Mobile Business II: Application Design, Applications, Infrastructures and Security
Basic Information
Type of Lecture: | Lecture with Exercise |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Summer 2015 |
Lecturers: | |
Email:
|
Content of the Course
Description
The 2nd part of this lecture series (Mobile Business II) focuses on the variety of opportunities and challenges, that are offered by mobile communication technologies and their specific properties and which need to be considered and addressed by companies and regulators. The overall objective of the course is to provide advanced knowledge about mobile applications and mobile services, ranging from technical to economic aspects. Students will be qualified to pro-actively realise inherent commercial potential and to identify and to address challenges and problems in the area of mobile business. An important facet of this is the discussion of international regulation and its implications on the development and application scenarios for mobile services.
Architectures for mobile services and their development are in the focus of the first part of the course. This includes topics such as security and privacy, usability, and the role of standardisation. The presentation of exemplary application areas will allow students to understand and question how different design aspects are considered in current scenarios. The course concludes with a state of the art overview of current mobile business research topics and activities, enabling students to understand the lines of research and to draw connections to already existing mobile business applications and scenarios.
Agenda:
Time and Place:
Tue, 16:00-18:00, HZ 12 (Hörsaalzentrum)
Wed, 10:00-12:00, HZ 7 (Hörsaalzentrum)
The Tuesday afternoon session will take place every week (14 April - 14 July 2015), whereas the Wednesday morning session will take place every second week (even-numbered week). Please check the Agenda below and note that Tuesday afternoon sessions are in HZ 12 whereas Wednesday morning sessions are in HZ 7.
Agenda:
-
-
-
-
- Tuesday, 14 April 2015
16-18 HZ 12
L01 - Introduction - Wednesday, 15 April 2015
10-12 HZ 7
L02 - Cryptography - Tuesday, 21 April 2015
16-18 HZ 12
L03 - Positioning Methods for Location-based Services - Tuesday, 28 April 2015
16-18 HZ 12
L04 - LBS Business Models & Use Cases - Wednesday, 29 April 2015
10-12 HZ 7
L05 - M-Payment I - Tuesday, 05 May 2015
16-18 HZ 12
E01 - Cryptography - Tuesday, 12 May 2015
16-18 HZ 12
G01 - Automotive and Mobility - Taxonomy, Technology and Business Models - Guest Lecture by Markus Tschersich - Wednesday, 13 May 2015
10-12 HZ 7
E02 - LBS and Mobile Communities - Tuesday, 19 May 2015
16-18 HZ 12
L06 - M-Payment II - Tuesday, 26 May 2015
16-18 HZ 12
G02 - Digital Touchpoint Management - Guest Lecture by Marco Benninghaus - Wednesday, 27 May 2015
10-12 HZ 7
G03 - How Internet of Things enables innovative business models - Guest Lecture by Michael Pachmajer & Dr. Carsten Hentrich - Tuesday, 02 June 2015
16-18 HZ 12
L07 - Mobile Surveillance, Data Protection, and Identity Management - Tuesday, 09 June 2015
16-18 HZ 12
L08 - (Mobile) Electronic Signatures - Wednesday, 10 June 2015
10-12 HZ 7
L09 - Regulation of (mobile) Telecommunications - Tuesday, 16 June 2015
16-18 HZ 12
L10 - Regulation by Licensing - Tuesday, 23 June 2015
16-18 HZ 12
L10 - Regulation by Licensing (continued) - Wednesday, 24 June 2015
10-12 HZ 7
E03 - Regulation of (mobile) Telecommunications - Tuesday, 30 June 2015
16-18 HZ 12
L11 - Design of Mobile Applications & Services: HCI Issues - Tuesday, 07 July 2015
16-18 HZ 12
L12 - Evaluation of Mobile Application & Service Designs - Wednesday, 08 July 2015
10-12 HZ 7
L13 - Current Research Topics - Tuesday, 14 July 2015
16-18 HZ 12
Q&A - Exam Preparation - Questions & Answers
- Tuesday, 14 April 2015
-
-
-
Downloads
-
-
-
-
- E01 - Cryptography
