<script src="https://bibbase.org/service/mendeley/4d6e333c-c37d-3ec7-8c04-1f45c312e278?jsonp=1"></script>
<?php
$contents = file_get_contents("https://bibbase.org/service/mendeley/4d6e333c-c37d-3ec7-8c04-1f45c312e278");
print_r($contents);
?>
<iframe src="https://bibbase.org/service/mendeley/4d6e333c-c37d-3ec7-8c04-1f45c312e278"></iframe>
For more details see the documention.
To the site owner:
Action required! Mendeley is changing its API. In order to keep using Mendeley with BibBase past April 14th, you need to:
@article{ title = {Optimal distinctiveness in platform markets: Leveraging complementors as legitimacy buffers}, type = {article}, year = {2021}, pages = {435-461}, volume = {42}, publisher = {Wiley Online Library}, id = {f9b53856-1c44-391c-9fea-650a23572358}, created = {2022-11-16T12:16:24.748Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2024-07-04T18:41:21.859Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Taeuscher, Karl and Rothe, Hannes}, journal = {Strategic Management Journal}, number = {2} }
@inproceedings{ title = {Introduction to the WI2021 Track: Creating Value through Digital Innovation in Health Care}, type = {inproceedings}, year = {2021}, pages = {2}, volume = {1}, publisher = {Springer}, id = {6f56d784-eb85-3ece-a628-96846b833c48}, created = {2023-02-09T08:26:04.875Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2024-07-04T18:40:57.791Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {inproceedings}, author = {Wessel, Lauri and Rothe, Hannes and Oborn, Eivor}, booktitle = {Proceeding of International Conference on Business & Information Systems Engineering 2021} }
@article{ title = {Accumulating Design Knowledge: A Mechanisms-based Approach}, type = {article}, year = {2020}, id = {c07e0489-57c0-3298-918e-a145172c2c10}, created = {2019-11-14T15:18:19.659Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2019-11-14T15:18:19.659Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Rothe, Hannes and Wessel, Lauri and Barquet, Ana Paula}, journal = {Journal of the Association for Information Systemsf} }
@inproceedings{ title = {The Digital Platform Otto. de: A Case Study of Growth, Complexity, and Generativity}, type = {inproceedings}, year = {2019}, city = {Siegen, Germany}, id = {6ef6ae2f-bd2f-3f70-9856-80661c83b0ee}, created = {2019-09-04T11:33:49.681Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2019-09-04T11:33:49.681Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Fürstenau, Daniel and Anisimova, Daria and Masak, Dieter and Rothe, Hannes and Schulte-Althoff, Matthias}, booktitle = {Proceedings of the 14th International Conference on Wirtschaftsinformatik} }
@inproceedings{ title = {How do entrepreneurial firms appropriate value in bio data infrastructures: an exploratory qualitative study}, type = {inproceedings}, year = {2019}, city = {Stockholm & Uppsala, Sweden}, id = {09b18e27-5c35-3672-a4f2-1e27edef4f35}, created = {2019-09-04T11:33:49.687Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2019-09-04T11:33:49.687Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, bibtype = {inproceedings}, author = {Rothe, Hannes and Jarvenpaa, Sirkka L and Penninger, Anna Auguste}, booktitle = {Proceedings of the 27th European Conference on Information Systems (ECIS)} }
@inproceedings{ title = {Configuration in smart service systems: A practice-based inquiry}, type = {inproceedings}, year = {2019}, keywords = {assistive technologies,configuration,dementia,practice theory,smart objects,smart service systems}, id = {bac237cc-fe5b-37ba-ae51-bbf3b384d603}, created = {2020-02-04T16:01:11.464Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2020-02-04T16:01:11.464Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {In this paper, we develop a new perspective on configuration processes inherent to smart service systems that brings human actors to the theoretical foreground, is informed by practice theory, and is grounded in an intervention study of smart locating systems used in home care of persons with dementia. Maintaining control of the location of persons with dementia is a major source of caregiver burden, and assistive technologies such as smart locating systems hold the promise of enhancing quality of life and reducing caregiver burden. Drawing from research on smart service systems, organizational configuration research, and practice theory, we articulate a conceptual model of configuring in practice to explain how practice elements and the capabilities of smart technologies become mutually configured. Our analysis of study participants' experiences with the locating systems identified three distinctive configurations, characterized as enhanced smartness, degraded smartness, and fragile smartness, which developed through configuring processes. The configuring in practice model we develop here helps explain why unexpected and anticipated configurations develop and thus the conditions that facilitate or inhibit value cocreation in smart service systems.}, bibtype = {inproceedings}, author = {Wessel, Lauri and Davidson, Elizabeth and Barquet, Ana Paula and Rothe, Hannes and Peters, Oliver and Megges, Herlind}, doi = {10.1111/isj.12268}, booktitle = {Information Systems Journal} }
