Publications
2020
Kryvinska, Natalia; Kaczor, Sebastian; Strauss, Christine
In: Applied Sciences, Bd. 10, Nr. 8, 2020, ISSN: 2076-3417, (Publisher Copyright: textcopyright 2020 by the authors.).
Abstract | Links | BibTeX | Schlagwörter: BUSINESS MODEL INNOVATION, DESERVITIZATION, enterprise, IMPACT, OF-THE-ART, OPERATIONS, PRODUCT FIRMS, product-service-systems, service science, SERVICE-DOMINANT-LOGIC, servitization, SYSTEMS, TECHNOLOGIES, TRANSFORMATION, value co-creation
@article{34350ddd5b1e4a6aa7814da4ba14b2eb,
title = {Enterprises’ Servitization in the First Decade: Retrospective Analysis of Back-End and Front-End Challenges},
author = {Natalia Kryvinska and Sebastian Kaczor and Christine Strauss},
doi = {10.3390/app10082957},
issn = {2076-3417},
year = {2020},
date = {2020-04-24},
journal = {Applied Sciences},
volume = {10},
number = {8},
publisher = {MDPI AG},
abstract = {The concept of servitization provides major benefits both for the performing company and for the profiting customer. Thus, during the last years many companies were heading for this well-proven direction tempted by expectations, but have been possibly even not aware of some inherent challenges. Since there are some issues even threatening the existence of companies, and some other rather easy to overcome, it is by all means necessary to consider and deal with this matter. Hence, this paper provides an insight into pitfalls in servitization named “service paradox” and addresses corresponding managerial issues. To operationalize the challenges of servitization, this paper suggests a separationamong internal back-end challenges and customer-facing front-end issues, which represents the applied framework for their examination. Besides, the matter of appropriate pricing and the inherent shift of risks towards suppliers are discussed. Finally, the last part concludes the analysis outputs and gives suggestions for the future strategies in the enterprise servitization.},
note = {Publisher Copyright: textcopyright 2020 by the authors.},
keywords = {BUSINESS MODEL INNOVATION, DESERVITIZATION, enterprise, IMPACT, OF-THE-ART, OPERATIONS, PRODUCT FIRMS, product-service-systems, service science, SERVICE-DOMINANT-LOGIC, servitization, SYSTEMS, TECHNOLOGIES, TRANSFORMATION, value co-creation},
pubstate = {published},
tppubtype = {article}
}
Reiting, Philip; Mladenow, Andreas; Strauss, Christine; Kotsis, Gabriele
Mobile Payment – Classic Approaches to Promote Consumer Adoption Konferenz
2020, (Publisher Copyright: textcopyright 2020 ACM.; 18th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2020, MoMM'20 ; Conference date: 30-11-2020 Through 02-12-2020).
Abstract | Links | BibTeX | Schlagwörter: consumer adoption, CUSTOMER SATISFACTION, IMPACT, INFORMATION-TECHNOLOGY, INTENTION, mobile payment, mobile transactions, MODEL, PERSONAL INNOVATIVENESS, RISK, SERVICES, SYSTEMS, TAM, technology acceptance model, technology adoption, USER ACCEPTANCE
@conference{51f2eaef02ff41cb84ce46e9c0bccf23,
title = {Mobile Payment – Classic Approaches to Promote Consumer Adoption},
author = {Philip Reiting and Andreas Mladenow and Christine Strauss and Gabriele Kotsis},
url = {http://www.iiwas.org/conferences/momm2020/},
doi = {https://doi.org/10.1145/3428690.3429182},
year = {2020},
date = {2020-01-01},
pages = {84--93},
abstract = {The development and diffusion of smartphones has led to many new trends, among them a new payment solution in the form of mobile payment. This paper places its focus on factors influencing consumer adoption of mobile payment. The basis for this is often the technology acceptance model and unified theory of acceptance and use of technology. Several factors including perceived ease of use, perceived usefulness, performance expectancy and social influence were found to influence primary adoption while a compelling user experience, usability and enjoyment were found to be a main driver of long-term usage.},
note = {Publisher Copyright: textcopyright 2020 ACM.; 18th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2020, MoMM'20 ; Conference date: 30-11-2020 Through 02-12-2020},
keywords = {consumer adoption, CUSTOMER SATISFACTION, IMPACT, INFORMATION-TECHNOLOGY, INTENTION, mobile payment, mobile transactions, MODEL, PERSONAL INNOVATIVENESS, RISK, SERVICES, SYSTEMS, TAM, technology acceptance model, technology adoption, USER ACCEPTANCE},
pubstate = {published},
tppubtype = {conference}
}
2015
Ekelhart, Andreas; Kiesling, Elmar; Grill, Bernhard; Strauss, Christine; Stummer, Christian
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach Artikel
In: Information Technology & Management, Bd. 16, Nr. 3, S. 221–233, 2015, ISSN: 1385-951X, (Publisher Copyright: textcopyright 2015, Springer Science+Business Media New York.).
Abstract | Links | BibTeX | Schlagwörter: Attacker behavior, BWL, CMI, GRAPHS, IT security, Modeling and simulation, Secure systems analysis and design, SYSTEMS, TREES
@article{daf5657a17694301956244c51bb7b5c8,
title = {Integrating attacker behavior in IT security analysis: a discrete-event simulation approach},
author = {Andreas Ekelhart and Elmar Kiesling and Bernhard Grill and Christine Strauss and Christian Stummer},
doi = {10.1007/s10799-015-0232-6},
issn = {1385-951X},
year = {2015},
date = {2015-09-01},
journal = {Information Technology & Management},
volume = {16},
number = {3},
pages = {221--233},
abstract = {When designing secure information systems, a profound understanding of the threats that they are exposed to is indispensable. Today’s most severe risks come from malicious threat agents exploiting a variety of attack vectors to achieve their goals, rather than from random opportunistic threats such as malware. Most security analyses, however, focus on fixing technical weaknesses, but do not account for sophisticated combinations of attack mechanisms and heterogeneity in adversaries’ motivations, resources, capabilities, or points of access. In order to address these shortcomings and, thus, to provide security analysts with a tool that makes it possible to also identify emergent weaknesses that may arise from dynamic interactions of attacks, we have combined rich conceptual modeling of security knowledge with attack graph generation and discrete-event simulation techniques. This paper describes the prototypical implementation of the resulting security analysis tool and demonstrates how it can be used for an experimental evaluation of a system’s resilience against various adversaries.},
note = {Publisher Copyright: textcopyright 2015, Springer Science+Business Media New York.},
keywords = {Attacker behavior, BWL, CMI, GRAPHS, IT security, Modeling and simulation, Secure systems analysis and design, SYSTEMS, TREES},
pubstate = {published},
tppubtype = {article}
}