Filtern
Erscheinungsjahr
- 2020 (32) (entfernen)
Dokumenttyp
- Wissenschaftlicher Artikel (20)
- Konferenzveröffentlichung (6)
- Sonstiges (3)
- Dissertation (1)
- Masterarbeit (1)
- Video (1)
Sprache
- Englisch (32) (entfernen)
Schlagworte
- Augmented Reality (1)
- Cookie <Internet> (1)
- Cr(VI) and Zn(II) cations (1)
- Datenschutz (1)
- Erweiterte Realität <Informatik> (1)
- Flugkörper (1)
- Hands-free Interaction (1)
- Human-Robot Interaction (1)
- Hydrogen evolution reaction (1)
- MITRE (1)
- OSINT (1)
- Object Recognition (1)
- Objektverfolgung (1)
- Online-Werbung (1)
- Ortsbestimmung (1)
- PEM water electrolysis (1)
- Privatsphäre (1)
- PtCoMn (1)
- Robotik (1)
- Ternary alloy catalyst preparation (1)
- Tracking (1)
- UAV (1)
- activated sludge (1)
- advanced persistent threats (1)
- antecedents (1)
- bacterial toxicity (1)
- blockchain (1)
- bloxberg (1)
- chlorinated phenols (1)
- compassionate love (1)
- cyber kill chain (1)
- dlt (1)
- efficiency of exciton transfer (1)
- ethereum (1)
- excitation energy transfer (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- measurement study (1)
- narcissism (1)
- open science (1)
- phishing (1)
- poa (1)
- poe (1)
- reconnaissance (1)
- respiration inhibition (1)
- servant leadership (1)
- vibronic coupling (1)
Institut
- Westfälisches Institut für Gesundheit (6)
- Westfälisches Energieinstitut (5)
- Elektrotechnik und angewandte Naturwissenschaften (4)
- Informatik und Kommunikation (4)
- Institut für biologische und chemische Informatik (3)
- Institut für Internetsicherheit (1)
- Wirtschaft und Informationstechnik Bocholt (1)
- Wirtschaftsingenieurwesen (1)
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.
We study the impact of underdamped intramolecular vibrational modes on the efficiency of the excitation energy transfer in a dimer in which each state is coupled to its own underdamped vibrational mode and, in addition, to a continuous background of environmental modes. For this, we use the numerically exact hierarchy equation of motion approach. We determine the quantum yield and the transfer time in dependence of the vibronic coupling strength, and in dependence of the damping of the incoherent background. Moreover, we tune the vibrational frequencies out of resonance with the excitonic energy gap. We show that the quantum yield is enhanced by up to 10% when the vibrational frequency of the donor is larger than at the acceptor. The vibronic energy eigenstates of the acceptor acquire then an increased density of states, which leads to a higher occupation probability of the acceptor in thermal equilibrium. We can conclude that an underdamped vibrational mode which is weakly coupled to the dimer fuels a faster transfer of excitation energy, illustrating that long-lived vibrations can, in principle, enhance energy transfer, without involving long-lived electronic coherence.
Leadership Beyond Narcissism: On the Role of Compassionate Love as Antecedent of Servant Leadership
(2020)
While we already know a lot about the outcomes and boundary conditions of servant leadership, there is still a need for research on its antecedents. Building on the theory of purposeful work behavior and further theorizing by van Dierendonck and Patterson (2015), we examine if leaders’ propensity for compassionate love will evoke servant leadership behavior. At the same time, we contrast compassionate love to leaders’ narcissism as psychological counterpart to compassionate love, because narcissism is not associated with leader effectiveness, but with leader emergence instead. We collected data from 170 leader-follower-dyads in a field study in Germany, while measuring leaders’ compassionate love and narcissism, and followers’ perceptions of servant leadership. We found a positive association between leaders’ compassionate love and servant leadership behavior, while narcissism was negatively associated with servant leadership. Theoretical and practical implications, as well as pathways for future research are discussed.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.