Wirtschaftsinformatik II (PWIN)
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Bachelor |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | German |
Term: |
Winter 2017/2018
|
Lecturers: |
Akos Grosz M.Sc.
|
Email:
|
|
Content of the Course
Description
Basierend auf der Vorlesung "Wirtschaftsinformatik 1" (OWIN) vermittelt dieser Kurs die Grundlagen von Informations- und Kommunikationssystemen (IuK-Systeme) und behandelt u.a. deren Entwicklung und Einführung in Unternehmen. Die Veranstaltung lässt sich grob in folgende vier Teile gliedern:
Im ersten Teil werden Bedeutung und Charakteristika von IuK-Systemen in Unternehmen rekapituliert und eine kurze Einführung in die Unternehmensmodellierung gegeben.
Der zweite Teil geht mehr ins Detail und widmet sich der Architektur und Funktionalität von IuK-Systemen. Es werden ferner die beiden miteinander verwandten Konzepte "Informationssysteme" (IS) und "Kommunikationssysteme" definiert und voneinander abgegrenzt. Dieser Abgrenzung folgend, werden IS-Architekturen und entsprechende IS-Modelle diskutiert und schichtenbasierte Kommunikation und Netzwerktechnologien für Kommunikationssysteme vorgestellt.
Der dritte Teil adressiert die Entwicklung von IuK-Systemen und erläutert zunächst verschiedene Konzepte für das Management von IT-Projekten. Anschließend werden Vorgehensmodelle zur Softwareentwicklung vorgestellt. Da die Modellierung von IuK-Systemen ein integraler Bestandteil solcher Vorgehensmodelle darstellt, werden ebenso verschiedene Modellierungsansätze (z.B. zur objekt- und datenorientierten Modellierung) vermittelt. Als exemplarische Sprache zur Modell-Implementierung wird die Structured Query Language (SQL) behandelt - der für IuK-Systeme wichtigsten Sprache für den Zugriff auf ihre Anwendungsdaten.
Der Kurs schließt mit einer Einführung in das Thema Business Process Reengineering (BPR). Unternehmen sind ständig gefordert, ihre Prozesse neuen Unternehmenszielen anzupassen oder ihre Effektivität und Prozesseffizienz zu verbessern. Obwohl auch traditionell damit eine Anpassung der Geschäftsprozesse sowie Optimierungsmaßnahmen verbunden sind, verlangt der BPR-Ansatz im Gegensatz dazu eine radikale Neugestaltung der Geschäftsprozesse.
Lernziele und Kompetenzen
-
-
-
-
- Studierenden werden mit den wichtigsten Fragestellungen im betrieblichen Informationsmanagement und mit strategischen Informationssystemen vertraut gemacht. Sie erhalten grundlegende theoretische Kompetenzen auf diesem Gebiet und lernen dieses Wissen kritisch anzuwenden. (LGB-1)
- Studierende erlernen den Umgang mit grundlegenden Methoden und Werkzeugen der Wirtschaftsinformatik und somit die analytische sowie strukturierte Durchdingung relevanter Problemstellungen. (LGB-2, LGB-3, LGB-5)
- Im Rahmen der Veranstaltung werden zahlreiche Praxisbeispiele und Fallstudien, die Informationsmanagement in verschiedenen Industrien beleuchten, behandelt. Insbesondere in den angebotenen Übungen und Mentorien wird die Fähigkeit der Studierenden geschult, das erlangte Wissen praktisch anzuwenden. (LGB-3)
- Durch Gruppenarbeiten üben Studierende die erfolgreiche Zusammenarbeit mit anderen. Ferner trainieren sie weitere Soft Skills wie etwa Präsentationsfähigkeiten, indem sie eingereichte schriftliche Arbeiten im Rahmen der Mentorien mündlich vortragen. (LGB-6, LGB-7)
-
-
-
<Download_Agenda>(Stand: 11.12.2017)
Lecture
-
-
-
-
- Lecture 1: Einführung
- Lecture 2: Informationssysteme I
- Lecture 3: Informationssysteme II
- Lecture 4: Informationssysteme III
- Lecture 5: Kommunikationssysteme I
- Lecture 6: Kommunikationssysteme II
- Lecture 7: Management of IT Projects
- Lecture 8: ICS Development I
- Guest Lecture 1: KFW
- Lecture 9: ICS Development II (Update: 20.12.2017)
- Lecture 10: ICS Development III (Update: 10.01.2018)
- Lecture 11: Database Management I
- Lecture 12: Database Management II (Update: 08.02.2018)
- Guest Lecture 2: Continental
- Lecture 13: Business Process Reengineering
- Lecture 14: Q&A
- Lecture 1: Einführung
-
-
-
-
-
-
-
- Exercise
- Exercise Application Scenario
- Exercise 1
- Exercise 1 - hints
- Exercise 2
- Exercise 2 - hints
- Exercise 3
- Exercise 3 - hints
- Exercise 4
- Exercise 4 - hints
- Exercise 5
- Exercise 5 - hints
- Exercise 6
- Exercise 6 - hints
-
-
-
-
-
-
-
- Mentorium
- Mentorium Application Scenario
- Mentorium 1
- Mentorium 1 - hints
- Mentorium 2
- Mentorium 2 - hints
- Mentorium 3
- Mentorium 3 - hints
- Mentorium 4
- Mentorium 4 - hints
- Mentorium 5
- Mentorium 5 - hints
- Mentorium 6
- Mentorium 6 - hints
- Mentorium
-
-
-
-
-
-
-
- Miscellaneous
- Dijkstra 1
- Dijkstra 1 - hints
- Dijkstra 2
- Dijkstra 2 - hints
- Dijkstra 3
- Dijkstra 3 - hints
- Dijkstra 4
- Dijkstra 4 - hints
- Dijkstra 5
- Dijkstra 5 - hints
- Miscellaneous
-
-
-
Exam
Information:
Previous Exams:
Seminar: Research on Augmented Reality
Basic Information
Type of Lecture: | Seminar |
---|---|
Course: | Master |
Hours/Week: | 2 |
Credit Points: | 6 |
Language: | English |
Term: | Winter 2017/2018 |
Lecturers: | |
Email: |
Content of the Course
Description:
This quote is a first sign that Augmented Reality (AR) has the potential to become the "next big thing" in our digital world. Current trends like Pokémon Go - the fastest adopted app of all time - show the actual potential AR has. At the moment, we stand at the beginning of the development which makes it important and highly interesting to investigate the topic from a scientific point of view.
