
Frederic ThiesseUniversity of Wuerzburg | JMU · Department of Management and Economics
Frederic Thiesse
Prof. Dr. oec. Dipl.-Wirtsch.-Inf.
About
168
Publications
68,769
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,165
Citations
Introduction
Professor of Information Systems Engineering
Additional affiliations
February 2010 - present
September 2003 - January 2010
June 1997 - September 2000
Publications
Publications (168)
Methods and software components for developing novel IT solutions based on artificial intelligence (AI) technology are broadly available to organizations of any size. However, as AI typically requires large amounts of data, smaller organizations are at a disadvantage compared to large competitors as the latter often have more training and test data...
Given the ongoing "arms race" in cybersecurity, the shortage of skilled professionals in this field is one of the strongest in computer science. The currently unmet staffing demand in cybersecurity is estimated at over 3 million jobs worldwide. Furthermore, the qualifications of the existing workforce are largely believed to be insufficient. We att...
Deepfakes endanger business and society. Regarding fraudulent texts created with deep learning techniques, this may become particularly evident for online reviews. Here, customers naturally rely on truthful information about a product or service to adequately evaluate its worthiness. However, in light of the proliferation of deepfakes, customers ma...
The study considers the application of text mining techniques to the analysis of curricula for study programs offered by institutions of higher education. It presents a novel procedure for efficient and scalable quantitative content analysis of module handbooks using topic modeling. The proposed approach allows for collecting, analyzing, evaluating...
Deep learning increasingly receives attention due to its ability to efficiently solve various complex prediction tasks in organizations. It is therefore not surprising that more and more business processes are supported by deep learning. With the proliferation of edge intelligence, this trend will continue and, in parallel, new forms of internal an...
Today's working environments are subject to dynamic changes due to the proliferation of digital technologies and systems. This phenomenon poses a challenge for universities and other institutions of higher education, which are expected to adapt their course offerings to the rapidly changing demands in the labor market. The complexity of the task an...
Deep learning increasingly receives attention due to its ability to efficiently solve various complex prediction tasks in organizations. It is therefore not surprising that more and more business processes are supported by deep learning. With the proliferation of edge intelligence, this trend will continue and, in parallel, new forms of internal an...
Experimenting with the creative process.
The increasing adoption of omnichannel strategies in recent years has led retail companies worldwide to fundamentally rethink the future role of their network of brick-and-mortar stores. One strategic option being pursued by many retailers is the transformation of the stationary store into a “smart store,” augmented by various digital services. How...
Blockchain technology has gained tremendous importance in recent years, paving the way for crypto-currencies and crowdfunding via Initial Coin Offerings (ICOs). However, the possibility to raise vast amounts of money in an anonymized and unregulated market also attracts criminals who cause substantial damage to investors. In the present study, we b...
FinTech (financial technology) applications are evolving at a rapid speed and are increasingly based on blockchain technology. Startups developing and offering such blockchain-based FinTech applications frequently raise capital through initial coin offerings (ICOs). Against this backdrop, it remains unclear to what extent these startups exploit the...
The present study explores the phenomenon of remixing in product design for additive manufacturing (AM). In contrast to other manufacturing techniques, AM offers unprecedented flexibility in adapting existing product designs to changing requirements. However, in order to benefit from this potential, structured design procedures and tools are indisp...
Obgleich mehrere Forscher die Wichtigkeit von Predictive Analytics für den theoretischen Erkenntnisgewinn hervorgehoben haben, werden IS-Theorien der Verhaltensforschung in der Regel nicht auf ihre Vorhersagekraft getestet. Vor diesem Hintergrund soll in dem diesem Artikel zugrundeliegenden Forschungsprojekt am Beispiel der Technologieakzeptanzfors...
Automated checkout systems promise greater sales due to an improved customer experience and cost savings because less store personnel is needed. The present design-oriented IS research study is concerned with an automated checkout solution in fashion retail stores. The implementation of such a cyberphysical system in established retail environments...
Once again, the working world is in turmoil and the next revolution is just around the corner (or already here): Digitalization. It offers enterprises great opportunities but also poses new challenges and uncertainties. The IS discipline is in a position to manage this digital transformation and most IS students will one day work in the businesses...
Retailers worldwide have started deploying smart service innovations in their stores to regain market share lost to online competitors. Against this backdrop, this paper focuses on the design of product recommendation systems for fashion stores. Our research particularly aims at answering the issues of whether and to what extent (i) the sensing cap...
The reuse of existing knowledge is an indispensable part of the creation of novel ideas. In the creative domain knowledge reuse is a common practice known as ‘‘remixing’’. With the emergence of open internet-based platforms in recent years, remixing has found its way from the world of music and art to the design of arbitrary physical goods. However...
We expand the design theory for cyber physical systems by introducing the notion of mutability of legacy components. Mutability refers to the extent components of the legacy system can be modified to facilitate better integration with the information system components. In particular, immutable components must remain untouched during the introductio...
