Institut für Wirtschafts- und Verwaltungsinformatik
FB 4: Informatik / Universität Koblenz
- 0261/2872646
- 0261/2871002646
Niemann, Marco; Riehle, Dennis M.; Brunk, Jens et al.
What is Abusive Language? --- Integrating Different Views on Abusive Language for Machine LearningChristian Grimme; Mike Preuss; Frank W. Takes; Annie Waldherr (Hrsg). Disinformation in Open Online Media: First Multidisciplinary International Symposium, MISDOOM 2019, Hamburg, Germany, February 27 – March 1, 2019, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2019 S. 59 - 73
Riehle, Dennis M.; Radas, Jonathan
Which Business Information do Decision-Makers need at Work? - Towards a Classification FrameworkJörg Becker; Dmitriy Novikov; Raisa Uskenbaeva; Dmitry M. Nazarov; Olga A. Tsukanova; Judith Barrios Albornoz; Elena Kornyshova; Oscar Pastor; A V. Shchepkin; V. O. Korepanov; D. Fedyanin; V.N. Burkov (Hrsg). Proceedings of the 21st IEEE Conference on Business Informatics CBI 2019: 15 - 17 July 2019; Moscow, Russia. Los Alamitos, CA: IEEE Computer Society 2019 S. 312 - 139
Schwade, Florian; Schubert, Petra
A Survey on the Status Quo of Social Collaboration Analytics in PracticePeter M. Bednar; Ulrich Frank; Karlheinz Kautz (Hrsg). Proceeding of the 26th European Conference on Information Systems - "Beyond Digitization - Facets of Socio-Technical Change" ECIS 2018: Portsmouth, UK, June 23-28, 2018. Atlanta, GA: Association for Information Systems/AIS eLibrary 2018 S. Research Papers 136
Schwade, Florian; Schubert, Petra
A Survey on the Status Quo of Social Collaboration Analytics in Practice.ECIS. 2018 S. 136
Corea, Carl; Delfmann, Patrick
A Tool to Monitor Consistent Decision-Making in Business Process ExecutionWil van der Aalst; Fabio Casati; Raffaele Conforti; Massimiliano de Leoni; Marlon Dumas; Akhil Kumar; Jan Mendling; Surya Nepal; Brian Pentland; Barbara Weber (Hrsg). BPMTracks 2018: Proceedings of the Dissertation Award, Demonstration, and Industrial Track at BPM 2018 - co-located with 16th International Conference on Business Process Management (BPM 2018); Sydney, Australia, September 9-14, 2018. Aachen: CEUR/RWTH 2018 S. 76 - 80
Isagah, Tupokigwe; Wimmer, Maria A.
Addressing Requirements of M-Government Services: Empirical Study from Designers' PerspectivesAtreyi Kankanhalli;Adegboyega Ojo;Delfina Soares (Hrsg). Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance ICEGOV2018: 4 - 6 April 2018; Galway, Ireland. New York, NY: ACM Association for Computing Machinery 2018 S. 599 - 608
Derbyshire, Richard; Green, Benjamin; Prince, Daniel et al.
An Analysis of Cyber Security Attack TaxonomiesEmiliano De Cristofaro; George Danezis; Matthew Smith; Frank Piessens (Hrsg). Proceedings of the3rd IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2018, London, United Kingdom, April 23-27, 2018. Los Alamitos, CA: IEEE Computer Society 2018 S. 153 - 161
Din, Ghulam Mohi Ud; Mauthe, Andreas U.; Marnerides, Angelos K.
Appliance-level Short-Term Load Forecasting using Deep Neural NetworksPramod K. Varshney;Jian Ren (Hrsg). Proceedings of the International Conference on Computing, Networking and Communications ICNC 2018: Maui, HI, USA, March 5-8, 2018. Los Alamitos, CA: IEEE Computer Society 2018 S. 53 - 57
Riehle, Dennis M.; Fleischer, Stefan; Becker, Jörg
Building a Web-Based Information System to Evaluate IT-Artefacts in Online Experiments - The Case of Intentional Forgetting2018
Troitzsch, Klaus G.
Can Lawlike Rules Emerge without the Intervention of Legislators?Frontiers in Sociology. Bd. 3. Frontiers Media SA 2018 2