Ali Sunyaev

Ali Sunyaev
Technical University of Munich | TUM

About

403
Publications
205,327
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,191
Citations
Additional affiliations
June 2010 - February 2016
University of Cologne
Position
  • Professor (Assistant)

Publications

Publications (403)
Article
Full-text available
Background: Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora an...
Article
Full-text available
Cloud computing (CC) is an emerging form of IT outsourcing (ITO) that requires organizations to adjust their sourcing processes. Although ITO researchers have established an extensive knowledge base on the determinant factors that drive sourcing decisions from various theoretical perspectives, the majority of research on cloud-sourcing decisions fo...
Article
Full-text available
Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35 000 mHealth apps are available for iOS and Android. Of the 6...
Article
Full-text available
Chronic medical conditions take a huge toll on lives of a growing number of people and are a major contributor to the rising costs in healthcare. As patients are increasingly willing to take an active part in managing their conditions, chronic disease self-management programs and information systems that support them are recognized for their potent...
Article
Full-text available
Cloud computing is an evolving paradigm that affects a large part of the IT industry, in particular the way hardware and software are deployed: as a service. Despite advantages of cloud computing, small and medium enterprises in particular remain cautious implementing cloud service solutions. Promoting transparent information exchange between cloud...
Conference Paper
Full-text available
The widespread diffusion of Generative Artificial Intelligence (GAI)-based systems offers many opportunities, but it is also accompanied by public scandals causing harm to individuals, markets, and society. Practice and research are calling for ensuring AI accountability. However, accountability attributions are challenging because multiple actors...
Conference Paper
Full-text available
The sharing of sensitive data increasingly poses privacy risks not only to the disclosing individuals, but also to their families and friends. Genetic data sharing is a prime example of the tensions between personal and interdependent privacy risks and benefits that individuals must trade off when making disclosure decisions. Surprisingly, extant r...
Preprint
Full-text available
The rapid integration of Artificial Intelligence (AI)-based systems offers benefits for various domains of the economy and society but simultaneously raises concerns due to emerging scandals. These scandals have led to the increasing importance of AI accountability to ensure that actors provide justification and victims receive compensation. Howeve...
Article
Full-text available
Various collaborative distributed machine learning (CDML) systems, including federated learning systems and swarm learning systems, with different key traits were developed to leverage resources for the development and use of machine learning (ML) models in a confidentiality-preserving way. To meet use case requirements, suitable CDML systems need...
Preprint
Full-text available
The joint implementation of Federated learning (FL) and Explainable artificial intelligence (XAI) will allow training models from distributed data and explaining their inner workings while preserving important aspects of privacy. Towards establishing the benefits and tensions associated with their interplay, this scoping review maps those publicati...
Chapter
The rapid evolution of information technologies in the past decades gave information systems an increasingly central role in society. Some of these information systems are now so critical that their disruption or unintended consequences can have detrimental effects on vital societal functions. This chapter clarifies the concept of critical informat...
Chapter
Not only today, but also in the future, information technology and advances in the field of computer science will have a high relevance for peace and security. Of course, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and offer an outlook...
Chapter
Full-text available
Zusammenfassung Die Digitale Transformation (DT) verändert Organisationen und die Arbeitswelten von Mitarbeitenden fundamental und in praktisch allen Branchen. Zusammenfassend deuten aktuelle Studien darauf hin, dass die DT und ihre Auswirkungen einen erheblichen Einfluss auf die Wahrnehmungen der Arbeitnehmenden haben. Es fehlt jedoch ein umfassen...
Chapter
Information systems (IS) are composed of distinct, interrelated elements that aim to fulfill desired features. This chapter introduces the concept of IS architecture as a way to meaningfully describe and design the underlying structure of an IS. It presents nine basic principles of IS architectures and explains them using the ex-ample of the cloud-...
Chapter
In order to explain how the Internet works, this chapter takes a closer look at the architecture that underlies the Internet, as well as at its architectural principles and mechanisms. After providing a brief overview of the Internet’s history, this chapter examines today’s core infrastructure and explains the role of Internet service providers (IS...