The advent of e-commerce puts traditional retail companies under a lot of pressure. A way retailers try to attract more customers to their physical stores is by offering online services on the retail sales floor. Such services are enabled through pervasive retail systems. These systems, however, do not only offer new opportunities but also bear ris...
Distinguishing between RFID-tagged objects within different areas poses an important building block for many RFID-based applications. Existing localization techniques, however, often cannot reliably distinguish between tagged objects that are close to the border of adjacent areas. Against this backdrop, we present a hybrid approach based on an ANN...
Traditional checkout systems are labor-intensive and can be a great source of frustration for customers when having to wait in line. In contrast, automated checkout systems scan, total and charge a customer’s purchase to a registered payments account while they are simply leaving the store. We focus on the main challenge of automatically detecting...
Smart Fitting Rooms offer great potential to enhance customer shopping experience in retail fashion stores. To this end, they leverage auto-id technology to detect product selections of customers and offer additional services based on these selections on screens within the Smart Fitting Room cabins (e.g., product recommendations or Omnichannel serv...
In today’s globalized world, companies are faced with numerous and continuously changing legal requirements. To ensure that these companies are compliant with legal regulations, law and consulting firms use open legal data published by governments worldwide. With this data pool growing rapidly, the complexity of legal research is strongly increasin...
The advent of e-commerce puts traditional retail companies under a lot of pressure. One way they try to attract more customers to their physical stores is by offering online services on the retail sales floor. Such services are built on the Internet of Things which denotes the equipment of ordinary objects with digital smartness. One example is a f...
OBJECTIVE: This paper aims at proposing a new framework for the classification of RFID deployments in fashion and apparel retailing. The framework encompasses several different use cases (UCs) pursued by fashion and apparel retailers in the last decade, and updates, expands and goes beyond what has already been presented in the related literature....
The growing interest in Radio Frequency Identification (RFID) technology in recent years has sparked an intensive debate on the benefits to be expected. With the growth of RFID implementations in size and scope comes a shift away from infrastructural aspects to the question of how to draw value from the large amounts of collected data. However, the...
False-positive classification is a central issue for RFID environments with limited process control, such as in-store settings. In the case of electronic article surveillance, false positives not only lead to incorrect inventory data but also trigger false alarms, which impair customer satisfaction. A typical counter measure is to reduce antenna po...
The increasing emergence of pervasive information systems requires a clearer understanding of the underlying characteristics in relation to user acceptance. Based on the integration of UTAUT2 and three pervasiveness constructs, we derived a comprehensive research model to account for pervasive information systems. Data collected from 346 participan...
The conjecture that all innovations are radical new ideas is flawed. In fact, for the most part innovations are recombinations of existing concepts, that is, so-called ‘remixes’. However, creators, inventors, artists, and companies are usually reluctant to disclose their sources of inspiration for fear of possible copyright infringements. As a cons...
IntroductionAdditive manufacturing (AM) - also known under the umbrella term “3D printing” - denotes a family of manufacturing techniques that allow for the generation of arbitrary physical objects layer by layer from digital 3D blueprints. Although several companies have used AM in prototyping for more than 25 years, it was only recently that the...
The use of Radio Frequency Identification (RFID) as a tool for improving shelf replenishment processes in stores has attracted the interest of several retailers. However, the performance of RFID-based inventory control policies is influenced by a variety of design choices, technology characteristics, and external influences. The present simulation...
In recent years, Radio Frequency Identification (RFID) has been widely adopted as a solution for the fully automatic identification of physical objects. However, technological and physical constraints may sometimes hamper a productive use. One of the key issues is the problem of false-positive RFID tag reads, that is, RFID transponders that are det...
Im Jahr 2006 hat Hubert Österle gemeinsam mit dem damaligen SAPVorstandssprecher Henning Kagermann das Buch „Geschäftsmodelle 2010“ veröffentlicht. Darin beschreiben die beiden Autoren einen Paradigmenwechsel in der Informationstechnologie, der „intelligentere“ Geschäftsmodelle erlaubt. Ähnlich wie in den 1990er Jahren mit der Geschäftsprozessorien...
RFID technology allows the collecting of fine-grained real-time information on physical processes in the
supply chain that often cannot be monitored using conventional approaches. However, because of the phenomenon
of false-positive reads, RFID data streams resemble noisy analog measurements rather than the
desired recordings of activities within a...
Benefits through using RFID in retail organizations have been frequently discussed in academia and practice. However, implementers still face many problems and challenges in achieving the estimated benefits of this technology. To support practitioners in the resolution of various issues associated with the practical implementation of productive RFI...
In the present study, we investigate to which degree persuasion profiling can increase the effectiveness of adaptive persuasive systems. For this purpose, an experiment was conducted in which subjects were exposed to persuasive SMS messages under three experimental conditions. One group received messages that fit to their personality traits, a seco...
This study investigates the role of information systems in stimulating energy-efficient behavior in private households. We present the example of Velix, a web portal designed to motivate customers of a utility company to reduce their electricity consumption. In particular, we consider the effectiveness of goal setting functionality and defaults in...
