Frederic Thiesse

Frederic Thiesse
University of Wuerzburg | JMU · Department of Management and Economics

Prof. Dr. oec. Dipl.-Wirtsch.-Inf.

About

168
Publications
68,769
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,165
Citations
Additional affiliations
February 2010 - present
University of Wuerzburg
Position
  • Professor (Full)
September 2003 - January 2010
University of St.Gallen
Position
  • Professor (Assistant)
June 1997 - September 2000
University of St.Gallen
Position
  • Research Assistant

Publications

Publications (168)
Conference Paper
Full-text available
Methods and software components for developing novel IT solutions based on artificial intelligence (AI) technology are broadly available to organizations of any size. However, as AI typically requires large amounts of data, smaller organizations are at a disadvantage compared to large competitors as the latter often have more training and test data...
Preprint
Full-text available
Given the ongoing "arms race" in cybersecurity, the shortage of skilled professionals in this field is one of the strongest in computer science. The currently unmet staffing demand in cybersecurity is estimated at over 3 million jobs worldwide. Furthermore, the qualifications of the existing workforce are largely believed to be insufficient. We att...
Conference Paper
Full-text available
Deepfakes endanger business and society. Regarding fraudulent texts created with deep learning techniques, this may become particularly evident for online reviews. Here, customers naturally rely on truthful information about a product or service to adequately evaluate its worthiness. However, in light of the proliferation of deepfakes, customers ma...
Article
Full-text available
The study considers the application of text mining techniques to the analysis of curricula for study programs offered by institutions of higher education. It presents a novel procedure for efficient and scalable quantitative content analysis of module handbooks using topic modeling. The proposed approach allows for collecting, analyzing, evaluating...
Chapter
Deep learning increasingly receives attention due to its ability to efficiently solve various complex prediction tasks in organizations. It is therefore not surprising that more and more business processes are supported by deep learning. With the proliferation of edge intelligence, this trend will continue and, in parallel, new forms of internal an...
Conference Paper
Full-text available
Today's working environments are subject to dynamic changes due to the proliferation of digital technologies and systems. This phenomenon poses a challenge for universities and other institutions of higher education, which are expected to adapt their course offerings to the rapidly changing demands in the labor market. The complexity of the task an...
Conference Paper
Full-text available
Deep learning increasingly receives attention due to its ability to efficiently solve various complex prediction tasks in organizations. It is therefore not surprising that more and more business processes are supported by deep learning. With the proliferation of edge intelligence, this trend will continue and, in parallel, new forms of internal an...
Article
The increasing adoption of omnichannel strategies in recent years has led retail companies worldwide to fundamentally rethink the future role of their network of brick-and-mortar stores. One strategic option being pursued by many retailers is the transformation of the stationary store into a “smart store,” augmented by various digital services. How...
Conference Paper
Full-text available
Blockchain technology has gained tremendous importance in recent years, paving the way for crypto-currencies and crowdfunding via Initial Coin Offerings (ICOs). However, the possibility to raise vast amounts of money in an anonymized and unregulated market also attracts criminals who cause substantial damage to investors. In the present study, we b...
Conference Paper
Full-text available
FinTech (financial technology) applications are evolving at a rapid speed and are increasingly based on blockchain technology. Startups developing and offering such blockchain-based FinTech applications frequently raise capital through initial coin offerings (ICOs). Against this backdrop, it remains unclear to what extent these startups exploit the...
Article
Full-text available
The present study explores the phenomenon of remixing in product design for additive manufacturing (AM). In contrast to other manufacturing techniques, AM offers unprecedented flexibility in adapting existing product designs to changing requirements. However, in order to benefit from this potential, structured design procedures and tools are indisp...
Conference Paper
Full-text available
Obgleich mehrere Forscher die Wichtigkeit von Predictive Analytics für den theoretischen Erkenntnisgewinn hervorgehoben haben, werden IS-Theorien der Verhaltensforschung in der Regel nicht auf ihre Vorhersagekraft getestet. Vor diesem Hintergrund soll in dem diesem Artikel zugrundeliegenden Forschungsprojekt am Beispiel der Technologieakzeptanzfors...