Chapter
Information systems have evolved rapidly in the past decades and increasingly take a central role in society. Today, some information systems have become such integral parts of society that their disruption or unintended consequences can have detrimental effects on vital societal functions; that is, they have become critical information infrastruct...
Chapter
Thanks to innovations like the Internet of Things and autonomous driving, millions of new devices, sensors, and applications will be going online in the near future. They will generate huge amounts of data, which connected technologies will have to be able to handle. Measuring, monitoring, analyzing, processing, and reacting are just a few examples...
Chapter
Cloud computing is an evolution of information technology and a dominant business model for delivering IT resources. With cloud computing, individuals and organizations can gain on-demand network access to a shared pool of managed and scalable IT resources, such as servers, storage, and applications. Recently, academics as well as practitioners hav...
Chapter
In the context of IT applications and systems, the integration of information systems into new IT environments poses many challenges. One of the biggest issues in this regard is dealing with systems heterogeneity in terms of used programming languages, operating systems, and data formats. In order to ensure communication between different applicati...
Chapter
Distributed Ledger Technology (DLT) has the potential to change organization and collaboration in the economy, society, and industry. This chapter introduces the technical background and use cases of DLT. It presents the major innovations originating from DLT since the introduction of the blockchain concept. Furthermore, cryptocurrencies’ historica...
Chapter
Building on the Internet’s success story over the past decades, the Internet of Things will profoundly change how people consume information and interact with their immediate environments. This chapter introduces the Internet of Things as a paradigm in which not only human-to-human and human-to-machine communication, but also machine-to-machine com...
Chapter
Distributing data has always been a fundamental Internet use case. Today, the Internet is the primary channel for distributing media content, and many other types of data are increasingly managed online. This tendency has led to growing requirements regarding the quantity and quality of Internet technologies with which to manage distributed data. I...
Chapter
Over the past decades, the Internet has fundamentally influenced almost all areas of our everyday lives. It has profoundly changed the ways in which we communicate, gather information, and consume media, and has led to the emergence of companies that are based on fundamentally new Internet-based business models. This chapter introduces Internet com...
Chapter
Each information system (IS) has an underlying architecture, although its complexity and scope can vary quite substantially for different kinds of systems. Since design decisions about the architecture define the very foundation of an IS, these design decisions cannot be easily undone or altered after they were made. If not taken seriously enough,...
Article
Full-text available
Decentralized exchanges (DEXs) have become an alternative to centralized exchanges (CEXs) for trading assets in the form of tokens in cryptoeconomic system markets. The emergence of DEXs is strongly driven by their potential to tackle challenges for market quality originating from CEXs by design, such as opaque market-making strategies and centrali...
Article
Recent research differentiates digital transformation from former transformations by the concept of value proposition. However, with this distinction, it remains unclear, particularly in knowledge- intensive sectors such as healthcare, how the core value-defining activities change and when they are considered extended or changed. As it is expected...
Article
Full-text available
Following the success of the Bitcoin blockchain, distributed ledger technology (DLT) has received extensive attention in health informatics research. Yet, the healthcare industry is highly complex with many different stakeholders, information systems, regulations, and challenges. Thus, DLT may be used in various settings and for different purposes....
Conference Paper
Full-text available
The widespread diffusion of Artificial Intelligence (AI)-based systems offers many opportunities to contribute to the well-being of individuals and the advancement of economies and societies. This diffusion is, however, closely accompanied by public scandals causing harm to individuals, markets, or society, and leading to the increasing importance...
Preprint
Full-text available
The widespread diffusion of Artificial Intelligence (AI)-based systems offers many opportunities to contribute to the well-being of individuals and the advancement of economies and societies. This diffusion is, however, closely accompanied by public scandals causing harm to individuals, markets, or society, and leading to the increasing importance...
Conference Paper
Procrastination is the deliberate postponing of tasks knowing that it will have negative consequences in the future. Despite the potentially serious impact on mental and physical health, research has just started to explore the potential of information systems to help students combat procrastination. Specifically, while existing learning systems in...