@article{ title = {Influential factors for technology-enhanced learning: professionals}, type = {article}, year = {2019}, keywords = {Importance of influential factors,Influential factors,Moderating effects of influential factors,Opinion of professionals in higher education,Technology-enhanced learning,Time exposure for influential factors}, pages = {JRIT-09-2017-0023}, websites = {https://www.emeraldinsight.com/doi/10.1108/JRIT-09-2017-0023}, month = {2}, publisher = {Emerald Publishing Limited}, day = {26}, id = {fdeb110b-b65c-36de-b048-aa900dedc26c}, created = {2020-02-13T16:16:57.667Z}, accessed = {2019-02-26}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2020-02-13T16:16:57.667Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {Purpose The purpose of this paper is to include several studies that define different critical success factors (CSF) which have to be considered to support the implementation of technology-enhanced learning (TEL) approaches. An analysis of such studies revealed that regional differences seem to determine the CSF for TEL approaches, certain CSF are relevant for TEL approaches in general and professionals in higher education determine which influential factors they consider when implementing TEL approaches. Thus, the question arises: in general, which influential factors do professionals in Austrian and German institutions of higher education actually consider when implementing TEL approaches? Design/methodology/approach The study is a quantitative research approach based on survey data. Findings The results show that certain influential factors seem to be generally important, such as the factors of respecting learning success or motivation. However, the outcome of the study also indicated that different mo...}, bibtype = {article}, author = {Schweighofer, Patrick and Weitlaner, Doris and Ebner, Martin and Rothe, Hannes}, doi = {10.1108/jrit-09-2017-0023}, journal = {Journal of Research in Innovative Teaching & Learning} }
@inproceedings{ title = {Navigating on the Edge - Exploring the Entrepreneurial Function of Postdocs}, type = {inproceedings}, year = {2019}, city = {Berlin, Germany}, id = {6f7f6d11-2528-3f51-808b-bc3b6eeda025}, created = {2020-02-13T16:16:57.976Z}, file_attached = {true}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2020-02-13T16:18:01.745Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, private_publication = {false}, bibtype = {inproceedings}, author = {Fluhrer, Alisa and Hofmann, Riika and Rothe, Hannes and Smith-Litiere, Katia}, booktitle = {Research in Entrepreneurship and Small Business (RENT) Conference} }
@inproceedings{ title = {Growth, Complexity, and Generativity of Digital Platforms: The Case of Otto. de}, type = {inproceedings}, year = {2019}, city = {Munich, Germany}, id = {345ba66e-34c7-31bb-b2db-605179a66d68}, created = {2020-02-13T16:16:58.145Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2020-02-13T16:16:58.145Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Fürstenau, Daniel and Rothe, Hannes and Schulte-Althoff, Matthias and Masak, Dieter and Schewina, Kai and Anisimova, Daria}, booktitle = {Proceedings 40th International Conference on Information Systems} }
@inproceedings{ title = {Content-Influencer-Fit: Improving Reach and Impact of Content for Influencers in eWOM}, type = {inproceedings}, year = {2018}, city = {Luneburg, Germany}, id = {8362c439-fc64-3f7b-8abe-3a245b26714f}, created = {2018-03-22T11:03:58.881Z}, file_attached = {true}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-04-11T14:31:35.820Z}, read = {true}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Rothe, Hannes and Wicke, Sebastian}, booktitle = {Multikonferenz Wirtschaftsinformatik} }
@inproceedings{ title = {Competition between platform ecosystems: a longitudinal study of MOOC platforms}, type = {inproceedings}, year = {2018}, id = {60f19594-5af9-36a7-98d2-4582b03b45c5}, created = {2018-12-22T17:12:34.475Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-12-22T17:12:34.475Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, source_type = {CONF}, private_publication = {false}, abstract = {The last decade has seen a rise in software-based platforms that engender entirely new ecosystems. In newly emerging platform markets, platforms compete for partners and customers in a rapidly changing environment. Yet, extant research mostly studies platforms' supply-side and demand-side strategies in relatively established platform markets. By combining a market-level and platform-level perspective, our research aims to develop a holistic understanding about the interdependencies between business model decisions, market evolution, and performance outcomes of platforms in emerging markets. We focus on the novel context of Massive Open Online Course (MOOC) platforms, analyzing longitudinal data for 35 MOOC platforms and their ecosystems. To account for the multi-level perspective, our research applies an innovative mixed-methods approach that combines qualitative methods with quantitative measures and visualizations derived from network analysis. Our findings suggest that platforms in new markets converge towards common business models as market leaders imitate the business model innovations of its smaller competitors to manifest their market position. Based on these analyses, we derive four propositions on how the dynamics of a platform’s business model and ecosystem position affect each other and the platform’s market performance.}, bibtype = {inproceedings}, author = {Rothe, Hannes and Täuscher, Karl and Basole, Rahul C}, booktitle = {Twenty-Sixth European Conference on Information Systems} }