Learning Goals
Basic understanding of the technological and economical evaluation of augmented reality and associated topics such as privacy (LGBWL-1) Communication of the obtained results in a clear and comprehensible manner (LGBWL-4)
Critical discussion of all results in the group (LGBWL-4)
Additional information for the course description:
Leistungsnachweis:
In order to successfully pass this module, you need to write a paper (60%) and make a presentation (40%). Each partial requirement needs to be passed with a grade of 4.0 or better.
Topics are in the area of:
Technological Development of AR
Evaluation of users’ perceptions and attitudes towards AR
AR adoption
AR use cases in different domains
Specific topics will be provided during the time before the registration. The methodologies will be presented and discussed in the group before the allocation of the topics. Students are still required to work through the methodology of their topic carefully.
UPDATE: As promised, here are 10 topics on AR.
Registration:
Instructions:
The number of participants is limited to 20. We will put up a registration on our Website. Registration starts at 2:00 p.m. on the 2nd of October 2017 and ends 2:00 p.m. on the 12th of October 2017. The first come - first served policy will be applied.
The course registration does not replace the examination registration, which is needed to finally get graded in this course. Examination registration and withdrawal takes place within the start of the semester in the registration week. Students will have to sign the registration list during the organizational meeting.
Project Seminar: Privacy in smartphone ecosystems
Basic Information
Type of Lecture: | Seminar |
---|---|
Course: | Master |
Hours/Week: | 10 |
Credit Points: | 12 |
Language: | English |
Term: | Winter 2017/2018 |
Lecturers: | |
Email: |
Content of the Course
Description:
Learning goals
§ Basic understanding of privacy and privacy enhancing technologies(LGBWL-1)
§ Basic understanding of privacy risk communication (LGBWL-1)
§ Basic understanding of technological and legal frameworks to prevent digital privacy threats to individuals (LGBWL-1)
Description:
Smartphone apps provide utility to their users by providing personalized and context-sensitive services. To achieve this, smartphone platforms provide those apps with access to a multiplicity of sensitive resources on the device e.g., device information, geolocation data, and user behavior information obtained from sensors. This capability however, poses important risks in regard to user privacy, especially considering that apps do not provide an appropriate level of transparency related to sensitive information processing.
The objective of this research project is to perform an extensive analysis of the state of the art in which different methodologies will be analyzed. Novel approaches will be investigated, and evaluated, specifically those emphasizing on understanding aspects such as context of app usage and purpose and functionality of apps when assessing their privacy properties.
Each project will be implemented by a group of students and will be focused on a specific perspective of the problem. Students focusing on the technical aspects are expected to have basic skills in
programming.
Students from Business informatics can get an additional task in order to reach the required 13 credits points.
The subtopics included in the project seminar are described below:
Topic 1: “Assessing privacy of smartphone apps through user comments”
This project will analyze state of the art approaches focused on assessing the security and privacy of smartphones apps using user (reviews)comments, and will develop a tool to support users in reporting privacy related issues of apps. The developed tool should then be validated through a user study.
Topic 2: “Understanding user’s privacy risk perception” (nontechnical)
This project will investigate the behavior of users regarding their perception of privacy risks and their willingness to report anomalous privacy related behavior of apps. This project is focused on the execution of a two phase user study. The user study has already been designed, therefore, the team is expected to collect and analyze the collected data.
Topic 3: “Assessing and comparing privacy risk of smartphone apps through the analysis of metadata”
This project will investigate the most common set of permission needed by apps within a number of categories and compare them according to theirprivacy risk/friendliness declared behavior.
Topic 4: “Privacy risk indicators for smartphone apps” (nontechnical)
The important aspect of this project is to clarify the psychological influences on the privacy indicators in smartphone apps (from both the application developers' and users' point of views).
