{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:09:24Z","timestamp":1767139764101,"version":"build-2238731810"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title>\n                  <jats:p>Mensch-Computer-Interaktion (MCI) besch\u00e4ftigt sich mit Fragen rund um die benutzer- und kontextegerechte Gestaltung von IT-Systemen. Ohne MCI ist die vielbeschworene digitale Transformation nicht m\u00f6glich, da Systeme, die nicht benutzbar (gebrauchstauglich) sind, f\u00fcr ihre Nutzer wertlos oder sogar gef\u00e4hrlich sind\u00a0\u2013 erst Nutzbarkeit schafft Nutzen! In diesem Beitrag sammeln wir einige Beispiele daf\u00fcr, wo und wie MCI in der Entwicklung zuk\u00fcnftiger IT-Systeme relevant ist\u00a0\u2013 von nutzerzentrierter k\u00fcnstlicher Intelligenz \u00fcber benutzbare Sicherheit, cyberphysische Systeme und digital Arbeit hin zu Augmented Reality und Virtual Reality.<\/jats:p>","DOI":"10.1007\/s00287-020-01299-8","type":"journal-article","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T05:04:54Z","timestamp":1598504694000},"page":"381-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mensch-Computer-Interaktion als zentrales Gebiet der Informatik \u2013 Bestandsaufnahme, Trends und Herausforderungen"],"prefix":"10.1007","volume":"43","author":[{"given":"Michael","family":"Koch","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"Ziegler","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schlegel","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Prilla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,27]]},"reference":[{"issue":"4","key":"1299_CR1","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1609\/aimag.v35i4.2513","volume":"35","author":"S Amershi","year":"2014","unstructured":"Amershi\u00a0S, Cakmak\u00a0M, Knox\u00a0WB, Kulesza\u00a0T (2014) Power to the people: the role of humans in interactive machine learning. Ai Mag 35(4):105\u2013120. https:\/\/doi.org\/10.1609\/aimag.v35i4.2513","journal-title":"Ai Mag"},{"key":"1299_CR2","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1017\/CBO9781139046855.020","volume-title":"Cambridge handbook of artificial intelligence","author":"N Bostrom","year":"2014","unstructured":"Bostrom\u00a0N, Yudkowski\u00a0E (2014) The ethics of artificial intelligence. In: Ramsey\u00a0W, Frankish\u00a0K (Hrsg) Cambridge handbook of artificial intelligence. Cambridge University Press, Cambridge, S\u00a0316\u2013334"},{"key":"1299_CR3","series-title":"ArXiv:1710.00794 [Cs]","volume-title":"What does explainable AI really mean? A new conceptualization of perspectives","author":"D Doran","year":"2017","unstructured":"Doran\u00a0D, Schulz\u00a0S, Besold\u00a0TR (2017) What does explainable AI really mean? A new conceptualization of perspectives. ArXiv:1710.00794 [Cs]"},{"issue":"1","key":"1299_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s00287-013-0748-2","volume":"37","author":"F Freiling","year":"2014","unstructured":"Freiling\u00a0F, Grimm\u00a0R, Gro\u00dfpietsch\u00a0K\u2011E, Keller\u00a0HB, Mottok\u00a0J, M\u00fcnch\u00a0I, Saglietti\u00a0F et al (2014) Technische Sicherheit und Informationssicherheit. Informatik Spektrum 37(1):14\u201324. https:\/\/doi.org\/10.1007\/s00287-013-0748-2","journal-title":"Informatik Spektrum"},{"key":"1299_CR5","doi-asserted-by":"publisher","DOI":"10.2200\/S00594ED1V01Y201408SPT011","volume-title":"Usable security. History, themes, and challenges","author":"SL Garfinkel","year":"2014","unstructured":"Garfinkel\u00a0SL, Lipford\u00a0RH (2014) Usable security. History, themes, and challenges. Morgan & Claypool, Williston. https:\/\/doi.org\/10.2200\/S00594ED1V01Y201408SPT011"},{"key":"1299_CR6","volume-title":"Deep learning","author":"I Goodfellow","year":"2017","unstructured":"Goodfellow\u00a0I, Bengio\u00a0Y, Courville\u00a0A (2017) Deep learning. MIT Press, Cambridge"},{"key":"1299_CR7","volume-title":"Mensch-Computer-Interaktion","author":"AM Heinecke","year":"2004","unstructured":"Heinecke\u00a0AM (2004) Mensch-Computer-Interaktion. Carl Hanser, M\u00fcnchen"},{"key":"1299_CR8","doi-asserted-by":"publisher","DOI":"10.1524\/9783486595406","volume-title":"Software-Ergonomie. Theorien, Modelle und Kriterien f\u00fcr gebrauchstaugliche interaktive Computersysteme","author":"M Herczeg","year":"2009","unstructured":"Herczeg\u00a0M (2009) Software-Ergonomie. Theorien, Modelle und Kriterien f\u00fcr gebrauchstaugliche interaktive Computersysteme, 3.