Hinkelmann, Knut

Lade...
Profilbild
E-Mail-Adresse
Geburtsdatum
Projekt
Organisationseinheiten
Berufsbeschreibung
Nachname
Hinkelmann
Vorname
Knut
Name
Hinkelmann, Knut

Suchergebnisse

Gerade angezeigt 1 - 10 von 136
  • Publikation
    Leading in society 5.0, The 5Co leadership concept
    (2023) Aeschbacher, Marc; Legena, Valeria; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of society 5.0 conference 2023]
    04B - Beitrag Konferenzschrift
  • Publikation
    A cyber attack simulation for teaching cybersecurity
    (2023) Scherb, Christopher; Heitz, Luc; Grimberg, Frank; Grieder, Hermann; Maurer, Marcel; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Therefore, it is time to rethink the approach on how to train cyber awareness. In this paper we suggest an alternative approach -- a serious game -- to educate awareness for common cyberattacks. While many serious games for cybersecurity education exist, all follow a very similar approach: showing people the effects of a cyber attack on their own system or company network. For example, one of the main tasks in these games is to sort out phishing mails. We developed and evaluated a new type of cybersecurity game: an attack simulator, which shows the entire setting from a different perspective. Instead of sorting out phishing mails the players should write phishing mails to trick potential victims and use other forms of cyberattacks. Our game explains the intention of each attack and shows the consequences of a successful attack. This way, we hope, players will get a better understanding on how to detect cyberattacks.
    04B - Beitrag Konferenzschrift
  • Publikation
    A new approach for teaching programming: model-based agile programming (MBAD)
    (ACM, 2023) Telesko, Rainer; Spahic, Maja; Hinkelmann, Knut; Pande, Charuta [in: ICIEI 2023. Proceedings of 2023 The 8th International Conference on Information and Education Innovations]
    Designing courses for introductory programming courses with a heterogeneous audience (business and IT background as well) is a challenging task. In an internal project of the School of Business at the FHNW University of Applied Sciences and Arts Northwestern Switzerland (FHNW) a group of lecturers developed a concept entitled “Model-based agile development” (MBAD) which supports the learning of elementary programming concepts in an agile environment and builds the basis for advanced courses. MBAD will be used as a basic learning module for various Bachelor programs at the FHNW.
    04B - Beitrag Konferenzschrift
  • Publikation
    Ontology-driven enhancement of process mining with domain knowledge
    (Sun SITE, Informatik V, RWTH Aachen, 2023) Eichele, Simon; Hinkelmann, Knut; Spahic, Maja; Martin, Andreas; Fill, Hans-Georg; Gerber, Aurona; Hinkelmann, Knut; Lenat, Doug; Stolle, Reinhard; Harmelen, Frank van [in: Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023)]
    Process mining is a technique used to analyze and understand business processes. It uses as input the event log, a type of data used to represent the sequence of activities occurring within a business process. An event log typically contains information such as the case ID, the performed activity’s name, the activity’s timestamp, and other data associated with the activity. By analyzing event logs, organizations can gain a deeper understanding of their business processes, identify areas for improvement, and make data-driven decisions to optimize their operations. However, as the event logs contain data collected from different systems involved in the process, such as ERP, CRM, or WfMS systems, they often lack the necessary context and knowledge to analyze and fully comprehend business processes. By extending the event logs with domain knowledge, organizations can gain a more complete and accurate insight into their business processes and make more informed decisions about optimizing them. This paper presents an approach for enhancing process mining with domain knowledge preserved in domain-specific OWL ontologies. Event logs are typically stored in structured form in relational databases. This approach first converts the process data into an event log which is then mapped with ontology concepts. The ontology contains classes and individuals representing background knowledge of the domain, which supports the understanding of the data. A class for the specific activities forms the link between the event log and the ontology. In this manner, it is possible to map the domain knowledge to a particular case and activity. This allows to determine conditions that must be satisfied for executing tasks and to prune discovered process models if they are too complex. This approach is demonstrated using data from the student admission process at FHNW and has been implemented in Protégé.
    04B - Beitrag Konferenzschrift
  • Publikation
    A system of customer co-creation for new product development of digital products with a pilot study of the Swiss media industry
    (2023) Le Cunff, Eric; Schlick, Sandra; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    In the age of digitisation, the media industry is faced with declining advertising revenues. Therefore, the focus on the development of new digital products is a key element to survive in such a fast-changing market and to increase the innovation performance. One of the most important elements thereby is the involvement of customers as co-creators in the new product development (NPD) process, so that new digital products are developed that are in demand on the market. However, the process of how companies turn external knowledge from customers into knowledge creation for generating new ideas and the development of innovative products has not been analysed. This pilot study, which presents an initial system of customer co-creation for NPD of digital products from the literature and searches for similarities and dissimilarities through an abductive qualitative data analysis from interviews with three managers in three different Swiss media companies, explores this unresolved research gap. The system of this study is based on an overarching phase model, which is derived from Application Lifecycle Management (ALM). The process anchored in it, which focuses on the customer co-creation of digital products, integrates process elements from the two user-centered approaches, namely User Centered Design (UCD) and Design Thinking (DT). The results from the interviews show that the system is largely in line with the NPD process procedures in the three media companies. It was found that customers can be involved everywhere in the NPD process, but that this is not yet implemented in practice. However, as the future ambition in media companies is to become even more customer- centric, the proposed system in this study is very promising.
    04B - Beitrag Konferenzschrift
  • Publikation
    Analysing barriers in the business ecosystem of European MaaS providers: an actor-network approach
