Hinkelmann, Knut

Lade...
Profilbild
E-Mail-Adresse
Geburtsdatum
Projekt
Organisationseinheiten
Berufsbeschreibung
Nachname
Hinkelmann
Vorname
Knut
Name
Hinkelmann, Knut

Suchergebnisse

Gerade angezeigt 1 - 10 von 39
  • Publikation
    A new approach for teaching programming: model-based agile programming (MBAD)
    (ACM, 2023) Hinkelmann, Knut [in: ICIEI 2023. Proceedings of 2023 The 8th International Conference on Information and Education Innovations]
    Designing courses for introductory programming courses with a heterogeneous audience (business and IT background as well) is a challenging task. In an internal project of the School of Business at the FHNW University of Applied Sciences and Arts Northwestern Switzerland (FHNW) a group of lecturers developed a concept entitled “Model-based agile development” (MBAD) which supports the learning of elementary programming concepts in an agile environment and builds the basis for advanced courses. MBAD will be used as a basic learning module for various Bachelor programs at the FHNW.
    04B - Beitrag Konferenzschrift
  • Publikation
    Ontology-driven enhancement of process mining with domain knowledge
    (Sun SITE, Informatik V, RWTH Aachen, 2023) Hinkelmann, Knut [in: Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023)]
    Process mining is a technique used to analyze and understand business processes. It uses as input the event log, a type of data used to represent the sequence of activities occurring within a business process. An event log typically contains information such as the case ID, the performed activity’s name, the activity’s timestamp, and other data associated with the activity. By analyzing event logs, organizations can gain a deeper understanding of their business processes, identify areas for improvement, and make data-driven decisions to optimize their operations. However, as the event logs contain data collected from different systems involved in the process, such as ERP, CRM, or WfMS systems, they often lack the necessary context and knowledge to analyze and fully comprehend business processes. By extending the event logs with domain knowledge, organizations can gain a more complete and accurate insight into their business processes and make more informed decisions about optimizing them. This paper presents an approach for enhancing process mining with domain knowledge preserved in domain-specific OWL ontologies. Event logs are typically stored in structured form in relational databases. This approach first converts the process data into an event log which is then mapped with ontology concepts. The ontology contains classes and individuals representing background knowledge of the domain, which supports the understanding of the data. A class for the specific activities forms the link between the event log and the ontology. In this manner, it is possible to map the domain knowledge to a particular case and activity. This allows to determine conditions that must be satisfied for executing tasks and to prune discovered process models if they are too complex. This approach is demonstrated using data from the student admission process at FHNW and has been implemented in Protégé.
    04B - Beitrag Konferenzschrift
  • Publikation
    Analysing barriers in the business ecosystem of European MaaS providers: an actor-network approach
    (2023) Gebhart, Julian; Schlick, Sandra; Marvell, Alan; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    As new Mobility as a Service (MaaS) platforms are being established in Europe, researchers and practitioners seek evidence on the barriers experienced by the MaaS providers in their evolving business ecosystem. This paper conceptualises the MaaS business ecosystem using a Systematic Literature Review (SLR) combined with Actor- Network Theory (ANT) by constructing an actor-network of key actors. This actor- network, along with the identified MaaS business ecosystem barriers, is then used for Multiple Case Study Research, interviewing 18 European MaaS experts. The cross-case analysis revealed how MaaS providers problematise, interest, enrol and mobilise their business ecosystems. Furthermore, the paper outlines and amends key barriers in the areas of (1) technology and data, (2) social and cultural, and (3) policy and regulation. Researchers and practitioners can use the findings of this study to formulate policies, create best practices or conduct further research on the development of MaaS.
