PUMA publications for /user/jmleimeister/pub_ms%C3%B6https://puma.uni-kassel.de/user/jmleimeister/pub_ms%C3%B6PUMA RSS feed for /user/jmleimeister/pub_ms%C3%B62024-03-29T02:19:09+01:00- Exploring Business Models for IT-enabled Product-Service-Systemshttps://puma.uni-kassel.de/bibtex/2a8703b74105fcdef27c0ab771287d70f/jmleimeisterjmleimeister2013-05-06T17:19:59+02:00Business_models information_technology. itegpub product_service_system pub_jml pub_mgi pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Michael Gierczak" itemprop="url" href="/author/Michael%20Gierczak"><span itemprop="name">M. Gierczak</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">DIBME 2013 Pre-ECIS Workshop on the Digitization in Business Models and Entrepreneurship</span>, </em></span><em>Utrecht, Netherlands (accepted for publication), </em>(<em><span>2013<meta content="2013" itemprop="datePublished"/></span></em>)Mon May 06 17:19:59 CEST 2013Utrecht, Netherlands (accepted for publication)DIBME 2013 Pre-ECIS Workshop on the Digitization in Business Models and EntrepreneurshipExploring Business Models for IT-enabled Product-Service-Systems2013Business_models information_technology. itegpub product_service_system pub_jml pub_mgi pub_msö
- Understanding Diversity – The Impact of Personality on Technology Acceptancehttps://puma.uni-kassel.de/bibtex/2da65a783b2fed6a9ec45e80453691bf6/jmleimeisterjmleimeister2013-05-06T17:10:12+02:00itegpub personality pub_jml pub_msö technology_acceptance <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Kay Behrenbruch" itemprop="url" href="/author/Kay%20Behrenbruch"><span itemprop="name">K. Behrenbruch</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Ludger Schmidt" itemprop="url" href="/author/Ludger%20Schmidt"><span itemprop="name">L. Schmidt</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">INTERACT 2013</span>, </em></span><em>Cape Town, South Africa, </em>(<em><span>2013<meta content="2013" itemprop="datePublished"/></span></em>)Mon May 06 17:10:12 CEST 2013Cape Town, South AfricaINTERACT 2013Understanding Diversity – The Impact of Personality on Technology Acceptance2013itegpub personality pub_jml pub_msö technology_acceptance
- Understanding Trust in IT Artifacts – A new Conceptual Approachhttps://puma.uni-kassel.de/bibtex/20f499f764a9a2170c784614f7e9c06df/jmleimeisterjmleimeister2013-04-23T15:36:54+02:00IT artifact artifacts conceptual in itegpub of paper provider pub_jml pub_msö the trust <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Paul Pavlou" itemprop="url" href="/author/Paul%20Pavlou"><span itemprop="name">P. Pavlou</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Academy of Management Annual Meeting</span>, </em></span><em>Orlando, Florida, USA, </em>(<em><span>2013<meta content="2013" itemprop="datePublished"/></span></em>)Tue Apr 23 15:36:54 CEST 2013Orlando, Florida, USAAcademy of Management Annual MeetingUnderstanding Trust in IT Artifacts – A new Conceptual Approach2013IT artifact artifacts conceptual in itegpub of paper provider pub_jml pub_msö the trust
- Towards a Productivity Measurement Model for Technology Mediated Learning Serviceshttps://puma.uni-kassel.de/bibtex/22b38076bc602a1a630b3aef8f0cc6215/jmleimeisterjmleimeister2013-04-23T15:12:39+02:00Technology-mediated itegpub learning productivity pub_msö pub_pbi service services success training <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Philipp Bitzer" itemprop="url" href="/author/Philipp%20Bitzer"><span itemprop="name">P. Bitzer</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">European Conference on Information Systems (ECIS)</span>, </em></span><em>Utrecht, Netherlands (accepted for publication), </em>(<em><span>2013<meta content="2013" itemprop="datePublished"/></span></em>)Tue Apr 23 15:12:39 CEST 2013Utrecht, Netherlands (accepted for publication)European Conference on Information Systems (ECIS)Towards a Productivity Measurement Model for Technology Mediated Learning Services2013Technology-mediated itegpub learning productivity pub_msö pub_pbi service services success training
- Incorporating Behavioral Trust Theory Into System Development for Ubiquitous Applicationshttps://puma.uni-kassel.de/bibtex/2747df5f98ef8b4366494da191f6a650c/jmleimeisterjmleimeister2012-12-17T11:04:17+01:00itegpub pub_hho pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Personal and Ubiquitous Computing (to be published)</em></span></span> </span>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>374.</em>Mon Dec 17 11:04:17 CET 2012Personal and Ubiquitous Computing (to be published)374Incorporating Behavioral Trust Theory Into System Development for Ubiquitous Applications2012itegpub pub_hho pub_msö