    (2023) Gebhart, Julian; Schlick, Sandra; Marvell, Alan; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    As new Mobility as a Service (MaaS) platforms are being established in Europe, researchers and practitioners seek evidence on the barriers experienced by the MaaS providers in their evolving business ecosystem. This paper conceptualises the MaaS business ecosystem using a Systematic Literature Review (SLR) combined with Actor- Network Theory (ANT) by constructing an actor-network of key actors. This actor- network, along with the identified MaaS business ecosystem barriers, is then used for Multiple Case Study Research, interviewing 18 European MaaS experts. The cross-case analysis revealed how MaaS providers problematise, interest, enrol and mobilise their business ecosystems. Furthermore, the paper outlines and amends key barriers in the areas of (1) technology and data, (2) social and cultural, and (3) policy and regulation. Researchers and practitioners can use the findings of this study to formulate policies, create best practices or conduct further research on the development of MaaS.
    04B - Beitrag Konferenzschrift
  • Publikation
    Agile management in cybersecurity
    (2023) Asprion, Petra; Giovanoli, Claudio; Scherb, Christopher; Bhat, Sourabha; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    Cybersecurity management has emerged as a topic of growing importance on a global scale. Applying traditional management practices to cybersecurity is often too cumbersome and can lead to significant delays. Today's enterprises must be able to adapt to ever-evolving digital threats and act with corresponding agility and flexibility. Agile methods are well suited for projects without a defined scope, duration, tasks, and resources and has been identified as suitable for meeting the management challenges of cybersecurity teams. Based on an in-depth literature review, this study assumed that adopting an agile approach to cybersecurity helps organizations manage cybersecurity effectively. A first prototypical model was developed and evaluated which combines agile methods with cybersecurity functions - based on a recognized reference model.
    04B - Beitrag Konferenzschrift
  • Publikation
    Success factor focus and attention in study and in the work context - a call for action at institutes of higher education in a more and more digitalized world
    (2023) Krebs, Michael; Kuhn, Christine; Sitte, Michael; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of the Society 5.0 Conference 2023]
    Digitization offers new opportunities in the context of students' learning opportunities and strategies, but also risks and challenges. Undisturbed attention is becoming a scarce resource due to multiple opportunities for influence and distraction (e.g., new social media, "attention economy") and is increasingly limiting the learning success of students. "Stolen Focus", low "Attention Span", increased levels of stress and signals of exhaustion and depression in the face of performance and learning demands that tend to remain the same or comparable over the years are signs of an attention crisis and challenge us faculty to actively address this issue in courses. The coming generations (Z etc.) need assistance to regain or improve their self-efficacy in their studies with media literacy, attention, focus and deeper learning. The authors see this situation as a call for action, aiming to improve students' perception (also meta-awareness) and awareness of the impact of the digitalized and accelerated world on their daily routines, learning and working. The ability to work and learn in a focused way is seen and expected by employers as one of the most important competencies of graduates in a recent study. The planned project intends to face this challenge by developing a teaching design with different components, consisting of teaching materials (online/offline), a playbook and a "focus for success diary" and is intended to be applied in a regular Bachelor program, where the authors teach the same course in different locations of the university. Overall, the project should help learners to be better prepared for the demands of the modern world and to be more aware and successful in their learning processes. The social and psychological consequences of digitalization, acceleration and densification will thusbecome an integral part of the training and the solutions developed will offer a contribution in terms of social sustainability in the context of our ESG efforts.
    04B - Beitrag Konferenzschrift
  • Publikation
    Fact checking: an automatic end to end fact checking system
    (Springer, 2022) Ahmed, Sajjad; Hinkelmann, Knut; Corradini, Flavio; Lahby, Mohamed; Pathan, Al-Sakib Khan; Maleh, Yassine; Yafooz, Wael Mohamed Shaher [in: Combating fake news with computational intelligence techniques]
    04A - Beitrag Sammelband
  • Publikation
    Post-quantum cryptography: an introductory overview and implementation challenges of quantum-resistant algorithms
    (2022) Käppler, Sherdel; Schneider, Bettina; Hinkelmann, Knut; Gerber, Aurona [in: Proceedings of the Society 5.0 Conference 2022 - Integrating digital world and real world to resolve challenges in business and society]
    Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of internet communication. The development of quantum computers (QCs) and their potential to utilize Shor’s Law, is increasingly recognized as a threat to asymmetric cryptography. In response, post-quantum cryptography (PQC) is gaining prominence as a notable field of research aiming to standardize quantum resistant algorithms before the operational usage of QCs. This paper is addressed to people with preliminary knowledge in the field of cryptography and QC. Based on a literature review, the authors provide an overview of challenges faced by the research community and elaborate the advancements in addressing post-quantum threats. A migration strategy from classical cryptosystems to PQC systems is in development, but obstacles such as time constraints and improper implementation complicate the process. Full implementation could take a decade or more. Until then, our paper aims to create awareness for potential challenges when transitioning towards PQC. As categorization scheme for these potential obstacles, we refer to a well- established model in cybersecurity – the McCumber Cube. Conclusions embrace preparing for risks of improper implementation and deriving a multi-step migration. Special attention is expected to be needed for data migration of existing data sets. As a request for future research in PQC, the authors identified the process of implementing post-cryptography standards, e.g., from the National Institute of Standards and Technology (NIST), and an assessment of the perceived readiness of industry to adapt.
    04B - Beitrag Konferenzschrift