About
4
Publications
1,829
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (4)
In the emerging information economy, data evolves as an essential asset and personal data in particular is used for data-driven business models. However, companies frequently leverage personal data without considering individuals’ data sovereignty. Therefore, we strive to strengthen individuals’ position in data ecosystems by combining concepts of...
During interaction with today’s internet services and platform ecosystems, consumer data is often harvested and shared without their consent; that is, consumers seized to be the sovereigns of their own data with the proliferation of the internet. Due to the rapid and abundant nature of interactions in today’s platform ecosystems, manual consent man...
Despite various security features offered by distributed ledger technology (DLT), distributed ledgers are vulnerable to a variety of malicious attacks (e.g., selfish-mining and block withholding). While such vulnerabilities have been thoroughly investigated in extant research, understanding and development of appropriate countermeasures is still in...
When using today's internet services and platform ecosystems, data of consumers is often harvested and shared without their consent; that is, consumers seized to be sovereigns of their own data. Due to the rapid and abundant nature of interactions in today's platform ecosystems, manual consent management is impracticable. To support development of...