(28.04.2015) - E01 - Cryptography - Hints
(07.05.2015) - E02 - LBS & Mobile Communities
(08.05.2015) - E02 - LBS & Mobile Communities - Solution
(13.05.2015) - E03 - Regulation of (mobile) Telecommunications + Regulation by Licensing
(23.06.2015) - E03 - Regulation of (mobile) Telecommunications + Regulation by Licensing - Solution
(29.06.2015, please also have a look at these two press releases of the European Commission: Die Roamingverordnung ist gültig (German) / The Roaming Regulation is valid (English) and Telekommunikation: Kommission fordert von Bundesnetzagentur zum fünften Mal niedrigere Mobilfunktarife (German) / Telecoms: Commission asks German regulator to lower mobile call tariffs for the fifth time (English).) - G01 - Automotive and Mobility
(07.05.2015) - G02 - Digital Touchpoint Management
(26.05.2015, M. Benninghaus also provided an additional paper for you, which has a strong link to his talk: Critical Metrics for Measuring App User Engagement) - G03 - How Internet of Things enables innovative business models
(26.05.2015) - L01 - Introduction
(13.04.2015) - L02 - Cryptography
(L02 updated on 15.04.2015: Algorithm Performance on slide 29; Source of Needham/Lampson quote on slides 54+55) - L03 - Positioning Methods for Location-based Services
(14.04.2015) - L04 - LBS Business Models & Use Cases
(14.04.2015) - L05 - M-Payment I
(27.04.2015) - L06 - M-Payment II
(27.04.2015) - L07 - Mobile Surveillance, Data Protection, and Identity Management
(15.05.2015) - L08 - (Mobile) Electronic Signatures
(05.06.2015) - L09 - Regulation of (mobile) Telecommunications
(05.06.2015) - L10 - Regulation by Licensing
(23.06.2015) - L11 - Design of Mobile Applications & Services: HCI Issues
(26.06.2015) - L12 - Evaluation of Mobile Application & Service Designs
(26.06.2015) - L13 - Current Research Topics
(07.07.2015) - Exam of summer semester 2013 (exercise sheet incl. sample solution)
(13.07.2015)
- E01 - Cryptography
-
-
-
Exam
Information:
Erfolgreicher Abschluss der Modulprüfung in Form einer Klausur von 90minütiger Dauer.
Business Informatics II
Basic Information
Type of Lecture: | Lecture with Exercise |
---|---|
Course: | Bachelor |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | German |
Term: |
Summer 2015
|
Lecturers: | |
Email:
|
|
Content of the Course
Description
Based on “Business Informatics 1” (OWIN), this course covers fundamentals, development, and introduction of Information and Communication Systems (ICS) for enterprises. It can roughly be divided into four parts as follows:
In the first part, the nature and role of ICS are briefly recapitulated, and an overview of Enterprise Modelling as a holistic view on ICS in enterprises is given.
In order to present the functionality and architecture of ICS, the second part begins with a closer look into ICS. First the two related concepts and terms of Information Systems (IS) and Communication Systems (CS) are analysed as both are often used in the literature, but their heritage and relation is rarely made clear. Following this distinction, IS architectures and corresponding IS models are discussed and layer-based communication and network typologies for CS are covered in more detail.
The third part is concerned with the development of ICS and begins with the introduction of management concepts for ICS-related projects. Subsequently, software development process models (SDPM) are presented and characterised. Since the modelling of ICS and their architectures constitutes an integral part of SDPM, several ICS modelling approaches (e.g. object-oriented or data-oriented models) are covered in more detail. This part is completed by providing an overview of programming and markup languages as means for the implementation of the previously discussed IS models. In addition, the Structured Query Language (SQL) as most commonly used means for ICS to access and manipulate its application data is discussed.