    04B - Beitrag Konferenzschrift
  • Publikation
    A system of customer co-creation for new product development of digital products with a pilot study of the Swiss media industry
    (2023) Le Cunff, Eric; Schlick, Sandra; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    In the age of digitisation, the media industry is faced with declining advertising revenues. Therefore, the focus on the development of new digital products is a key element to survive in such a fast-changing market and to increase the innovation performance. One of the most important elements thereby is the involvement of customers as co-creators in the new product development (NPD) process, so that new digital products are developed that are in demand on the market. However, the process of how companies turn external knowledge from customers into knowledge creation for generating new ideas and the development of innovative products has not been analysed. This pilot study, which presents an initial system of customer co-creation for NPD of digital products from the literature and searches for similarities and dissimilarities through an abductive qualitative data analysis from interviews with three managers in three different Swiss media companies, explores this unresolved research gap. The system of this study is based on an overarching phase model, which is derived from Application Lifecycle Management (ALM). The process anchored in it, which focuses on the customer co-creation of digital products, integrates process elements from the two user-centered approaches, namely User Centered Design (UCD) and Design Thinking (DT). The results from the interviews show that the system is largely in line with the NPD process procedures in the three media companies. It was found that customers can be involved everywhere in the NPD process, but that this is not yet implemented in practice. However, as the future ambition in media companies is to become even more customer- centric, the proposed system in this study is very promising.
    04B - Beitrag Konferenzschrift
  • Publikation
    A cyber attack simulation for teaching cybersecurity
    (2023) Scherb, Christopher; Heitz, Luc; Grimberg, Frank; Grieder, Hermann; Maurer, Marcel; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Therefore, it is time to rethink the approach on how to train cyber awareness. In this paper we suggest an alternative approach -- a serious game -- to educate awareness for common cyberattacks. While many serious games for cybersecurity education exist, all follow a very similar approach: showing people the effects of a cyber attack on their own system or company network. For example, one of the main tasks in these games is to sort out phishing mails. We developed and evaluated a new type of cybersecurity game: an attack simulator, which shows the entire setting from a different perspective. Instead of sorting out phishing mails the players should write phishing mails to trick potential victims and use other forms of cyberattacks. Our game explains the intention of each attack and shows the consequences of a successful attack. This way, we hope, players will get a better understanding on how to detect cyberattacks.
    04B - Beitrag Konferenzschrift
  • Publikation
    Agile management in cybersecurity
    (2023) Asprion, Petra; Giovanoli, Claudio; Scherb, Christopher; Bhat, Sourabha; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]
    Cybersecurity management has emerged as a topic of growing importance on a global scale. Applying traditional management practices to cybersecurity is often too cumbersome and can lead to significant delays. Today's enterprises must be able to adapt to ever-evolving digital threats and act with corresponding agility and flexibility. Agile methods are well suited for projects without a defined scope, duration, tasks, and resources and has been identified as suitable for meeting the management challenges of cybersecurity teams. Based on an in-depth literature review, this study assumed that adopting an agile approach to cybersecurity helps organizations manage cybersecurity effectively. A first prototypical model was developed and evaluated which combines agile methods with cybersecurity functions - based on a recognized reference model.
    04B - Beitrag Konferenzschrift
  • Publikation
    A hybrid intelligent approach for the support of higher education students in literature discovery
    (2022) Prater, Ryan; Laurenzi, Emanuele; Martin, Andreas; Hinkelmann, Knut; Fill, Hans-Georg; Gerber, Aurona; Lenat, Doug; Stolle, Reinhard; van Harmelen, Frank [in: Proceedings of the AAAI 2022 Spring Symposium on Machine Learning and Knowledge Engineering for Hybrid Intelligence (AAAI-MAKE 2022)]
