Abschlussarbeiten

Informationen zu Abschlussarbeiten am Lehrstuhl Digital Communication and Transformation

Wir haben alle relevanten Informationen zur Anmeldung und zum Verfassen von Abschlussarbeiten in einem Moodle-Kurs zusammengefasst. Es ist absolut erforderlich, dass Sie sich die Informationen genau ansehen, bevor Sie mit uns in Kontakt treten.

Hier gehts zum Moodle Kurs für Abschlussarbeiten

Wir betreuen Abschlussarbeiten unter anderem zu den unten genannten Feldern. Im Folgenden finden Sie ausgeschriebene Themen sowie offene Themenfelder für Abschlussarbeiten. Sie können auch eigene Vorschläge für Themen machen. Grundsätzlich ist es auch möglich, Abschlussarbeiten in Kooperation mit Unternehmen zu schreiben.

Es wird erwartet, dass Sie im Vorfeld zu einem ersten Treffen bereits Gedanken über einen möglichen Schwerpunkt Ihrer Arbeit machen.

Ausgeschriebene Themen für Abschlussarbeiten

ICT and Social Connectedness in Virtual Organizations

Zielgruppe:

Master

Anforderungen:

Expert Interviews/Qualitative Methods

Inhalte:

Recent upheavals in the world of work have put many organizations in the position of forced virtualization, turning their extant working practices upside down. In parallel to this development, however, increasing numbers of virtual organizations surface in the IT sector and beyond. These organizations rely heavily on Information and Communication Technologies (ICT) and work fully remote, with many of their employees practicing digital nomadism. A supposed problem of such organizations is the formation and maintanance of social connectedness among its members. To better understand how virtual organizations approach this problem, this thesis aims to compile a case study of virtual organizations from different sectors. This could be underpinned by Social Identity Theory (or a similar lens). An alternative approach would be to approach only one case organization and using Grounded Theory Methodology.

Literatur:

  • Vecchi, A. 2019. “Global Work Arrangements and Talent Management in the Born-Virtual Organization: The Case of Automattic,” in Research Handbook of International Talent Management, pp. 144-185.
  • Richter, A., P. Heinrich, A. Stocker, and G. Schwabe, “Digital Work Design”, Business & Information Systems Engineering 60(3), 2018, pp. 259–264.
  • Asatiani, A., and Penttinen, E. 2019. “Constructing Continuities in Virtual Work Environments: A Multiple Case Study of Two Firms with Differing Degrees of Virtuality,” Information Systems Journal (29:2), pp. 484–513.
  • Wang, B., D. Schlagwein, D. Cecez-Kecmanovic, and M.C. Cahalane, “Beyond the Factory Paradigm: Digital Nomadism and the Digital Future(s) of Knowledge Work Post-COVID-19 Dialectical Reasoning for Envisioning the Future” Journal of the Association for Information Systems 21(6), 2020, pp. 1379-1401.

Kontakt:

Julian Marx

Revolution or Restoration - The (Immediate) Future of Knowledge Work

Zielgruppe:

Master

Anforderungen:

Expert Interviews/Qualitative Methods

Inhalte:

The digitization of the world of work affects individuals and organizations alike. Across industries, technological and structural progress offers new potential for individuals to re-organize their work independently of time and place. In this context, phenomena such as ‘digital nomadism’ or even 'corporate nomadism' have emerged. Large enterprises such as Microsoft or Siemens have abandoned large parts of their office buildings and go remote beyond the pandemic. Other firms require their knowledge workers to return to their offices. The aim of this thesis is to empirically examine how knowledge workers experience this disparity. Moreover, the research problem shall be viewed through a philosophical lens, i.e. by reviewing literature about other cases of "restoration" and the cumulative tradition of this concept.

Literatur:

  • Prester, J., D. Cecez-Kecmanovic, and D. Schlagwein, “Becoming a digital nomad: Identity emergence in the flow of practice”, 40th International Conference on Information Systems, ICIS 2019, (2019)
  • Asatiani, A., and Penttinen, E. 2019. “Constructing Continuities in Virtual Work Environments: A Multiple Case Study of Two Firms with Differing Degrees of Virtuality,” Information Systems Journal (29:2), pp. 484–513.
  • Schlagwein, D., and M.H. Jarrahi, “The Mobilities of Digital Work: The Case of Digital Nomadism”, ECIS 2020 Research-in-Progress Papers, 89, 2020.
  • Wang, B., D. Schlagwein, D. Cecez-Kecmanovic, and M.C. Cahalane, “Beyond the Factory Paradigm: Digital Nomadism and the Digital Future(s) of Knowledge Work Post-COVID-19 Dialectical Reasoning for Envisioning the Future” Journal of the Association for Information Systems 21(6), 2020, pp. 1379-1401.