The course is completed by its fourth part covering the Business Process Reengineering (BPR) approach. Enterprises have a continuous obligation to align their processes to new business objectives or to improve the effectiveness and efficiency of their processes. Whereas this traditionally led to Business Process Alignment and Optimisation activities, the introduction of BRP significantly contrasts to these approaches by calling for radical redesign of business processes.
-
-
-
-
- Tuesday, 14.04.2015, 10:00 - 12:00 in HZ4
Lecture1: Einführung - Tuesday, 21.04.2015, 08:00 - 10:00 in HZ4
Lecture2: Informationssystem I - Tuesday, 21.04.2015, 10:00 - 12:00 in HZ4
Lecture3: Informationssysteme II - Modelle und Architekturen - Tuesday, 28.04.2015, 10:00 - 12:00 in HZ4
Lecture4: Informationssyteme III - Mobile Systeme - Tuesday, 05.05.2015, 08:00 - 10:00 in HZ4
Exercise0 and Exercise1: Lecture1, Lecture2 - Tuesday, 05.05.2015, 10:00 - 12:00 in HZ4
Exercise2: Lecture3, Lecture4 - Tuesday, 05.05.2015, 16:00 - 18:00 in Seminarpavillon - SP2.04
Mentorium0 and Mentorium1: Vorstellung Myplace, Organisatorisches; Lecture1, Lecture2 - Tuesday, 07.05.2015, 10:00 - 12:00 in RuW 2.202
Mentorium0 and Mentorium1: Vorstellung Myplace, Organisatorisches; Lecture1, Lecture2 - Tuesday, 07.05.2015, 12:00 - 14:00 in HoF 1.28 / Shanghai
Mentorium0 and Mentorium1: Vorstellung Myplace, Organisatorisches; Lecture1, Lecture2 - Tuesday, 12.05.2015, 10:00 - 12:00 in HZ4
Guest Lecture: Dr. Andreas Albers - Tuesday, 19.05.2015, 08:00 - 10:00 in HZ4
Lecture5: Kommunikationssysteme I - Schichtenbasierte Kommunikation - Tuesday, 19.05.2015, 10:00 - 12:00 in HZ4
Lecture6: Kommunikationssysteme II - Kabelgeb. U. drahtlose Kommunikation - Tuesday, 19.05.2015, 16:00 - 18:00 in HZ4 (room has changed)
Mentorium2: Lecture3, Lecture4 - Thursday, 21.05.2015, 10:00 - 12:00 in SH 0.109 (room has changed)
Mentorium2: Lecture3, Lecture4 - Thursday, 21.05.2015, 12:00 - 14:00 in SH 0.109 (room has changed)
Mentorium2:Lecture3, Lecture4 - Tuesday, 26.05.2015, 10:00 - 12:00 in HZ4
Exercise3: Lecture5, Lecture6 - Tuesday, 02.06.2015, 08:00 - 10:00 in HZ4
Lecture7: Management von IT Projekten - Tuesday, 02.06.2015, 10:00 - 12:00 in HZ4
Lecture8: Entwicklung von IS I - Software Engineering - Tuesday, 02.06.2015, 16:00 - 18:00 in HZ4(room has changed)
Mentorium3: Lecture5, Lecture6 - Tuesday, 09.06.2015, 10:00 - 12:00 in HZ4
Exercise4: Lecture7, Lecture8 - Thursday, 11.06.2015, 10:00 - 12:00 in SH 0.109 (room and date have changed)
Mentorium3: Lecture5, Lecture6 - Thursday, 11.06.2015, 12:00 - 14:00 in SH 0.109 (room and date have changed)
Mentorium3: Lecture5, Lecture6 - Tuesday, 16.06.2015, 08:00 - 10:00 in HZ4
Lecture9: Entwicklung von IS II - Objektorientierung & UML - Tuesday, 16.06.2015, 10:00 - 12:00 in HZ4
Lecture10: Entwicklung von IS III - Markup Languages - Tuesday, 16.06.2015, 16:00 - 18:00 in HZ4 (room has changed)
Mentorium4: Lecture7, Lecture8 - Thursday, 18.06.2015, 10:00 - 12:00 in SH 0.109 (room has changed)
Mentorium4: Lecture7, Lecture8 - Thursday, 18.06.2015, 12:00 - 14:00 in SH 0.109 (room has changed)
Mentorium4: Lecture7, Lecture8 - Tuesday, 23.06.2015, 10:00 - 12:00 in HZ4
Exercise5: Lecture09, Lecture10 - Tuesday, 30.06.2015, 08:00 - 10:00 in HZ4
Lecture11: Datenbankansatz & Datenorientierte Modellierung - Tuesday, 30.06.2015, 10:00 - 12:00 in HZ4
Lecture12: SQL - Tuesday, 30.06.2015, 16:00 - 18:00 in HZ4(room has changed)
Mentorium5: Lecture09, Lecture10 - Thursday, 02.07.2015, 10:00 - 12:00 in H14 (Campus Bockenheim) (room has changed)