- Towards Trust-Based Software Requirement Patternshttps://puma.uni-kassel.de/bibtex/2f812b268854457075b75cd574604d314/jmleimeisterjmleimeister2012-10-04T21:50:37+02:00itegpub patterns pub_aho pub_hho pub_jml pub_msö trust <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Hoffmann" itemprop="url" href="/author/A.%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Second International Workshop on Requirements Patterns (RePa' 12)</span>, </em></span><em>Chicago, Illinois, USA, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>351.</em>Thu Oct 04 21:50:37 CEST 2012Chicago, Illinois, USASecond International Workshop on Requirements Patterns (RePa' 12)351Towards Trust-Based Software Requirement Patterns2012itegpub patterns pub_aho pub_hho pub_jml pub_msö trust
- Socially acceptable design of a ubiquitous system for monitoring elderly family membershttps://puma.uni-kassel.de/bibtex/2ff576c6afb50c0350ee1a74de335ea39/jmleimeisterjmleimeister2012-10-04T16:29:52+02:00pub_aho pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Sebastian Hoberg" itemprop="url" href="/author/Sebastian%20Hoberg"><span itemprop="name">S. Hoberg</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Ludger Schmidt" itemprop="url" href="/author/Ludger%20Schmidt"><span itemprop="name">L. Schmidt</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Axel Hoffmann" itemprop="url" href="/author/Axel%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Christian Voigtmann" itemprop="url" href="/author/Christian%20Voigtmann"><span itemprop="name">C. Voigtmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Klaus David" itemprop="url" href="/author/Klaus%20David"><span itemprop="name">K. David</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Julia Zirfas" itemprop="url" href="/author/Julia%20Zirfas"><span itemprop="name">J. Zirfas</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Alexander Roßnagel" itemprop="url" href="/author/Alexander%20Ro%c3%9fnagel"><span itemprop="name">A. Roßnagel</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">42. Jahrestagung der Gesellschaft für Informatik</span>, </em></span><em>Braunschweig, Germany, </em><em>Gesellschaft für Informatik, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>349.</em>Thu Oct 04 16:29:52 CEST 2012Braunschweig, Germany42. Jahrestagung der Gesellschaft für Informatik349Socially acceptable design of a ubiquitous system for monitoring elderly family members2012pub_aho pub_jml pub_msö
- Opening up the Black Box: The Importance of Different Kinds of Trust in Recommender System Usagehttps://puma.uni-kassel.de/bibtex/2c7a1d711ebdd81e9385417bc5a6eadc6/jmleimeisterjmleimeister2012-08-13T17:06:34+02:00Recommender_systems Trust itegpub pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">72nd Academy of Management Annual Meeting</span>, </em></span><em>Boston, Mass., USA, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>345.</em>Mon Aug 13 17:06:34 CEST 2012Boston, Mass., USA72nd Academy of Management Annual Meeting345Opening up the Black Box: The Importance of Different Kinds of Trust in Recommender System Usage2012Recommender_systems Trust itegpub pub_jml pub_msö
- Understanding the Formation of Trust in IT Artifactshttps://puma.uni-kassel.de/bibtex/2bf7fa7e6d8ba92e683888d654c02d1cd/jmleimeisterjmleimeister2012-07-25T17:12:21+02:00iteg_pub pub_aho pub_hho pub_jml pub_msö trust <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Axel Hoffmann" itemprop="url" href="/author/Axel%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Holger Hoffmann" itemprop="url" href="/author/Holger%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Arno Wacker" itemprop="url" href="/author/Arno%20Wacker"><span itemprop="name">A. Wacker</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Proceedings of the International Conference on Information Systems (ICIS)</span>, </em></span><em>Orlando Florida, USA, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>342.</em>Wed Jul 25 17:12:21 CEST 2012Orlando Florida, USAProceedings of the International Conference on Information Systems (ICIS)342Understanding the Formation of Trust in IT Artifacts2012iteg_pub pub_aho pub_hho pub_jml pub_msö trust
