@inproceedings{ls_leimeister, address = {Utrecht, Netherlands (accepted for publication)}, author = {Gierczak, Michael and Söllner, Matthias and Leimeister, Jan Marco}, booktitle = {DIBME 2013 Pre-ECIS Workshop on the Digitization in Business Models and Entrepreneurship}, interhash = {b48be051a8550b083f46deaf59b922c9}, intrahash = {a8703b74105fcdef27c0ab771287d70f}, title = {Exploring Business Models for IT-enabled Product-Service-Systems}, year = 2013 } @inproceedings{ls_leimeister, address = {Cape Town, South Africa}, author = {Behrenbruch, Kay and Söllner, Matthias and Leimeister, Jan Marco and Schmidt, Ludger}, booktitle = {INTERACT 2013}, interhash = {95b51099abed3a07e20e25f303d6b3b9}, intrahash = {da65a783b2fed6a9ec45e80453691bf6}, title = {Understanding Diversity – The Impact of Personality on Technology Acceptance}, year = 2013 } @inproceedings{ls_leimeister, address = {Orlando, Florida, USA}, author = {Söllner, Matthias and Pavlou, Paul and Leimeister, Jan Marco}, booktitle = {Academy of Management Annual Meeting}, interhash = {71fc731ea8fd7d6893422d5ed0e8635b}, intrahash = {0f499f764a9a2170c784614f7e9c06df}, title = {Understanding Trust in IT Artifacts – A new Conceptual Approach}, year = 2013 } @inproceedings{ls_leimeister, address = {Utrecht, Netherlands (accepted for publication)}, author = {Bitzer, Philipp and Söllner, Matthias}, booktitle = {European Conference on Information Systems (ECIS)}, interhash = {bc6ff6701f1e1673fa90aa643e1d00a6}, intrahash = {2b38076bc602a1a630b3aef8f0cc6215}, title = {Towards a Productivity Measurement Model for Technology Mediated Learning Services}, year = 2013 } @article{ls_leimeister, author = {Hoffmann, H. and Söllner, M.}, interhash = {320a140d68cf8d4b488e32ec6ce2d1e7}, intrahash = {747df5f98ef8b4366494da191f6a650c}, journal = {Personal and Ubiquitous Computing (to be published)}, note = 374, title = {Incorporating Behavioral Trust Theory Into System Development for Ubiquitous Applications}, year = 2012 } @inproceedings{ls_leimeister, address = {Chicago, Illinois, USA}, author = {Hoffmann, A. and Söllner, M. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {Second International Workshop on Requirements Patterns (RePa' 12)}, interhash = {227c745b0df995163ccf6dbc75bd7c6e}, intrahash = {f812b268854457075b75cd574604d314}, note = 351, title = {Towards Trust-Based Software Requirement Patterns}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_351.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Braunschweig, Germany}, author = {Hoberg, Sebastian and Schmidt, Ludger and Hoffmann, Axel and Söllner, Matthias and Leimeister, Jan Marco and Voigtmann, Christian and David, Klaus and Zirfas, Julia and Roßnagel, Alexander}, booktitle = {42. Jahrestagung der Gesellschaft für Informatik}, interhash = {1d3d57304e11c02ad448d10814354b33}, intrahash = {ff576c6afb50c0350ee1a74de335ea39}, note = 349, organization = {Gesellschaft für Informatik}, title = {Socially acceptable design of a ubiquitous system for monitoring elderly family members}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_354.