During lecture time, we have our Lunchtime Seminar each Tuesday from 12.15-12.45. During this seminars, researchers of the Department or invited guest provide us with insights into their research.
|The inevitability of misclassification in media recommender systems
The abundance of user generated or user submitted media content on modern social media platforms makes algorithmic curation of content more or less inevitable. The precise principles governing the recommender systems are usually opaque, but the goals behind the optimiziation process are transparent: Factors like engagement, dwell time or watch time are optimized for because these measures translate into monetizable usage time, thus directly affecting the financial bottom line of said... more
|The New Logic of Design: Autonomous Design Tools and Video Game Production
In this lunchtime talk, Stefan Seidel speaks about a stream of research that investigates how autonomous design tools shape the nature of design work. These tools generate outcomes with little or no user intervention and produce designs of unprecedented complexity and originality. They fundamentally revamp how organizations will design and innovate in future. Stefan will highlight (1) the relevance of this emergent phenomenon, (2) conceptual lenses to study this phenomenon, and (3) some... more
|Digital Community Currencies: Opportunities and Best Practices
Community currencies are alternative currencies, which enable the mobilization of local resources for local needs and building resilient communities. They allow community members to perform economic transactions like buying products and paying for services using an alternative currency as a medium of exchange. For decades, regional, paper-based community currencies have been in use across the world. With the advent of the digital age, community currencies are increasingly moving into the... more
|Enterprise Process Security Architecture – a security-by-design approach for postal operators
Supply chain security deals with the protection of supply chain assets (people, equipment, facilities etc.) against threats from theft, smuggling and sabotage. That comprises management and design activities in order to ensure an effective integration of security into the organization’s landscape. This talk presents a security-enhanced business process modelling notation based on BPMN that supports the explicit modelling and evaluation of security elements.
|mlr3 - A new framework for machine learning with R
I'll give a short introduction to the 'mlr3' package (<https://mlr3.mlr-org.com>) for modern, state-of-the-art machine learning in R.
|Lunchtime Talk: Process Science
The first Lunchtime-Seminar in 2021 will be about “Process Science”. Process science, as introduced in a keynote at the BPM 2020 Conference in Sevilla for the first time, is an exciting new field of science, which is about the interdisciplinary study of processes aiming to understand, influence and design the evolvement of processes. The talk explains why it is timely and important to establish process science as an individual field. Also, a theoretical foundation for process science is... more
|CLAIRE: Challenges for Creating a Unified European AI Community with a Human-Centred Focus
The Confederation of Laboratories for Artificial Intelligence Research in Europe (CLAIRE, https://claire-ai.org) is an organisation created by the European AI community that seeks to strengthen European excellence in AI research and innovation with a strong focus on human-centred AI. CLAIRE aims to ensure that societies and citizens across all of Europe, and beyond, benefit from AI as a major driver of innovation, future growth and competitiveness, and to... more
|Big Satellite Data: Opportunities and Challenges
Machine learning techniques aim at extracting knowledge in an automatic manner and have been identified as one of the key drivers for future discoveries and innovation in in this field. Processing and analyzing the massive amounts of data can, however, still become extremely challenging from a computational perspective. The presentation will cover some of our current research activities that are related to this line of research. In particular, I will sketch the potential of modern deep... more
|Critical success factors of data management in intra-organizational settings
Data management consists of the planning and execution of policies, practices, and projects that acquire, control, and enhance the value of data. Many organizations approach data management in a holistic manner, focusing on several data assets at once. However, a holistic approach comprising a large data scope and several data decision domains can lead to slow relative progress which can lead to an unwillingness of senior management to adopt and invest in data management. Therefore, it is... more
|Practitioner-centered Assessment of Socio-technical Innovations in Crisis Management: Insights from the DRIVER+ Demonstration Project
The scale and pace of crises pose enormous challenges for the crisis management (CM) community, with new threats emerging all the time. An already complex field must strive to integrate new technologies and methods; cope with a rapidly changing infrastructure; understand evolving risks; be effective across cultural, administrative and national boundaries as well as engage with populations to enhance their resilience. In this context, crisis management innovation must be capable of meeting... more