- Untersuchung bestehender Geschäftsmodelle etablierter Cloud Anbieterhttps://puma.uni-kassel.de/bibtex/236de6094774092f9602aa515dc783599/jmleimeisterjmleimeister2012-07-05T10:17:38+02:00Business Cloud Computing Geschäftsmodelle Models itegpub pub_jml pub_mgi pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Michael Gierczak" itemprop="url" href="/author/Michael%20Gierczak"><span itemprop="name">M. Gierczak</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">ConLife 2012 Academic Conference</span>, </em></span><em>Cologne, Germany, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>339.</em>Thu Jul 05 10:17:38 CEST 2012Cologne, GermanyConLife 2012 Academic Conference339Untersuchung bestehender Geschäftsmodelle etablierter Cloud Anbieter2012Business Cloud Computing Geschäftsmodelle Models itegpub pub_jml pub_mgi pub_msö
- Hemmnisse bei der Nutzung von Cloud Computing im B2B-Bereich und die Zuordnung dieser zu den verschiedenen Vertrauensbeziehungenhttps://puma.uni-kassel.de/bibtex/2aac435f410d23ac76894ca695d0080e0/jmleimeisterjmleimeister2012-07-05T10:15:07+02:00itegpub pub_jml pub_lge pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Lysann Gebauer" itemprop="url" href="/author/Lysann%20Gebauer"><span itemprop="name">L. Gebauer</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">ConLife 2012 Academic Conference</span>, </em></span><em>Cologne, Germany, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>338.</em>Thu Jul 05 10:15:07 CEST 2012Cologne, GermanyConLife 2012 Academic Conference338Hemmnisse bei der Nutzung von Cloud Computing im B2B-Bereich und die Zuordnung dieser zu den verschiedenen Vertrauensbeziehungen2012itegpub pub_jml pub_lge pub_msö
- Designing Socio-technical Applications for Ubiquitous Computing - Results from a Multidisciplinary Case Studyhttps://puma.uni-kassel.de/bibtex/26af666cfb448581cf8f7eddcfd7cb51b/jmleimeisterjmleimeister2012-06-20T11:16:04+02:00pub_aho pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Diana Elena Comes" itemprop="url" href="/author/Diana%20Elena%20Comes"><span itemprop="name">D. Comes</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Christoph Evers" itemprop="url" href="/author/Christoph%20Evers"><span itemprop="name">C. Evers</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Kurt Geihs" itemprop="url" href="/author/Kurt%20Geihs"><span itemprop="name">K. Geihs</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Axel Hoffmann" itemprop="url" href="/author/Axel%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Romy Kniewel" itemprop="url" href="/author/Romy%20Kniewel"><span itemprop="name">R. Kniewel</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jan Marco Leimeister" itemprop="url" href="/author/Jan%20Marco%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Stefan Niemczyk" itemprop="url" href="/author/Stefan%20Niemczyk"><span itemprop="name">S. Niemczyk</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Alexander Roßnagel" itemprop="url" href="/author/Alexander%20Ro%c3%9fnagel"><span itemprop="name">A. Roßnagel</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Ludger Schmidt" itemprop="url" href="/author/Ludger%20Schmidt"><span itemprop="name">L. Schmidt</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Thomas Schulz" itemprop="url" href="/author/Thomas%20Schulz"><span itemprop="name">T. Schulz</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Söllner" itemprop="url" href="/author/Matthias%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Andreas Witsch" itemprop="url" href="/author/Andreas%20Witsch"><span itemprop="name">A. Witsch</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Distributed Applications and Interoperable Systems (DAIS 2012)</span>, </em></span><em>Volume 7272 von Lecture Notes in Computer Science, </em><em>Seite <span itemprop="pagination">194-201</span>. </em><em>Stockholm, Sweden, 2012. Lecture Notes in Computer Science. Springer, Berlin / Heidelberg, S 194-201, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>333.</em>Wed Jun 20 11:16:04 CEST 2012Stockholm, Sweden, 2012. Lecture Notes in Computer Science. Springer, Berlin / Heidelberg, S 194-201Distributed Applications and Interoperable Systems (DAIS 2012)333194-201Lecture Notes in Computer ScienceDesigning Socio-technical Applications for Ubiquitous Computing - Results from a Multidisciplinary Case Study72722012pub_aho pub_jml pub_msö
