Ali SunyaevTechnical University of Munich | TUM
Ali Sunyaev
About
403
Publications
205,327
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,191
Citations
Introduction
Additional affiliations
June 2010 - February 2016
Publications
Publications (403)
Background: Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora an...
Cloud computing (CC) is an emerging form of IT outsourcing (ITO) that requires organizations to adjust their sourcing processes. Although ITO researchers have established an extensive knowledge base on the determinant factors that drive sourcing decisions from various theoretical perspectives, the majority of research on cloud-sourcing decisions fo...
Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35 000 mHealth apps are available for iOS and Android. Of the 6...
Chronic medical conditions take a huge toll on lives of a growing number of people and are a major contributor to the rising costs in healthcare. As patients are increasingly willing to take an active part in managing their conditions, chronic disease self-management programs and information systems that support them are recognized for their potent...
Cloud computing is an evolving paradigm that affects a large part of the IT industry, in particular the way hardware and software are deployed: as a service. Despite advantages of cloud computing, small and medium enterprises in particular remain cautious implementing cloud service solutions. Promoting transparent information exchange between cloud...
The widespread diffusion of Generative Artificial Intelligence (GAI)-based systems offers many opportunities, but it is also accompanied by public scandals causing harm to individuals, markets, and society. Practice and research are calling for ensuring AI accountability. However, accountability attributions are challenging because multiple actors...
The sharing of sensitive data increasingly poses privacy risks not only to the disclosing individuals, but also to their families and friends. Genetic data sharing is a prime example of the tensions between personal and interdependent privacy risks and benefits that individuals must trade off when making disclosure decisions. Surprisingly, extant r...
The rapid integration of Artificial Intelligence (AI)-based systems offers benefits for various domains of the economy and society but simultaneously raises concerns due to emerging scandals. These scandals have led to the increasing importance of AI accountability to ensure that actors provide justification and victims receive compensation. Howeve...
Various collaborative distributed machine learning (CDML) systems, including federated learning systems and swarm learning systems, with different key traits were developed to leverage resources for the development and use of machine learning (ML) models in a confidentiality-preserving way. To meet use case requirements, suitable CDML systems need...
The joint implementation of Federated learning (FL) and Explainable artificial intelligence (XAI) will allow training models from distributed data and explaining their inner workings while preserving important aspects of privacy. Towards establishing the benefits and tensions associated with their interplay, this scoping review maps those publicati...
The rapid evolution of information technologies in the past decades gave information systems an increasingly central role in society. Some of these information systems are now so critical that their disruption or unintended consequences can have detrimental effects on vital societal functions. This chapter clarifies the concept of critical informat...
Not only today, but also in the future, information technology and advances in the field of computer science will have a high relevance for peace and security. Of course, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and offer an outlook...
Zusammenfassung
Die Digitale Transformation (DT) verändert Organisationen und die Arbeitswelten von Mitarbeitenden fundamental und in praktisch allen Branchen. Zusammenfassend deuten aktuelle Studien darauf hin, dass die DT und ihre Auswirkungen einen erheblichen Einfluss auf die Wahrnehmungen der Arbeitnehmenden haben. Es fehlt jedoch ein umfassen...
Information systems (IS) are composed of distinct, interrelated elements that aim to fulfill desired features. This chapter introduces the concept of IS architecture as a way to meaningfully describe and design the underlying structure of an IS. It presents nine basic principles of IS architectures and explains them using the ex-ample of the cloud-...
In order to explain how the Internet works, this chapter takes a closer look at the architecture that underlies the Internet, as well as at its architectural principles and mechanisms. After providing a brief overview of the Internet’s history, this chapter examines today’s core infrastructure and explains the role of Internet service providers (IS...
Information systems have evolved rapidly in the past decades and increasingly take a central role in society. Today, some information systems have become such integral parts of society that their disruption or unintended consequences can have detrimental effects on vital societal functions; that is, they have become critical information infrastruct...
Thanks to innovations like the Internet of Things and autonomous driving, millions of new devices, sensors, and applications will be going online in the near future. They will generate huge amounts of data, which connected technologies will have to be able to handle. Measuring, monitoring, analyzing, processing, and reacting are just a few examples...
Cloud computing is an evolution of information technology and a dominant business model for delivering IT resources. With cloud computing, individuals and organizations can gain on-demand network access to a shared pool of managed and scalable IT resources, such as servers, storage, and applications. Recently, academics as well as practitioners hav...
In the context of IT applications and systems, the integration of information systems into new IT environments poses many challenges. One of the biggest issues in this regard is dealing with systems heterogeneity in terms of used programming languages, operating systems, and data formats. In order to ensure communication between different applicati...