Mentorium5: Lecture09, Lecture10 - Thursday, 02.07.2015, 12:00 - 14:00in H14 (Campus Bockenheim) (room has changed)
Mentorium5: Lecture09, Lecture10 - Tuesday, 07.07.2015, 10:00 - 12:00 in HZ4 (date has changed)
Lecture13: Business Process Engineering - Tuesday, 07.07.2015, 16:00 - 18:00 in HZ9(room has changed)
Mentorium6: Lecture11, Lecture12 - Thursday, 09.07.2015, 10:00 - 12:00 in SH 0.109 (room has changed)
Mentorium6: Lecture11, Lecture12 - Thursday, 09.07.2015, 12:00 - 14:00in SH 0.109 (room has changed)
Mentorium6: Lecture11, Lecture12 - Tuesday, 14.07.2015, 08:00 - 10:00 in HZ4 (date has changed)
Exercise6: Lecture11, Lecture12 - Tuesday, 14.07.2015, 10:00 - 12:00 in HZ4
Lecture14: Q&A
- Tuesday, 14.04.2015, 10:00 - 12:00 in HZ4
-
-
-
Seminar: Privacy and Identity Management - What do the users perceive? - Single View
Basic Information
Type of Lecture: | Seminar |
---|---|
Course: | Master |
Hours/Week: | 2 |
Credit Points: | 6 |
Language: | English |
Term: | Winter 2015/2016 |
Lecturers: | |
Email: |
Content of the Course
Description:
In this seminar we plan to perform a joint field study in a structured form of collaboration. The students will be provided with a validated measurement instrument and pointers to the related works. Their main task is to perform small-scale field studies with the help of the given instrument and perform analysis on their findings. The students will receive adequate instruction to relevant statistical analysis they need to perform. By the end of the semester, we expect the students to have obtained a valuable experience of information system research.
Capacity and Registration:
To guaranty the quality work, the number of participants is limited to 15 and the first come - first served policy will be applied.
Prerequisites:
Interest in privacy and behavioural research
- Diligence for performing literature reviews
- Dedication and willingness to perform survey/interview
Registration:
Maximum participants:
Exam:
Information:
We will put up the registration for on www.m-chair.de on 01 October 2015.
The participants will be graded based on their 20-min presentation (40%) and their final report (60%) of approximately 25 pages
Project Seminar: Privacy, Security and Trust in Emerging Technologies
Basic Information
Type of Lecture: | Seminar |
---|---|
Course: | Master |
Hours/Week: | 1 |
Credit Points: | 12 |
Language: | English |
Term: | Winter 2015/2016 |
Lecturers: | |
Email: |
Content of the Course
Description:
This project seminar consists of three administrative parts: the first one is the exam which covers one third of the final grade and takes place on 10.11.2015 (see Exam section of the project web page of the chair), the second part is producing a report of the project seminar work (one third of the final grade), and the third part is the presentation of results (one third of the final grade). Participation in all parts is required for the successful completion of the project seminar. The work is evaluated on individual basis (not in groups). Registration for the seminar is mandatory. The online registration form is available on the Registration section of the project seminar. The maximum number of students allowed for this project seminar is 12. If the maximum number of students is exceeded, the registration system will offer a waiting list for further potential participants. Once the registration deadline has expired, all course applicants will be notified via email about their final registration status.