@inproceedings{ title = {Business-Managed IT: A Conceptual Framework and Empirical Illustration}, type = {inproceedings}, year = {2018}, id = {25780e17-2aba-3791-aa8e-273a5ca946c1}, created = {2018-12-22T17:12:34.613Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-12-22T17:12:34.613Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {Infants with respiratory syncytial virus (RSV) infection are at risk for developing apnea. The authors compared patients with RSV infection who develop apnea with those who do not, to help ambulatory physicians risk stratify their patients with RSV infection.}, bibtype = {inproceedings}, author = {Kopper, Andreas and Furstenau, Daniel and Zimmermann, Stephan and Rentrop, Christopher and Rothe, Hannes and Strahringer, Susanne and Westner, Markus}, doi = {10.1177/0009922808320699}, booktitle = {Twenty-Sixth European Conference on Information Systems} }
@article{ title = {Shadow IT and Business-Managed IT: A Conceptual Framework and Empirical Illustration}, type = {article}, year = {2018}, pages = {19}, volume = {9}, id = {784fa215-ba6a-3e96-8743-a78a4c9a0aa2}, created = {2018-12-22T17:12:34.625Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-12-22T17:12:34.625Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert” systems developed by business entities are integrated in the organizational IT management. These systems become visible, are thus not “in the shadows” anymore, and subsequently do not fit to existing definitions of Shadow IT. Practice shows that some information systems share characteristics of Shadow IT but are created openly in alignment with the IT organization. This paper proposes the term “Business-managed IT” to describe “overt” information systems developed or managed by business entities and distinguishes it from Shadow IT by illustrating case vignettes. Accordingly, our contribution is to suggest a concept and its delineation against other concepts. In this way, IS researchers interested in IT originated from or maintained by business entities can construct theories with a wider scope of application that are at the same time more specific to practical problems. In addition, the terminology allows to value potentially innovative developments by business entities more adequately.}, bibtype = {article}, author = {Kooper, Andreas and Furstenau, Daniel and Zimmermann, Stephan and Klotz, Stefan and Rentrop, Christopher and Rothe, Hannes and Strahringer, Susanne and Westner, Markus}, journal = {International Journal of IT/Business Alignment and Governance (IJITBAG)}, number = {2} }
@inproceedings{ title = {Shaping the Boundaries of a Service Ecosystem: The Case of Udacity}, type = {inproceedings}, year = {2017}, city = {Waikoloa Village, HI, USA}, id = {54015acc-3a23-37b3-b81f-515ba9bf94d8}, created = {2017-02-22T09:11:13.000Z}, file_attached = {true}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {Service-dominant logic highlights the ability of service ecosystems to 'self-adjust' as a reaction to sys-temic inefficiencies or external changes [1]–[3]. We contribute to the question on how focal actors shape the boundaries of service ecosystems through service innovation. This is a single case study on a digital eco-system focused on a first mover in digital platforms for Massive Open Online Courses (MOOCs): Udacity. We found two mechanisms, where Udacity shaped the boundaries of its ecosystem: 'user self-service integra-tion' and 'gradual partner disintegration'. Through-out three phases between 2011 and 2015 they disinte-grated services from higher education, namely offer-ing courses online, designing course, and accredita-tion due to lowly perceived adaptability of universities and external pressures for finding a sustainable busi-ness model. Additionally, they disintegrated self-orga-nized solutions of user needs and re-integrated them with new actors. This led to newly shaped boundaries of the service ecosystem.}, bibtype = {inproceedings}, author = {Rothe, Hannes and Steier, Florian}, doi = {http://hdl.handle.net/10125/41799}, booktitle = {Proceedings of the 50th Hawaii International Conference on System Sciences}, keywords = {massive open online course,mooc,platform,service ecosystem,service ecosystem design,service-dominant logic} }
@inproceedings{ title = {Knowledge Accumulation in Design-Oriented Research}, type = {inproceedings}, year = {2017}, pages = {398-413}, publisher = {Springer}, id = {c1679e22-18ac-32c2-bfce-60e01d5a2e93}, created = {2017-09-30T09:07:50.446Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-10-03T10:10:30.500Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Barquet2017}, source_type = {CONF}, private_publication = {false}, bibtype = {inproceedings}, author = {Barquet, Ana Paula and Wessel, Lauri and Rothe, Hannes}, booktitle = {International Conference on Design Science Research in Information Systems} }
@inproceedings{ title = {API-Management in Digitalen Service-Systemen – Auf dem Weg zu neuen Modellierungsansätzen}, type = {inproceedings}, year = {2017}, city = {Leipzig, Germany}, id = {c890fe66-661e-3449-9d00-c9f7b5fd676e}, created = {2017-10-07T10:02:05.347Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-12-10T11:13:35.336Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Terhaar2017}, private_publication = {false}, bibtype = {inproceedings}, author = {Terhaar, Oliver and Rothe, Hannes and Gersch, Martin}, booktitle = {2. Jahrestagung der Wissenschaftlichen Kommission Dienstleistungsmanagement (WK DLM)} }