Kontakt:

Julian Marx

Mit sciebo durch Studium und Forschung? Eine Untersuchung der Nutzungsintentionen und Erwartungen der Nutzer*innen an die hochschulcloud.nrw

Zielgruppe:

Bachelor

Anforderungen:

Statistische Grundkenntnisse in SPSS

Inhalte:

Die campuscloud.nrw oder auch kurz Sciebo (hergeleitet aus den beiden Wörtern „sciece“ und „box“) ist eine nicht-kommerzielle Cloud-Lösung, die speziell für Studium, Forschung und Lehre an Hochschulen entwickelt wurde (Meske et al., 2015). Sie stellt allen Studierenden und Mitarbeiter*innen aller Hochschulen in NRW mindestens 30 Gigabyte Speicherplatz zur Verfügung, um dort nicht nur die Archivierung von Daten zu ermöglichen, sondern auch die ortsunabhängige Zusammenarbeit in Forschungs- und Studierendenprojekten zu fördern (Vogl et al., 2016). Sciebo wird von den Universitäten Duisburg-Essen und Münster stetig weiterentwickelt um den wachsenden Anforderungen der Nutzer*innen gerecht zu werden und mit kommerziellen Cloud-Lösungen mithalten zu können (Wilms et al., 2017; Wilms et al., 2018). Um die Nutzungsintention und die Erwartungen der Nutzer*innen besser zu verstehen, wurde in diesem Rahmen eine Umfrage erstellt, die Nutzer*innen sowohl bei der Erstanmeldung, als auch nach sechsmonatiger Nutzung angezeigt wurde.

In dieser Bachelorarbeit soll untersucht werden, warum Studierende, Lehrende und andere Mitarbeiter*innen von Universitäten nicht-kommerzielle Cloud-Lösungen – wie sciebo – nutzen oder auch nicht nutzen. Dazu soll ein existierender sciebo-Datensatz mit Informationen zur Langzeitnutzungsintention analysiert werden. Auf Grundlage der Daten und unter Einbeziehung neuester Kenntnisse aus der Literatur (z.B. Hofeditz et al., 2020; Kim et al., 2015; Stieglitz et al., 2020), sollen konkrete Handlungsempfehlungen für Cloud-Entwickler abgeleitet werden. Zusätzlich soll ein Framework aufgestellt werden, welches die Langzeitnutzungsintentionen und die Erwartungen der Nutzer*innen beschreibt.

Literatur:

  • Hofeditz, L., Ross, B., Wilms, K., Rother, M., Rehwald, S. et al. (2020). How to Design a Research Data Management Platform? Technical, Organizational and Individual Perspectives and Their Relations. In: Yamamoto S., Mori H. (eds) Human Interface and the Management of Information. Interacting with Information. HCII 2020. Lecture Notes in Computer Science, vol 12185. Springer, Cham.
  • Kim, Y., and Zhang, P. 2015. “Understanding data sharing behaviors of STEM researchers: The roles of attitudes, norms, and data repositories,” Library & Information Science Research, (37:3), pp. 189–200 (doi: 10.1016/J.LISR.2015.04.006).
  • Vogl R., Angenent H., Rudolph D., Thoring A., Schild C., Stieglitz S. and Meske C. 2015. „sciebo – the Campuscloud for NRW”, European Journal of Higher Education IT (EJHEIT) (2:3), pp. 1-12. (Winner of the Elite Award for Excellence).
  • Stieglitz, S., Wilms, K., Mirbabaie, M., Hofeditz, L., Brenger, B., Lopez, A. & Rehwald, S. (2020). When are researchers willing to share their data? – Impacts of values and uncertainty on open data in academia. PLOS ONE, 15(7).
  • Vogl, R., Rudolph, D., Thoring, A., Angenent, H., Stieglitz, S., & Meske, C. (2016). How to build a cloud storage service for half a million users in higher education: Challenges met and solutions found. Proceedings of the Annual Hawaii International Conference on System Sciences, 2016–March, 5328–5337. https://doi.org/10.1109/HICSS.2016.658
  • Wilms, K., Brenger, B., López, A., Rehwald, S. (2018). Open Data in Higher Education – What Prevents Researchers from Sharing Research Data?. In: Proceedings of the 39th International Conference on Information Systems (ICIS).
  • Wilms, K., Meske, C., Stieglitz, S., Decker, H., Fröhlich, L., Jendrosch, N., Schaulies, S., Vogl, R. and Rudolph, D. (2017). Digital Transformation in Higher Education – New Cohorts, New Requirements?. In: Proceedings of the 23rd Americas Conference on Information Systems (AMCIS)

Kontakt:

Lennart Hofeditz

Exploring the Identity of Knowledge Workers in a Digital World

Zielgruppe:

Master

Anforderungen:

Qualitative Methods/Quantitative Methods

Inhalte:

The ongoing development of information technology (IT) enables organizations to introduce digital work as the new normal. Therefore, employees face new forms of work that might decrease personal interaction and increase interaction with IT. Nevertheless, these new ways of work entail that individuals cannot do their jobs with the same values and convictions as they are used to. Furthermore, location-independent work such as home office or digital (corporate) nomadism is on the rise in the digital landscape.

However, there is a constant change that might impact self- beliefs constituting professional identity at work, i.e., the perception of one's role in the workplace. Experiencing a new work situation that contradicts one's identity might lead to a loss of self-esteem and a threat to identity. As emerging technologies have changed the landscape and experiences of various professions, various touchpoints correlate with the identification at work. The digitization of the workplace emphasizes the demand for digital work as the new normal in organizations.

