Conference Agenda

Overview and details of the sessions of this conference. Please select a date or location to show only sessions at that day or location. Please select a single session for detailed view (with abstracts and downloads if available).

 
 
Session Overview
Session
Internet of Things and Cyber-physical Systems
Time:
Tuesday, 17/Sept/2024:
1:30pm - 2:30pm

Session Chair: Katharina Drechsler
Location: 1.002


Show help for 'Increase or decrease the abstract text size'
Presentations

Smart Homes, Smart Strategies? An Empirical Study on Organizational Trust Repair after Breaches of Privacy

B. Konopka1, K. Hönemann1, N. Yang2, J. B. Thatcher3, M. Wiesche1

1TU Dortmund University, Germany; 2Loyola University Chicago, United States of America; 3University of Colorado Boulder, United States of America

Previous research has identified customer trust and privacy concerns as key factors for predicting the adoption and continued use of technology, especially for emerging technologies like the smart home. However, there is only limited empirical data on how trust can be restored after privacy violations, which are known to be common in smart home contexts. This study uses a scenario-based policy-capturing design to collect data from long-term smart home users. We examine the effectiveness of verbal (apology, reticence, denial) and substantive (compensation, regulation, third-party involvement) trust repair strategies for two types of privacy violations. Our results indicate that the effectiveness of verbal strategies varies depending on the type of violation, while regulation is the most effective substantive strategy across violation types. Combining verbal and substantive strategies is found to be more successful than isolated approaches. The study concludes with implications and recommendations for future research.

Konopka-Smart Homes, Smart Strategies An Empirical Study-344_a.pdf


Requirements Engineering for Cyber-Physical Systems – A Taxonomy for Classifying Constraints in the Context of Requirements Engineering

C. Mombrey1,2, G. Herzwurm3

1Graduate School of Excellence advanced Manufacturing Engineering in Stuttgart (GSaME); 2cellcentric GmbH & Co. KG; 3Universität Stuttgart, Germany

Requirements engineering is often seen as one of the most important phases of a software project. The imposed requirements are the basis for developing a product or software. Despite the existing research on requirements, most techniques and teams focus on the functional requirements, which reflect the functions of the software. Especially when developing software for cyber physical systems e.g. for manufacturing, there are a lot of (technical) constraints, which must be considered. Because of the variety of constraints and their different impact on the software development and the related project, it is needed to classify and differentiate between these. Therefore, the aim of this paper is to present a taxonomy, which can be used to classify constraints in the context of requirements engineering.

Mombrey-Requirements Engineering for Cyber-Physical Systems – A Taxonomy-169_a.pdf


 
Contact and Legal Notice · Contact Address:
Privacy Statement · Conference: WI24
Conference Software: ConfTool Pro 2.8.105+TC+CC
© 2001–2025 by Dr. H. Weinreich, Hamburg, Germany