@inproceedings{ title = {Simulation of a Service Station in a Public Transportation System}, type = {inproceedings}, year = {2017}, city = {Berlin, Germany}, id = {cc603183-92ae-327d-bee1-064efeb4224a}, created = {2017-10-07T10:02:05.348Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-05-23T10:17:00.615Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Thiede2017}, private_publication = {false}, bibtype = {inproceedings}, author = {Thiede, Malte and Stegemann, Lars and Furstenau, Daniel and Gersch, Martin and Rothe, Hannes}, booktitle = {International Conference on Operations Research (OR2017)} }
@article{ title = {Shadow systems, risk, and shifting power relations in organizations}, type = {article}, year = {2017}, keywords = {Business IT alignment,IT governance,Power,Risk,Shadow systems}, volume = {41}, id = {ce2bdea4-aa91-3f15-80ab-8acce1a76f8f}, created = {2017-11-28T04:50:17.093Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2019-01-21T08:59:14.105Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {© 2017 by the Association for Information Systems. Drawing on notions of power and the social construction of risk, we build new theory to understand the persistence of shadow systems in organizations. From a single case study in a mid-sized savings bank, we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow systems. A distant business-IT relationship and changing business needs can create repeated cost and time pressures that make business units draw on shadow systems. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow systems. However, empirical findings suggest that the weakening tendency of formal risk-management programs may not be sufficient to stop the shadow systems cycle spinning if they fail to address the underlying causes for the emergence of shadow systems. These findings highlight long-term dynamics associated with shadow systems and pose “risk” as a power-shifting construct.}, bibtype = {article}, author = {Furstenau, D. and Rothe, H. and Sandner, M.}, journal = {Communications of the Association for Information Systems} }
@book{ title = {Knowledge accumulation in design-oriented research developing and communicating knowledge contributions}, type = {book}, year = {2017}, source = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, keywords = {Design theory,Design-oriented research,Empirical data,Knowledge contribution,Qualitative process methods}, volume = {10243 LNCS}, id = {6bc3c174-3de5-34e0-b240-05d218ae8209}, created = {2017-11-28T04:50:17.157Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-11-28T04:50:17.157Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {© Springer International Publishing AG 2017. In this paper, we problematize a relative absence of established ways to develop and communicate knowledge contributions (KC) from Design-oriented research (DOR) within information systems. This is problematic since it hinders the potential for knowledge accumulation within the field. Thus, for communicating KC, we propose a framework, dubbed PDSA (Prescriptive, Descriptive, Situated, and Abstract). To develop KC especially from empirical data, we suggest the use of qualitative process methods. The framework is illustrated by revisiting a published DOR study. Finally, we show how the PDSA framework serves as a template to establish firm KC in DOR. In addition, we explore contributions generated from empirical data and suggest possibilities to use qualitative process methods as means to increase transparency and rigor of KC development and communication.}, bibtype = {book}, author = {Barquet, A.P. and Wessel, L. and Rothe, H.}, doi = {10.1007/978-3-319-59144-5_24} }
@article{ title = {Shadow Systems, Risk, and Shifting Power Relations in Organizations}, type = {article}, year = {2017}, keywords = {Business IT alignment,IT governance,Power,Risk,Shadow systems}, pages = {3}, volume = {41}, id = {327f74f5-4408-3f1b-8e18-3c7f8c21bd28}, created = {2017-12-07T09:25:56.888Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-12-07T09:25:56.888Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Furstenau2017}, source_type = {JOUR}, private_publication = {false}, abstract = {© 2017 by the Association for Information Systems. Drawing on notions of power and the social construction of risk, we build new theory to understand the persistence of shadow systems in organizations. From a single case study in a mid-sized savings bank, we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow systems. A distant business-IT relationship and changing business needs can create repeated cost and time pressures that make business units draw on shadow systems. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow systems. However, empirical findings suggest that the weakening tendency of formal risk-management programs may not be sufficient to stop the shadow systems cycle spinning if they fail to address the underlying causes for the emergence of shadow systems. These findings highlight long-term dynamics associated with shadow systems and pose “risk” as a power-shifting construct.}, bibtype = {article}, author = {Furstenau, Daniel and Rothe, Hannes and Sandner, Matthias}, journal = {Communications of the Association for Information Systems}, number = {1} }
