Results 1-20 of 38.
((uid:50040042))
![]() Lee, Chul Min ![]() ![]() ![]() in Proceedings of the 56th Hawaii International Conference on System Sciences (2023, January 03) Credit risk assessment is a standard procedure for financial institutions (FIs) when estimating their credit risk exposure. It involves the gathering and processing quantitative and qualitative datasets ... [more ▼] Credit risk assessment is a standard procedure for financial institutions (FIs) when estimating their credit risk exposure. It involves the gathering and processing quantitative and qualitative datasets to estimate whether an individual or entity will be able to make future required payments. To ensure effective processing of this data, FIs increasingly use machine learning methods. Large FIs often have more powerful models as they can access larger datasets. In this paper, we present a Federated Learning prototype that allows smaller FIs to compete by training in a cooperative fashion a machine learning model which combines key data derived from several smaller datasets. We test our prototype on an historical mortgage dataset and empirically demonstrate the benefits of Federated Learning for smaller FIs. We conclude that smaller FIs can expect a significant performance increase in their credit risk assessment models by using collaborative machine learning. [less ▲] Detailed reference viewed: 92 (25 UL)![]() Delgado Fernandez, Joaquin ![]() ![]() ![]() in Applied Energy (2022), 326 With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these ... [more ▼] With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these forecasts as they provide detailed load data. However, using smart meter data for load forecasting is challenging due to data privacy requirements. This paper investigates how these requirements can be addressed through a combination of federated learning and privacy preserving techniques such as differential privacy and secure aggregation. For our analysis, we employ a large set of residential load data and simulate how different federated learning models and privacy preserving techniques affect performance and privacy. Our simulations reveal that combining federated learning and privacy preserving techniques can secure both high forecasting accuracy and near-complete privacy. Specifically, we find that such combinations enable a high level of information sharing while ensuring privacy of both the processed load data and forecasting models. Moreover, we identify and discuss challenges of applying federated learning, differential privacy and secure aggregation for residential short-term load forecasting. [less ▲] Detailed reference viewed: 79 (21 UL)![]() Roth, Tamara ![]() in Applied Energy (2022), 325 Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify ... [more ▼] Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify the reasons for this slow progress, we reviewed the recent energy literature regarding the use of blockchain, analyzed industry reports, and interviewed experts who have conducted blockchain projects in Europe’s energy systems. Our analysis reveals eight common use cases, their expected benefits, and the challenges encountered. We find that the expected benefits are often little more than generic hopes, largely outweighed by technological, organizational, and regulatory challenges. The identified challenges are significant and numerous, especially for peer-to-peer trading and microgrid use cases. The fact that few projects have yet provided robust evidence for profitable use suggests there is still a rocky road ahead. Moreover, many use cases appear to require more than just blockchain technology to succeed. In particular, privacy and scalability requirements often call for systems in which blockchains only take a backseat. This realization may be essential for the future use of blockchain technology in energy systems – in Europe and beyond. [less ▲] Detailed reference viewed: 36 (10 UL)![]() ; ; et al Report (2022) Detailed reference viewed: 42 (5 UL)![]() ; ; et al Report (2022) Detailed reference viewed: 50 (3 UL)![]() Roth, Tamara ![]() ![]() in Forty-Third International Conference on Information Systems (2022, October) Investments in fashionable IT do not make organizations more successful than investments in less fashionable alternatives. Many organizations nevertheless associate with fashionable IT to signal ... [more ▼] Investments in fashionable IT do not make organizations more successful than investments in less fashionable alternatives. Many organizations nevertheless associate with fashionable IT to signal compliance with norms of progress and rationality. These decisions can be risky as fashionable IT is often surrounded by wishful and unbalanced discourse, especially in the ‘fashion up-swing’. Engagement with fashionable IT thus requires the ability to navigate hype narratives and fit the new technology into the adopting organization. Fit needs to be established in many regards, such as political and technological. In this paper, we explore a third and so far, understudied perspective: cultural fit between the values