field Instant Near Social VENUS_Winfo itegpub messaging myown presence pub_jml systems <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="F. Köbler" itemprop="url" href="/author/F.%20K%c3%b6bler"><span itemprop="name">F. Köbler</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="P. Koene" itemprop="url" href="/author/P.%20Koene"><span itemprop="name">P. Koene</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Krcmar" itemprop="url" href="/author/H.%20Krcmar"><span itemprop="name">H. Krcmar</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Altmann" itemprop="url" href="/author/M.%20Altmann"><span itemprop="name">M. Altmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">2. International Workshop on Near Field Communication (NFC) 2010</span>, </em></span><em> 2, </em><em>Monaco, Monaco, </em>(<em><span>2010<meta content="2010" itemprop="datePublished"/></span></em>)<em>180 (28-10).</em>Tue Nov 22 10:26:32 CET 2011Monaco, Monaco2. International Workshop on Near Field Communication (NFC) 2010180 (28-10)LocaTag - An NFC-based system enhancing instant messaging tools with real-time user location22010Awareness Communication Field Instant Near Social VENUS_Winfo itegpub messaging myown presence pub_jml systems The Anti-Social Tagger - Detecting Spam in Social Bookmarking Systemshttps://puma.uni-kassel.de/bibtex/26357f535000a383f228f1e8e56ca86ca/itegiteg2011-11-22T10:26:32+01:002.0 2008 bookmarking folksonomies folksonomy itegpub myown social spam systems tagger tagorapub web web2.0 <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Beate Krause" itemprop="url" href="/author/Beate%20Krause"><span itemprop="name">B. Krause</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Christoph Schmitz" itemprop="url" href="/author/Christoph%20Schmitz"><span itemprop="name">C. Schmitz</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Andreas Hotho" itemprop="url" href="/author/Andreas%20Hotho"><span itemprop="name">A. Hotho</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Gerd Stumme" itemprop="url" href="/author/Gerd%20Stumme"><span itemprop="name">G. Stumme</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Proc. of the Fourth International Workshop on Adversarial Information Retrieval on the Web</span>, </em></span>(<em><span>2008<meta content="2008" itemprop="datePublished"/></span></em>)Tue Nov 22 10:26:32 CET 2011Proc. of the Fourth International Workshop on Adversarial Information Retrieval on the WebThe Anti-Social Tagger - Detecting Spam in Social Bookmarking Systems20082.0 2008 bookmarking folksonomies folksonomy itegpub myown social spam systems tagger tagorapub web web2.0