Thus, this thesis aims to explore novel factors that might influence a digital knowledge worker's identity at the workplace. To this end, several methods could be applied. Students may choose or connect qualitative and quantitative methods such as a systematic literature review, (Expert) Interviews, or online experiments with (digital) knowledge workers.

This thesis will need a solid theoretical foundation considering an identity perspective. To this end, possible theoretical foundations are (1) IT-Identity, (2) Organizational Identity, (3) Social Identity Theory, or (4) Sociomateriality.

Literatur:

  • Prester, J., D. Cecez-Kecmanovic, and D. Schlagwein, “Becoming a digital nomad: Identity emergence in the flow of practice”, 40th International Conference on Information Systems, ICIS 2019, (2019)
  • RMirbabaie, M., Stieglitz, S., Brünker, F., Hofeditz, L., Ross, B., & Frick, N. R. J. (2021). Understanding Collaboration with Virtual Assistants – The Role of Social Identity and the Extended Self. Business & Information Systems Engineering, 63, 21-37
  • Carter, M., Grover, V., & Clemson University. (2015). Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications. MISQuarterly, 39(4), 931–957. https://doi.org/10/gf5sg7
  • Carter, M., Petter, S., & Compeau, D. (2019). Identifying with IT in a Digital World. In ICIS 2019 Proceedings (p. 10). Presented at the International Conference on Information Systems, Munich.
  • Burke, P. J., & Stryker, S. (2016). Identity Theory: Progress in Relating the Two Strands. In New Directions in Identity Theory and Research (pp. 657–810). New York, NY: Oxford University Press.

Kontakt:

Felix Brünker

Digital Nudging to overcome hierarchy in organizations

Zielgruppe:

Master

Anforderungen:

Mixed Methods

Inhalte:

Hierarchies are omnipresent in organizations. They form the chain-of-command and sometimes provide the required stability in complex enterprise environments (Knight and Mehta 2017). (Hogg 2010) point out that given hierarchical power can alter people’s behavior. Despite positive intentions, it can easily lead to negative effects that hinder innovation (R. A. M. Mudambi 2011) and an organization's performance in general (Leavitt 2005; Meske et al. 2020). Digital nudging was suggested as a new way of guiding users towards to optimal decision. It seeks to optimize formerly negative decision-making processes and persuade the user towards the better decision (Weinmann et al. 2016). In the discipline of information systems, digital nudging was found to positively influence the user adoption (Gregor and Lee-Archer 2016; Thaler and Sunstein 2009) and effectiveness of application usage (Hummel and Maedche 2019). Nudging was applied in various contexts to verify positive influence on behavior (Meske and Potthoff 2017; Stieglitz et al. 2017). Yet, the application in the context of organizational hierarchy is missing. Research currently lacks the link between digital nudging in information systems and hierarchy in an organizational context. Thus, overcoming these hierarchical distances is both key and potentially benefiting from the new and subtle form of persuasion, digital nudging. First studies identified an accelerated effect of nudges when influenced by hierarchical power (Kretzer and Maedche 2018), however the opposite has not been elaborated on yet.
The study is a mixed-method study and has two parts. First, interviews with experts are conducted to find out what burdens exist with hierarchy. This will allow the validation of findings in literature that hierarchy forms an obstacle in the way towards an increased productivity in the digital age. In addition, the interviews should reveal what the examples and use cases are that hierarchy is impacting. This will contribute to the study by (1) verifying the hypothesis that hierarchy can be an inhibitor for productivity, (2) detailing out where the obstacles are (including their relative strength so prioritization is possible) and (3) what intentions of the interviewees are to overcome those obstacles. The interviews should be done with a target number of 12 participants conducted in an organization of at least around 100 employees. The second part is an experiment that will test a designed digital nudge, which was derived from the interviews. Depending on the interview outcomes, the strongest inhibitor for productivity should be chosen, preferably with backing from previous literature. This will allow the design based on the input from the interviews as well as previous research background and results. The nudge then should be tested at the same or another company in an automated way.

Literatur:

  • Gregor, S., and Lee-Archer, B. 2016. “The Digital Nudge in Social Security Administration,” International Social Security Review (69:3–4), pp. 63–83. (https://doi.org/10.1111/issr.12111).
  • Hogg, M. A. 2010. “Influence and Leadership,” in Handbook of Social Psychology, John Wiley & Sons, Inc. (https://doi.org/10.1002/9780470561119.socpsy002031).
  • Meske, C., Kissmer, T., and Stieglitz, S. 2020. “Bridging Formal Barriers in Digital Work Environments – Investigating Technology-Enabled Interactions across Organizational Hierarchies,” Telematics and Informatics (48), Elsevier Ltd. (https://doi.org/10.1016/j.tele.2020.101342).
  • Stieglitz, S., Potthoff, T., and Kißmer, T. 2017. “Digital Nudging Am Arbeitsplatz,” HMD Praxis Der Wirtschaftsinformatik, Springer Fachmedien Wiesbaden, pp. 1–12. (https://doi.org/10.1365/s40702-017-0367-5).