attributed to the fashionable IT through the fashion discourse and those of the recipient organizational context. Through an inductive case study of two blockchain projects, we find that cultural fit can equally be an important determinant for successful adoption of fashionable IT. Moreover, we develop a process theory for how cultural fit can be established through a process of cultural sensemaking and dissonance reduction along two recursive pathways. Adopting organizations can change their implementation of fashionable IT systems and re-frame the narratives surrounding them to fit their organization’s cultural values. Alternatively, they can transform their local or overarching organizational culture by integrating values attributed to the fashionable IT. Overall, we contribute a much-needed organizational culture perspective to IT fashions and extend the discussions on IT cultural conflict. [less ▲] Detailed reference viewed: 41 (4 UL)![]() Rieger, Alexander ![]() ![]() ![]() in Joule (2022), 6(6), 1137-1141 Detailed reference viewed: 70 (11 UL)![]() Amard, Alexandre ![]() ![]() ![]() in Drechsler, A.; Gerber, A.; Hevner, A. (Eds.) The Transdisciplinary Reach of Design Science Research. DESRIST 2022 (2022, May 25) After being granted asylum in European countries, refugees need to go through a multitude of administrative processes before they can participate in society. However, these processes are often challenging ... [more ▼] After being granted asylum in European countries, refugees need to go through a multitude of administrative processes before they can participate in society. However, these processes are often challenging, as refugees struggle to understand them, lack instructions for managing paperwork, and do not possess the required language skills. Prior research emphasizes the role of information and communication technologies to simplify and enable refugee-friendly administrative processes. However, recent research and existing applications mainly focus on information retrieval and do not offer assistance for understanding official letters, completing administrative forms, and managing corresponding documents. Furthermore, refugees are often reluctant to use existing applications as they do not trust their host country’s governments and public authorities. In this research, we aim to address this functional and trust gap. We follow a design science research approach to develop a design for a refugee-centric and trustworthy mobile application that assists refugees along administrative processes. In doing so, we identify three design principles that may guide the development of such applications for refugees. [less ▲] Detailed reference viewed: 80 (19 UL)![]() Roth, Tamara ![]() in International Journal of Information Management (2022) Detailed reference viewed: 86 (7 UL)![]() Weigl, Linda ![]() ![]() ![]() in Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS) (2022, January) User-centric identity management systems are gaining momentum as concerns about Big Tech and Big Government rise. Many of these systems are framed as offering Self-Sovereign Identity (SSI). Yet, competing ... [more ▼] User-centric identity management systems are gaining momentum as concerns about Big Tech and Big Government rise. Many of these systems are framed as offering Self-Sovereign Identity (SSI). Yet, competing appropriation and the social embedding of SSI have resulted in diverging interpretations. These vague and value-laden interpretations can damage the public discourse and risk misrepresenting values and affordances that technology offers to users. To unpack the various social and technical understandings of SSI, we adopt an ‘interpretive flexibility’ lens. Based on a qualitative inductive interview study, we find that SSI’s interpretation is strongly mediated by surrounding institutional properties. Our study helps to better navigate these different perceptions and highlights the need for a multidimensional framework that can improve the understanding of complex socio-technical systems for digital government practitioners, researchers, and policy-makers. [less ▲] Detailed reference viewed: 474 (79 UL)![]() Barbereau, Tom Josua ![]() ![]() ![]() in Proceedings of the Hawaii International Conference on System Sciences 2022 (2022, January) Bitcoin and Ethereum are frequently promoted as decentralized, but developers and academics question their actual decentralization. This motivates further experiments with public permissionless ... [more ▼] Bitcoin and Ethereum are frequently promoted as decentralized, but developers and academics question their actual decentralization. This motivates further experiments with public permissionless blockchains to achieve decentralization along technical, economic, and political lines. The distribution of tokenized voting rights aims for political decentralization. Tokenized voting rights achieved notoriety within the nascent field of decentralized finance (DeFi) in 2020. As an alternative to centralized crypto-asset exchanges and lending platforms (owned by companies like Coinbase and Celsius), DeFi developers