- How to Use Behavioral Research Insights on Trust for HCI System Designhttps://puma.uni-kassel.de/bibtex/2088c9c7267b8a5feb84a3a801852bf94/jmleimeisterjmleimeister2012-05-31T17:05:27+02:00Trust itegpub pub_aho pub_hho pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Hoffmann" itemprop="url" href="/author/A.%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)</span>, </em></span><em>Austin, Texas, USA, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>330.</em>Thu May 31 17:05:27 CEST 2012Austin, Texas, USAACM SIGCHI Conference on Human Factors in Computing Systems (CHI)330How to Use Behavioral Research Insights on Trust for HCI System Design2012Trust itegpub pub_aho pub_hho pub_jml pub_msö
- Twenty software requirement patterns to specify recommender systems that users will trusthttps://puma.uni-kassel.de/bibtex/2010de0f71263ba534893d085d030d9df/jmleimeisterjmleimeister2012-05-29T13:09:42+02:00itegpub pattern pub_aho pub_hho pub_msö trust <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Hoffmann" itemprop="url" href="/author/A.%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">20th European Conference on Information Systems (ECIS)</span>, </em></span><em>Barcelona, Spanien, </em>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>324.</em>Tue May 29 13:09:42 CEST 2012Barcelona, Spanien20th European Conference on Information Systems (ECIS)324Twenty software requirement patterns to specify recommender systems that users will trust2012itegpub pattern pub_aho pub_hho pub_msö trust
- Vertrauensunterstützung für ubiquitäre Systeme – von der Vertrauenstheorie zu Anforderungen an ubiquitäre Systemehttps://puma.uni-kassel.de/bibtex/2d8aeace1bbfbd020d2ca0cc765255180/jmleimeisterjmleimeister2012-01-11T12:54:57+01:00Anforderungen Nutzerakzeptanz Ubiquitous_Computing Vertrauen Vertrauensunterstützung itegpub pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">9. Berliner Werkstatt Mensch-Maschine-Systeme (BWMMS)</span>, </em></span><em> 9, </em><em>Seite <span itemprop="pagination">1-2</span>. </em><em>Berlin, Germany, </em>(<em><span>2011<meta content="2011" itemprop="datePublished"/></span></em>)Wed Jan 11 12:54:57 CET 2012Berlin, Germany9. Berliner Werkstatt Mensch-Maschine-Systeme (BWMMS)91-2Vertrauensunterstützung für ubiquitäre Systeme – von der Vertrauenstheorie zu Anforderungen an ubiquitäre Systeme2011Anforderungen Nutzerakzeptanz Ubiquitous_Computing Vertrauen Vertrauensunterstützung itegpub pub_jml pub_msö
- Vertrauensunterstützung für sozio-technische ubiquitäre Systemehttps://puma.uni-kassel.de/bibtex/2d0c67b5857b2e86b86b6e03f778a80d3/jmleimeisterjmleimeister2012-01-11T12:08:44+01:00itegpub pub_aho pub_hho pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Hoffmann" itemprop="url" href="/author/A.%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Zeitschrift für Betriebswirtschaft</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">2012 </span></span>(<span itemprop="issueNumber">4</span>):
<span itemprop="pagination">109-140</span></em> </span>(<em><span>2012<meta content="2012" itemprop="datePublished"/></span></em>)<em>298 (02-12).</em>Wed Jan 11 12:08:44 CET 2012Zeitschrift für Betriebswirtschaft298 (02-12)4109-140Vertrauensunterstützung für sozio-technische ubiquitäre Systeme20122012itegpub pub_aho pub_hho pub_jml pub_msö VertrauensaufbauundVertrauensunterstützungsinderfolgskritischfürdieAd- option neuer IT-Systeme. Umso erstaunlicher ist, dass in der Literatur kaum etwas zur systematischen Integration der Vielzahl an verhaltensorientierten Erkenntnissen zu Vertrauen in und um IT-Systeme in deren Entwicklung zu finden ist. Das Ziel dieses Artikels ist die Entwicklung einer Methode zur Ableitung vertrauensunterstützender Komponenten für sozio-technische ubiquitäre Systeme. Die Methode wird exemplarisch auf die Entwicklung einer ubiquitären Restaurantempfehlungsanwen- dung angewandt. Die Anwendung wird hierdurch um vier vertrauensunterstützende Komponenten angereichert. Die so entwickelte Anwendung wird anschließend im Rahmen eines Laborexperiments mit 166 Probanden evaluiert. Hierbei wird gezeigt, dass sowohl das Vertrauen in das sozio-technische ubiquitäre System, als auch die Absicht es zu nutzen signifikant erhöht werden konnten. Soweit es den Autoren bekannt ist, beschreibt dieser Artikel als Erster, wie Vertrauen in systematischer Art und Weise in die Entwicklung sozio-technischer ubiquitärer Systeme einbezogen werden und welchen Nutzen dies stiften kann.
