Refine
Year of publication
- 2020 (52) (remove)
Document Type
- Article (52) (remove)
Has Fulltext
- no (52) (remove)
Keywords
- Arzneimittel (1)
- BSM (1)
- Bodily sensation maps (1)
- Depression (1)
- EZB (1)
- Emotion induction (1)
- Energiewende (1)
- Europäische Zentralbank (1)
- Geldpolitik (1)
- Hydrogen evolution reaction (1)
Institute
- Wirtschaftsrecht (19)
- Elektrotechnik und angewandte Naturwissenschaften (4)
- Westfälisches Energieinstitut (4)
- Institut für biologische und chemische Informatik (3)
- Wirtschaft Gelsenkirchen (3)
- Wirtschaft und Informationstechnik Bocholt (2)
- Informatik und Kommunikation (1)
- Westfälisches Institut für Gesundheit (1)
Unternehmen setzen zunehmend auf KI oder planen, dies künftig zu tun. Doch die große Euphorie bleibt in der Industrie aus guten Gründen noch aus. Zum einen fehlt die kritische Masse an Einsatzszenarien, weswegen Unsicherheit besteht, welche Handlungsfelder nachhaltige Erfolge versprechen. Zum anderen ist die Frage der Zuverlässigkeit zu klären, also wie valide KI-generierte Ergebnisse wirklich sind. Im Folgenden geht es um die Mechanismen, die gute Ergebnisse sicherstellen helfen.
Digitalisierung gilt als die Basis für das Wohlergehen der modernen und globalen Informations- und Wissensgesellschaft. Während sie immer mehr Fahrt aufnimmt, zeigt sie gleichzeitig immer deutlicher auch ihre Kehrseite: Altbewährte Verteidigungssysteme gegen Cyberangriffe versagen zunehmend. Die Ursachen werden inzwischen sehr klar: Der klassische Perimeter löst sich dank Cloud und Mobility auf, die Angriffsflächen werden dank unzähliger neu im Netz hinzugekommener Dinge exponentiell größer, und Abwehrmaßnahmen auf herkömmliche Weise dank einer zerklüfteten, kaum integrierten Security-Landschaft immer komplexer. Zeit, die Erfolgsfaktoren der Digitalisierung zu erkennen und für das eigene Unternehmen umzusetzen. Dabei helfen vier grundsätzliche Cybersicherheitsstrategien.
A systematic method for obtaining a novel electrode structure based on PtCoMn ternary alloy catalyst supported on graphitic carbon nanofibers (CNF) for hydrogen evolution reaction (HER) in acidic media is proposed. Ternary alloy nanoparticles (Co0.6Mn0.4 Pt), with a mean crystallite diameter under 10 nm, were electrodeposited onto a graphitic support material using a two-step pulsed deposition technique. Initially, a surface functionalisation of the carbon nanofibers is performed with the aid of oxygen plasma. Subsequently, a short galvanostatic pulse electrodeposition technique is applied. It has been demonstrated that, if pulsing current is employed, compositionally controlled PtCoMn catalysts can be achieved. Variations of metal concentration ratios in the electrolyte and main deposition parameters, such as current density and pulse shape, led to electrodes with relevant catalytic activity towards HER. The samples were further characterised using several physico-chemical methods to reveal their morphology, structure, chemical and electrochemical properties. X-ray diffraction confirms the PtCoMn alloy formation on the graphitic support and energy dispersive X-ray spectroscopy highlights the presence of the three metallic components from the alloy structure. The preliminary tests regarding the electrocatalytic activity of the developed electrodes display promising results compared to commercial Pt/C catalysts. The PtCoMn/CNF electrode exhibits a decrease in hydrogen evolution overpotential of about 250 mV at 40 mA cm−2 in acidic solution (0.5 M H2SO4) when compared to similar platinum based electrodes (Pt/CNF) and a Tafel slope of around 120 mV dec−1, indicating that HER takes place under the Volmer-Heyrovsky mechanism.