Purpose ‐ The purpose of this paper is to assess the value of radio-frequency identification (RFID) and sensor technologies to reverse logistics processes. The research is motivated by the question of to what extent the accuracy of information on product quality delivered by such technologies impacts the total recovered value that companies obtain...
The growing interest in Radio Frequency Identification (RFID) technology in recent years has sparked an intensive debate on the benefits to be expected. With the growth of RFID implementations in size and scope comes a shift away from infrastructural aspects to the question of how to draw value from the large amounts of collected data. However, the...
The growing interest in Radio Frequency Identification (RFID) technology in recent years has sparked an intensive debate on the benefits to be expected. With the growth of RFID implementations in size and scope comes a shift away from infrastructural aspects to the question of how to draw value from the large amounts of collected data. However, the...
Vehicle sensor data enable novel, usage-based insurance premium models known as ‘Pay-As-You-Drive’ (PAYD) insurance, but pose substantial challenges for actuarial decision-making because of their inherent complexity and volume. Based on a large real-world sample of location data from 1572 vehicles, the present study proposes a classification analys...
The problem of false-positive RFID tag reads i.e., tags that have been read unintentionally by a reader, is crucial for the actual implementation of RFID solutions in the real world. Prior research has shown that the use of the low-level reader data is suitable to approach this problem and it is the scope of this paper to evaluate the use of altern...
Vehicle sensor data enable novel, usage-based insurance premium models known as 'Pay-As-You-Drive' (PAYD) insurance, but pose substantial challenges for actuarial decision-making because of their inherent complexity and volume. Based on a large real-world sample of location data from 1572 vehicles, the present study proposes a classification analys...
Ubiquitous IS enables novel services and business models, yet require a careful balancing of consumer privacy concerns (PC) - induced by the provision of particular sensors and information types - with functional performance in order to maximize acceptance. For the exemplary case of Usage-based Insurance (UBI), this paper presents a design science...
Counterfeit trade is amulti-billion dollar industry affecting anever-wider range of goods andmarkets. Despite the
diversity of counterfeit products in terms of complexity, manufacturing techniques, investments in production
facilities, potential dangers or value for the users, and degrees of conflict for the counterfeit producers with the
local aut...
This contribution is concerned with the value of RFID for retail store operations, particularly the use of the technology to automate shelf replenishment decisions. We construct and test an inventory control policy based on RFID data with case-level tagging. Our model incorporates RFID hardware capable of detecting bidirectional product movements b...
Mobilität und Ubiquität sind entscheidende Faktoren bei der Entwicklung, Implementierung
und Anwendung von Informationssystemen. So erlaubt die Verwendung mobiler
und drahtloser Kommunikationstechnik nicht nur eine bessere Unterstützung existierender
mobiler Aktivitäten, sondern bietet auch die technische Grundlage für ganz neue
Arten mobilen Arbei...
The widespread deployment of IT in the past decades has significantly increased the integration reach, breadth, and scope in organisations. Many of the associated socio-economic phenomena have been studied by IS researchers, for example, in the context of IT adoption, the business value of IT, and IS success. Surprisingly though, the concept of int...
Purpose – The present study is concerned with the determinants of RFID adoption among a group of early standards adopters. Despite the extensive discussion of the technological characteristics and expected benefits of RFID in the literature, only little is known about the drivers and barriers of RFID implementations in practice. This holds particul...
Radio Frequency Identification (RFID) can be used in various ways for the optimization of supply chain management processes. However, there are technological constraints that delay a reliable and productive use of the technology. One of these constraints is the problem of false-positive RFID tag reads i.e., tags that have been read unintentionally...
Abstract: This contribution is concerned with the business value of large amounts of data generated by RFID data collection infrastructures. We present the case example of a department store that implemented RFID in its menswear department to seamlessly track thousands of items on their way from the distribution centre to the point of sale. The rec...
Using a mobile application to report an emergency allows for the transmission of the current location. This not only helps rescue teams but supports the assistance service if provided by insurance companies. However, the acceptance behavior as well as the influence of trust related to the insurer is unknown. We hence explore the influence of provid...
This contribution deals with the business value
of radio frequency identification (RFID) technology in the apparel retail industry. We present a case study of an RFID project at Galeria Kaufhof, a subsidiary of Metro Group and one of the largest department store
chains in Europe. The trial shows that operational efficiency gains through the automat...
This contribution is concerned with business value of large amounts of data generated by RFID data collection infrastructures.
We present the case example of a department store that implemented RFID in its menswear department to seamlessly track thousands
of items on their way from the distribution center to the point of sale. The recorded trace da...
This contribution is concerned with the business value of Radio Frequency Identification (RFID) technology in retail. We present a case study of an RFID project at Galeria Kaufhof, a subsidiary of Metro Group and one of the largest department store chains in Europe. The project encompasses a variety of RFID applications at the intersection of store...