Distributed Ledger Technology (DLT) has the potential to change organization and collaboration in the economy, society, and industry. This chapter introduces the technical background and use cases of DLT. It presents the major innovations originating from DLT since the introduction of the blockchain concept. Furthermore, cryptocurrencies’ historica...
Building on the Internet’s success story over the past decades, the Internet of Things will profoundly change how people consume information and interact with their immediate environments. This chapter introduces the Internet of Things as a paradigm in which not only human-to-human and human-to-machine communication, but also machine-to-machine com...
Distributing data has always been a fundamental Internet use case. Today, the Internet is the primary channel for distributing media content, and many other types of data are increasingly managed online. This tendency has led to growing requirements regarding the quantity and quality of Internet technologies with which to manage distributed data. I...
Over the past decades, the Internet has fundamentally influenced almost all areas of our everyday lives. It has profoundly changed the ways in which we communicate, gather information, and consume media, and has led to the emergence of companies that are based on fundamentally new Internet-based business models. This chapter introduces Internet com...
Each information system (IS) has an underlying architecture, although its complexity and scope can vary quite substantially for different kinds of systems. Since design decisions about the architecture define the very foundation of an IS, these design decisions cannot be easily undone or altered after they were made. If not taken seriously enough,...
Decentralized exchanges (DEXs) have become an alternative to centralized exchanges (CEXs) for trading assets in the form of tokens in cryptoeconomic system markets. The emergence of DEXs is strongly driven by their potential to tackle challenges for market quality originating from CEXs by design, such as opaque market-making strategies and centrali...
Recent research differentiates digital transformation from former transformations by the concept of value proposition. However, with this distinction, it remains unclear, particularly in knowledge- intensive sectors such as healthcare, how the core value-defining activities change and when they are considered extended or changed. As it is expected...
Following the success of the Bitcoin blockchain, distributed ledger technology (DLT) has received extensive attention in health informatics research. Yet, the healthcare industry is highly complex with many different stakeholders, information systems, regulations, and challenges. Thus, DLT may be used in various settings and for different purposes....
The widespread diffusion of Artificial Intelligence (AI)-based systems offers many opportunities to contribute to the well-being of individuals and the advancement of economies and societies. This diffusion is, however, closely accompanied by public scandals causing harm to individuals, markets, or society, and leading to the increasing importance...
The widespread diffusion of Artificial Intelligence (AI)-based systems offers many opportunities to contribute to the well-being of individuals and the advancement of economies and societies. This diffusion is, however, closely accompanied by public scandals causing harm to individuals, markets, or society, and leading to the increasing importance...
Procrastination is the deliberate postponing of tasks knowing that it will have negative consequences in the future. Despite the potentially serious impact on mental and physical health, research has just started to explore the potential of information systems to help students combat procrastination. Specifically, while existing learning systems in...
This minitrack, for the second time, deepens understanding of data sharing, data ecosystems, data platforms, data spaces, data hubs, and repositories. It emphasizes diverse perspectives, covering technical, organizational, social, and regulatory aspects, and examines multiple levels, including system, individual, community, and societal dimensions....
Encouraging employees to take security precautions is a vital strategy that organizations can use to reduce their vulnerability to information security (ISec) threats. This study investigates how the bright- and dark-side effects of trust in organizational information security impact employees’ intention to take security precautions. Employees who...
Artificial intelligence (AI) models are often complex and require additional explanations for use in high-stakes decision-making contexts like healthcare. To this end, explainable AI (XAI) developers must evaluate their explanations with domain experts to ensure understandability. As these evaluations are tedious and repetitive, we look at gamifica...
Central Bank Digital Currencies (CBDCs) have the potential to increase the financial reliability of digital payment systems by offering direct interactions between payment system participants, including institutional and private ones. To unfold the potential of CBDCs, CBDC systems need to offer confidential payments to protect participants from sur...
Background
Recent advances in hardware and software enabled the use of artificial intelligence (AI) algorithms for analysis of complex data in a wide range of daily-life use cases. We aim to explore the benefits of applying AI to a specific use case in transplant nephrology: risk prediction for severe posttransplant events. For the first time, we c...
Researchers increasingly turn to explainable artificial intelligence (XAI) to analyze omics data and gain insights into the underlying biological processes. Yet, given the interdisciplinary nature of the field, many findings have only been shared in their respective research community. An overview of XAI for omics data is needed to highlight promis...
Zusammenfassung
Im Dezember 2019 wurden in Deutschland Digitale Gesundheitsanwendungen (DiGA) in die Regelversorgung aufgenommen und können somit durch die gesetzlichen Krankenkassen erstattet werden, um PatientInnen bei der Behandlung von Erkrankungen oder Beeinträchtigungen zu unterstützen. Inzwischen gibt es 48 DiGA (Stand: Oktober 2023) im Verz...