Kontakt:

Tobias Kissmer

Fake News on cross-platform social media

Target Group:

Bachelor/Master

Requirements:

Social Media Analytics, Data Mining, Machine Learning

Contents:

In recent years, social media has become a source to spread fake news, increasing mainly during the crisis like COVID-19 or events like an election. The dynamic of the spread of fake news is unpredictable. The trends of flow are different across multiple social media platform. In this thesis, the student can use labelled data from multiple platforms and analyse the content of the social media post and user behaviour. The thesis could aim to analyse the content similarity, network analysis and exchange of information across different social media platforms. The data is gathered using the AMUSED framework.
The thesis can be supervised and written in English only.

Literature:

  • Shahi GK, Dirkson A, Majchrzak TA. An exploratory study of covid-19 misinformation on twitter. arXiv preprint arXiv:2005.05710. 2020 May 12.
  • Shahi GK, Nandini D. FakeCovid--A Multilingual Cross-domain Fact Check News Dataset for COVID-19. arXiv preprint arXiv:2006.11343. 2020 Jun 19.
  • Kishore Shahi G. AMUSED: An Annotation Framework of Multi-modal Social Media Data. arXiv e-prints. 2020 Oct:arXiv-2010.

Contact:

Gautam Kishore Shahi

Trust-Worthiness of the fact-checking websites

Target Group:

Bachelor/Master

Requirements:

Social Media Analytics

Contents:

There is an increasing amount of fake news in the media, social media, and other web sources. In recent years much research has been done for fake news detection and debunking of fake news. In the last two decades, there is a tremendous increase in the spread of misinformation, leading to an escalation in the number of fact-checking institutions. Fact-checking websites can help to investigate claims and determine whether the information used in the articles is true or not. But the quality of the fact-checking websites is questionable. More than 213 fact-checking websites are working in 40+ languages. There is no standard protocol for fact-checking websites, and they do not publish their articles in a standard format which generates several conflicts. So there is a need to investigate the reliability of the fact-checked content. In this thesis, the aim is to analyse the fact-checked content from multiple sources and create fact-checking websites' reliability.

The thesis can be supervised and written in English only.

Literature:

  • Shahi GK, Dirkson A, Majchrzak TA. An exploratory study of covid-19 misinformation on twitter. arXiv preprint arXiv:2005.05710. 2020 May 12.
  • Shahi GK, Nandini D. FakeCovid--A Multilingual Cross-domain Fact Check News Dataset for COVID-19. arXiv preprint arXiv:2006.11343. 2020 Jun 19.
  • Kishore Shahi G. AMUSED: An Annotation Framework of Multi-modal Social Media Data. arXiv e-prints. 2020 Oct:arXiv-2010.
  • Shahi GK, Stieglitz S. FactCred: Credibility Assessment of Fact-Checking Websites.

Contact:

Gautam Kishore Shahi

Anti-Vaccination Infodemic: The role of counter movements in the discourse about the Covid-19 vaccination campaigns

Target Group:

Master

Requirements:

Social Media Analytics, Multimethod Approach (e.g. Social Network Analysis and Content / Discourse Analysis)

Contents:

Since February 2020, the world has faced the most serious pandemic since the Spanish flu. All over the world, people are urged to take protective measures: Keep your distance, follow the sneeze etiquette, wear a mask and wash your hands regularly. Some countries have also instituted stricter rules, such as closing various businesses and institutions or banning private meetings with people outside one's household (WHO, 2021).

A major hope to defeat the pandemic in the long term is the implementation of widespread vaccination campaigns. To this end, the production of vaccines has been promoted worldwide and central vaccination centers have been established.

While many citizens are eager to be vaccinated against Covid-19, there are other voices in the population that are very critical of vaccination and protective measures (Johnson et al. 2020). As the "Querdenker" movement in Germany has shown, the movement opposing pandemic response measures is very inhomogeneous. At their events the movement gathers people with clearly right- wing ideas, spiritualists who associate themselves with anthroposophical movements, among others, but also citizens with existential fears (Nachtwey et al. 2020).

In this master thesis it will be your task to analyse the online discourse on (anti-)vaccination campaigns. The aim is to get a more detailed picture of the camp of the “Querdenker” and anti- vaccination supporters and to show their connections and differences to each other. Most of the studies looking at anti-vaccination online movementes have been conducted with a special focus on the USA (Burki 2020, Germani et al. 2021). Of particular interest for this master thesis, since neglected in the discussion so far, are the Left-wing/Spiritual/Antroposophical movements (DW, 2020).

For your final project, you will engage with a social media dataset on the Covid-19 pandemic. The chair has a large dataset on Covid-19, but it is also possible to collect a more concrete dataset after your research in which certain identifiable hashtags, keywords, and accounts are present. In addition to the Twitter network, it is also possible to use a YouTube data set. Regarding the applied method you are free to combine different methods as a multi-method approach. Possible methods that you can combine with each other are e.g. a social network analysis, content analysis/discourse analysis, identification of opinion leaders.