Article
Full-text available
Automated checkout systems promise greater sales due to an improved customer experience and cost savings because less store personnel is needed. The present design-oriented IS research study is concerned with an automated checkout solution in fashion retail stores. The implementation of such a cyberphysical system in established retail environments...
Conference Paper
Full-text available
Once again, the working world is in turmoil and the next revolution is just around the corner (or already here): Digitalization. It offers enterprises great opportunities but also poses new challenges and uncertainties. The IS discipline is in a position to manage this digital transformation and most IS students will one day work in the businesses...
Conference Paper
Full-text available
Retailers worldwide have started deploying smart service innovations in their stores to regain market share lost to online competitors. Against this backdrop, this paper focuses on the design of product recommendation systems for fashion stores. Our research particularly aims at answering the issues of whether and to what extent (i) the sensing cap...
Article
Full-text available
The reuse of existing knowledge is an indispensable part of the creation of novel ideas. In the creative domain knowledge reuse is a common practice known as ‘‘remixing’’. With the emergence of open internet-based platforms in recent years, remixing has found its way from the world of music and art to the design of arbitrary physical goods. However...
Conference Paper
Full-text available
We expand the design theory for cyber physical systems by introducing the notion of mutability of legacy components. Mutability refers to the extent components of the legacy system can be modified to facilitate better integration with the information system components. In particular, immutable components must remain untouched during the introductio...
Conference Paper
Full-text available
The advent of e-commerce puts traditional retail companies under a lot of pressure. A way retailers try to attract more customers to their physical stores is by offering online services on the retail sales floor. Such services are enabled through pervasive retail systems. These systems, however, do not only offer new opportunities but also bear ris...
Conference Paper
Distinguishing between RFID-tagged objects within different areas poses an important building block for many RFID-based applications. Existing localization techniques, however, often cannot reliably distinguish between tagged objects that are close to the border of adjacent areas. Against this backdrop, we present a hybrid approach based on an ANN...
Conference Paper
Full-text available
Traditional checkout systems are labor-intensive and can be a great source of frustration for customers when having to wait in line. In contrast, automated checkout systems scan, total and charge a customer’s purchase to a registered payments account while they are simply leaving the store. We focus on the main challenge of automatically detecting...
Conference Paper
Full-text available
Smart Fitting Rooms offer great potential to enhance customer shopping experience in retail fashion stores. To this end, they leverage auto-id technology to detect product selections of customers and offer additional services based on these selections on screens within the Smart Fitting Room cabins (e.g., product recommendations or Omnichannel serv...
Conference Paper
Full-text available
In today’s globalized world, companies are faced with numerous and continuously changing legal requirements. To ensure that these companies are compliant with legal regulations, law and consulting firms use open legal data published by governments worldwide. With this data pool growing rapidly, the complexity of legal research is strongly increasin...
Conference Paper
The advent of e-commerce puts traditional retail companies under a lot of pressure. One way they try to attract more customers to their physical stores is by offering online services on the retail sales floor. Such services are built on the Internet of Things which denotes the equipment of ordinary objects with digital smartness. One example is a f...
Article
Full-text available
OBJECTIVE: This paper aims at proposing a new framework for the classification of RFID deployments in fashion and apparel retailing. The framework encompasses several different use cases (UCs) pursued by fashion and apparel retailers in the last decade, and updates, expands and goes beyond what has already been presented in the related literature....
Article
The growing interest in Radio Frequency Identification (RFID) technology in recent years has sparked an intensive debate on the benefits to be expected. With the growth of RFID implementations in size and scope comes a shift away from infrastructural aspects to the question of how to draw value from the large amounts of collected data. However, the...
Conference Paper
Full-text available
False-positive classification is a central issue for RFID environments with limited process control, such as in-store settings. In the case of electronic article surveillance, false positives not only lead to incorrect inventory data but also trigger false alarms, which impair customer satisfaction. A typical counter measure is to reduce antenna po...
