Filtern
Erscheinungsjahr
- 2020 (60) (entfernen)
Dokumenttyp
- Wissenschaftlicher Artikel (60) (entfernen)
Schlagworte
- Europäische Zentralbank (2)
- Arbeitnehmer (1)
- Arbeitsrecht (1)
- Arzneimittel (1)
- BDSG (1)
- BSM (1)
- Bewerbung (1)
- Bodily sensation maps (1)
- Branding (1)
- Bundesdatenschutzgesetz (2017) (1)
- Corporate Identity (1)
- Cr(VI) and Zn(II) cations (1)
- DSGVO (1)
- Datenschutz (1)
- Datenschutz-Grundverordnung (1)
- Depression (1)
- Deutschland (1)
- Deutschland. Bundesverfassungsgericht (1)
- EZB (1)
- Emotion induction (1)
- Energiewende (1)
- Erwerbsobliegenheit (1)
- Geldpolitik (1)
- Geldwäsche (1)
- Hydrogen evolution reaction (1)
- IAPS (1)
- Immobilien (1)
- Insolvenzrecht (1)
- Klimaschutz (1)
- Kommunikation (1)
- MITRE (1)
- Markenmanagement (1)
- Marketing (1)
- Medication (1)
- Miete (1)
- Mietendeckel (1)
- OSINT (1)
- PEM water electrolysis (1)
- PtCoMn (1)
- Replication (1)
- Ternary alloy catalyst preparation (1)
- Unbewegliche Sache (1)
- Verfassungsmäßigkeit (1)
- Werbung (1)
- Wohlverhaltensphase (1)
- activated sludge (1)
- advanced persistent threats (1)
- antecedents (1)
- bacterial toxicity (1)
- blockchain (1)
- bloxberg (1)
- chlorinated phenols (1)
- compassionate love (1)
- cyber kill chain (1)
- dlt (1)
- efficiency of exciton transfer (1)
- ethereum (1)
- excitation energy transfer (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- measurement study (1)
- narcissism (1)
- open science (1)
- phishing (1)
- poa (1)
- poe (1)
- reconnaissance (1)
- respiration inhibition (1)
- servant leadership (1)
- vibronic coupling (1)
Institut
- Wirtschaftsrecht (24)
- Elektrotechnik und angewandte Naturwissenschaften (4)
- Westfälisches Energieinstitut (4)
- Institut für biologische und chemische Informatik (3)
- Wirtschaft Gelsenkirchen (3)
- Informatik und Kommunikation (2)
- Wirtschaft und Informationstechnik Bocholt (2)
- Westfälisches Institut für Gesundheit (1)
- Wirtschaftsingenieurwesen (1)
Ein professionelles Digital-Risk-Management-System scannt das Clearnet, Deep Net und Darknet nach auffälligen, potenziell sensiblen Dokumenten und Informationen, um Hinweise für technische oder menschliche Sicherheitsrisiken identifizieren zu können. Die Prävention von Cyberangriffen ist nach wie vor eine entscheidend wichtige Säule, um die Digitalisierung zu meistern, Geschäftswerte langfristig zu schützen und die Anzahl an kritischen Sicherheitslücken im Unternehmen gering zu halten. Im Rahmen eines Master-Projekts hat sich das Institut für Internet-Sicherheit – if(is) mit dem Thema DRM auseinander gesetzt und insbesondere das Tool RISKREX exemplarisch analysiert.
2018 wurde das „DNS over HTTPS (DoH)“-Protokoll vorgestellt. Der Vorteil von DoH besteht darin, dass sich die Manipulation von DNS-Anfragen für missbräuchliche Zwecke verhindern lässt. Aus diesem Grund haben Apple, Google, Microsoft und weitere Internetfirmen DoH bereits eingebunden oder haben vor dies zu tun. Doch wie genau funktioniert die Verbesserung beim Schutz der Privatsphäre und bei der Sicherheit auf Protokollebene? Und gibt es auch Nachteile?
Mit den Reisebeschränkungen in der Corona-Krise ist der Bedarf an einfach zu handhabenden Videokonferenzsystemen sprunghaft gestiegen. Krisengewinner war dabei ohne Zweifel der amerikanische Hersteller Zoom Video Communications.
Mit seinem „Zoom Meeting“-Dienst preschte das junge Unternehmen an bisherigen Branchenlieblingen vorbei. Derzeit gilt Zoom als populärstes Konferenzsystem auf dem Markt. Mitten im Aufstieg ist Zoom jedoch auch heftig in Kritik geraten: Schlechte Umsetzung des Datenschutzes, hohe Angreifbarkeit durch klaffende Schwachstellen und unzureichende Verschlüsselung lauteten die Vorwürfe. Der Hersteller zeigte sich bei der Behebung der Schwachstellen kooperativ. Doch ist jetzt alles sicher und vertrauenswürdig?
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.
We study the impact of underdamped intramolecular vibrational modes on the efficiency of the excitation energy transfer in a dimer in which each state is coupled to its own underdamped vibrational mode and, in addition, to a continuous background of environmental modes. For this, we use the numerically exact hierarchy equation of motion approach. We determine the quantum yield and the transfer time in dependence of the vibronic coupling strength, and in dependence of the damping of the incoherent background. Moreover, we tune the vibrational frequencies out of resonance with the excitonic energy gap. We show that the quantum yield is enhanced by up to 10% when the vibrational frequency of the donor is larger than at the acceptor. The vibronic energy eigenstates of the acceptor acquire then an increased density of states, which leads to a higher occupation probability of the acceptor in thermal equilibrium. We can conclude that an underdamped vibrational mode which is weakly coupled to the dimer fuels a faster transfer of excitation energy, illustrating that long-lived vibrations can, in principle, enhance energy transfer, without involving long-lived electronic coherence.