Synergien
(2020)
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Dank der neuen Datenschutzgrundverordnung zum Schutz der Privatsphäre konnte der Sammelwahn einiger Dienstleister bereits abgemildert werden. Dennoch zeichnet sich eine immer stärkere Zentralisierung und Monopolisierung von Datenhaltern und Dienstleistern ab, vor allem in Form großer USA- oder Asien-basierter Technologieunternehmen. Im Umgang mit den eigenen Daten schreiten nur wenige Menschen bewusst zur Tat, sehen meist nur den angepriesenen Vorteil und nicht die möglichen negativen Konsequenzen für ihre Privatsphäre. Eine Self-Sovereign Identity (SSI) könnte Basis für einen fairen Datenaustausch innerhalb der Smart Economy sein und die Integration auch kleinerer Unternehmen in eine offene Infrastruktur unterstützen.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
Nerzzucht mit Hindernissen – oder: alle juristischen Auslegungskriterien plus Analogie in einem Fall
(2020)
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
Leadership Beyond Narcissism: On the Role of Compassionate Love as Antecedent of Servant Leadership
(2020)
While we already know a lot about the outcomes and boundary conditions of servant leadership, there is still a need for research on its antecedents. Building on the theory of purposeful work behavior and further theorizing by van Dierendonck and Patterson (2015), we examine if leaders’ propensity for compassionate love will evoke servant leadership behavior. At the same time, we contrast compassionate love to leaders’ narcissism as psychological counterpart to compassionate love, because narcissism is not associated with leader effectiveness, but with leader emergence instead. We collected data from 170 leader-follower-dyads in a field study in Germany, while measuring leaders’ compassionate love and narcissism, and followers’ perceptions of servant leadership. We found a positive association between leaders’ compassionate love and servant leadership behavior, while narcissism was negatively associated with servant leadership. Theoretical and practical implications, as well as pathways for future research are discussed.
We study the impact of underdamped intramolecular vibrational modes on the efficiency of the excitation energy transfer in a dimer in which each state is coupled to its own underdamped vibrational mode and, in addition, to a continuous background of environmental modes. For this, we use the numerically exact hierarchy equation of motion approach. We determine the quantum yield and the transfer time in dependence of the vibronic coupling strength, and in dependence of the damping of the incoherent background. Moreover, we tune the vibrational frequencies out of resonance with the excitonic energy gap. We show that the quantum yield is enhanced by up to 10% when the vibrational frequency of the donor is larger than at the acceptor. The vibronic energy eigenstates of the acceptor acquire then an increased density of states, which leads to a higher occupation probability of the acceptor in thermal equilibrium. We can conclude that an underdamped vibrational mode which is weakly coupled to the dimer fuels a faster transfer of excitation energy, illustrating that long-lived vibrations can, in principle, enhance energy transfer, without involving long-lived electronic coherence.
Mit den Reisebeschränkungen in der Corona-Krise ist der Bedarf an einfach zu handhabenden Videokonferenzsystemen sprunghaft gestiegen. Krisengewinner war dabei ohne Zweifel der amerikanische Hersteller Zoom Video Communications.
Mit seinem „Zoom Meeting“-Dienst preschte das junge Unternehmen an bisherigen Branchenlieblingen vorbei. Derzeit gilt Zoom als populärstes Konferenzsystem auf dem Markt. Mitten im Aufstieg ist Zoom jedoch auch heftig in Kritik geraten: Schlechte Umsetzung des Datenschutzes, hohe Angreifbarkeit durch klaffende Schwachstellen und unzureichende Verschlüsselung lauteten die Vorwürfe. Der Hersteller zeigte sich bei der Behebung der Schwachstellen kooperativ. Doch ist jetzt alles sicher und vertrauenswürdig?
2018 wurde das „DNS over HTTPS (DoH)“-Protokoll vorgestellt. Der Vorteil von DoH besteht darin, dass sich die Manipulation von DNS-Anfragen für missbräuchliche Zwecke verhindern lässt. Aus diesem Grund haben Apple, Google, Microsoft und weitere Internetfirmen DoH bereits eingebunden oder haben vor dies zu tun. Doch wie genau funktioniert die Verbesserung beim Schutz der Privatsphäre und bei der Sicherheit auf Protokollebene? Und gibt es auch Nachteile?