Conference Paper
Full-text available
This minitrack, for the second time, deepens understanding of data sharing, data ecosystems, data platforms, data spaces, data hubs, and repositories. It emphasizes diverse perspectives, covering technical, organizational, social, and regulatory aspects, and examines multiple levels, including system, individual, community, and societal dimensions....
Article
Full-text available
Encouraging employees to take security precautions is a vital strategy that organizations can use to reduce their vulnerability to information security (ISec) threats. This study investigates how the bright- and dark-side effects of trust in organizational information security impact employees’ intention to take security precautions. Employees who...
Conference Paper
Full-text available
Artificial intelligence (AI) models are often complex and require additional explanations for use in high-stakes decision-making contexts like healthcare. To this end, explainable AI (XAI) developers must evaluate their explanations with domain experts to ensure understandability. As these evaluations are tedious and repetitive, we look at gamifica...
Article
Full-text available
Central Bank Digital Currencies (CBDCs) have the potential to increase the financial reliability of digital payment systems by offering direct interactions between payment system participants, including institutional and private ones. To unfold the potential of CBDCs, CBDC systems need to offer confidential payments to protect participants from sur...
Article
Background Recent advances in hardware and software enabled the use of artificial intelligence (AI) algorithms for analysis of complex data in a wide range of daily-life use cases. We aim to explore the benefits of applying AI to a specific use case in transplant nephrology: risk prediction for severe posttransplant events. For the first time, we c...
Article
Full-text available
Researchers increasingly turn to explainable artificial intelligence (XAI) to analyze omics data and gain insights into the underlying biological processes. Yet, given the interdisciplinary nature of the field, many findings have only been shared in their respective research community. An overview of XAI for omics data is needed to highlight promis...
Article
Full-text available
Zusammenfassung Im Dezember 2019 wurden in Deutschland Digitale Gesundheitsanwendungen (DiGA) in die Regelversorgung aufgenommen und können somit durch die gesetzlichen Krankenkassen erstattet werden, um PatientInnen bei der Behandlung von Erkrankungen oder Beeinträchtigungen zu unterstützen. Inzwischen gibt es 48 DiGA (Stand: Oktober 2023) im Verz...
Article
Combining domain knowledge (DK) and machine learning is a recent research stream to overcome multiple issues like limited explainability, lack of data, and insufficient robustness. Most approaches applying informed machine learning (IML), however, are customized to solve one specific problem. This study analyzes the status of IML in medicine by con...
Article
Full-text available
Enterprise information systems (EIS) were important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses for integration with suppliers as well as customers. Today, EIS architectures comprise, not only, ERP, sup...
Conference Paper
Fog computing has evolved as a promising paradigm to overcome challenges of edge and cloud computing for use cases such as autonomous driving and virtual reality demanding low latency and the handling of large data loads. The design of fog systems between the cloud and edge opens a large space of possible tasks that fog nodes can take, such as (pre...
Chapter
Fog computing has evolved as a promising paradigm to overcome challenges of edge and cloud computing for use cases such as autonomous driving and virtual reality demanding low latency and the handling of large data loads. The design of fog systems between the cloud and edge opens a large space of possible tasks that fog nodes can take, such as (pre...
Research
The proper design of automated market makers (AMMs) is crucial to enable the continuous trading of assets represented as digital tokens on markets of cryptoeconomic systems. Improperly designed AMMs can make such markets suffer from the thin market problem (TMP), which can cause cryptoeconomic systems to fail their purposes. We developed an AMM tax...
Conference Paper
Large language models (LLMs) like ChatGPT recently gained interest across all walks of life with their human-like quality in textual responses. Despite their success in research, healthcare, or education, LLMs frequently include incorrect information, called hallucinations, in their responses. These hallucinations could influence users to trust fak...
Chapter
Decentralized applications are increasingly recognized as efficient tools to overcome security challenges in the management of highly sensitive health information. However, research still lacks the understanding of how to address the complex security challenges in the design of health data management applications (HDMAs). In this study, we structur...