Conference Paper
The increasing emergence of pervasive information systems requires a clearer understanding of the underlying characteristics in relation to user acceptance. Based on the integration of UTAUT2 and three pervasiveness constructs, we derived a comprehensive research model to account for pervasive information systems. Data collected from 346 participan...
Conference Paper
Full-text available
The conjecture that all innovations are radical new ideas is flawed. In fact, for the most part innovations are recombinations of existing concepts, that is, so-called ‘remixes’. However, creators, inventors, artists, and companies are usually reluctant to disclose their sources of inspiration for fear of possible copyright infringements. As a cons...
Article
Full-text available
IntroductionAdditive manufacturing (AM) - also known under the umbrella term “3D printing” - denotes a family of manufacturing techniques that allow for the generation of arbitrary physical objects layer by layer from digital 3D blueprints. Although several companies have used AM in prototyping for more than 25 years, it was only recently that the...
Article
The use of Radio Frequency Identification (RFID) as a tool for improving shelf replenishment processes in stores has attracted the interest of several retailers. However, the performance of RFID-based inventory control policies is influenced by a variety of design choices, technology characteristics, and external influences. The present simulation...
Conference Paper
In recent years, Radio Frequency Identification (RFID) has been widely adopted as a solution for the fully automatic identification of physical objects. However, technological and physical constraints may sometimes hamper a productive use. One of the key issues is the problem of false-positive RFID tag reads, that is, RFID transponders that are det...
Chapter
Im Jahr 2006 hat Hubert Österle gemeinsam mit dem damaligen SAPVorstandssprecher Henning Kagermann das Buch „Geschäftsmodelle 2010“ veröffentlicht. Darin beschreiben die beiden Autoren einen Paradigmenwechsel in der Informationstechnologie, der „intelligentere“ Geschäftsmodelle erlaubt. Ähnlich wie in den 1990er Jahren mit der Geschäftsprozessorien...
Article
RFID technology allows the collecting of fine-grained real-time information on physical processes in the supply chain that often cannot be monitored using conventional approaches. However, because of the phenomenon of false-positive reads, RFID data streams resemble noisy analog measurements rather than the desired recordings of activities within a...
Conference Paper
Benefits through using RFID in retail organizations have been frequently discussed in academia and practice. However, implementers still face many problems and challenges in achieving the estimated benefits of this technology. To support practitioners in the resolution of various issues associated with the practical implementation of productive RFI...
Article
In the present study, we investigate to which degree persuasion profiling can increase the effectiveness of adaptive persuasive systems. For this purpose, an experiment was conducted in which subjects were exposed to persuasive SMS messages under three experimental conditions. One group received messages that fit to their personality traits, a seco...
Article
Full-text available
This study investigates the role of information systems in stimulating energy-efficient behavior in private households. We present the example of Velix, a web portal designed to motivate customers of a utility company to reduce their electricity consumption. In particular, we consider the effectiveness of goal setting functionality and defaults in...
Article
Purpose ‐ The purpose of this paper is to assess the value of radio-frequency identification (RFID) and sensor technologies to reverse logistics processes. The research is motivated by the question of to what extent the accuracy of information on product quality delivered by such technologies impacts the total recovered value that companies obtain...
Article
Full-text available
The growing interest in Radio Frequency Identification (RFID) technology in recent years has sparked an intensive debate on the benefits to be expected. With the growth of RFID implementations in size and scope comes a shift away from infrastructural aspects to the question of how to draw value from the large amounts of collected data. However, the...
Article
The growing interest in Radio Frequency Identification (RFID) technology in recent years has sparked an intensive debate on the benefits to be expected. With the growth of RFID implementations in size and scope comes a shift away from infrastructural aspects to the question of how to draw value from the large amounts of collected data. However, the...
Article
Vehicle sensor data enable novel, usage-based insurance premium models known as ‘Pay-As-You-Drive’ (PAYD) insurance, but pose substantial challenges for actuarial decision-making because of their inherent complexity and volume. Based on a large real-world sample of location data from 1572 vehicles, the present study proposes a classification analys...