@article{ title = {Social Networking Services in E-Learning}, type = {article}, year = {2016}, pages = {259-279}, volume = {15}, websites = {https://www.editlib.org/p/42111/}, city = {Chesapeake, VA, USA}, id = {6830b3ef-2047-3d3e-8645-be975122a07d}, created = {2012-08-02T09:23:51.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Weber2015}, source_type = {JOUR}, private_publication = {false}, bibtype = {article}, author = {Weber, Peter and Rothe, Hannes}, journal = {International Journal on E-Learning (IJEL) - Corporate, Government, Healthcare, & Higher Education}, number = {2} }
@inproceedings{ title = {Mass Customization im Lernservice Engineering: Realisierung durch einen webbasierten Baukasten für die Gründungslehre}, type = {inproceedings}, year = {2016}, pages = {12}, city = {Ilmenau}, id = {a1ab2779-c9e6-3a4d-9ac7-4ee5b281107e}, created = {2016-03-01T21:04:30.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-10-07T10:05:40.315Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Rothe2016a}, private_publication = {false}, bibtype = {inproceedings}, author = {Rothe, Hannes and Gersch, Martin and Tolksdorf, Robert}, booktitle = {Multikonferenz Wirtschaftsinformatik 2016} }
@book{ title = {Educational Service Improvement Cycle: Ein Vorgehen zur Analyse von Nutzungsdaten für die kontinuierliche Weiterentwicklung webbasierter Lernservices}, type = {book}, year = {2016}, pages = {336}, publisher = {Südwestdeutscher Verlag Für Hochschulschriften Ag Co. Kg}, id = {650434fa-9fe7-39f2-9a2f-bc9008bd5ad6}, created = {2016-06-30T12:01:13.000Z}, file_attached = {true}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-04-07T13:49:03.554Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Rothe2016b}, private_publication = {false}, abstract = {Terms like e-, m- or Blended Learning show, currently many educational services are supported by web technologies. Within such services predominant parts of learner’s usage processes are hidden from the educator’s perception. In front of a service-dominant logic understanding usage processes is essential to comprehend the value-co-creation of educators and learners. Learning analytics may hold methods to enable a continual improvement process by collecting and analyzing usage data. A systematic literature review reveals that neither educational service nor learning analytics literature present a suitable or adequately specified procedural model for this purpose. Following a design science research approach this dissertation introduces a new procedural model to systematically improve educational services. It is called ’Educational Service Improvement Cycle (ESIC)’. Design parameters are derived from the literature review. As part of an iterative design process two learning scenarios from higher education are used to develop the procedural model. The ESIC consists of six activities, which enable a systematic analysis of usage processes. Recommended methods, a role concept and a broad overview on possible indicators are presented to clarify the ESIC. Besides their demonstrative purposes both learning scenarios are also part of an ex ante evaluation. The ex post evaluation contains another single case study, where students make use of the ESIC and create a learning analytics dashboard for advanced training of entrepreneurs. Additional interviews with experts of the field also indicate its perceived usefulness and ease-of-use.}, bibtype = {book}, author = {Rothe, Hannes}, keywords = {educational service engineering} }
@inbook{ type = {inbook}, year = {2016}, pages = {35-45}, publisher = {Waxmann Verlag}, id = {dbe7976b-369a-3522-bc89-15b9ac72080e}, created = {2016-10-20T09:44:03.000Z}, file_attached = {true}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {Zusammenfassung Das gemeinsame Schreiben in kurzen Zeiträumen in sogenannten " Booksprints " hat vor allem durch digitale Technologien an Fahrt gewonnen. Plattformen zur virtuellen Kooperation und Kommunikation sowie schließlich auch zur Online-Veröffentlichung ermöglichen einen gemeinsamen, räumlich verteil-ten und parallelisierten Veröffentlichungsprozess, welcher Absprachen und Übergänge teils drastisch verkürzt. Gerade im Bereich der Hochschulen gibt es jedoch nur wenige Beispiele für Booksprints. In der folgenden vergleichen-den Fallstudie werden drei erfolgreiche Beispiele miteinander verglichen: eine beim E-Learning-Tag in Koblenz in drei Stunden erstellte Textsammlung zu per-sönlichen Erinnerungen an Lieblings-Lernmedien (Auwärter u.a., 2013), die Überarbeitung des Lehrbuchs " Lernen und Lehren mit Technologien " in sieben Tagen, an dem sich mehr als 250 Mitwirkende beteiligten (L3T 2.0, Ebner & Schön, 2013) sowie ein dreitägiger Booksprint mit der Sammlung von inno-vativen Fallbeispielen zu neuartigen Geschäftsmodellen des Hochschulforums Digitalisierung (Bremer u.a., 2015). Eine Darstellung der Lessons Learned bzw. Empfehlungen für Nachahmer/innen schließt den Beitrag ab.}, bibtype = {inbook}, author = {Schön, Sandra and Ebner, Martin and Horndasch, Sebastian and Rothe, Hannes}, editor = {Josef Wachtler, Martin Ebner, Ortrun Gröblinger, Michael Kopp, Erwin Bratengeyer, Hans-Peter Steinbacher, Christian Freisleben-Teutscher, Christine Kapper}, chapter = {Booksprints im Hochschulkontext: Drei erfolgreiche Beispiele für das gemeinsame Schreiben in kurzen Zeiträumen}, title = {Digitale Medien: Zusammenarbeit in der Bildung}, keywords = {Booksprint,Hochschule} }
