Ali Sunyaev

Ali Sunyaev
Karlsruhe Institute of Technology | KIT · Institute of Applied Informatics and Formal Description Methods

About

324
Publications
145,036
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,609
Citations
Additional affiliations
June 2010 - February 2016
University of Cologne
Position
  • Professor (Assistant)

Publications

Publications (324)
Article
Full-text available
Background: Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora an...
Article
Full-text available
Cloud computing (CC) is an emerging form of IT outsourcing (ITO) that requires organizations to adjust their sourcing processes. Although ITO researchers have established an extensive knowledge base on the determinant factors that drive sourcing decisions from various theoretical perspectives, the majority of research on cloud-sourcing decisions fo...
Article
Full-text available
Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35 000 mHealth apps are available for iOS and Android. Of the 6...
Article
Full-text available
Chronic medical conditions take a huge toll on lives of a growing number of people and are a major contributor to the rising costs in healthcare. As patients are increasingly willing to take an active part in managing their conditions, chronic disease self-management programs and information systems that support them are recognized for their potent...
Article
Full-text available
Cloud computing is an evolving paradigm that affects a large part of the IT industry, in particular the way hardware and software are deployed: as a service. Despite advantages of cloud computing, small and medium enterprises in particular remain cautious implementing cloud service solutions. Promoting transparent information exchange between cloud...
Article
Full-text available
Emerging technologies in healthcare such as wearables, robotics, nanotech, connected health, and genomics technologies produce increasing amounts of data, which fuel artificial intelligence-powered algorithms to actively react to, predict, and prevent diseases and steer scarce healthcare resources. Currently, while digitalization in the healthcare...
Article
Full-text available
Although consumers and experts often express concerns regarding the questionable business practices of direct-to-consumer (DTC) genetic testing services (e.g., reselling of consumers' genetic data), the DTC genetic testing market keeps expanding rapidly. We employ retail fairness as our theoretical lens to address this seeming paradox and conduct a...
Article
Full-text available
While the importance of information system (IS) certifications to demonstrate compliance with security and personal data protection requirements is constantly increasing, competing (theoretical) viewpoints exist that outline the rationales for organizations to adopt certifica-tions. The results of these competing perspectives are inconclusive resea...
Article
Full-text available
Zusammenfassung Der DigitalPakt Schule soll das deutsche Bildungswesen flächendeckend modernisieren, zeigt jedoch bisher Anlaufschwierigkeiten. Die bereitgestellten Fördermittel werden zögerlich abgerufen und die Kritiker:innen des Programms werden immer lauter. Diese Arbeit setzt genau an diesem Punkt an und diskutiert Ursachen und Einflüsse, die...
Conference Paper
Full-text available
Poorly annotated data is a common problem for data-intensive applications like supervised machine learning. In domains like healthcare, annotation tasks require specific domain knowledge and are thus often done manually by experts, which is error-prone, time-intensive, and tedious. In this study, we investigate gamification as a means to foster ann...
Article
Full-text available
Objective Rising interests in distributed ledger technology (DLT) and genomics have sparked various interdisciplinary research streams with a proliferating number of scattered publications investigating the application of DLT in genomics. This review aims to uncover the current state of research on DLT in genomics, in terms of focal research themes...
Preprint
Full-text available
Federated learning (FL) has received high interest from researchers and practitioners to train machine learning (ML) models for healthcare. Ensuring the trustworthiness of these models is essential. Especially bias, defined as a disparity in the model's predictive performance across different subgroups, may cause unfairness against specific subgrou...
Preprint
BACKGROUND With direct-to-consumer (DTC) genetic testing allowing consumers self-responsible access to novel information on their ancestry, traits, or health, consumers often turn to social media for assistance and discussion. While YouTube, the largest social media platform for videos, offers an abundance of DTC genetic testing-related videos, use...
Article
Prior information system research remains inconsistent of the effects of system certifications. In their current use, certifications are often reduced to graphical seals. This approach fails to incorporate detailed assurance information emanating from the certification process. To address this gap, we adopt a design science approach and deploy a fo...