Ein professionelles Digital-Risk-Management-System scannt das Clearnet, Deep Net und Darknet nach auffälligen, potenziell sensiblen Dokumenten und Informationen, um Hinweise für technische oder menschliche Sicherheitsrisiken identifizieren zu können. Die Prävention von Cyberangriffen ist nach wie vor eine entscheidend wichtige Säule, um die Digitalisierung zu meistern, Geschäftswerte langfristig zu schützen und die Anzahl an kritischen Sicherheitslücken im Unternehmen gering zu halten. Im Rahmen eines Master-Projekts hat sich das Institut für Internet-Sicherheit – if(is) mit dem Thema DRM auseinander gesetzt und insbesondere das Tool RISKREX exemplarisch analysiert.
Background: Emotions play a central role in mental disorder and especially in depression. They are sensed in the body, and it has recently been shown in healthy participants that these sensations can be differentiated between emotions. The aim of the current study was to assess bodily sensations for basic emotions induced by emotion eliciting pictures in depression.
Methods: 30 healthy controls (HC), 30 individuals suffering from Major depressive disorder (MDD) without medication use (MDDnm) and 30 individuals with MDD with medication use (MDDm) were shown emotional and neutral pictures and were asked to paint areas in an empty body silhouette where they felt an increase or decrease in activation. Body sensation maps were then calculated and statistical pattern recognition applied.
Results Results indicated statistically separable activation patterns for all three groups. MDDnm showed less overall activation than HCs, especially in sadness and fear, while MDDm showed stronger deactivation for all emotions than the other two groups.
Conclusions: We could show that emotion experience was associated with bodily sensations that are weaker in depression than in healthy controls and that antidepressant medication was correlated with an increased feeling of bodily deactivation.
Results give insights into the relevance for clinicians to acknowledge bodily sensations in the treatment of depression.
Die Notwendigkeit von Nachweisen findet sich in sehr vielen Bereichen unseres Lebens. Zertifikate, Zeugnisse, Abnahmen, Rechnungen, Quittungen, Urkunden und Bescheinigungen über Fortbildungen sind nur einige Beispiele dafür. Durch die Digitalisierung, die mittlerweile so gut wie überall Einzug gehalten hat, und durch die Corona-Krise einen besonderen Schub erfahren hat, wird die Umsetzung solcher Nachweise heutzutage immer öfters digital statt auf Papier verwirklicht. Digitale Nachweise bieten viel Raum für die Optimierung von Prozessen und liefern gleichzeitig einige Schwachstellen, die zum Betrügen genutzt werden können.
Hier gilt es in der aktuellen Forschung und Entwicklung Lösungen zu finden, die die Sicherheit erhöhen, um somit die Vertrauenswürdigkeit der digitalen Nachweise zu steigern. Ob wir je komplett auf Papier verzichten werden können ist fraglich, jedoch kein unmögliches Ziel. Wer dieses Ziel verfolgt, muss nach und nach die Schwachstellen und Probleme der digitalen Nachweise ausmerzen.
BGH, 24.01.2020 - V ZR 155/18: Gewohnheitsrecht kann im Einzelfall kein Notwegerecht begründen
(2020)
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
Ergänzend zu den Befunden von Klauk (2019; Intelligenzdiagnostik bei überwiegend Nicht-EU-Migrantinnen und -Migranten), wird in diesem Übersichtsartikel Rekurs genommen auf die Bedeutung der Intelligenz zur Vorhersage von Berufserfolgskriterien im Kontext von Migrationserfahrungen. Ferner werden die bei Klauk nicht im Fokus stehenden Kernelemente der Potenzial- und Kompetenzerfassung skizziert, inklusive berufsrelevanter Personenmerkmale und Interessen. Durch Zuwanderung erhöht sich die Diversität in der Gesellschaft, ggf. auch in Unternehmen, daher werden hier bedeutsame Aspekte der Diversität in Arbeitsgruppen, insbesondere Stereotype, kurz erläutert. Der Artikel schließt mit einigen Handlungsimpulsen und Ausblicken auf zukünftige Forschung.
This paper analyses the status quo of large-scale decision making combined with the possibility of blockchain as an underlying decentralized architecture to govern common pool resources in a collective manner and evaluates them according to their requirements and features (technical and non-technical). Due to an increasing trend in the distribution of knowledge and an increasing amount of information, the combination of these decentralized technologies and approaches, can not only be beneficial for consortial governance using blockchain but can also help communities to govern common goods and resources. Blockchain and its trust-enhancing properties can potenitally be a catalysator for more collaborative behavior among participants and may lead to new insights about collective action and CPRs.
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.