Combining domain knowledge (DK) and machine learning is a recent research stream to overcome multiple issues like limited explainability, lack of data, and insufficient robustness. Most approaches applying informed machine learning (IML), however, are customized to solve one specific problem. This study analyzes the status of IML in medicine by con...
Enterprise information systems (EIS) were important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses for integration with suppliers as well as customers. Today, EIS architectures comprise, not only, ERP, sup...
Fog computing has evolved as a promising paradigm to overcome challenges of edge and cloud computing for use cases such as autonomous driving and virtual reality demanding low latency and the handling of large data loads. The design of fog systems between the cloud and edge opens a large space of possible tasks that fog nodes can take, such as (pre...
Fog computing has evolved as a promising paradigm to overcome challenges of edge and cloud computing for use cases such as autonomous driving and virtual reality demanding low latency and the handling of large data loads. The design of fog systems between the cloud and edge opens a large space of possible tasks that fog nodes can take, such as (pre...
The proper design of automated market makers (AMMs) is crucial to enable the continuous trading of assets represented as digital tokens on markets of cryptoeconomic systems. Improperly designed AMMs can make such markets suffer from the thin market problem (TMP), which can cause cryptoeconomic systems to fail their purposes. We developed an AMM tax...
Large language models (LLMs) like ChatGPT recently gained interest across all walks of life with their human-like quality in textual responses. Despite their success in research, healthcare, or education, LLMs frequently include incorrect information, called hallucinations, in their responses. These hallucinations could influence users to trust fak...
Decentralized applications are increasingly recognized as efficient tools to overcome security challenges in the management of highly sensitive health information. However, research still lacks the understanding of how to address the complex security challenges in the design of health data management applications (HDMAs). In this study, we structur...
Information systems (IS) research has largely treated IS certifications (i.e., graphical cues that prove the endorsement of independent third parties) as universally effective at improving website visitors’ perceptions of trustworthiness. However, inconclusive findings on the effectiveness of IS certifications on websites have emerged, critically c...
Mobility-as-A-Service (MaaS) is a concept for combining different transport modes, including diverse mobility services, while facilitating their use through customer centricity (e.g., pay-as-you-go tariffs, unified interfaces). MaaS platforms offer access to different mobility services of various providers via MaaS ticket systems. IT governance of...
Advanced programmatic hyperparameter optimization (HPO) methods, such as Bayesian optimization, have high sample efficiency in reproducibly finding optimal hyperparameter values of machine learning (ML) models. Yet, ML practitioners often apply less sample-efficient HPO methods, such as grid search, which often results in under-optimized ML models....
The rising diffusion of information systems (IS) throughout society poses an increasingly serious threat to privacy as a social value. One approach to alleviating this threat is to establish transparency of information privacy practices (TIPP) so that consumers can better understand how their information is processed. However, the design of transpa...
BACKGROUND
Recent advances in hardware and software enabled the use of artificial intelligence (AI) algorithms for analysis of complex data in a wide range of daily-life use cases. We aim to explore the benefits of applying AI to a specific use case in transplant nephrology: risk prediction for severe posttransplant events. For the first time, we c...
Mobility-as-A-Service (MaaS) is a concept for combining different transport modes, including diverse mobility services, while facilitating their use through customer centricity (e.g., pay-as-you-go tariffs, unified interfaces). MaaS platforms offer access to different mobility services of various providers via MaaS ticket systems. IT governance of...
Existing research on data valuation in federated and swarm learning focuses on valuing client contributions and works best when data across clients is independent and identically distributed (IID). In practice, data is rarely distributed IID. We develop an approach called DDVal for decentralized data valuation, capable of valuing individual data po...
Decentralized applications are increasingly recognized as efficient tools to overcome security challenges in the management of highly sensitive health information. However, research still lacks the understanding of how to address the complex security challenges in the design of health data management applications (HDMAs). In this study, we structur...
Gamification refers to the use of game design elements in non-game contexts to evoke both instrumental and experiential outcomes within users. Although narratives are an integral part of most video games, little academic attention has been paid toward narratives as part of gamification design. In this research, we investigate two distinct aspects o...
Multiorganizational, multistakeholder (MO-MS) collaborations that may span organizational and national boundaries, present design challenges beyond those of smaller-scale collaborations. This study opens an exploratory research stream to discover and document design concerns for MO-MS collaboration systems beyond those of the single-task collaborat...
One way to reduce privacy risks for consumers when using the internet is to inform them better about the privacy practices they will encounter. Tailored privacy information provision could outperform the current practice where information system providers do not much more than posting unwieldy privacy notices. Paradoxically, this would require addi...