@inproceedings{ title = {Shadow IT, Risk, and Power in Organizations Shadow IT, Risk, and Shifting Power Relations in Organizations}, type = {inproceedings}, year = {2016}, keywords = {IT Governance,Power Relations,Risk,Shadow IT}, city = {San Diego, USA}, id = {67d91969-334f-3da1-a3c5-02928c40ebfe}, created = {2016-10-20T09:46:32.000Z}, file_attached = {true}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-09-30T08:58:51.212Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {We draw on notions of power and the social construction of risk to understand the persistence of shadow IT within organizations. From a single case study in a mid-sized savings bank we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow IT. A distant business-IT relationship, a lack of IT business knowledge and changing business needs can create repeated cost and time pressures that make business units draw on shadow IT. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow IT. However, empirical findings suggest that the weakening tendency of formal programs may not be sufficient to stop the shadow IT cycle spinning if they fail to address the underlying causes for the shadow IT emergence. These findings highlight long-term dynamics associated with shadow IT and pose " risk " as a power-shifting construct.}, bibtype = {inproceedings}, author = {Furstenau, Daniel and Rothe, Hannes and Sandner, Matthias and Anapliotis, Dimitrios}, booktitle = {Proceedings of the 22nd Americas Conference on Information Systems} }
@inproceedings{ title = {Uncovering Unexpected Actors in an Educational Service Ecosystem}, type = {inproceedings}, year = {2016}, city = {Rostock, Germany}, id = {d55b7f9c-638c-3900-843c-c9fe361f00b7}, created = {2017-10-07T10:05:40.064Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-12-10T11:13:34.441Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Rothe2016c}, private_publication = {false}, abstract = {A crucial factor of improving IT-based services lies within the boundaries of understanding its usage. This is especially true for highly integrated services, like educational service (Shostack 1982), as value co-creation is based upon usage processes (Prahalad and Ramaswamy 2004; Vargo and Lusch 2004). Usage can be assumed as a process of (autonomous) resource integration between several actors. Therefore, Lusch and Vargo (2014) draw on ‘relatively self-contained, and self-adjusting systems” (p. 161), they call service ecosystems. Self-containment and self-adjustment are a result of inherent self-supporting and loosely-coupled actors, who mainly share two things: (1) a will to co-create value, and (2) institutional logics, like rules and standards, which mediate their actors coupling. As each actor in a service ecosystem chooses on its own, which resources it integrates into value-co-creation, the number and type of actors become may become less pre-determined and less expectable for focal service suppliers. We choose to take a traditional supplier-perspective and ask: How do resource-integrating users autonomously – and therefore unexpectedly – integrate actors into value co-creation processes?}, bibtype = {inproceedings}, author = {Rothe, Hannes and Gersch, Martin}, booktitle = {1. Jahrestagung der Wissenschaftlichen Kommission Dienstleistungsmanagement (WK DLM)} }
@inproceedings{ title = {Shadow IT, risk, and shifting power relations in organizations}, type = {inproceedings}, year = {2016}, keywords = {IT governance,Power relations,Risk,Shadow IT}, id = {1d9c0c52-117a-30b1-8ce1-9c078e7e4cff}, created = {2017-11-28T04:50:17.232Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-11-28T04:50:17.232Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {false}, hidden = {false}, private_publication = {false}, abstract = {We draw on notions of power and the social construction of risk to understand the persistence of shadow IT within organizations. From a single case study in a mid-sized savings bank we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow IT. A distant business-IT relationship, a lack of IT business knowledge and changing business needs can create repeated cost and time pressures that make business units draw on shadow IT. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow IT. However, empirical findings suggest that the weakening tendency of formal programs may not be sufficient to stop the shadow IT cycle spinning if they fail to address the underlying causes for the shadow IT emergence. These findings highlight long-term dynamics associated with shadow IT and pose "risk" as a power-shifting construct.}, bibtype = {inproceedings}, author = {Furstenau, D. and Sandner, M. and Rothe, H. and Anapliotis, D.}, booktitle = {AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems} }
@inproceedings{ title = {Which factors drive E-Learning Usage?}, type = {inproceedings}, year = {2014}, keywords = {E-Learning,Technology Acceptance Model,Web-based T}, pages = {7571-7580}, publisher = {IATED}, city = {Valencia, Spain}, id = {81419d1e-5362-3dec-b88b-8f953ebd39b2}, created = {2014-03-18T20:02:57.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Horn2014}, folder_uuids = {bd46c7e1-79d8-4d1f-8d7f-920ef87cae5a}, private_publication = {false}, bibtype = {inproceedings}, author = {Horn, Anne-Marie and Rothe, Hannes and Gersch, Martin}, booktitle = {INTED2014 Conference} }