Downloads
Kick-off slides: Introduction to the project seminar
Agenda:
The first one is the exam which covers one third of the final grade and takes place on January 10th 2018 (see Exam section of the project web page of the chair).
The second part is producing a report of the project seminar work (one third of the final grade) due on January 17th 2018
The third part is the presentation of results, which will take place on January 31st 2018 9:00-18:00 RuW 2.202 (one third of the final grade).
The first introductory presentation (kick-off) will take place on October 18th 2017 10:00-12:00 RuW room 2.202
Follow up meetings every two Mondays from October to December.
The final presentation will take place on January 31st 2018 9:00-18:00 RuW 2.202
Registration:
Maximum participants:
Exam:
Information:
Type of Examination
• written exam of 90 minutes duration (1/3)
• presentation of the project results (1/3)
• final report: summary of the project results 50-70 pages (1/3)
Each partial requirement needs to be passed with a grade of 4.0 or better.
Date: January 10th 2018
Time: 10:00 - 12:00
Room: RuW 2.202
Mobile Business I - Technology, Markets, Platforms, and Business Models
Basic Information
Type of Lecture: | Lecture with Exercise |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Winter 2017/2018 |
Lecturers: | |
Email: |
Content of the Course
Description:
The "Mobile Business" lecture series provides an introduction to technologies and economic principles defining these markets. Students will be qualified to identify success factors of mobile business models and to judge on possible application scenarios. Starting with the basics of mobile communication services, emphasis will be put on an analysis of the interaction between individuals and mobile devices / services.
This includes an historic overview across the development of mobile communication infrastructures, services, and protocols. Based on this, students will be qualified to identify possibilities and limitations of mobile business applications and business models, in order to consider the resulting opportunities and challenges when deriving the success factors. Characteristic attributes of mobile services, especially in contrast to electronic services, will be outlined and considered in an analysis of the current market environment for mobile business applications. Furthermore, traditional as well as emerging business models will be discussed. The course concludes with a presentation and discussion of several exemplary application scenarios. Students will be able to reflect on specific attributes of mobile applications, to analyse new scenarios, and to draw connections to traditional and established scenarios.
Agenda:
Time and Place:
Wednesday: 10.00 - 12.00, Hörsaalzentrum - HZ 7
Tuesday: 14.00 - 16.00, Hörsaalzentrum - HZ 7
Note: On 23rd of Jan: 14.00 - 16.00, Hörsaalzentrum - HZ 7
Exam
Information:
Privacy vs. Data: Business Models in the digital, mobile Economy
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | German |
Term: | Summer 2018 |
Lecturers: | |
Email: |
Content of the Course
Description:
Course Contents
The majority of business models in the digital economy heavily rely on the existence of user data in order to enable a value proposition for users. For instance, advertisers use data for the targeting of advertisements whereas others apply it for the personalisation of their service offerings. However, what is beneficial for businesses often becomes of a threat to the privacy of users – especially if highly sensitive data, such as location data, is collected and processed without their consent. Within the digital economy field, this course is going to explore the area of conflict between data-centric business models and user privacy. Since mobile devices accumulate a significant amount of personal data about individuals, the following topics will be covered and examined with a special focus from this „mobile“ perspective:
-
-
-
- Digital data-driven business models
- Means of data collection and its threat to privacy
- Privacy and Data Protection
- Basics of Information Security
- Interplay between data and privacy within digital business models
-
-
Further information: Official "Privacy vs. Data" Lecture QIS Page
Literature:
No initial readings are required for the course.
Agenda:
Time:
-
-
-
- Mon, 16.04.18, 9 am - 5 pm (Room 2.202, RuW building)
- Tue, 17.04.18, 9 am - 5 pm (Room 2.202, RuW building)
- Wed, 18.04.18, 9 am - 5 pm (Room 2.202, RuW building)
- Thu, 19.04.18, 9 am - 2 pm (Room 2.202, RuW building)
- Thu, 19.04.18, 2 pm - 5 pm (Room SH 0.107, Seminarhaus)
- Fri, 20.04.18, 9 am - 5 pm (Room 2.202, RuW building)
-
-
Note: The course starts every day "cum tempore" (ct.)
Downloads:
-
-
-
- Lecture 1: Introduction to Course and Organisation
- Lecture 2: Customer Touchpoints
- Lecture 3: Products & Services
- Lecture 4: Business Models & Innovation
- Lecture 5: Digital Business - Enablers & Platform Models
- Lecture 6: Big Four of Digital Business
- Lecture 7+8: Data Capital
- Lecture 9: Online Profiling Challenge
- Lecture 10+11: Privacy & Privacy Protection
- Lecture 12: From Data to Artificial Intelligence
- Lecture 13: Tradeoff between Privacy vs. Business Value
- Lecture 14: Course Conclusion & Takeaways
- Course Exercises
-
-
All downloads are password protected. Participating students will receive the password via e-mail to their student e-mail accounts.
Registration:
Exam
The written exam is held in German whereas students are allowed to answer in either German or English. For more information on the written exam, esp. the exam date, please refer to the examination office.