Preprint
Full-text available
Current advanced hyperparameter optimization (HPO) methods, such as Bayesian optimization, have high sampling efficiency and facilitate replicability. Nonetheless, machine learning (ML) practitioners (e.g., engineers, scientists) mostly apply less advanced HPO methods, which can increase resource consumption during HPO or lead to underoptimized ML...
Conference Paper
Full-text available
In the emerging information economy, data evolves as an essential asset and personal data in particular is used for data-driven business models. However, companies frequently leverage personal data without considering individuals’ data sovereignty. Therefore, we strive to strengthen individuals’ position in data ecosystems by combining concepts of...
Conference Paper
Full-text available
Converging hedonic and utilitarian elements under the label of gamification has become an important phenomenon in information systems over the last decade. Yet, academic discourse on narratives in gamified IS remains scarce. To advance scholarly engagement, this study recontextualizes the concept of narratives for gamified IS. Based on the theoreti...
Conference Paper
Full-text available
Continuous service certification (CSC) recently emerged as a promising means to provide ongoing assurances and disrupt pertinent certification approaches. CSC involves the consistent gathering and assessing of certification-relevant data by certification authorities about service operation to validate ongoing adherence to certification criteria. Wh...
Conference Paper
Full-text available
Trust transfer is a promising perspective on prevalent discussions about trust in AI-capable technologies. However, the convergence of AI with other technologies challenges existing theoretical assumptions. First, it remains unanswered whether both trust in AI and the base technology is necessary for trust transfer. Second, a nu-anced view on trust...
Chapter
During interaction with today’s internet services and platform ecosystems, consumer data is often harvested and shared without their consent; that is, consumers seized to be the sovereigns of their own data with the proliferation of the internet. Due to the rapid and abundant nature of interactions in today’s platform ecosystems, manual consent man...
Conference Paper
Full-text available
One barrier to more widespread adoption of differentially private neural networks is the entailed accuracy loss. To address this issue, the relationship between neural network architectures and model accuracy under differential privacy constraints needs to be better understood. As a first step, we test whether extant knowledge on architecture desig...
Conference Paper
Full-text available
Contemporary research focuses on examining trustworthy AI but neglects to consider trust transfer processes, proposing that users' established trust in a familiar source (e.g., a technology or person) may transfer to a novel target. We argue that such trust transfer processes also occur in the case of novel AI-capable technologies, as they are the...
Preprint
Full-text available
One barrier to more widespread adoption of differentially private neural networks is the entailed accuracy loss. To address this issue, the relationship between neural network architectures and model accuracy under differential privacy constraints needs to be better understood. As a first step, we test whether extant knowledge on architecture desig...
Article
Full-text available
Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentrali...
Conference Paper
Full-text available
Driven by economic advantages and the idea of disintermediation of business processes, the decentralization of technical and economic systems has become a highly discussed topic in recent years. Extant research primarily investigated the technical implementations of decentralized information systems (IS) and their use by firms in business networks....
Preprint
Full-text available
Smart contracts are a promising means of formalizing and reliably enforcing agreements between entities using distributed ledger technology (DLT). Research has revealed that a significant number of smart contracts are subject to programming flaws, making them vulnerable to attacks and leading to detrimental effects, such as asset loss. Researchers...
Conference Paper
Full-text available
Open multi-agent systems (OMASs) allow autonomous agents (AAs) to collaborate in coalitions to accomplish complex tasks (e.g., swarm robots exploring new terrain). In OMASs, AAs can arbitrarily join and leave the network. Thus, AAs must often collaborate with unknown AAs that may corrupt coalitions, leading to less robust systems. However, measures...
Article
Full-text available
Background: In health care, the use of game-based interventions to increase motivation, engagement, and overall sustainability of health behaviors is steadily becoming more common. The most prevalent types of game-based interventions in health care research are gamification and serious games. Various researchers have discussed substantial conceptua...
Article
Full-text available
Catchword Article: Classification and Research Directions
Chapter
Despite various security features offered by distributed ledger technology (DLT), distributed ledgers are vulnerable to a variety of malicious attacks (e.g., selfish-mining and block withholding). While such vulnerabilities have been thoroughly investigated in extant research, understanding and development of appropriate countermeasures is still in...