The goal of your thesis will be to gain an overview of which actors contribute to anti-vaccine campaigns, which groups and opinion leaders do belong to this countermovement and do the members share a common group identity? Is the movement sharing a same goal and do they share a collective action network? How do they engage in the discourse on the vaccination campaigns in Germany?

Theoretical foundations for this study can be found especially in the field of online activism and collective action and identity, interesting starting points for reading can be (Mirbabaie et al. 2021, Leong et al. 2019, Bonilla and Rosa 2015, Kavada, 2015) The results of this study are of high importance from a scientific and societal perspective, as they can help to find out who controls anti-vaccination campaigns, what motivations are behind them and thus provide a starting point to protect the population from this dangerous misinformation.

Literature:

  • Anastasia Kavada (2015) Creating the collective: social media, the Occupy Movement and its constitution as a collective actor, Information, Communication & Society, 18:8, 872-886, DOI: 10.1080/1369118X.2015.1043318
  • BONILLA, Y. and ROSA, J. (2015), #Ferguson: Digital protest, hashtag ethnography, and the racial politics of social media in the United States. American Ethnologist, 42: 4-17. https://doi.org/10.1111/amet.12112
  • Carmen Leong, Shan L. Pan, Shamshul Bahri & Ali Fauzi (2019) Social media empowerment in social movements: power activation and power accrual in digital activism, European Journal of Information Systems, 28:2, 173-204, DOI: 10.1080/0960085X.2018.1512944
  • Milad Mirbabaie, Felix Brünker, Magdalena Wischnewski, and Judith Meinert. 2021. The Development of Connective Action during Social Movements on Social Media. Trans. Soc. Comput. 4, 1, Article 3 (April 2021), 21 pages. DOI:https://doi.org/10.1145/3446981
  • Talha Burki, The online anti-vaccine movement in the age of COVID-19, The Lancet Digital Health, Volume 2, Issue 10, 2020, Pages e504-e505, https://doi.org/10.1016/S2589-7500(20)30227-2.
  • Germani F, Biller-Andorno N (2021)The anti-vaccination infodemicon socialmedia: A behavioralanalysis.PLoSONE 16(3):e0247642.https://doi.org/10.1371/journal.pone.0247642
  • Johnson, N.F., Velásquez, N., Restrepo, N.J. et al. The online competition between pro- and anti- vaccination views. Nature 582, 230–233 (2020). https://doi.org/10.1038/s41586-020-2281-1
  • WHO (2021) https://covid19.who.int/
  • Deutsche Welle (2020) https://www.dw.com/en/meet-germanys-querdenker-covid-protest- movement/a-57049985
  • Nachtwey O., Schäfer, R., Frei N. (2020) Politische Soziologie Coronaproteste. Preprint. https://doi.org/10.31235/osf.io/zyp3f

Contact:

Anna-Katharina Jung

Identifying the workload of end-users to acquire information on how to avoid and handle cyber threats

Target Group:

Bachelor

Requirements:

Online Experiment / Onlinestudy

Contents:

In our daily lives, we are reliant on technological devices for various reasons, starting from entertainment to performing work-related activities. These technological devices are vulnerable to cyber-attacks due to a majority of them having access to the internet. This access allows individuals with the necessary know-how and malicious intent to access these devices and to cause harm. A cyber-attack could for example result in personal information of the device owner being stolen, the user being spied on, or the device being made unusable. Through the ongoing Covid-19 Pandemic a significant number of individuals started working from home either using devices provided by their employer or using their own devices. This leads to a shift in some of the responsibility in regard to making sure that work-related devices are not breached and work-related information is not being accessed by unauthorized individuals.

Individuals that are not well versed in cybersecurity might be overwhelmed with such a situation. These individuals are faced with questions such as how do I reduce the chances of becoming a victim of such an attack or what do I have to do if I fell victim to such an attack.

Thus, the aim of this work is to examine the self-assessed workload of individuals to acquire such information. For this purpose, an (online) experiment is to be conducted in which participants are surveyed on their assessment of performing this task on multiple dimensions including effort and mental demand.

The goal of the work is to gain knowledge about how much workload individuals attribute to acquiring information in regard to how to behave once they fall victim to a cyber-attack and how to reduce the chances of falling victim to such a situation.

Literature:

  • Dykstra, J., & Paul, C. L. (2018). Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations. In 11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18).
  • A. Alahmari and B. Duncan, "Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence," 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020, pp. 1-5, doi: 10.1109/CyberSA49311.2020.9139638.

Contact:

Ali Sercan Basyurt

How to effectively inform about cyber threats.

Target Group:

Bachelor

Requirements:

Online Experiment / Onlinestudy

Contents:

Over the years technological devices have become intertwined with our daily lives and activities to a degree that it is almost impossible to separate them from our lives. We use them to entertain us, to connect with each other, to perform our work, and even in some cases to survive.

Not only are we dependent on these technologies we also provide them with our private information sometimes actively by giving information such as our interests or dislikes to these devices but sometimes even indirectly by being tracked through sensors of said devices or by them tracking our activities.

