@inproceedings{ls_leimeister, address = {Chicago, Illinois, USA}, author = {Hoffmann, A. and Söllner, M. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {Second International Workshop on Requirements Patterns (RePa' 12)}, interhash = {227c745b0df995163ccf6dbc75bd7c6e}, intrahash = {f812b268854457075b75cd574604d314}, note = 351, title = {Towards Trust-Based Software Requirement Patterns}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_351.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Braunschweig, Germany}, author = {Hoberg, Sebastian and Schmidt, Ludger and Hoffmann, Axel and Söllner, Matthias and Leimeister, Jan Marco and Voigtmann, Christian and David, Klaus and Zirfas, Julia and Roßnagel, Alexander}, booktitle = {42. Jahrestagung der Gesellschaft für Informatik}, interhash = {1d3d57304e11c02ad448d10814354b33}, intrahash = {ff576c6afb50c0350ee1a74de335ea39}, note = 349, organization = {Gesellschaft für Informatik}, title = {Socially acceptable design of a ubiquitous system for monitoring elderly family members}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_354.pdf}, year = 2012 } @inproceedings{sollner2012understanding, address = {Orlando Florida, USA}, author = {Söllner, Matthias and Hoffmann, Axel and Hoffmann, Holger and Wacker, Arno and Leimeister, Jan Marco}, booktitle = {Proceedings of the International Conference on Information Systems (ICIS)}, interhash = {7b7bb6349fb52a33202d3a2cce517e2f}, intrahash = {bf7fa7e6d8ba92e683888d654c02d1cd}, note = 342, title = {Understanding the Formation of Trust in IT Artifacts}, year = 2012 } @inproceedings{conf/dais/ComesEGHKLNRSSSW12, address = {Stockholm, Sweden, 2012. Lecture Notes in Computer Science. Springer, Berlin / Heidelberg, S 194-201}, author = {Comes, Diana Elena and Evers, Christoph and Geihs, Kurt and Hoffmann, Axel and Kniewel, Romy and Leimeister, Jan Marco and Niemczyk, Stefan and Roßnagel, Alexander and Schmidt, Ludger and Schulz, Thomas and Söllner, Matthias and Witsch, Andreas}, booktitle = {Distributed Applications and Interoperable Systems (DAIS 2012)}, editor = {Göschka, Karl M. and Haridi, Seif}, interhash = {b597b0d66d4140e90a1f2dc11e765078}, intrahash = {6af666cfb448581cf8f7eddcfd7cb51b}, note = 333, pages = {194-201}, series = {Lecture Notes in Computer Science}, title = {Designing Socio-technical Applications for Ubiquitous Computing - Results from a Multidisciplinary Case Study}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_369.pdf}, volume = 7272, year = 2012 } @inproceedings{ls_leimeister, address = {Austin, Texas, USA}, author = {Söllner, M. and Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)}, interhash = {acd7efc60bdf96bd34fc0b63de3bb3e8}, intrahash = {088c9c7267b8a5feb84a3a801852bf94}, note = 330, title = {How to Use Behavioral Research Insights on Trust for HCI System Design}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_329.pdf}, year = 2012 } @article{ls_leimeister, abstract = {VertrauensaufbauundVertrauensunterstützungsinderfolgskritischfürdieAd- option neuer IT-Systeme. Umso erstaunlicher ist, dass in der Literatur kaum etwas zur systematischen Integration der Vielzahl an verhaltensorientierten Erkenntnissen zu Vertrauen in und um IT-Systeme in deren Entwicklung zu finden ist. Das Ziel dieses Artikels ist die Entwicklung einer Methode zur Ableitung vertrauensunterstützender Komponenten für sozio-technische ubiquitäre Systeme. Die Methode wird exemplarisch auf die Entwicklung einer ubiquitären Restaurantempfehlungsanwen- dung angewandt. Die Anwendung wird hierdurch um vier vertrauensunterstützende Komponenten angereichert. Die so entwickelte Anwendung wird anschließend im Rahmen eines Laborexperiments mit 166 Probanden evaluiert. Hierbei wird gezeigt, dass sowohl das Vertrauen in das sozio-technische ubiquitäre System, als auch die Absicht es zu nutzen signifikant erhöht werden konnten. Soweit es den Autoren bekannt ist, beschreibt dieser Artikel als Erster, wie Vertrauen in systematischer Art und Weise in die Entwicklung sozio-technischer ubiquitärer Systeme einbezogen werden und welchen Nutzen dies stiften kann.}, author = {Söllner, M. and Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, interhash = {2dc5670a2a09654795f2be0dbf990e62}, intrahash = {d0c67b5857b2e86b86b6e03f778a80d3}, journal = {Zeitschrift für Betriebswirtschaft}, note = {298 (02-12)}, number = 4, pages = {109-140}, title = {Vertrauensunterstützung für sozio-technische ubiquitäre Systeme}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_328.pdf}, volume = 2012, year = 2012 } @inproceedings{ls_leimeister, address = {Berlin, Germany}, author = {Hoffmann, A. and Söllner, M. and Fehr, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {Informatik 2011 - Informatik schafft Communities. Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI)}, editor = {Heiß, H. and Pepper, P. and Schlingloff, H. and Schneider, J.}, interhash = {f78635b6e188a391b888a2ce912faf96}, intrahash = {d7e54ad81db0d35d9c8a2317de275c31}, note = {290 (53-11)}, number = 41, pages = {1-15}, publisher = {LNI}, title = {Towards an Approach for Developing socio-technical Ubiquitous Computing Applications}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_279.pdf}, volume = {P-192}, year = 2011 } @inproceedings{ls_leimeister, address = {Shanghai, China}, author = {Söllner, M. and Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {10. Annual Workshop on HCI Research in MIS}, interhash = {d24d0246edfa5996f2c8c9a26c5841b3}, intrahash = {40f62d482302d3ceca230422e7c6ac0e}, note = {288 (51-11)}, number = 10, pages = {1-6}, title = {Towards a Theory of Explanation and Prediction for the Formation of Trust in IT Artifacts}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_260.pdf}, year = 2011 } @inproceedings{ls_leimeister, address = {Kaiserslautern, Germany}, author = {Söllner, M. and Hoffmann, A. and Altmann, M. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {VHB Jahrestagung 2011}, interhash = {423cb80b4c2dbb2544eaaf92f9a23ccb}, intrahash = {8f82517d25a710224de3c1840fac0b17}, note = {224 (10-11)}, number = 73, title = {Vertrauen als Designaspekt – Systematische Ableitung vertrauensunterstützender Komponenten am Beispiel einer mobilen Anwendung}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_259.pdf}, year = 2011 } @inproceedings{ls_leimeister, address = {Bled, Slovenia}, author = {Söllner, M. and Hoffmann, A. and Hirdes, E. M. and Rudakova, L. and Leimeister, S. and Leimeister, J. M.}, booktitle = {23. Bled eConference eTrust: Implications for the Individual, Enterprises and Society (Bled) 2010}, interhash = {1fbe0c995c35208e67fbfd134002f143}, intrahash = {9262c38ba0e7696650edf62836bda938}, note = {191 (39-10)}, number = 23, pages = {65-79}, title = {Towards a Formative Measurement Model for Trust}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_187.pdf}, year = 2010 }