@inproceedings{ title = {Shadow it systems: Discerning the good and the evil}, type = {inproceedings}, year = {2014}, keywords = {Centrality measures,Design science research,IS architectures,Network analysis,Shadow IT systems}, id = {e4e94ec1-7478-3add-80b5-36c877eabd2c}, created = {2015-11-02T14:04:22.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-05-23T10:17:00.623Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, private_publication = {false}, abstract = {Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.}, bibtype = {inproceedings}, author = {Fürstenau, D. and Rothe, H.}, booktitle = {Proceedings of the 22nd European Conference on Information Systems} }
@inbook{ type = {inbook}, year = {2014}, pages = {55}, websites = {https://www.researchgate.net/profile/Martin_Ebner2/publication/259754812_Wie_man_ein_offenes_Lehrbuch_in_sieben_Tagen_mit_mehr_als_200_Mitmacherinnen_neu_auflegt/links/0046352d9851cd0daa000000.pdf#page=56}, publisher = {Book on Demand}, city = {Norderstedt, Germany}, id = {91686b2a-47d1-3e72-b87d-9e68f42ccc97}, created = {2017-10-07T10:14:30.360Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-12-10T11:13:35.730Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Rothe2014b}, source_type = {BOOK}, private_publication = {false}, bibtype = {inbook}, author = {Rothe, Hannes and Noffke, Magdalena}, editor = {Ebner, Martin and Schön, Sandra}, chapter = {Die (Selbst-) Organisation einer Online-Community beim offenen Buchsprint L3T 2.0}, title = {Wie man ein offenes Lehrbuch in sieben Tagen mit mehr als 200 Mitmacher/innen neu auflegt:-Über die kooperative Erstellung der Neuauflage des „Lehrbuchs für Lernen und Lehren mit Technologien “(L3T 2.0)} }
@article{ title = {Analyzing interactivity in asynchronous video discussions}, type = {article}, year = {2014}, keywords = {Online discussion,asynchronous video discussion,educational data mining,higher education,interactivity}, pages = {226-237}, volume = {8523}, websites = {http://link.springer.com/10.1007/978-3-319-07482-5_22}, publisher = {Springer International Publishing}, city = {Heraklion (Greece)}, id = {141f146a-5d0f-3278-b6a8-c5e2195fd1e3}, created = {2017-12-07T09:25:57.263Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-04-21T17:55:48.047Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Rothe2014}, folder_uuids = {bd46c7e1-79d8-4d1f-8d7f-920ef87cae5a}, private_publication = {false}, abstract = {Evaluating online discussions is a complex task for educators. Infor-mation systems may support instructors and course designers to assess the qual-ity of an asynchronous online discussion tool. Interactivity on a human-to-human, human-to-computer or human-to-content level are focal elements of such quality assessment. Nevertheless existing indicators used to measure inter-activity oftentimes rely on manual data collection. One major contribution of this paper is an updated overview about indicators which are ready for automat-ic data collection and processing. Following a design science research approach we introduce measures for a consumer side of interactivity and contrast them with a producer’s perspective. For this purpose we contrast two ratio measures ‘viewed posts prior to a statement’ and ‘viewed posts after a statement’ created by a student. In order to evaluate these indicators, we apply them to Pinio, an innovative asynchronous video discussion tool, used in a virtual seminar.}, bibtype = {article}, author = {Rothe, Hannes and Sundermeier, Janina and Gersch, Martin}, doi = {10.1007/978-3-319-07482-5_22}, journal = {Lecture Notes in Computer Science (LNCS)}, number = {PART 1} }
@inproceedings{ title = {Shadow it systems: Discerning the good and the evil}, type = {inproceedings}, year = {2014}, keywords = {Centrality measures,Design science research,IS architectures,Network analysis,Shadow IT systems}, pages = {1 - 14}, publisher = {Association for Information Systems}, city = {Tel Aviv, Israel}, id = {e7a3cb32-185d-3506-9b4f-56c97ecd81cd}, created = {2018-05-23T10:16:59.860Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-05-23T10:16:59.860Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Furstenau2014}, source_type = {CONF}, private_publication = {false}, abstract = {Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.}, bibtype = {inproceedings}, author = {Furstenau, Daniel and Rothe, Hannes}, booktitle = {Proceedings of the 22nd European Conference on Information Systems} }
@inbook{ type = {inbook}, year = {2013}, pages = {55-66}, volume = {6}, publisher = {Salzburg Research}, id = {b58069e5-ae28-35c4-a494-b93d41149a1b}, created = {2013-07-31T09:56:36.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Schon2013a}, source_type = {CHAP}, private_publication = {false}, bibtype = {inbook}, author = {Schön, Sandra and Rothe, Hannes}, chapter = {Anreize für die Unterstützung bei einer öffentlichen Abstimmung im Web - Impressionen vom Wettbewerb MOOC Production Fellowship}, title = {Social Media: Macht mit im Web! Anreizsysteme zur Unterstützung von Aktivitäten bei Community- und Content-Plattformen.} }