A significant number of these technological devices such as smartphones, notebooks, virtual assistant AI devices (e.g., Amazon Echo, etc.), televisions, and more recently even cars are connected to the internet. This leads to them being accessible remotely which also means that these devices are vulnerable to cyber-attacks. As a result of such an attack valuable information could be stolen or worse the devices could be tempered with.

Computer emergency response teams (CERT) are teams tasked with handling cybersecurity incidents. The scope of their work includes the detection and analysis of threats as well as the communication and coordination with different groups of affected people. They are confronted with questions such as how should a message warning the public about a cyber threat be formulated in order for it to be as effective as possible and which information should be provided to the public for the message to be effective.

This work thus aims to examine how the general population can be most effectively informed about cyber threats that might affect them. For this purpose, an (online) experiment is to be conducted in which participants surveyed on how, where, and which type of information they would prefer as recommendations for action by CERTs to handle these crises.

The goal of the work is to gain knowledge about how recommendations for action by experts need to be presented to the population to deal with them in an effective manner.

Literature:

  • J. R. C. Nurse, S. Creese, M. Goldsmith, and K. Lamberts, "Trustworthy and effective communication of cybersecurity risks: A review," 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2011, pp. 60-68, doi: 10.1109/STAST.2011.6059257.
  • Zou, Y., Danino, S., Sun, K., & Schaub, F. (2019, May). YouMight'Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (pp. 1-14).
  • Y. Zou and F. Schaub, "Beyond Mandatory: Making Data Breach Notifications Useful for Consumers," in IEEE Security & Privacy, vol. 17, no. 2, pp. 67-72, March-April 2019, doi: 10.1109/MSEC.2019.2897834.

Contact:

Ali Sercan Basyurt

Giving advice on cyber threats

Target Group:

Master

Requirements:

Online Experiment / Online study

Contents:

Nowadays we have adopted a variety of technological devices into our lives that we use on a daily basis. Among these technologies are numerous devices that are connected to the internet. This makes them vulnerable to cyber-attacks from individuals with malicious intent.

In order for end-users of these technologies to handle such threats, they need to be informed about current cyber threats and how to handle them in case they become a victim of such an attack.

Therefore, it is important to understand the behavior of the end user in seeking out such information and the factors that influence the end-users behavioral intention to follow or ignore warnings in regard to cyber threats when they are presented with information about current threats.

Thus, this work aims at identifying such factors and their information-seeking behaviors through an (online) experiment where participants are surveyed in regard to their behavioral intention when presented with such information and how they seek out such information.

The aim of this work is to acquire insights into factors that might influence the end-user to act appropriately when experts provide them with information about cyber threats and how to handle them.

Literature:

  • Kovačević, A., Putnik, N., & Tošković, O. (2020). Factors Related to Cyber Security Behavior. IEEE Access, 8, 125140-125148.
  • Nicholson, J., Coventry, L., & Briggs, P. (2019, May). " If It's Important It Will Be A Headline" Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (pp. 1-11).
  • Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. computers & security, 73, 345-358.

Contact:

Ali Sercan Basyurt

Effektive Nutzung der Virtual Reality App Spatial für Kollaboration im Unternehmenskontext

Zielgruppe:

Master

Anforderungen:

Interviews (evtl. auch in englischer Sprache), hohes Engagement während der Rekrutierung von Interviewpartnern

Inhalte:

Plattformen für die Zusammenarbeit in virtueller Realität (VR) ermöglichen es Teammitgliedern, ein natürliches Gespräch zu führen, nonverbale Hinweise wahrzunehmen und in einer ablenkungsfreien Umgebung zusammenzuarbeiten. Die VR-Kollaborationsplattform Spatial hat sich als äußerst erfolgreich erwiesen, insbesondere seit der weit verbreiteten Home-Office-Regelung während der COVID-19-Pandemie. Viele große Unternehmen wie LARVOL, Mattel, Pfizer, BNP Paribas, Ford, Nestlé Purina und Enel SpA nutzen Spatial für die Zusammenarbeit und interaktive Meetings. So hat beispielsweise das Unternehmen LARVOL seinen Hauptsitz nach Spatial verlegt, während Unternehmen wie Mattel und Ford interdisziplinäre Teams aus der ganzen Welt in Spatial-Projekträume bringen, um gemeinsam neue Produkte zu entwerfen.

Nichtsdestotrotz sind kollaborative Meetings in VR immer noch eher die Ausnahme als die Regel, und es bleibt die offene Frage, wie VR effektiv genutzt werden kann, vor allem angesichts des breiten Spektrums anderer verfügbarer Meeting-Optionen wie Face-to-Face-Meetings, Telefonate und Videokonferenz-Tools. Ziel dieser Arbeit ist es daher, zu verstehen, was effektives Nutzungsverhalten in Bezug auf VR für die Zusammenarbeit im Unternehmenskontext ausmacht. Die Literatur zur Theorie der effektiven Nutzung und des Affordance-Netzwerk-Ansatzes als methodischer Schritt-für-Schritt-Ansatz zum Verständnis von effektivem Nutzungsverhalten dient dabei als guter Ausgangspunkt für die Auseinandersetzung mit dem Thema.