Article
Full-text available
In a thought-provoking paper published in EJIS more than a decade ago, Lyytinen and colleagues asked the question, why does the “old world” perform poorly in high academic impact publishing? This triggered a lively debate on the epistemological and methodological traditions, preferences, and research practices of Europeans versus North Americans th...
Conference Paper
Information system (IS) certifications are considered as a powerful tool for improving the security and trustworthiness of an IS. However, organizations struggle to evaluate and finally adopt appropriate IS certifications. To enhance our understanding of the evaluation of IS certifications, we iteratively develop a taxonomy of key characteristics o...
Preprint
BACKGROUND In healthcare, using game-based intervention approaches to increase motivation, engagement, and overall sustainability of health behaviors is steadily becoming more common. The most prevailing approaches for such game-based interventions in healthcare research are gamification and serious games. Various researchers have discussed substan...
Article
Full-text available
To combat the COVID-19 pandemic, many countries around the globe have adopted digital contact tracing apps. Various technologies exist to trace contacts that are potentially prone to different types of tracing errors. Here, we study the impact of different proximity detection ranges on the effectiveness and efficiency of digital contact tracing app...
Chapter
Full-text available
Blockchain is a term that has been increasingly encountered in recent years in connection with digitization. The concept became known mainly through the cryptocurrency Bitcoin, which was introduced in 2008 and implemented in 2009. But what is the blockchain actually and why could it soon have a big influence on our everyday life?
Preprint
Full-text available
Blockchain is a radical innovation with a unique value proposition that shifts trust from institutions to algorithms. Still, the potential of blockchains remains elusive due to knowledge gaps between computer science research and socio-economic research. Building on information technology governance literature and the theory of coevolution, this st...
Conference Paper
Full-text available
Collecting data from many sources is an essential approach to generate large data sets required for the training of machine learning models. Trustworthy machine learning requires incentives, guarantees of data quality, and information privacy. Applying recent advancements in data valuation methods for machine learning can help to enable these. In t...
Article
Full-text available
Communication between vehicles and their environment (i.e., vehicle-to-everything or V2X communication) in vehicular ad hoc networks (VANETs) has become of particular importance for smart cities. However, economic challenges, such as the cost incurred by data sharing (e.g., due to power consumption), hinder the integration of data sharing in open s...
Chapter
Dienste wie Facebook, Twitter, Instagram oder Snapchat sind für viele, insbesondere junge Menschen, nicht mehr aus ihrem alltäglichen Leben wegzudenken. Wir leben in einer Zeit, die durch das Internet und Social Media geprägt und in der die Offenlegung von persönlichen Informationen im Internet ein zunehmender Teil des modernen Lebens geworden ist....
Article
Ali Sunyaev & Niclas Kannengießer (Karlsruhe Institute of Technology) discuss the key concept of decentralization, which the token economy is built on, from two fundamental perspectives (i.e., technical and political decentralization) and provides propositions to discuss decentralization. Moreover, this chapter explicates the need for interdiscipli...
Conference Paper
Full-text available
Patient-centered health care information systems (PHSs) on peer-to-peer (P2P) networks promise decentralization benefits. P2P PHSs, such as decentralized personal health records or interoperable Covid-19 proximity trackers, can enhance data sovereignty and resilience to single points of failure, but the openness of P2P networks introduces new secur...
Conference Paper
Full-text available
The adoption of artificial intelligence promises tremendous economic benefits for organizations. Yet, many organizations struggle to unlock the full potential of this technology. To ease the adoption of artificial intelligence for organizations, several cloud providers have begun offering artificial intelligence as a service (AIaaS). Extant researc...
Conference Paper
Full-text available
Gamification is increasingly utilized in information systems to afford positive experiences that are typically perceived from playing games. Despite potential benefits, gamification projects have shown to be prone for failure which may lead to severe harmful effects for its users. In traditional software projects, project managers try to mitigate f...
Conference Paper
Full-text available
Label quality is an important and common problem in contemporary supervised machine learning research. Mislabeled instances in a data set might not only impact the performance of machine learning models negatively but also make it more difficult to explain, and thus trust, the predictions of those models. While extant research has especially focuse...