Conference Paper
The problem of false-positive RFID tag reads i.e., tags that have been read unintentionally by a reader, is crucial for the actual implementation of RFID solutions in the real world. Prior research has shown that the use of the low-level reader data is suitable to approach this problem and it is the scope of this paper to evaluate the use of altern...
Article
Vehicle sensor data enable novel, usage-based insurance premium models known as 'Pay-As-You-Drive' (PAYD) insurance, but pose substantial challenges for actuarial decision-making because of their inherent complexity and volume. Based on a large real-world sample of location data from 1572 vehicles, the present study proposes a classification analys...
Conference Paper
Ubiquitous IS enables novel services and business models, yet require a careful balancing of consumer privacy concerns (PC) - induced by the provision of particular sensors and information types - with functional performance in order to maximize acceptance. For the exemplary case of Usage-based Insurance (UBI), this paper presents a design science...
Article
Counterfeit trade is amulti-billion dollar industry affecting anever-wider range of goods andmarkets. Despite the diversity of counterfeit products in terms of complexity, manufacturing techniques, investments in production facilities, potential dangers or value for the users, and degrees of conflict for the counterfeit producers with the local aut...
Article
This contribution is concerned with the value of RFID for retail store operations, particularly the use of the technology to automate shelf replenishment decisions. We construct and test an inventory control policy based on RFID data with case-level tagging. Our model incorporates RFID hardware capable of detecting bidirectional product movements b...
Book
Full-text available
Mobilität und Ubiquität sind entscheidende Faktoren bei der Entwicklung, Implementierung und Anwendung von Informationssystemen. So erlaubt die Verwendung mobiler und drahtloser Kommunikationstechnik nicht nur eine bessere Unterstützung existierender mobiler Aktivitäten, sondern bietet auch die technische Grundlage für ganz neue Arten mobilen Arbei...
Conference Paper
Full-text available
The widespread deployment of IT in the past decades has significantly increased the integration reach, breadth, and scope in organisations. Many of the associated socio-economic phenomena have been studied by IS researchers, for example, in the context of IT adoption, the business value of IT, and IS success. Surprisingly though, the concept of int...
Article
Purpose – The present study is concerned with the determinants of RFID adoption among a group of early standards adopters. Despite the extensive discussion of the technological characteristics and expected benefits of RFID in the literature, only little is known about the drivers and barriers of RFID implementations in practice. This holds particul...
Conference Paper
Radio Frequency Identification (RFID) can be used in various ways for the optimization of supply chain management processes. However, there are technological constraints that delay a reliable and productive use of the technology. One of these constraints is the problem of false-positive RFID tag reads i.e., tags that have been read unintentionally...
Conference Paper
Full-text available
Abstract: This contribution is concerned with the business value of large amounts of data generated by RFID data collection infrastructures. We present the case example of a department store that implemented RFID in its menswear department to seamlessly track thousands of items on their way from the distribution centre to the point of sale. The rec...
Conference Paper
Using a mobile application to report an emergency allows for the transmission of the current location. This not only helps rescue teams but supports the assistance service if provided by insurance companies. However, the acceptance behavior as well as the influence of trust related to the insurer is unknown. We hence explore the influence of provid...
Chapter
Full-text available
This contribution deals with the business value of radio frequency identification (RFID) technology in the apparel retail industry. We present a case study of an RFID project at Galeria Kaufhof, a subsidiary of Metro Group and one of the largest department store chains in Europe. The trial shows that operational efficiency gains through the automat...
Chapter
Full-text available
This contribution is concerned with business value of large amounts of data generated by RFID data collection infrastructures. We present the case example of a department store that implemented RFID in its menswear department to seamlessly track thousands of items on their way from the distribution center to the point of sale. The recorded trace da...
Article
Full-text available
This contribution is concerned with the business value of Radio Frequency Identification (RFID) technology in retail. We present a case study of an RFID project at Galeria Kaufhof, a subsidiary of Metro Group and one of the largest department store chains in Europe. The project encompasses a variety of RFID applications at the intersection of store...