Um Erkenntnisse zu den Forschungsfragen zu gewinnen, sollen Interviews mit Beschäftigten geführt werden, die Spatial für die Zusammenarbeit nutzen. Da die Zielgruppe nicht einfach für Interviews zu rekrutieren ist, ist eine hohe Begeisterung für das Thema und Engagement während des Rekrutierungsprozesses erforderlich. Außerdem ist eine gewisse Sicherheit in der englischen Sprache erforderlich, um Interviews mit Beschäftigen aus internationalen Unternehmen führen zu können. Ein guter Anfang könnte die Kontaktaufnahme mit der Firma Spatial selbst und den oben genannten Unternehmen sein, die Spatial bereits einsetzen. Während der Bearbeitung besteht die Möglichkeit, ein Oculus-Quest-Headset vom Lehrstuhl auszuleihen, um Spatial (und andere Apps) selbst auszuprobieren und sich mit Interviewpartnern in ihrer Spatial-Umgebung zu treffen, um einen besseren Eindruck davon zu bekommen, wie Unternehmen diese Umgebung nutzen.

Literatur:

  • Spatial (2020). LARVOL Uses Spatial As Their Virtual Headquarters. https://spatial.io/blog/larvol-vr-office
  • Burton-Jones, A., & Grange, C. (2013). From Use to Effective Use: A Representation Theory Perspective. Information Systems Research, 24(3), 632–658.
  • Burton-Jones, A., & Volkoff, O. (2017). How can we develop contextualized theories of effective use? A demonstration in the context of community-care electronic health records. Information Systems Research, 28(3), 468–489.
  • Fromm, J., Mirbabaie, M. & Stieglitz, S. (2020). The Effects of Virtual Reality Affordances and Constraints on Negative Group Effects during Brainstorming Sessions. In Proceedings of the 15th International Conference on Wirtschaftsinformatik (WI), Potsdam, Germany.

Kontakt:

Jennifer Fromm

Wie Akteure mit gegensätzlichen Zielen die Social Media Aktivitäten von Fridays for Future beeinflussen

Zielgruppe:

Bachelor / Master

Anforderungen:

Interviews

Inhalte:

Fridays for Future ist eine Umweltbewegung, die erfolgreich soziale Medien nutzt, um über Umweltthemen aufzuklären, sich zu koordinieren und Menschen für Proteste zu mobilisieren. In kürzlich durchgeführten Interviews konnten wir uns ein gutes Bild davon machen, wie Fridays for Future soziale Medien nutzt, um die Ziele der Bewegung zu erreichen. Während dieser Interviews kam oft zur Sprache, dass nicht nur die Social-Media-Aktivitäten der Bewegung selbst wichtig sind. Vielmehr warfen die Aktivist:innen das Problem auf, dass sie sich mit den Social-Media-Aktivitäten von Akteuren auseinandersetzen müssen, die andere Ziele als die der Bewegung verfolgen. Als Beispiele wurden Fridays for Hubraum oder Privatpersonen mit rechtsextremen Ansichten genannt. Fridays for Future musste sich mit Akteuren auseinandersetzen, die versuchten, in ihre WhatsApp-Gruppen einzudringen, um rechtsextremes Gedankengut zu verbreiten, die sie persönlich über Direktnachrichten auf Facebook angriffen oder, die einen koordinierten Shitstorm organisierten.

Trotz der Möglichkeiten, die soziale Medien für soziale Bewegungen bieten, insbesondere in Zeiten der Pandemie, können die Aktivitäten dieser Akteure Fridays for Future bei der Erreichung ihrer Bewegungsziele einschränken. Ziel dieser Arbeit ist es, genauer zu untersuchen, welche Auswirkungen die Aktivitäten von Akteuren mit konträren Zielen auf die Social-Media-Nutzung von Fridays for Future haben und wie die Bewegung ihr Nutzungsverhalten anpasst, um den Auswirkungen entgegenzuwirken und ihre Ziele dennoch zu erreichen. Zur Erforschung des Themas soll die Technology Affordances and Constraints Theory herangezogen ewrden. Der Grundgedanke dieser Theorie ist, dass Technologien wie soziale Medien einerseits Handlungsmöglichkeiten (Affordances) bieten, andererseits aber auch Einschränkungen, die Akteure an der Erreichung ihrer Ziele hindern. Bisherige Forschung konzentrierte sich bisher hauptsächlich darauf, wie ein einzelnes Individuum, eine Gruppe oder eine Organisation solche Handlungsmöglichkeiten und Einschränkungen wahrnimmt und nutzt / umgeht, während das Zusammenspiel mit anderen Akteuren Möglichkeiten zur Erweiterung der Theorie bieten könnte.

Die Forschungsfragen könnten durch zusätzliche Interviews mit Fridays for Future-Aktivist:innen beantwortet werden, die sich detaillierter mit diesem Thema befassen. Die Transkripte der bereits durchgeführten Interviews können vom Lehrstuhl zur Verfügung gestellt werden und als Ausgangspunkt dienen, um ins Thema einzusteigen und Fragen in Bezug auf Akteure mit konträren Zielen zu identifizieren, die in der Arbeit vertieft werden könnten.