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Boston, Mass., USA}, author = {Söllner, Matthias and Leimeister, Jan Marco}, booktitle = {72nd Academy of Management Annual Meeting}, interhash = {375090ef92a63f0b3df267021a2f5224}, intrahash = {c7a1d711ebdd81e9385417bc5a6eadc6}, note = 345, title = {Opening up the Black Box: The Importance of Different Kinds of Trust in Recommender System Usage}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_327.pdf}, year = 2012 } @inproceedings{sollner2012understanding, address = {Orlando Florida, USA}, author = {Söllner, Matthias and Hoffmann, Axel and Hoffmann, Holger and Wacker, Arno and Leimeister, Jan Marco}, booktitle = {Proceedings of the International Conference on Information Systems (ICIS)}, interhash = {7b7bb6349fb52a33202d3a2cce517e2f}, intrahash = {bf7fa7e6d8ba92e683888d654c02d1cd}, note = 342, title = {Understanding the Formation of Trust in IT Artifacts}, year = 2012 } @inproceedings{ls_leimeister, address = {Cologne, Germany}, author = {Gierczak, Michael and Söllner, Matthias and Leimeister, Jan Marco}, booktitle = {ConLife 2012 Academic Conference}, interhash = {55d8152a9bc0f44d511c03baadb60426}, intrahash = {36de6094774092f9602aa515dc783599}, note = 339, title = {Untersuchung bestehender Geschäftsmodelle etablierter Cloud Anbieter}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_360.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Cologne, Germany}, author = {Gebauer, Lysann and Söllner, Matthias and Leimeister, Jan Marco}, booktitle = {ConLife 2012 Academic Conference}, interhash = {6148d3d64fbda28b6937be2115b0afc7}, intrahash = {aac435f410d23ac76894ca695d0080e0}, note = 338, title = {Hemmnisse bei der Nutzung von Cloud Computing im B2B-Bereich und die Zuordnung dieser zu den verschiedenen Vertrauensbeziehungen}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_362.pdf}, year = 2012 } @inproceedings{conf/dais/ComesEGHKLNRSSSW12, address = {Stockholm, Sweden, 2012. Lecture Notes in Computer Science. Springer, Berlin / Heidelberg, S 194-201}, author = {Comes, Diana Elena and Evers, Christoph and Geihs, Kurt and Hoffmann, Axel and Kniewel, Romy and Leimeister, Jan Marco and Niemczyk, Stefan and Roßnagel, Alexander and Schmidt, Ludger and Schulz, Thomas and Söllner, Matthias and Witsch, Andreas}, booktitle = {Distributed Applications and Interoperable Systems (DAIS 2012)}, editor = {Göschka, Karl M. and Haridi, Seif}, interhash = {b597b0d66d4140e90a1f2dc11e765078}, intrahash = {6af666cfb448581cf8f7eddcfd7cb51b}, note = 333, pages = {194-201}, series = {Lecture Notes in Computer Science}, title = {Designing Socio-technical Applications for Ubiquitous Computing - Results from a Multidisciplinary Case Study}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_369.pdf}, volume = 7272, year = 2012 } @inproceedings{ls_leimeister, address = {Austin, Texas, USA}, author = {Söllner, M. and Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)}, interhash = {acd7efc60bdf96bd34fc0b63de3bb3e8}, intrahash = {088c9c7267b8a5feb84a3a801852bf94}, note = 330, title = {How to Use Behavioral Research Insights on Trust for HCI System Design}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_329.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Barcelona, Spanien}, author = {Hoffmann, A. and Söllner, M. and Hoffmann, H.}, booktitle = {20th European Conference on Information Systems (ECIS)}, interhash = {db95fde6b4b76f22d8c7177261e9729e}, intrahash = {010de0f71263ba534893d085d030d9df}, note = 324, title = {Twenty software requirement patterns to specify recommender systems that users will trust}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_399.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Berlin, Germany}, author = {Söllner, M. and Leimeister, J. M.