\u00a0Aufl. Oldenbourg, M\u00fcnchen","edition":"3"},{"key":"1299_CR9","doi-asserted-by":"publisher","DOI":"10.1524\/9783486720051","volume-title":"Prozessf\u00fchrungssysteme: Sicherheitskritische Mensch-Maschine-Systeme und interaktive Medien zur \u00dcberwachung und Steuerung von Prozessen in Echtzeit","author":"M Herczeg","year":"2014","unstructured":"Herczeg\u00a0M (2014) Prozessf\u00fchrungssysteme: Sicherheitskritische Mensch-Maschine-Systeme und interaktive Medien zur \u00dcberwachung und Steuerung von Prozessen in Echtzeit. De Gruyter, Oldenbourg, Berlin, M\u00fcnchen"},{"issue":"4","key":"1299_CR10","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s00287-015-0901-1","volume":"38","author":"M Herczeg","year":"2015","unstructured":"Herczeg\u00a0M, Koch\u00a0M (2015) Allgegenw\u00e4rtige Mensch-Computer-Interaktion. Informatik Spektrum 38(4):290\u2013295","journal-title":"Informatik Spektrum"},{"key":"1299_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1719030.1719050","volume-title":"Proceedings of the 2009 workshop on New security paradigms workshop - NSPW \u201909","author":"C Herley","year":"2009","unstructured":"Herley\u00a0C (2009) So long, and no thanks for the externalities. In: Proceedings of the 2009 workshop on New security paradigms workshop - NSPW \u201909. ACM Press, New York, S 133\u2013144 https:\/\/doi.org\/10.1145\/1719030.1719050"},{"key":"1299_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1361-5","author":"A Holzinger","year":"2018","unstructured":"Holzinger\u00a0A, Plass\u00a0M, Kickmeier-Rust\u00a0M, Holzinger\u00a0K, Cri\u015fan\u00a0GC, Pintea\u00a0C\u2011M, Palade\u00a0V (2018) Interactive machine learning: experimental evidence for the human in the algorithmic loop. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-018-1361-5","journal-title":"Appl Intell"},{"issue":"1","key":"1299_CR13","doi-asserted-by":"publisher","first-page":"43","DOI":"10.5898\/JHRI.3.1.Johnson","volume":"3","author":"M Johnson","year":"2014","unstructured":"Johnson\u00a0M, Bradshaw\u00a0JM, Feltovich\u00a0PJ, Jonker\u00a0CM, van Riemsdijk\u00a0MB, Sierhuis\u00a0M (2014) Coactive design: designing support for interdependence in joint activity. J\u00a0Hum Robot Interact 3(1):43\u201369. https:\/\/doi.org\/10.5898\/JHRI.3.1.Johnson","journal-title":"J Hum Robot Interact"},{"key":"1299_CR14","unstructured":"Jones H (2018) Geoff Hinton dismissed the need for explainable AI: 8 experts explain why he\u2019s wrong. https:\/\/www.forbes.com\/sites\/cognitiveworld\/2018\/12\/20\/geoff-hinton-dismissed-the-need-for-explainable-ai-8-experts-explain-why-hes-wrong\/. Zugegriffen: 22. M\u00e4rz 2019"},{"issue":"2","key":"1299_CR15","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s00287-017-1027-4","volume":"40","author":"M Koch","year":"2017","unstructured":"Koch\u00a0M, Alt\u00a0F (2017) Allgegenw\u00e4rtige Mensch-Computer-Interaktion. Informatik Spektrum 40(2):147\u2013152","journal-title":"Informatik Spektrum"},{"key":"1299_CR16","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/ASE.2017.8115707","volume-title":"CogniCrypt: supporting developers in using cryptography","author":"S Kruger","year":"2017","unstructured":"Kruger\u00a0S, Nadi\u00a0S, Reif\u00a0M, Ali\u00a0K, Mezini\u00a0M, Bodden\u00a0E, Kamath\u00a0R et\u00a0al (2017) CogniCrypt: supporting developers in using cryptography. ASE 2017\u2014Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, S\u00a0931\u2013936 https:\/\/doi.org\/10.1109\/ASE.2017.8115707"},{"key":"1299_CR17","series-title":"arXiv:1707.01154","volume-title":"Interpretable & explorable approximations of black box models","author":"H Lakkaraju","year":"2017","unstructured":"Lakkaraju\u00a0H, Kamar\u00a0E, Caruana\u00a0R, Leskovec\u00a0J (2017) Interpretable & explorable approximations of black box models. arXiv:1707.01154 (http:\/\/arxiv.org\/abs\/1707.01154)"},{"key":"1299_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2016.12.038","volume":"234","author":"W Liu","year":"2017","unstructured":"Liu\u00a0W, Wang\u00a0Z, Liu\u00a0X, Zeng\u00a0N, Liu\u00a0Y, Alsaadi\u00a0FE (2017) A survey of deep neural network architectures and their applications. Neurocomputing 234:11\u201326. https:\/\/doi.org\/10.1016\/j.neucom.2016.12.038","journal-title":"Neurocomputing"},{"key":"1299_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ijhcs.2018.05.002","volume":"121","author":"B Loepp","year":"2019","unstructured":"Loepp\u00a0B, Donkers\u00a0T, Kleemann\u00a0T, Ziegler\u00a0J (2019) Interactive recommending with Tag-Enhanced Matrix Factorization (TagMF). Int J