@inproceedings{ title = {Discussing Public Voting in the Web as a Measure to Democratize Award Decisions}, type = {inproceedings}, year = {2013}, keywords = {Social Media,field study,public voting,voting contest}, pages = {51 - 58}, publisher = {City University press}, city = {Hong Kong}, id = {1d8220e0-e21f-34de-9121-755e4aeec898}, created = {2013-08-30T14:26:00.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Ebner2013}, private_publication = {false}, bibtype = {inproceedings}, author = {Ebner, Martin and Schön, Sandra and Stöcker, Alexander and Rother, Hannes and Tsang, Philip}, editor = {Tsang, P. and Eustace K. Tsoi, R and Tse, S.}, booktitle = {Proceedings of Social Media 2013} }
@inbook{ type = {inbook}, year = {2013}, keywords = {Lern-Service-Engineering,Service-Engineer,e-learning}, pages = {8}, edition = {2}, id = {00770738-177d-3cfd-b2f1-201f1d33bd04}, created = {2013-08-30T14:30:23.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Fink2013}, folder_uuids = {5436423f-faaf-41fa-b9e1-641914debb19}, private_publication = {false}, bibtype = {inbook}, author = {Fink, Corinna and Gabriel, Roland and Gersch, Martin and Lehr, Christian and Rothe, Hannes and Weber, Peter}, editor = {Ebner, Martin and Schön, Sandra}, chapter = {Lern-Service-Engineering - Eine ökonomische Perspektive auf technologiegestütztes Lernen}, title = {L3T Lehrbuch für Lernen und Lehren mit Technologien} }
@inbook{ type = {inbook}, year = {2013}, keywords = {MOOC,Social Media,public voting}, pages = {54-65}, publisher = {Salzburg Research}, city = {Salzburg}, chapter = {Macht mit im Web! Anreizsysteme zur Unterstützung von Aktivitäten bei Community- und Content-Plattformen.}, id = {cc02d000-2986-38fa-94dc-e1566e2a5d15}, created = {2013-08-30T14:35:51.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2018-04-21T17:55:48.038Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Schon2013}, private_publication = {false}, bibtype = {inbook}, author = {Schön, Sandra and Ebner, Martin and Rothe, Hannes and Steinmann, Renate and Wenger, Florian}, editor = {Güntner, Georg and Schaffert, Sebastian}, title = {Social Media} }
@inbook{ type = {inbook}, year = {2013}, keywords = {Community of Inquiry Framework,E-Learning,Social Network Analysis,Social Networking Services,Virtual Collaborative Learning}, pages = {89-99}, publisher = {AACE}, city = {Chesapeake}, chapter = {Social Networking Services in E-Learning}, id = {8f4d1e39-653f-3910-ae31-525af5f6a33e}, created = {2013-11-20T08:48:11.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {true}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Weber2013}, folder_uuids = {5436423f-faaf-41fa-b9e1-641914debb19,bd46c7e1-79d8-4d1f-8d7f-920ef87cae5a}, private_publication = {false}, bibtype = {inbook}, author = {Weber, Peter and Rothe, Hannes}, editor = {Bastiaens, T.J. and Marks, G.H}, title = {Education and Information Technology 2013: A Selection of AACE Award Papers} }
@inbook{ type = {inbook}, year = {2012}, keywords = {Blended Learning,E-Learning,Lernservice Engineering}, pages = {46-49}, websites = {http://l3t.eu/zukunft/?p=308}, publisher = {Martin Ebner and Sandra Schön}, id = {50b0657d-b400-3067-a434-b06b98268283}, created = {2012-09-20T08:38:30.000Z}, accessed = {2012-09-20}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Gersch2012a}, folder_uuids = {5436423f-faaf-41fa-b9e1-641914debb19}, private_publication = {false}, bibtype = {inbook}, author = {Gersch, Martin and Lehr, Christian and Rothe, Hannes}, chapter = {Standardisierung und Flexibilisierung, ‘Fast Food’ und ‘Slow Food’}, title = {Die Zukunft von Lern- und Lehrmaterialien: Entwicklungen, Initiativen, Vorhersagen} }
@inproceedings{ title = {Social Networking Services in E-Learning}, type = {inproceedings}, year = {2012}, keywords = {Community of Inquiry Framework,E-Learning,Social Network Analysis,Social Networking Services}, pages = {1955-1965}, publisher = {Association for the advancement of computing in education (AACE)}, city = {Montreal, Quebec, Canada}, id = {afd44d50-9588-3c58-853a-0a23d866cb89}, created = {2012-09-20T08:42:54.000Z}, file_attached = {false}, profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278}, last_modified = {2017-03-14T03:00:56.766Z}, read = {false}, starred = {false}, authored = {true}, confirmed = {true}, hidden = {false}, citation_key = {Weber2012}, private_publication = {false}, abstract = {This paper is a report on the findings of a study conducted on the use of the social networking service NING in a cross-location e-learning setting named “Net Economy”. We describe how we implemented NING as a fundamental part of the setting through a special phase concept and team building approach. With the help of user statistics, we examine the value of the implemented social networking service with regard to the need for a social presence, as emphasized by the Community of Inquiry framework. Findings indicate that NING led to a well-meshed network of relationships among the students from the participating locations and that the development of these relationships was fundamentally influenced by the chosen phase concept and team building approach. Further, we show that with the help of social networking services, interconnections between students in virtual teams become more transparent and can be influenced systematically.}, bibtype = {inproceedings}, author = {Weber, Peter and Rothe, Hannes}, booktitle = {Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-LEARN) 2012} }