typically create non-custodial projects that are not majority-owned or managed by legal entities. Holders of tokenized voting rights can instead govern DeFi projects. To scrutinize DeFi’s distributed governance strategies, we conducted a multiple-case study of non-custodial, Ethereum-based DeFi projects: Uniswap, Maker, SushiSwap, Yearn Finance, and UMA. Our findings are novel and surprising: quantitative evaluations of DeFi’s distributed governance strategies reveal a failure to achieve political decentralization. [less ▲] Detailed reference viewed: 846 (69 UL)![]() Höß, Alexandra ![]() ![]() ![]() in Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS) (2022) Fragmentation and limited accessibility of charging infrastructure impede the adoption of electric vehicles. To improve the availability of charging infrastructure independent of providers, eRoaming ... [more ▼] Fragmentation and limited accessibility of charging infrastructure impede the adoption of electric vehicles. To improve the availability of charging infrastructure independent of providers, eRoaming offers a promising solution. Yet, current eRoaming systems are typically centralized, which raises concerns of market power concentration. While the use of blockchain technology can obviate such concerns, it comes with significant privacy challenges. To address these challenges, we explore a combination of blockchain with self-sovereign identity. Specifically, we apply a design science research approach, which helps us to identify requirements, derive a conceptual architecture, and deduce design principles for decentralized eRoaming and beyond. We find that blockchain may best leverage its benefits when it takes a backseat as a public registry for legal entities. Moreover, we find that the use of self-sovereign identities could improve compliance with privacy regulations, but they should not be overused. [less ▲] Detailed reference viewed: 272 (19 UL)![]() ; Sedlmeir, Johannes ![]() ![]() in 30th European Conference on Information Systems (ECIS 2022) (2022) Today’s systems for digital identity management exhibit critical security, efficiency, and privacy issues. A new paradigm, called Self-Sovereign Identity (SSI), addresses these shortcomings by equipping ... [more ▼] Today’s systems for digital identity management exhibit critical security, efficiency, and privacy issues. A new paradigm, called Self-Sovereign Identity (SSI), addresses these shortcomings by equipping users with mobile wallets and empowering them to manage their digital identities. Various companies and governments back this paradigm and promote its development and diffusion. User experience often plays a subordinate role in these efforts, even though it is crucial for user satisfaction and adoption. We thus conduct a comprehensive user experience study of four prominent SSI wallets using a mixed-method approach that involves moderated and remote interviews and the User Experience Questionnaire (UEQ). We find that the examined wallets already provide a decent level of user experience, yet further improvements need to be done. In particular, the examined wallets do not make their novelty and benefits sufficiently apparent to users. Our analysis contributes to user experience research and offers guidance for SSI practitioners. [less ▲] Detailed reference viewed: 107 (3 UL)![]() Fridgen, Gilbert ![]() ![]() in Proceedings of the Thirtieth European Conference on Information Systems (ECIS 2022), Timisoara, Romania: Artificial Intelligence as a Call for Retail Banking : Applying Digital Options Thinking to Artificial Intelligence Adoption (2022) Technology-driven challenges, both existing and emerging, require banks to invest in IT capabilities, especially in artificial intelligence (AI). Digital options theory presents a valuable guide rail for ... [more ▼] Technology-driven challenges, both existing and emerging, require banks to invest in IT capabilities, especially in artificial intelligence (AI). Digital options theory presents a valuable guide rail for these investments. However, the nature of AI as a moving frontier of computing requires certain extensions to established digital option thinking. Based on interviews with 23 experts in the retail banking industry, we highlight the importance of thinking broadly when laying the foundation for AI options and being mindful of the dynamic effects of contextual factors. Drawing from digital options theory and the Technology-Organization-Environment framework as dual lens, our study adds a structured approach to consciously balance resources and AI-related capability investments with a broader consideration of the banking industry’s complex environment. In this way, our study complements recent research on the interplay between incumbents’ resources and digital opportunities. [less ▲] Detailed reference viewed: 69 (14 UL)![]() Barbereau, Tom Josua ![]() ![]() in Lacity, Mary; Treiblmaier, Horst (Eds.) Blockchains and the Token Economy: Studies in Theory and Practice (2022) Art and collectibles markets tend to involve lower liquidity and higher fees than public equity