Leadership Beyond Narcissism: On the Role of Compassionate Love as Antecedent of Servant Leadership
(2020)
While we already know a lot about the outcomes and boundary conditions of servant leadership, there is still a need for research on its antecedents. Building on the theory of purposeful work behavior and further theorizing by van Dierendonck and Patterson (2015), we examine if leaders’ propensity for compassionate love will evoke servant leadership behavior. At the same time, we contrast compassionate love to leaders’ narcissism as psychological counterpart to compassionate love, because narcissism is not associated with leader effectiveness, but with leader emergence instead. We collected data from 170 leader-follower-dyads in a field study in Germany, while measuring leaders’ compassionate love and narcissism, and followers’ perceptions of servant leadership. We found a positive association between leaders’ compassionate love and servant leadership behavior, while narcissism was negatively associated with servant leadership. Theoretical and practical implications, as well as pathways for future research are discussed.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
Nerzzucht mit Hindernissen – oder: alle juristischen Auslegungskriterien plus Analogie in einem Fall
(2020)
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
Dank der neuen Datenschutzgrundverordnung zum Schutz der Privatsphäre konnte der Sammelwahn einiger Dienstleister bereits abgemildert werden. Dennoch zeichnet sich eine immer stärkere Zentralisierung und Monopolisierung von Datenhaltern und Dienstleistern ab, vor allem in Form großer USA- oder Asien-basierter Technologieunternehmen. Im Umgang mit den eigenen Daten schreiten nur wenige Menschen bewusst zur Tat, sehen meist nur den angepriesenen Vorteil und nicht die möglichen negativen Konsequenzen für ihre Privatsphäre. Eine Self-Sovereign Identity (SSI) könnte Basis für einen fairen Datenaustausch innerhalb der Smart Economy sein und die Integration auch kleinerer Unternehmen in eine offene Infrastruktur unterstützen.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Synergien
(2020)
A systematic method for obtaining a novel electrode structure based on PtCoMn ternary alloy catalyst supported on graphitic carbon nanofibers (CNF) for hydrogen evolution reaction (HER) in acidic media is proposed. Ternary alloy nanoparticles (Co0.6Mn0.4 Pt), with a mean crystallite diameter under 10 nm, were electrodeposited onto a graphitic support material using a two-step pulsed deposition technique. Initially, a surface functionalisation of the carbon nanofibers is performed with the aid of oxygen plasma. Subsequently, a short galvanostatic pulse electrodeposition technique is applied. It has been demonstrated that, if pulsing current is employed, compositionally controlled PtCoMn catalysts can be achieved. Variations of metal concentration ratios in the electrolyte and main deposition parameters, such as current density and pulse shape, led to electrodes with relevant catalytic activity towards HER. The samples were further characterised using several physico-chemical methods to reveal their morphology, structure, chemical and electrochemical properties. X-ray diffraction confirms the PtCoMn alloy formation on the graphitic support and energy dispersive X-ray spectroscopy highlights the presence of the three metallic components from the alloy structure. The preliminary tests regarding the electrocatalytic activity of the developed electrodes display promising results compared to commercial Pt/C catalysts. The PtCoMn/CNF electrode exhibits a decrease in hydrogen evolution overpotential of about 250 mV at 40 mA cm−2 in acidic solution (0.5 M H2SO4) when compared to similar platinum based electrodes (Pt/CNF) and a Tafel slope of around 120 mV dec−1, indicating that HER takes place under the Volmer-Heyrovsky mechanism.
Digitalisierung gilt als die Basis für das Wohlergehen der modernen und globalen Informations- und Wissensgesellschaft. Während sie immer mehr Fahrt aufnimmt, zeigt sie gleichzeitig immer deutlicher auch ihre Kehrseite: Altbewährte Verteidigungssysteme gegen Cyberangriffe versagen zunehmend. Die Ursachen werden inzwischen sehr klar: Der klassische Perimeter löst sich dank Cloud und Mobility auf, die Angriffsflächen werden dank unzähliger neu im Netz hinzugekommener Dinge exponentiell größer, und Abwehrmaßnahmen auf herkömmliche Weise dank einer zerklüfteten, kaum integrierten Security-Landschaft immer komplexer. Zeit, die Erfolgsfaktoren der Digitalisierung zu erkennen und für das eigene Unternehmen umzusetzen. Dabei helfen vier grundsätzliche Cybersicherheitsstrategien.
Unternehmen setzen zunehmend auf KI oder planen, dies künftig zu tun. Doch die große Euphorie bleibt in der Industrie aus guten Gründen noch aus. Zum einen fehlt die kritische Masse an Einsatzszenarien, weswegen Unsicherheit besteht, welche Handlungsfelder nachhaltige Erfolge versprechen. Zum anderen ist die Frage der Zuverlässigkeit zu klären, also wie valide KI-generierte Ergebnisse wirklich sind. Im Folgenden geht es um die Mechanismen, die gute Ergebnisse sicherstellen helfen.