Article
Information systems (IS) research has largely treated IS certifications (i.e., graphical cues that prove the endorsement of independent third parties) as universally effective at improving website visitors’ perceptions of trustworthiness. However, inconclusive findings on the effectiveness of IS certifications on websites have emerged, critically c...
Chapter
Full-text available
Mobility-as-A-Service (MaaS) is a concept for combining different transport modes, including diverse mobility services, while facilitating their use through customer centricity (e.g., pay-as-you-go tariffs, unified interfaces). MaaS platforms offer access to different mobility services of various providers via MaaS ticket systems. IT governance of...
Preprint
Full-text available
Advanced programmatic hyperparameter optimization (HPO) methods, such as Bayesian optimization, have high sample efficiency in reproducibly finding optimal hyperparameter values of machine learning (ML) models. Yet, ML practitioners often apply less sample-efficient HPO methods, such as grid search, which often results in under-optimized ML models....
Article
Full-text available
The rising diffusion of information systems (IS) throughout society poses an increasingly serious threat to privacy as a social value. One approach to alleviating this threat is to establish transparency of information privacy practices (TIPP) so that consumers can better understand how their information is processed. However, the design of transpa...
Preprint
BACKGROUND Recent advances in hardware and software enabled the use of artificial intelligence (AI) algorithms for analysis of complex data in a wide range of daily-life use cases. We aim to explore the benefits of applying AI to a specific use case in transplant nephrology: risk prediction for severe posttransplant events. For the first time, we c...
Chapter
Full-text available
Mobility-as-A-Service (MaaS) is a concept for combining different transport modes, including diverse mobility services, while facilitating their use through customer centricity (e.g., pay-as-you-go tariffs, unified interfaces). MaaS platforms offer access to different mobility services of various providers via MaaS ticket systems. IT governance of...
Preprint
Full-text available
Existing research on data valuation in federated and swarm learning focuses on valuing client contributions and works best when data across clients is independent and identically distributed (IID). In practice, data is rarely distributed IID. We develop an approach called DDVal for decentralized data valuation, capable of valuing individual data po...
Preprint
Full-text available
Decentralized applications are increasingly recognized as efficient tools to overcome security challenges in the management of highly sensitive health information. However, research still lacks the understanding of how to address the complex security challenges in the design of health data management applications (HDMAs). In this study, we structur...
Conference Paper
Full-text available
Gamification refers to the use of game design elements in non-game contexts to evoke both instrumental and experiential outcomes within users. Although narratives are an integral part of most video games, little academic attention has been paid toward narratives as part of gamification design. In this research, we investigate two distinct aspects o...
Article
Multiorganizational, multistakeholder (MO-MS) collaborations that may span organizational and national boundaries, present design challenges beyond those of smaller-scale collaborations. This study opens an exploratory research stream to discover and document design concerns for MO-MS collaboration systems beyond those of the single-task collaborat...
Chapter
Full-text available
One way to reduce privacy risks for consumers when using the internet is to inform them better about the privacy practices they will encounter. Tailored privacy information provision could outperform the current practice where information system providers do not much more than posting unwieldy privacy notices. Paradoxically, this would require addi...
Conference Paper
Full-text available
AI-driven convergence describes how innovative products emerge from the interplay of embedded artificial intelligence (AI) in existing technologies. Trust transfer theory provides an excellent opportunity to deepen prevailing discussions about trust in such converged products. However, AI-driven convergence challenges existing theoretical assumptio...
Conference Paper
Full-text available
This minitrack provides a venue for all work (qualitative, quantitative, computational, and design) in relation to better understanding health data platforms, data repositories, data sharing, data governance, and ecosystems. It highlights various perspectives, including technical, organizational, social, and regulatory ones and considers multiple l...
Conference Paper
Full-text available
Mindfulness practices are valuable exercises for physical and mental health. Various digital applications exist that support individuals in practicing mindfulness. Following the trend of gamifying utilitarian systems, many mindfulness applications (MAs) incorporate game design elements (GDEs). However, little is known about users' GDE preferences i...