Literatur:

  • Pozzi, G., Pigni, F., & Vitari, C. (2014). Affordance theory in the IS discipline: A review and synthesis of the literature. Proceedings of the Americas Conference on Information Systems.
  • Majchrzak, A., & Markus, M. L. (2012). Technology affordances and constraints in management information systems. In E. Kessler (Ed.), Encyclopedia of Management Theory (pp. 832-836), Sage.
  • Harindranath, G., Bernroider, E., & Kamel, S. (2015). Social media and social transformation movements: The role of affordances and platforms. Proceedings of the European Conference on Information Systems.
  • Dumitrica, D., & Felt, M. (2019). Mediated grassroots collective action: Negotiating barriers of digital activism. Information, Communication & Society, 23(13), 1821–1837.
  • Sergeeva, A., Huysman, M., Soekijad, M., & van den Hooff, B. (2013). “No user is an island” onlookers, affordances, and the impact of mobile devices on work practices. Proceedings of the International Conference on Information Systems.

Kontakt:

Jennifer Fromm

Die Enstehung von digitalen Desinformationskampagnen auf sozialen Medien während der COVID-19 Pandemie

Zielgruppe:

Bachelor / Master

Anforderungen:

Systematisches Literatur Review, Social Media Analytics

Inhalte:

In Krisensituationen wie der COVID-19 Pandemie benötigt die Bevölkerung verlässliche Informationen, um die Lage einzuschätzen und angemessen handeln zu können. Um schnell an Informationen zu gelangen, wenden sich viele verstärkt den sozialen Medien zu. Fake News, Verschwörungstheorien und digitale Desinformationskampagnen erschweren dort jedoch die Meinungsbildung. Es zirkulieren Fake News, die dazu führen, dass Schutzmaßnahmen nicht umgesetzt und Menschenleben gefährdet werden (z.B. Händewaschen hilft nicht). Außerdem kursieren Verschwörungstheorien, die dem Zusammenhalt unserer Gesellschaft schaden und soziale Unruhen auslösen können (z.B. Theorien über bestimmte ethnische oder religiöse Gruppen als Ursprung des Virus).

Die Europäische Kommission warnt außerdem davor, dass bestimmte Personen existierende Falschinformationen gezielt instrumentalisieren. Mit digitalen Desinformationskampagnen versuchen etwa ausländische Akteure, die demokratische Debatte zu untergraben, die soziale Polarisierung zu verschärfen und ihr eigenes Image in der Krise zu verbessern. Durch die koordinierte Verbreitung von Desinformationen – häufig unter Einsatz von sozialen Bots – sind diese Akteure in der Lage, eine künstliche Verzerrung des Meinungsbilds auf sozialen Medien herbeizuführen. Digitale Desinformationskampagnen können dazu führen, dass die Bevölkerung das Vertrauen in sicherheitsrelevante Akteure verliert und Pandemieschutzmaßnahmen nicht mehr einhält.

Das Ziel dieser Arbeit besteht deshalb darin, ein besseres Verständnis für die Entstehung von digitalen Desinformationskampagnen zu erlangen, um Präventionsmaßnahmen für Behörden und Organisationen mit Sicherheitsaufgaben daraus abzuleiten. Im Rahmen eines systematischen Literatur Reviews soll in einem ersten Schritt der aktuelle Forschungsstand zur Entstehung von digitalen Desinformationskampagnen erfasst werden. Ergänzend dazu sollen mit Hilfe von Social Media Analytics weitere Erkenntnisse zur Entstehung von realen Desinformationskampagnen während der COVID-19 Pandemie gewonnen werden.

Literatur:

  • Karlova, N. A. & Fisher, K. E. (2013). A Social Diffusion Model of Misinformation and Disinformation for Understanding Human Information Behaviour, Information Research (18:1).
  • Rofrío, D. et al. (2019). Presidential Elections in Ecuador: Bot Presence in Twitter, Proceedings of the International Conference on eDemocracy & eGovernment.
  • Shao, C., Ciampaglia, G. L., Varol, O., Yang, K.-C., Flammini, A., & Menczer, F. (2018). The spread of low-credibility content by social bots. Nature Communications, 9(1), 1-9.
  • Tran, T., Valecha, R., Rad, P. & Rao, H. R. (2020). An investigation of misinformation harms related to social media during humanitarian crises. Communications in Computer and Information Science, 167–181.
  • Varol, O., & Uluturk, I. (2018). Deception strategies and threats for online discussions. First Monday, 23(5-7).

Kontakt:

Jennifer Fromm

Themenfelder für Abschlussarbeiten

Social-Media-Analytics

  • Automatisierte Kommunikation in Social Media -- Kontakt
  • (Digitale) Wissenschaftskommunikation -- Kontakt
  • Echokammern und Filterblasen in sozialen Netzwerken -- Kontakt

Communication and Collaboration

  • Conversational Agents in virtueller Kollaboration -- Kontakt & Kontakt
  • Einsatz und Nutzung von Künstlicher Intelligenz (in Unternehmen) -- Kontakt 
  • Digitale Ethik -- Kontakt & Kontakt
  • Forschungsdatenmanagement und Open Science in der Cloud -- Kontakt