}, booktitle = {9. Berliner Werkstatt Mensch-Maschine-Systeme (BWMMS)}, interhash = {44e62edaed77bfacf91814e7c52f22f0}, intrahash = {d8aeace1bbfbd020d2ca0cc765255180}, number = 9, pages = {1-2}, title = {Vertrauensunterstützung für ubiquitäre Systeme – von der Vertrauenstheorie zu Anforderungen an ubiquitäre Systeme}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_258.pdf}, year = 2011 } @article{ls_leimeister, abstract = {VertrauensaufbauundVertrauensunterstützungsinderfolgskritischfürdieAd- option neuer IT-Systeme. Umso erstaunlicher ist, dass in der Literatur kaum etwas zur systematischen Integration der Vielzahl an verhaltensorientierten Erkenntnissen zu Vertrauen in und um IT-Systeme in deren Entwicklung zu finden ist. Das Ziel dieses Artikels ist die Entwicklung einer Methode zur Ableitung vertrauensunterstützender Komponenten für sozio-technische ubiquitäre Systeme. Die Methode wird exemplarisch auf die Entwicklung einer ubiquitären Restaurantempfehlungsanwen- dung angewandt. Die Anwendung wird hierdurch um vier vertrauensunterstützende Komponenten angereichert. Die so entwickelte Anwendung wird anschließend im Rahmen eines Laborexperiments mit 166 Probanden evaluiert. Hierbei wird gezeigt, dass sowohl das Vertrauen in das sozio-technische ubiquitäre System, als auch die Absicht es zu nutzen signifikant erhöht werden konnten. Soweit es den Autoren bekannt ist, beschreibt dieser Artikel als Erster, wie Vertrauen in systematischer Art und Weise in die Entwicklung sozio-technischer ubiquitärer Systeme einbezogen werden und welchen Nutzen dies stiften kann.}, author = {Söllner, M. and Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, interhash = {2dc5670a2a09654795f2be0dbf990e62}, intrahash = {d0c67b5857b2e86b86b6e03f778a80d3}, journal = {Zeitschrift für Betriebswirtschaft}, note = {298 (02-12)}, number = 4, pages = {109-140}, title = {Vertrauensunterstützung für sozio-technische ubiquitäre Systeme}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_328.pdf}, volume = 2012, year = 2012 } @inproceedings{ls_leimeister, address = {Berlin, Germany}, author = {Hoffmann, A. and Söllner, M. and Fehr, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {Informatik 2011 - Informatik schafft Communities. Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI)}, editor = {Heiß, H. and Pepper, P. and Schlingloff, H. and Schneider, J.}, interhash = {f78635b6e188a391b888a2ce912faf96}, intrahash = {d7e54ad81db0d35d9c8a2317de275c31}, note = {290 (53-11)}, number = 41, pages = {1-15}, publisher = {LNI}, title = {Towards an Approach for Developing socio-technical Ubiquitous Computing Applications}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_279.pdf}, volume = {P-192}, year = 2011 } @inproceedings{ls_leimeister, address = {Shanghai, China}, author = {Söllner, M. and Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {10. Annual Workshop on HCI Research in MIS}, interhash = {d24d0246edfa5996f2c8c9a26c5841b3}, intrahash = {40f62d482302d3ceca230422e7c6ac0e}, note = {288 (51-11)}, number = 10, pages = {1-6}, title = {Towards a Theory of Explanation and Prediction for the Formation of Trust in IT Artifacts}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_260.pdf}, year = 2011 } @inproceedings{ls_leimeister, address = {Dresden, Germany}, author = {Wegener, R. and Söllner, M. and Voss, A. and Leimeister, J. M.}, booktitle = {e-Learning Fachtagung Informatik (DeLFI) 2011, Workshop „Mobile Learning“ }, interhash = {9a2b9b7b02aeb59576e155044e2cceed}, intrahash = {83be5cd6a0cfa6fff81b2b8e3c7aacb3}, note = {252 (34-11)}, title = {Einflussgrößen auf die Nutzungsabsicht von Mobile Learning in unterschiedlichen Einsatzszenarien – eine empirische Studie}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_257.pdf}, year = 2011 } @inproceedings{ls_leimeister, address = {Shanghai, China}, author = {Söllner, M.