Hum Comput Stud 121:21\u201341. https:\/\/doi.org\/10.1016\/j.ijhcs.2018.05.002","journal-title":"Int J Hum Comput Stud"},{"issue":"C","key":"1299_CR20","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.chb.2014.04.043","volume":"37","author":"GM Lucas","year":"2014","unstructured":"Lucas\u00a0GM, Gratch\u00a0J, King\u00a0A, Morency\u00a0L\u2011P (2014) It\u2019s only a\u00a0computer. Comput Hum Behav 37(C):94\u2013100. https:\/\/doi.org\/10.1016\/j.chb.2014.04.043","journal-title":"Comput Hum Behav"},{"key":"1299_CR21","first-page":"1321","volume":"E77-D","author":"P Milgram","year":"1994","unstructured":"Milgram\u00a0P, Kishino\u00a0F (1994) A taxonomy of mixed reality visual displays. IEICE Trans Inf ^|^ Syst E77-D:1321\u20131329","journal-title":"IEICE Trans Inf ^|^ Syst"},{"key":"1299_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1201\/b15703-3","volume-title":"User centered system design","author":"DA Norman","year":"1986","unstructured":"Norman\u00a0DA (1986) Cognitive engineering. In: Norman\u00a0DA, Draper\u00a0SW (Hrsg) User centered system design. Lawrence Erlbaum, Hillsdale, S\u00a031\u201361"},{"key":"1299_CR23","volume-title":"The invisible computer","author":"DA Norman","year":"1998","unstructured":"Norman\u00a0DA (1998) The invisible computer. MIT Press, Cambridge"},{"key":"1299_CR24","volume-title":"Emotional design","author":"DA Norman","year":"2004","unstructured":"Norman\u00a0DA (2004) Emotional design. Basic Books, New York"},{"key":"1299_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-19523-6","volume-title":"Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement","author":"C Reuter","year":"2018","unstructured":"Reuter\u00a0C (2018) Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden https:\/\/doi.org\/10.1007\/978-3-658-19523-6"},{"key":"1299_CR26","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-658-19523-6_2","volume-title":"Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement","author":"C Reuter","year":"2018","unstructured":"Reuter\u00a0C, Kaufhold\u00a0M\u2011A (2018) Usable Safety Engineering sicherheitskritischer interaktiver Systeme. In: Reuter\u00a0C (Hrsg) Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, S 17\u201340 https:\/\/doi.org\/10.1007\/978-3-658-19523-6_2"},{"key":"1299_CR27","volume-title":"Experience design","author":"N Shedroff","year":"2001","unstructured":"Shedroff\u00a0N (2001) Experience design. New Riders, Indianapolis"},{"key":"1299_CR28","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-1-4899-7637-6_10","volume-title":"Recommender Systems Handbook","author":"N Tintarev","year":"2015","unstructured":"Tintarev\u00a0N, Masthoff\u00a0J (2015) Explaining recommendations: design and evaluation. In: Recommender Systems Handbook. Springer, Berlin Heidelberg, S\u00a0353\u2013382"},{"key":"1299_CR29","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1145\/3282894.3289743","volume-title":"Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia","author":"L Trotter","year":"2018","unstructured":"Trotter\u00a0L, Prange\u00a0S, Khamis\u00a0M, Davies\u00a0N, Alt\u00a0F (2018) Design considerations for secure and usable authentication on situated displays. In: Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia. ACM, New York, S\u00a0483\u2013490 https:\/\/doi.org\/10.1145\/3282894.3289743"}],"updated-by":[{"DOI":"10.1007\/s00287-021-01379-3","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000}}],"container-title":["Informatik Spektrum"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-020-01299-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00287-020-01299-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-020-01299-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T19:44:25Z","timestamp":1630007065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00287-020-01299-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,27]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1299"],"URL":"https:\/\/doi.org\/10.1007\/s00287-020-01299-8","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,27]]},"assertion":[{"value":"27 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2021","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Erratum","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Zu diesem Beitrag wurde ein Erratum ver\u00f6ffentlicht:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s00287-021-01379-3","URL":"https:\/\/doi.org\/10.1007\/s00287-021-01379-3","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}