markets. Distributed ledger technology can tokenize artworks and collectibles, so that claims to these ... [more ▼] Art and collectibles markets tend to involve lower liquidity and higher fees than public equity markets. Distributed ledger technology can tokenize artworks and collectibles, so that claims to these assets can be exchanged digitally without intermediaries. Tokenization offers investors access to a global market plus a digitized paper trail, as well as new options for the fractional ownership of artworks, art-collateralized loans, and yield-bearing art assets. The main challenge for tokenization researchers and platform developers is to simultaneously satisfy regulators’ demands for transparency and auditability as well as art investors’ demands for privacy. New technological solutions are required that enable market participants to disclose the absolute minimum amount of information that is required by regulators. We explore new concepts from distributed ledger technology, cryptography, and digital identity management that can help address this challenge. [less ▲] Detailed reference viewed: 167 (20 UL)![]() Rieger, Alexander ![]() ![]() ![]() in Nature Human Behaviour (2021) Detailed reference viewed: 136 (29 UL)![]() Sedlmeir, Johannes ![]() ![]() ![]() in Business and Information Systems Engineering (2021), 63(5), 603-613 Public institutions and companies typically employ physical credentials (such as passports, social security cards, and employee badges) to identify individuals. Individuals can choose where to store their ... [more ▼] Public institutions and companies typically employ physical credentials (such as passports, social security cards, and employee badges) to identify individuals. Individuals can choose where to store their physical credentials, and sometimes, they can decide to whom their credentials are disclosed. These familiar privileges inspired a new type of digital credential called a verifiable credential (VC). Similar to physical credentials, individuals can store their verifiable credentials in a so-called digital wallet on their mobile phone, on another edge device, or in the cloud, and they can use verifiable credentials for identification, authentication, and authorization. [less ▲] Detailed reference viewed: 100 (12 UL)![]() Rieger, Alexander ![]() ![]() ![]() in Med (2021) Detailed reference viewed: 86 (13 UL)![]() ; Fridgen, Gilbert ![]() ![]() in 54th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii (Virtual) (2021, April) Cross-organizational collaboration and the exchange of process data are indispensable for many processes in federally organized governments. Conventional IT solutions, such as cross-organizational ... [more ▼] Cross-organizational collaboration and the exchange of process data are indispensable for many processes in federally organized governments. Conventional IT solutions, such as cross-organizational workflow management systems, address these requirements through centralized process management and architectures. However, such centralization is difficult and often undesirable in federal contexts. One alternative solution that emphasizes decentralized process management and a decentralized architecture is the blockchain solution of Germany’s Federal Office for Migration and Refugees. Here, we investigate the architecture of this solution and examine how it addresses the requirements of federal contexts. We find that the solution’s architecture resembles an improvement and cross-organizational adaption of an old architectural paradigm, the enterprise service bus. [less ▲] Detailed reference viewed: 319 (24 UL)![]() Höß, Alexandra ![]() ![]() in Proceedings of the Twenty-Ninth European Conference on Information Systems (ECIS) (2021) Blockchains enable distributed operation, decentralized control, and token-based representations of tangible and intangible assets. Organizations commonly use blockchain technology to foster collaboration ... [more ▼] Blockchains enable distributed operation, decentralized control, and token-based representations of tangible and intangible assets. Organizations commonly use blockchain technology to foster collaboration. In this paper, we investigate the use of blockchain to foster competition. We conduct a single-case study of Germany’s mobility-as-a-service community and its efforts to use blockchain as a technical backbone for mobility ecosystems. The community views blockchain as a technology that embodies organizing principles of empowerment and equality. These principles motivated the community to rethink ecosystem structure. In particular, the community began to question the exclusive, non-adversarial position of mobility service aggregators. We find that rethinking this position might shift their competitive focus from the inter- to the intra-ecosystem level and enables the creation of a larger ecosystem. As a second-order effect, the community began to rethink ecosystem governance. Specifically, it began to explore options for effectively distributed decision making while safeguarding efficiency. [less ▲] Detailed reference viewed: 214 (10 UL) |
||