- Towards an Approach for Developing socio-technical Ubiquitous Computing Applicationshttps://puma.uni-kassel.de/bibtex/2d7e54ad81db0d35d9c8a2317de275c31/jmleimeisterjmleimeister2011-10-26T13:16:16+02:00itegpub pub_aho pub_hho pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Hoffmann" itemprop="url" href="/author/A.%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Fehr" itemprop="url" href="/author/A.%20Fehr"><span itemprop="name">A. Fehr</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Informatik 2011 - Informatik schafft Communities. Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI)</span>, </em></span><em> P-192, </em><em>Seite <span itemprop="pagination">1-15</span>. </em><em>Berlin, Germany, </em><em><span itemprop="publisher">LNI</span>, </em>(<em><span>2011<meta content="2011" itemprop="datePublished"/></span></em>)<em>290 (53-11).</em>Wed Oct 26 13:16:16 CEST 2011Berlin, GermanyInformatik 2011 - Informatik schafft Communities. Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI)290 (53-11)411-15Towards an Approach for Developing socio-technical Ubiquitous Computing ApplicationsP-1922011itegpub pub_aho pub_hho pub_jml pub_msö
- Towards a Theory of Explanation and Prediction for the Formation of Trust in IT Artifactshttps://puma.uni-kassel.de/bibtex/240f62d482302d3ceca230422e7c6ac0e/jmleimeisterjmleimeister2011-10-26T12:32:08+02:00Laboratory_experiment Theory_of_explanation_and_prediction Trust Trust_in_IT_artifacts itegpub pub_aho pub_hho pub_jml pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Hoffmann" itemprop="url" href="/author/A.%20Hoffmann"><span itemprop="name">A. Hoffmann</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="H. Hoffmann" itemprop="url" href="/author/H.%20Hoffmann"><span itemprop="name">H. Hoffmann</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">10. Annual Workshop on HCI Research in MIS</span>, </em></span><em> 10, </em><em>Seite <span itemprop="pagination">1-6</span>. </em><em>Shanghai, China, </em>(<em><span>2011<meta content="2011" itemprop="datePublished"/></span></em>)<em>288 (51-11).</em>Wed Oct 26 12:32:08 CEST 2011Shanghai, China10. Annual Workshop on HCI Research in MIS288 (51-11)101-6Towards a Theory of Explanation and Prediction for the Formation of Trust in IT Artifacts2011Laboratory_experiment Theory_of_explanation_and_prediction Trust Trust_in_IT_artifacts itegpub pub_aho pub_hho pub_jml pub_msö
- Einflussgrößen auf die Nutzungsabsicht von Mobile Learning in unterschiedlichen Einsatzszenarien – eine empirische Studiehttps://puma.uni-kassel.de/bibtex/283be5cd6a0cfa6fff81b2b8e3c7aacb3/jmleimeisterjmleimeister2011-08-15T17:29:19+02:00itegpub pub_jml pub_msö pub_rwe <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="R. Wegener" itemprop="url" href="/author/R.%20Wegener"><span itemprop="name">R. Wegener</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. Voss" itemprop="url" href="/author/A.%20Voss"><span itemprop="name">A. Voss</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J. M. Leimeister" itemprop="url" href="/author/J.%20M.%20Leimeister"><span itemprop="name">J. Leimeister</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">e-Learning Fachtagung Informatik (DeLFI) 2011, Workshop „Mobile Learning“</span>, </em></span><em>Dresden, Germany, </em>(<em><span>2011<meta content="2011" itemprop="datePublished"/></span></em>)<em>252 (34-11).</em>Mon Aug 15 17:29:19 CEST 2011Dresden, Germanye-Learning Fachtagung Informatik (DeLFI) 2011, Workshop „Mobile Learning“ 252 (34-11)Einflussgrößen auf die Nutzungsabsicht von Mobile Learning in unterschiedlichen Einsatzszenarien – eine empirische Studie2011itegpub pub_jml pub_msö pub_rwe
- Deriving Trust Supporting Components for Ubiquitous Computing Systemshttps://puma.uni-kassel.de/bibtex/20f68f9dd822874d97dca50599b84a948/jmleimeisterjmleimeister2011-08-15T16:39:19+02:00itegpub pub_msö <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="M. Söllner" itemprop="url" href="/author/M.%20S%c3%b6llner"><span itemprop="name">M. Söllner</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">International Conference on Information Systems (ICIS) 2011, Doctoral Consortium</span>, </em></span><em>Shanghai, China, </em>(<em><span>2011<meta content="2011" itemprop="datePublished"/></span></em>)Mon Aug 15 16:39:19 CEST 2011Shanghai, ChinaInternational Conference on Information Systems (ICIS) 2011, Doctoral ConsortiumDeriving Trust Supporting Components for Ubiquitous Computing Systems2011itegpub pub_msö