Matthias Söllner
YOU?
Author Swipe
View article: Time-Based State-Management of Hash-Based Signature CAs for VPN-Authentication
Time-Based State-Management of Hash-Based Signature CAs for VPN-Authentication Open
Advances in quantum computing necessitate migrating the entire technology stack to post-quantum cryptography. This includes IPsec-based VPN connection authentication. Although there is an RFC draft for post-quantum authentication in this s…
View article: ChatGPT and Beyond: Exploring the Responsible Use of Generative AI in the Workplace
ChatGPT and Beyond: Exploring the Responsible Use of Generative AI in the Workplace Open
View article: Personalized Coaching for Lifestyle Behavior Change through Large Language Models: A Qualitative Study
Personalized Coaching for Lifestyle Behavior Change through Large Language Models: A Qualitative Study Open
This paper investigates the impact of large language model (LLM)-based coaching interventions on enhancing physical activity and nutritional habits, following motivational interviewing guidelines. By exploring user perceptions through qual…
View article: Enhancing legal writing skills: The impact of formative feedback in a hybrid intelligence learning environment
Enhancing legal writing skills: The impact of formative feedback in a hybrid intelligence learning environment Open
Recent developments in artificial intelligence (AI) have significantly influenced educational technologies, reshaping the teaching and learning landscape. However, the notion of fully automating the teaching process remains contentious. Th…
View article: Mapping soft skills and further research directions for higher education: a bibliometric approach with structural topic modelling
Mapping soft skills and further research directions for higher education: a bibliometric approach with structural topic modelling Open
View article: Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices
Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices Open
The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems. Since attacks on such devices can also cause damage to people and machines, they must be properly s…
View article: Threat Analysis of Industrial Internet of Things Devices
Threat Analysis of Industrial Internet of Things Devices Open
As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet increases the risks for Industrial Control Systems. Therefore, a threat analysis is essential for these…
View article: A Secure and Privacy-Friendly Logging Scheme
A Secure and Privacy-Friendly Logging Scheme Open
Finding a robust security mechanism for audit trail logging has long been a poorly satisfied goal. There are many reasons for this. The most significant of these is that the audit trail is a highly sought after goal of attackers to ensure …
View article: Security of Cloud Services with Low-Performance Devices in Critical Infrastructures
Security of Cloud Services with Low-Performance Devices in Critical Infrastructures Open
As part of the Internet of Things (IoT) and Industry 4.0 Cloud services are increasingly interacting with low-performance devices that are used in automation. This results in security issues that will be presented in this paper. Particular…
View article: Employee acceptance of digital transformation strategies: A paradox perspective
Employee acceptance of digital transformation strategies: A paradox perspective Open
Digital transformation (DT) strategies often aim at innovating an organization's business models (BMs) and developing digital innovations. However, most of the DT strategies fail or result only in incremental innovation. Research predomina…
View article: Improving Students' Argumentation Skills Using Dynamic Machine-Learning-Based Modeling
Improving Students' Argumentation Skills Using Dynamic Machine-Learning-Based Modeling Open
View article: Behavior Change Techniques in Digital Interventions for Health Behavior Change: A Taxonomy of Popular Mobile Applications
Behavior Change Techniques in Digital Interventions for Health Behavior Change: A Taxonomy of Popular Mobile Applications Open
View article: Lawfulness by design – development and evaluation of lawful design patterns to consider legal requirements
Lawfulness by design – development and evaluation of lawful design patterns to consider legal requirements Open
New political objectives, emerging regulatory regimes for the digital sphere, and higher penalties for violations have intensified the pressure to develop lawful IT artefacts. As the adaptation of existing IT artefacts to new regulations c…
View article: Leveraging Low Code Development of Smart Personal Assistants: An Integrated Design Approach with the SPADE Method
Leveraging Low Code Development of Smart Personal Assistants: An Integrated Design Approach with the SPADE Method Open
Smart personal assistants (SPAs), such as Alexa for example, promise individualized user interactions owing to their varying interaction possibilities, knowledgeability, and human-like behaviors. To support the widespread adoption and use …
View article: Gamifying a Learning Management System: Narrative and Team Leaderboard in the Context of Effective Information Security Education
Gamifying a Learning Management System: Narrative and Team Leaderboard in the Context of Effective Information Security Education Open
Gamified learning management systems (LMS) can be effective in case game-design elements (GDE) address users’ motivation to engage with the topic and lower barriers to learning. In the context of Security Education, Training, and Awareness…
View article: Artificial Intelligence-Driven Convergence and its Moderating Effect on Multi-Source Trust Transfer
Artificial Intelligence-Driven Convergence and its Moderating Effect on Multi-Source Trust Transfer Open