Language: The working language of project will be English.
As listed below, this project seminar has three main subtopics.
Topic 1: “Measuring uncertainty”.
One of the challenges that users face when deciding about their privacy limits is the uncertainty they feel. They are uncertain to what degree and what magnitude of audience they should share their information. This uncertainty arises partly due to lack of accumulated contextual knowledge relevant to the kind and amount of information and the audience, and partly due to the fact that users are not supported with pertinent information that can help them for decision at the given context. This project aims at studying the background problem about uncertainty challenges in privacy decision making, and further produce constructs to measure the degree of uncertainty of users in given contexts. Furthermore, students will carry out user studies to methodologically validate the constructs.
Topic 2: “Adoption of biometric authentication systems in online banking”
Biometric technologies are increasingly spreading, and are often considered more reliable than traditional mechanisms like passwords or tokens, especially because they are able to provide non-repudiation. However, despite their potential, there is still a low adoption of biometric authentication systems in highly sensitive environments like electronic banking. The aim of this project is to determine, which factors influence their adoption in online banking. In particular the concepts of trust, privacy, liability, and data protection regulations must be investigated, by creating and evaluating a questionnaire.
*Basic skills in programming are desirable.
Acquisti, Alessandro, Laura Brandimarte, and George Loewenstein. "Privacy and human behavior in the age of information." Science 347.6221 (2015): 509-514.
Jindal, Prateek, Carl A. Gunter, and Dan Roth. "Detecting privacysensitive events in medical text." Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM, 2014
Agenda:
Download kick-off presentations
Registration:
Maximum participants:
Exam:
Information:
Date: 10.11.2015
Time: 10:00 - 12:00
Room: 2.202
Business Informatics II
Basic Information
Type of Lecture: | Lecture with Exercise |
---|---|
Course: | Bachelor |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | German |
Term: |
Winter 2015/2016
|
Lecturers: | |
Email:
|
|
Content of the Course
Description
Based on “Business Informatics 1” (OWIN), this course covers fundamentals, development, and introduction of Information and Communication Systems (ICS) for enterprises. It can roughly be divided into four parts as follows:
In the first part, the nature and role of ICS are briefly recapitulated, and an overview of Enterprise Modelling as a holistic view on ICS in enterprises is given.
In order to present the functionality and architecture of ICS, the second part begins with a closer look into ICS. First the two related concepts and terms of Information Systems (IS) and Communication Systems (CS) are analysed as both are often used in the literature, but their heritage and relation is rarely made clear. Following this distinction, IS architectures and corresponding IS models are discussed and layer-based communication and network typologies for CS are covered in more detail.
The third part is concerned with the development of ICS and begins with the introduction of management concepts for ICS-related projects. Subsequently, software development process models (SDPM) are presented and characterised. Since the modelling of ICS and their architectures constitutes an integral part of SDPM, several ICS modelling approaches (e.g. object-oriented or data-oriented models) are covered in more detail. This part is completed by providing an overview of programming and markup languages as means for the implementation of the previously discussed IS models. In addition, the Structured Query Language (SQL) as most commonly used means for ICS to access and manipulate its application data is discussed.
The course is completed by its fourth part covering the Business Process Reengineering (BPR) approach. Enterprises have a continuous obligation to align their processes to new business objectives or to improve the effectiveness and efficiency of their processes. Whereas this traditionally led to Business Process Alignment and Optimisation activities, the introduction of BRP significantly contrasts to these approaches by calling for radical redesign of business processes.