AI-driven convergence describes how innovative products emerge from the interplay of embedded artificial intelligence (AI) in existing technologies. Trust transfer theory provides an excellent opportunity to deepen prevailing discussions about trust in such converged products. However, AI-driven convergence challenges existing theoretical assumptio...
This minitrack provides a venue for all work (qualitative, quantitative, computational, and design) in relation to better understanding health data platforms, data repositories, data sharing, data governance, and ecosystems. It highlights various perspectives, including technical, organizational, social, and regulatory ones and considers multiple l...
Mindfulness practices are valuable exercises for physical and mental health. Various digital applications exist that support individuals in practicing mindfulness. Following the trend of gamifying utilitarian systems, many mindfulness applications (MAs) incorporate game design elements (GDEs). However, little is known about users' GDE preferences i...
To improve contemporary machine learning (ML) models, research is increasingly looking at tapping in and incorporating the knowledge of domain experts. However, expert knowledge often relies on intuition, which is difficult to formalize for incorporation into ML models. Against this backdrop, we investigate the role of intuition in the context of e...
Vehicular Fog Computing (VFC) facilitates the deployment of distributed, latency-aware services, residing between smart vehicles and cloud services. However, VFC systems are exposed to manifold security threats, putting human life at risk. Knowledge on such threats is scattered and lacks empirical validation. We performed an extensive threat assess...
Smart contracts are a promising means of formalizing and reliably enforcing agreements between entities using distributed ledger technology (DLT). Research has revealed that a significant number of smart contracts are subject to programming flaws, making them vulnerable to attacks and leading to detrimental effects, such as asset loss. Researchers...
Digital transformation continues to profoundly impact employees in organizations in many industries. While past research has extensively investigated the impact of digital transformation on organizations, we still lack a comprehensive understanding of the factors that are relevant to examine how employees perceive digital transformation and its eff...
Zusammenfassung
Das Training von Künstliche Intelligenz (KI)-Modellen, die auf maschinellem Lernen (ML) beruhen, erfordert eine große Menge qualitativ hochwertiger Daten. Besonders im Gesundheitswesen mit seinen hochsensiblen Daten und hohen Anforderungen an den Datenschutz besitzen einzelne Akteur:innen oft jedoch nicht ausreichend hochwertige Dat...
Background: With direct-to-consumer (DTC) genetic testing enabling self-responsible access to novel information on ancestry, traits, or health, consumers often turn to social media for assistance and discussion. YouTube, the largest social media platform for videos, offers an abundance of DTC genetic testing–related videos. Nevertheless, user disco...
This document provides supplementary information for the paper “Be Mindful of User Preferences: An Explorative Study on Game Design Elements in Mindfulness Applications” submitted to HICSS-56.
This document provides supplementary material for the article "Understanding the Role of Expert Intuition in Medical Image Annotation: A Cognitive Task Analysis Approach" accepted at HICSS-56.
Whereas the importance of information system (IS) certifications is increasing to prove compliance with regulatory and industry requirements, research reveals inconsistent findings concerning the effectiveness of IS certifications. Prior studies have concluded that such inconsistent findings stem partly from users’ limited understanding of the natu...
Token economy instances can be built on a variety of protocols, such as distributed ledger technology (DLT) protocols. DLT protocols are used to operate DLT systems that perform, in a decentralized way, several tasks (e.g., the prevention of double-spending) that are usually handled by central actors, such as banks. Using DLT can be subject to chal...
Emerging technologies in healthcare such as wearables, robotics, nanotech, connected health, and genomics technologies produce increasing amounts of data, which fuel artificial intelligence-powered algorithms to actively react to, predict, and prevent diseases and steer scarce healthcare resources. Currently, while digitalization in the healthcare...
Although consumers and experts often express concerns regarding the questionable business practices of direct-to-consumer (DTC) genetic testing services (e.g., reselling of consumers' genetic data), the DTC genetic testing market keeps expanding rapidly. We employ retail fairness as our theoretical lens to address this seeming paradox and conduct a...
While the importance of information system (IS) certifications to demonstrate compliance with security and personal data protection requirements is constantly increasing, competing (theoretical) viewpoints exist that outline the rationales for organizations to adopt certifica-tions. The results of these competing perspectives are inconclusive resea...
Zusammenfassung
Der DigitalPakt Schule soll das deutsche Bildungswesen flächendeckend modernisieren, zeigt jedoch bisher Anlaufschwierigkeiten. Die bereitgestellten Fördermittel werden zögerlich abgerufen und die Kritiker:innen des Programms werden immer lauter. Diese Arbeit setzt genau an diesem Punkt an und diskutiert Ursachen und Einflüsse, die...