Learn More
The wealth of social information presented on Facebook is astounding. While these affordances allow users to keep up-to-date, they also produce a basis for social comparison and envy on an unprecedented scale. Even though envy may endanger users' life satisfaction and lead to platform avoidance, no study exists uncovering this dynamics. To close this gap,(More)
This article summarizes the results of 25 expert interviews, regarding the value potential and challenges of the Service-oriented Architecture (SoA) paradigm for users and software vendors. On the user side, the SoA value potential most often mentioned by experts was agility, followed by process optimization. Cost reduction, through a more efficient(More)
Measurability is the essential basis for management. Although the management of complexity is a central task of CIOs and IT-architects, literature has not proposed a concrete measure to quantify complexity in enterprise architectures so far. Against this background the contribution of this paper is a) the introduction of a system theoretic conceptualization(More)
Since Facebook has opened its platform to third-party developers, privacy concerns surrounding applications are mounting. By granting " permission " to an app request, users allow app providers to circumvent their privacy settings endangering their own privacy and that of their friends. Considering a rising use of Facebook apps and a paucity of research in(More)
For several years, marketplaces exist in the software industry, where customers can, for instance, search for specific services offered by different vendors, review, buy and use these services. The vendor-sided characteristics of these marketplaces are widely discussed but have not yet been investigated in detail. In this paper, we consider online(More)
Despite increasing interest in IT outsourcing (ITO) and the various benefits it promises, Cloud Computing (CC) as the currently most prevalent ITO paradigm still entails serious IT security risks. Little attention has been paid so far to fully and unambiguously capture the complex nature of IT security risks and how to measure it. Against this backdrop, we(More)