-
-
-
-
- Tuesday, 13.10.2015, 10:00 - 12:00 in HZ4
Lecture1: Einführung - Tuesday, 20.10.2015, 08:30 - 10:00 in HZ4
Lecture2: Informationssystem I - Tuesday, 20.10.2015, 10:00 - 12:00 in HZ4
Lecture3: Informationssysteme II - Modelle und Architekturen - Tuesday, 27.10.2015, 10:00 - 12:00 in HZ4
Exercise0 and Exercise1: Lecture1, Lecture2 - Tuesday, 03.11.2015, 08:30 - 10:00 in HZ4
Lecture4: Informationssyteme III - Mobile Systeme - Tuesday, 03.11.2015, 10:00 - 12:00 in HZ4
Lecture5: Kommunikationssysteme I - Schichtenbasierte Kommunikation - Tuesday, 03.11.2015, 16:00 - 18:00 in SH 5.101
Mentorium0 and Mentorium1: Vorstellung Myplace, Organisatorisches; Lecture1, Lecture2 - Tuesday, 05.11.2015, 10:00 - 12:00 in SH 5.101
Mentorium0 and Mentorium1: Vorstellung Myplace, Organisatorisches; Lecture1, Lecture2 - Tuesday, 05.11.2015, 12:00 - 14:00 in SH 5.101
Mentorium0 and Mentorium1: Vorstellung Myplace, Organisatorisches; Lecture1, Lecture2 - Tuesday, 10.11.2015, 10:00 - 12:00 in HZ4
Guest Lecture: Dr. André Deuker - Tuesday, 17.11.2015, 08:30 - 10:00 in HZ4
Exercise2: Lecture3, Lecture4 - Tuesday, 17.11.2015, 10:00 - 12:00 in HZ4
Lecture6: Kommunikationssysteme II - Kabelgeb. U. drahtlose Kommunikation - Tuesday, 17.11.2015, 17:00 - 19:00 in SH 5.101
Mentorium2: Lecture3, Lecture4 - Thursday, 19.11.2015, 10:00 - 12:00 in SH 5.101
Mentorium2: Lecture3, Lecture4 - Thursday, 19.11.2015, 12:00 - 14:00 in SH 5.101
Mentorium2:Lecture3, Lecture4 - Tuesday, 24.11.2015, 10:00 - 12:00 in HZ4
Lecture7: Management von IT Projekten - Tuesday, 01.12.2015, 08:30 - 10:00 in HZ4
Lecture8: Entwicklung von IS I - Software Engineering - Tuesday, 01.12.2015, 10:00 - 12:00 in HZ4
Lecture9: Entwicklung von IS II - Objektorientierung & UML - Tuesday, 01.12.2015, 16:00 - 18:00 in CAS 823
Mentorium3: Lecture5, Lecture6 - Thursday, 03.12.2015, 10:00 - 12:00 in SH 5.106
Mentorium3: Lecture5, Lecture6 - Thursday, 03.12.2015, 12:00 - 14:00 in SH 5.106
Mentorium3: Lecture5, Lecture6 - Tuesday, 08.12.2015, 10:00 - 12:00 in HZ4
Lecture10: Entwicklung von IS III - Markup Languages - Tuesday, 15.12.2015, 08:30 - 10:00 in HZ4
Exercise3: Lecture5, Lecture6 - Tuesday, 15.12.2015, 10:00 - 12:00 in HZ4
Exercise4: Lecture7, Lecture8 - Tuesday, 15.12.2015, 16:00 - 18:00 in SH 5.101
Mentorium4: Lecture7, Lecture8 - Thursday, 17.12.2015, 10:00 - 12:00 in SH 5.101
Mentorium4: Lecture7, Lecture8 - Thursday, 17.12.2015, 12:00 - 14:00 in SH 5.101
Mentorium4: Lecture7, Lecture8 - Tuesday, 12.01.2016, 10:00 - 12:00 in HZ4
Lecture11: Datenbankansatz & Datenorientierte Modellierung - Tuesday, 19.01.2016, 08:30 - 10:00 in HZ4
Exercise5: Lecture9, Lecture10 - Tuesday, 19.01.2016, 10:00 - 12:00 in HZ4