    In this paper, we present a hybrid intelligent approach that combines knowledge engineering, machine learning, and human intervention to automatically recommend literature resources relevant for a high quality of literature discovery. The primary target group that we aim to support is higher education students in their first experiences with research works. The approach builds a knowledge graph by leveraging a logistic regression algorithm which is first parameterized and then influenced by the interventions of a supervisor and a student, respectively. Both interventions allow continuous learning based on both the supervisor’s preferences (e.g. high score of H-index) and the student’s feedback to the resulting literature resources. The creation of the hybrid intelligent approach followed the Design-Science Research methodology and is instantiated in a working prototype named PaperZen. The evaluation was conducted in two complementary ways: (1) by showing how the design requirements manifest in the prototype, and (2) with an illustrative scenario in which a corpus of a research project was taken as a source of truth. A small subset from the corpus was entered into the PaperZen and Google Scholar, independently. The resulting literature resources were compared with the corpus of a research project and show that PaperZen outperforms Google Scholar
    04B - Beitrag Konferenzschrift
  • Publikation
    A computational literature analysis of conversational AI research with a focus on the coaching domain
    (2022) Hinkelmann, Knut [in: Proceedings of the Society 5.0 Conference 2022 - Integrating digital world and real world to resolve challenges in business and society]
    We conduct a computational analysis of the literature on Conversational AI. We identify the trend based on all publications until the year 2020. We then concentrate on the publications for the last five years between 2016 and 2020 to find out the top ten venues and top three journals where research on Conversational AI has been published. Further, using the Latent Dirichlet Allocation (LDA) topic modeling technique, we discover nine important topics discussed in Conversational AI literature and specifically two topics related to the area of coaching. Finally, we detect the key authors who have contributed significantly to Conversational AI research and area(s) related to coaching. We determine the key authors' areas of expertise and how the knowledge is distributed across different regions. Our findings show an increasing trend and thus, an interest in Conversational AI research, predominantly from the authors in Europe.
    04B - Beitrag Konferenzschrift
  • Publikation
    Post-quantum cryptography: an introductory overview and implementation challenges of quantum-resistant algorithms
    (2022) Käppler, Sherdel; Schneider, Bettina; Hinkelmann, Knut; Gerber, Aurona [in: Proceedings of the Society 5.0 Conference 2022 - Integrating digital world and real world to resolve challenges in business and society]
    Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of internet communication. The development of quantum computers (QCs) and their potential to utilize Shor’s Law, is increasingly recognized as a threat to asymmetric cryptography. In response, post-quantum cryptography (PQC) is gaining prominence as a notable field of research aiming to standardize quantum resistant algorithms before the operational usage of QCs. This paper is addressed to people with preliminary knowledge in the field of cryptography and QC. Based on a literature review, the authors provide an overview of challenges faced by the research community and elaborate the advancements in addressing post-quantum threats. A migration strategy from classical cryptosystems to PQC systems is in development, but obstacles such as time constraints and improper implementation complicate the process. Full implementation could take a decade or more. Until then, our paper aims to create awareness for potential challenges when transitioning towards PQC. As categorization scheme for these potential obstacles, we refer to a well- established model in cybersecurity – the McCumber Cube. Conclusions embrace preparing for risks of improper implementation and deriving a multi-step migration. Special attention is expected to be needed for data migration of existing data sets. As a request for future research in PQC, the authors identified the process of implementing post-cryptography standards, e.g., from the National Institute of Standards and Technology (NIST), and an assessment of the perceived readiness of industry to adapt.
    04B - Beitrag Konferenzschrift
  • Publikation
    Platform-based strategic consulting for digital transformation
    (2022) Gatziu Grivas, Stella; Giovanoli, Claudio; Grasshoff, Gunnar; Imhof, Denis; Hinkelmann, Knut; Gerber, Aurona [in: Proceedings of the Society 5.0 Conference 2022 - Integrating digital world and real world to resolve challenges in business and society]
    The digital age poses manifold challenges and difficult conditions for all sizes of organizations in all industries. Organizations need to adapt to complex challenges and difficult conditions and to plan and execute their digital transformation strategies. More and more organizations need support by strategic business consulting companies which must be offered in an effective and efficient way so that also small and medium sized companies can profit from it to stay competitive. Our research work focusses on the development of online strategic consulting tools offered as self-services on a web-based platform supporting the definition of digital transformation strategy. The so-called Digital Backpack Assessment (DBA) measures the digital maturity and proposes possible cases for changes. The tool follows the following principles: (1) A holistic approach with focus on the customer orientation, the business models, the organizational excellence, and the operational excellence. (2) An open strategy approach where several stakeholders from the company participate
    04B - Beitrag Konferenzschrift