Preprint
Full-text available
To combat the COVID-19 pandemic, many countries have adopted digital contact tracing apps. Various technologies exist to trace contacts that are potentially prone to different types of tracing errors. Here, we study the impact of different proximity detection ranges on the effectiveness and efficiency of digital contact tracing apps. Furthermore, w...
Conference Paper
Full-text available
The number and variety of information systems (IS) certifications have increased continuously as the use of information technology has diversified and expanded. IS certifications are neutral third-party attestations of specific system characteristics and management principles to prove compliance with requirements. The reasons for organizations to a...
Conference Paper
Full-text available
As cybersecurity threats evolve and cybersecurity teams update digital security infrastructures, employees often get perplexed by the threats and corresponding countermeasures. Drawing insight from a literature review and a qualitative exploratory study with 85 participants, this paper defines cybersecurity perplexity, a paradoxical psychological s...
Conference Paper
Full-text available
To foster ambitious goal setting, mHealth app developers increasingly implement social comparison features such as leaderboards. However, extant research does not sufficiently look at affective consequences of such features and their impact on goal- setting behavior. We focus on two aspects of social comparison to better address this issue: (1) the...
Presentation
Full-text available
When using today's internet services and platform ecosystems, data of consumers is often harvested and shared without their consent; that is, consumers seized to be sovereigns of their own data. Due to the rapid and abundant nature of interactions in today's platform ecosystems, manual consent management is impracticable. To support development of...
Article
Full-text available
BACKGROUND: Nowadays, numerous health-related mobile applications implement gamification in an attempt to draw on the motivational potential of video games and thereby increase user engagement or foster certain health behaviors. However, research on effective gamification is still in its infancy and researchers increasingly recognize methodologica...
Article
Full-text available
Pollution-monitoring systems (PMSs) are used worldwide to sense environmental changes, such as air quality conditions or temperature increases, and to monitor compliance with regulations. However, organizations manage the environmental data collected by such PMSs in a centralized manner, which is why recorded environmental data are vulnerable to ma...
Article
Full-text available
Artificial intelligence (AI) brings forth many opportunities to contribute to the wellbeing of individuals and the advancement of economies and societies, but also a variety of novel ethical, legal, social, and technological challenges. Trustworthy AI (TAI) bases on the idea that trust builds the foundation of societies, economies, and sustainable...
Preprint
BACKGROUND Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19...
Article
Article in ZD-Aktuell https://beck-online.beck.de/?vpath=bibdata%2fzeits%2fZDAKTUELL%2f2020%2fcont%2fZDAKTUELL%2e2020%2e07119%2ehtm
Presentation
Full-text available
Nowadays, sophisticated techniques have been developed to determine users’ behavioral tendencies and to find and display content suitable to users. Companies collect huge amounts of information about users in order to better identify content and respond to user contexts. How and for what purposes the information is collected is, however, often not...
Conference Paper
Full-text available
Interest in applications based on distributed ledger technology (DLT) is on the rise, with corporations worldwide shifting from simply exploring DLT's potential to creating productive business cases. However, despite the existence of numerous DLT applications, developers are still lacking proper tools and instruments for evaluating system behavior...
Conference Paper
Researchers and practitioners have long thought that web seals are effective means to improve a website’s trustworthiness. However, studies demonstrated that web seals sometimes fail to exhibit the desired effect. Drawing on literature on cognitive complexity and the trust tipping point, this study investigates whether a website’s default trustwort...
Conference Paper
Full-text available
Distributed ledger technology (DLT) is an emerging technology, which allows for the creation of novel applications, services, and business models by enabling innovative collaborations among organizations and individuals. Although DLT arose from the idea of a self-regulated and publicly usable infrastructure, permissioned distributed ledgers (e.g.,...
Article
Full-text available
Web assurance seals are actions taken by e-commerce vendors to increase their trustworthiness and alleviate consumers’ concerns. In their essence, web assurance seals are a product of negotiations, adoptions, and settlements among various groups of interests (e.g., seal authorities, vendors, consumers, or governmental institutions). However, previo...
Article
Full-text available
Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These concerns can be addressed through corresponding security and privacy requirements within the syste...
Article
Full-text available
When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Fur...