AI-driven convergence describes how innovative products emerge from the interplay of embedded artificial intelligence (AI) in existing technologies. Trust transfer theory provides an excellent opportunity to deepen prevailing discussions a…
View article: How Virtuous are Virtual Influencers? – A Qualitative Analysis of Virtual Actors’ Virtues on Instagram
How Virtuous are Virtual Influencers? – A Qualitative Analysis of Virtual Actors’ Virtues on Instagram Open
Recently, virtual influencers (VIs) have become a more frequent alternative to human influencers (HIs). VIs can be described as non-human agents who behave in a human-like pattern. Big enterprises such as Prada, Porsche, Samsung, or Ikea h…
View article: Collaborative Work Practices for Management Education: Using Collaboration Engineering to Design a Reusable and Scalable Collaborative Learning Instructional Design
Collaborative Work Practices for Management Education: Using Collaboration Engineering to Design a Reusable and Scalable Collaborative Learning Instructional Design Open
Pandemics like COVID-19 highlight the needs and pitfalls of inclusive and equitable education in a digital society. IT-based instructional designs are needed to increase learners’ expertise, and to develop higher-order thinking skills. Ins…
View article: Designing Conversational Evaluation Tools
Designing Conversational Evaluation Tools Open
Conversational agents (CAs) provide opportunities for improving the interaction in evaluation surveys. To investigate if and how a user-centered conversational evaluation tool impacts users' response quality and their experience, we build …
View article: Towards Hybrid Intelligence Workflows: Integrating Interface Design and Scalable Deployment
Towards Hybrid Intelligence Workflows: Integrating Interface Design and Scalable Deployment Open
View article: Use IT again? Dynamic roles of habit, intention and their interaction on continued system use by individuals in utilitarian, volitional contexts
Use IT again? Dynamic roles of habit, intention and their interaction on continued system use by individuals in utilitarian, volitional contexts Open
This paper employs a longitudinal perspective to examine continued system use (CSU) by individuals in utilitarian, volitional contexts when alternative systems are present . We focus on two key behavioural antecedents of CSU - habit and co…
View article: Entwurfsmuster für die interdisziplinäre Gestaltung rechtsverträglicher Systeme
Entwurfsmuster für die interdisziplinäre Gestaltung rechtsverträglicher Systeme Open
Zusammenfassung Durch die Digitalisierung werden immer mehr Technologien entwickelt. Dabei gewinnt die soziotechnische Systementwicklung zunehmend an Bedeutung, in deren Rahmen nicht nur das technische System isoliert betrachtet wird, sond…
View article: Designing for Cultural Values: Towards a Theory-motivated Method for Culture-sensitive Adaptation of Information Systems
Designing for Cultural Values: Towards a Theory-motivated Method for Culture-sensitive Adaptation of Information Systems Open
To ensure that an intended target group accepts and uses an information system (IS) is a major challenge for service systems engineering and a key interest in IS research. On the one hand, individuals’ cultural values affect their willingn…
View article: Collaborative Work Practices for Management Education: Using Collaboration Engineering to Design a Reusable and Scalable Collaborative Learning Instructional Design
Collaborative Work Practices for Management Education: Using Collaboration Engineering to Design a Reusable and Scalable Collaborative Learning Instructional Design Open
View article: Understanding the Necessary Conditions of Multi-Source Trust Transfer in Artificial Intelligence
Understanding the Necessary Conditions of Multi-Source Trust Transfer in Artificial Intelligence Open
Trust transfer is a promising perspective on prevalent discussions about trust in AI-capable technologies. However, the convergence of AI with other technologies challenges existing theoretical assumptions. First, it remains unanswered whe…
View article: Introduction to the Minitrack on Applications of Human-AI Collaboration: Insights from Theory and Practice
Introduction to the Minitrack on Applications of Human-AI Collaboration: Insights from Theory and Practice Open
View article: Transferring Well-Performing Collaborative Work Practices with Parameterized Templates and Guidebooks: Empowering Subject Matter Experts for an Adaptation to Slightly Different Contexts
Transferring Well-Performing Collaborative Work Practices with Parameterized Templates and Guidebooks: Empowering Subject Matter Experts for an Adaptation to Slightly Different Contexts Open
View article: Use IT again? Dynamic roles of habit, intention and their interaction on continued system use by individuals in utilitarian, volitional contexts
Use IT again? Dynamic roles of habit, intention and their interaction on continued system use by individuals in utilitarian, volitional contexts Open
This paper employs a longitudinal perspective to examine continued system use (CSU) by individuals in utilitarian, volitional contexts when alternative systems are present . We focus on two key behavioural antecedents of CSU – habit and co…
View article: AI-based Argumentation Tutoring – A Novel System Class to Improve Learners’ Argumentation Skills
AI-based Argumentation Tutoring – A Novel System Class to Improve Learners’ Argumentation Skills Open
Argumentation is an omnipresent foundation of our daily communication and thinking. The ability to form convincing arguments is not only the fundament for persuading an audience of novel ideas but also plays a major role in strategic decis…
View article: Hybrid intelligence in business networks
Hybrid intelligence in business networks Open