Conference Paper
Full-text available
To improve contemporary machine learning (ML) models, research is increasingly looking at tapping in and incorporating the knowledge of domain experts. However, expert knowledge often relies on intuition, which is difficult to formalize for incorporation into ML models. Against this backdrop, we investigate the role of intuition in the context of e...
Article
Full-text available
Vehicular Fog Computing (VFC) facilitates the deployment of distributed, latency-aware services, residing between smart vehicles and cloud services. However, VFC systems are exposed to manifold security threats, putting human life at risk. Knowledge on such threats is scattered and lacks empirical validation. We performed an extensive threat assess...
Article
Full-text available
Smart contracts are a promising means of formalizing and reliably enforcing agreements between entities using distributed ledger technology (DLT). Research has revealed that a significant number of smart contracts are subject to programming flaws, making them vulnerable to attacks and leading to detrimental effects, such as asset loss. Researchers...
Conference Paper
Full-text available
Digital transformation continues to profoundly impact employees in organizations in many industries. While past research has extensively investigated the impact of digital transformation on organizations, we still lack a comprehensive understanding of the factors that are relevant to examine how employees perceive digital transformation and its eff...
Article
Full-text available
Zusammenfassung Das Training von Künstliche Intelligenz (KI)-Modellen, die auf maschinellem Lernen (ML) beruhen, erfordert eine große Menge qualitativ hochwertiger Daten. Besonders im Gesundheitswesen mit seinen hochsensiblen Daten und hohen Anforderungen an den Datenschutz besitzen einzelne Akteur:innen oft jedoch nicht ausreichend hochwertige Dat...
Article
Full-text available
Background: With direct-to-consumer (DTC) genetic testing enabling self-responsible access to novel information on ancestry, traits, or health, consumers often turn to social media for assistance and discussion. YouTube, the largest social media platform for videos, offers an abundance of DTC genetic testing–related videos. Nevertheless, user disco...
Data
This document provides supplementary information for the paper “Be Mindful of User Preferences: An Explorative Study on Game Design Elements in Mindfulness Applications” submitted to HICSS-56.
Data
This document provides supplementary material for the article "Understanding the Role of Expert Intuition in Medical Image Annotation: A Cognitive Task Analysis Approach" accepted at HICSS-56.
Article
Whereas the importance of information system (IS) certifications is increasing to prove compliance with regulatory and industry requirements, research reveals inconsistent findings concerning the effectiveness of IS certifications. Prior studies have concluded that such inconsistent findings stem partly from users’ limited understanding of the natu...
Chapter
Full-text available
Token economy instances can be built on a variety of protocols, such as distributed ledger technology (DLT) protocols. DLT protocols are used to operate DLT systems that perform, in a decentralized way, several tasks (e.g., the prevention of double-spending) that are usually handled by central actors, such as banks. Using DLT can be subject to chal...
Article
Full-text available
Emerging technologies in healthcare such as wearables, robotics, nanotech, connected health, and genomics technologies produce increasing amounts of data, which fuel artificial intelligence-powered algorithms to actively react to, predict, and prevent diseases and steer scarce healthcare resources. Currently, while digitalization in the healthcare...
Article
Full-text available
Although consumers and experts often express concerns regarding the questionable business practices of direct-to-consumer (DTC) genetic testing services (e.g., reselling of consumers' genetic data), the DTC genetic testing market keeps expanding rapidly. We employ retail fairness as our theoretical lens to address this seeming paradox and conduct a...
Article
Full-text available
While the importance of information system (IS) certifications to demonstrate compliance with security and personal data protection requirements is constantly increasing, competing (theoretical) viewpoints exist that outline the rationales for organizations to adopt certifica-tions. The results of these competing perspectives are inconclusive resea...
Article
Full-text available
Zusammenfassung Der DigitalPakt Schule soll das deutsche Bildungswesen flächendeckend modernisieren, zeigt jedoch bisher Anlaufschwierigkeiten. Die bereitgestellten Fördermittel werden zögerlich abgerufen und die Kritiker:innen des Programms werden immer lauter. Diese Arbeit setzt genau an diesem Punkt an und diskutiert Ursachen und Einflüsse, die...