Guest Lecture: Dr. Andreas Albers - Tuesday, 26.01.2016, 10:00 - 12:00 in HZ4
Lecture12: SQL - Tuesday, 26.01.2016, 16:00 - 18:00 in SH 0.106
Mentorium5: Lecture9, Lecture10 - Thursday, 28.01.2016, 10:00 - 12:00 in SH 5.101
Mentorium5: Lecture9, Lecture10 - Thursday, 28.01.2016, 12:00 - 14:00 in SH 5.101
Mentorium5: Lecture9, Lecture10 - Tuesday, 02.02.2016, 08:30 - 10:00 in HZ4
Lecture13: Business Process Engineering - Tuesday, 02.02.2016, 10:00 - 12:00 in HZ4
Exercise6: Lecture11, Lecture12 - Tuesday, 02.02.2016, 16:00 - 18:00 in Cas 823
Mentorium6: Lecture11, Lecture12 - Thursday, 04.02.2016, 10:00 - 12:00 in SH 0.106
Mentorium6: Lecture11, Lecture12 - Thursday, 04.02.2016, 12:00 - 14:00 in SH 0.106
Mentorium6: Lecture11, Lecture12 - Tuesday, 09.02.2016, 10:00 - 12:00 in HZ4
Q&A Lecture
- Tuesday, 13.10.2015, 10:00 - 12:00 in HZ4
-
-
-
-
-
-
-
- Lecture1: Einführung (Update!)
- Lecture2: Informationssystem I (Update 2!)
- Lecture3: Informationssysteme II - Modelle und Architekturen
- Lecture4: Informationssyteme III - Mobile Systeme (Update 2!)
- Lecture5: Kommunikationssysteme I - Schichtenbasierte Kommunikation
- Lecture6: Kommunikationssysteme II - Kabelgeb. U. drahtlose Kommunikation (Update)
- Lecture7: Management von IT Projekten
- Lecture8: Entwicklung von IS I - Software Engineering
- Lecture9: Entwicklung von IS II - Objektorientierung & UML (Update!)
- Lecture10: Entwicklung von IS III - Markup Languages (Update!)
- Lecture11: Datenbankansatz & Datenorientierte Modellierung (Update!)
- Guest Lecture (password will be announced in the lecture)
- Lecture12: SQL
- Lecture13: Business Process Engineering
- Q&A Lecture (Please submit your questions no later than February 5, 6:00 p.m. to
This email address is being protected from spambots. You need JavaScript enabled to view it. ) - Exercise0: Lecture1
- Exercise1: Lecture2, Lösung
- Exercise2: Lecture3, Lecture4, Lösung
- Exercise3: Lecture5, Lecture6, Lösung
- Exercise4: Lecture7, Lecture8, Lösung
- Exercise5: Lecture9, Lecture10, Lösung
- Exercise6: Lecture11, Lecture12, Lösung
- Mentorium0: Vorstellung Myplace, Organisatorisches
- Mentorium1: Lecture1, Lecture2, Hints
- Mentorium2: Lecture3, Lecture4, Hints
- Mentorium3: Lecture5, Lecture6, Hints
- Mentorium4: Lecture7, Lecture8, Hints
- Mentorium5: Lecture9, Lecture10, Hints
- Mentorium6: Lecture11, Lecture12, Hints
-
-
-
- Mobile Business I - Technology, Markets, Platforms, and Business Models Winter 2015/2016
- Seminar: Privacy and uncertainty Summer 2016
- Mobile Business II: Application Design, Applications, Infrastructures and Security Summer 2016
- Seminar: Information Security and Information Privacy Assessment - Demands, Challenges and Opportunities Summer 2016