}, booktitle = {International Conference on Information Systems (ICIS) 2011, Doctoral Consortium}, interhash = {35efb04299b7989706a1adf6d1ff3132}, intrahash = {0f68f9dd822874d97dca50599b84a948}, title = {Deriving Trust Supporting Components for Ubiquitous Computing Systems}, year = 2011 } @incollection{ls_leimeister, address = {Berlin, Germany}, author = {Weiß, F. and Söllner, M.}, booktitle = {Smart Mobile Apps}, editor = {Linnhoff-Popien, C. and Verclas, S.}, interhash = {d93eed752ade207abb9cb690d80fd48a}, intrahash = {a31980b681eea03689aa08dcccedc15d}, publisher = {Springer}, title = {Technologische und marktseitige Unsicherheit bei der Neuentwicklung von Mobile Enterprise Services}, year = 2011 } @inproceedings{ls_leimeister, address = {Kaiserslautern, Germany}, author = {Söllner, M. and Hoffmann, A. and Altmann, M. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {VHB Jahrestagung 2011}, interhash = {423cb80b4c2dbb2544eaaf92f9a23ccb}, intrahash = {8f82517d25a710224de3c1840fac0b17}, note = {224 (10-11)}, number = 73, title = {Vertrauen als Designaspekt – Systematische Ableitung vertrauensunterstützender Komponenten am Beispiel einer mobilen Anwendung}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_259.pdf}, year = 2011 } @inproceedings{ls_leimeister, address = {Leipzig, Germany}, author = {Rudakova, L. and Söllner, M. and Leimeister, J. M.}, booktitle = {40. Jahrestagung der Gesellschaft für Informatik}, interhash = {9b7889e168bc6537ae4be50946aed937}, intrahash = {b311de02c64950c94baba43902159617}, note = {215 (60-10)}, number = 40, title = {Warum Hochschulrechenzentren andere IT-Service-Management Konzepte brauchen - eine konzeptionelle Analyse}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_192.pdf}, year = 2010 } @inproceedings{ls_leimeister, address = {Rome, Italy}, author = {Söllner, M. and Leimeister, J. M.}, booktitle = {European Academy of Management Annual Conference}, interhash = {3f598d029f1bd140cbd8332f19adac98}, intrahash = {551e921daded2a2323acd8c6c84b960b}, note = {180 (28-10)}, title = {15 years of measurement model misspecification in trust research? A theory based approach to solve this problem}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_189.pdf}, volume = 10, year = 2010 } @inproceedings{ls_leimeister, address = {Montréal, Canada}, author = {Söllner, M. and Leimeister, J. M.}, booktitle = {Academy of Management Annual Meeting}, interhash = {cc5466e910753cd217bc8713680149f8}, intrahash = {e3607a12bc3e106f2680ae353b976d5c}, note = {181 (29-10)}, title = {Did they all get it wrong? Towards a better measurement model of trust}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_188.pdf}, year = 2010 } @inproceedings{ls_leimeister, address = {Hannover, Germany}, author = {Manouchehri, S. and Söllner, M. and Leimeister, J. M.}, booktitle = {23. International Conference on Architecture of Computing Systems (ARCS) 2010}, interhash = {32b17bc609264b9982b7f8bb51f94752}, intrahash = {029247cabe2e9a1a535402e708eafe16}, note = {169 (18-10)}, title = {Trust as a design aspect of context aware systems}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_207.pdf}, year = 2010 } @inproceedings{ls_leimeister, address = {Bled, Slovenia}, author = {Söllner, M. and Hoffmann, A. and Hirdes, E. M. and Rudakova, L. and Leimeister, S. and Leimeister, J. M.}, booktitle = {23. Bled eConference eTrust: Implications for the Individual, Enterprises and Society (Bled) 2010}, interhash = {1fbe0c995c35208e67fbfd134002f143}, intrahash = {9262c38ba0e7696650edf62836bda938}, note = {191 (39-10)}, number = 23, pages = {65-79}, title = {Towards a Formative Measurement Model for Trust}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_187.pdf}, year = 2010 }