Tatiana Ermakova

Tatiana Ermakova
Hochschule für Technik und Wirtschaft Berlin | HTW

PhD, M.Sc. Information Systems

About

71
Publications
70,341
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
945
Citations
Citations since 2017
46 Research Items
788 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Additional affiliations
November 2015 - present
Universität Potsdam
Position
  • PostDoc Position
April 2012 - October 2015
Technische Universität Berlin
Position
  • Research Assistant
December 2010 - February 2012
Humboldt-Universität zu Berlin
Position
  • Research Assistant
Education
April 2012 - April 2015
Technische Universität Berlin
Field of study
  • Information Systems
October 2008 - January 2011
Humboldt-Universität zu Berlin
Field of study
  • Information Systems

Publications

Publications (71)
Article
Full-text available
The EPCglobal Network is an emerging global information architecture for supporting Radio-Frequency Identification (RFID) in supply chains. Discovery services for the EPCglobal Network are distributed services that serve the following pivotal lookup function: Given an identifier for a real-world object, e.g., an Electronic Product Code (EPC) stored...
Conference Paper
Full-text available
The accelerated adoption of cloud computing among enterprises is due to the multiple benefits the technology provides, one of them the simplification of inter-organizational information sharing, which is of utmost importance in healthcare. Nevertheless, moving sensitive health records to the cloud still implies severe security and privacy risks. Wi...
Conference Paper
Full-text available
Over the years, a drastic increase in online information disclosure spurs a wave of concerns from multiple stakeholders. Among others, users resent the “behind the closed doors” processing of their personal data by companies. Privacy policies are supposed to inform users how their personal information is handled by a website. However, several studi...
Article
Full-text available
In healthcare, inter-organizational sharing and collaborative use of big data become increasingly important. The cloud computing paradigm is expected to provide an environment perfectly matching the needs of collaborating healthcare workers. However, there are still many security and privacy challenges impeding the wide adoption of cloud computing...
Article
Full-text available
Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These concerns can be addressed through corresponding security and privacy requirements within the syste...
Article
Full-text available
The Residue Number System (RNS) is a non-positional number system that allows parallel computations without transfers between digits. However, some operations in RNS require knowledge of the positional characteristic of a number. Among these operations is the conversion from RNS to the positional number system. The methods of reverse conversion for...
Conference Paper
Full-text available
In recent years, artificial intelligence has essentially contributed to the progress of human society in various application areas. However, it also gave raise to questioning its ethical principles in application domains such as autonomous driving. Despite a plethora of research related to acceptance of autonomously driving vehicles in the MIS rese...
Article
Full-text available
Security threats have increased in recent years. To motivate the developers to stick to the security policies, the notion of usable security is investigated. Enhancing the usability of security services leads to developing software products that are resilient against security threats. In this paper, we investigate the role of usable security in dev...
Conference Paper
Full-text available
Motivated by their increasing popularity and usefulness in the English-speaking world, we model and analyze patient referral networks for medical specialties based on Germany-wide claims data from the fourth quarter of 2015. Based on the average values of local graph measures, different groups of medical specialties could be distinguished. Family p...
Conference Paper
Full-text available
Autonomous systems (AS) that relay Internet traffic are not equally well connected. The failure of just a tiny portion of them can render multiple sites inaccessible and disconnect multiple service providers from the global network, while targeted attacks can severely impact Internet connectivity. Modeling Internet topology and measuring Internet c...
Conference Paper
Full-text available
Empirical insights into high-promising commercial sentiment analysis solutions that go beyond their vendors’ claims are rare. Moreover, due to ongoing advances in the field, earlier studies are far from reflecting the current situation due to the constant evolution of the field. The present research aims to evaluate and compare current solutions. B...
Conference Paper
Full-text available
European Union (EU) member states consider themselves bulwarks of democracy and freedom of speech. However, there is a lack of empirical studies assessing possible violations of these principles in the EU through Internet censorship. This work starts addressing this research gap by investigating Internet censorship in Spain over 2016-2020, includin...
Article
Full-text available
Patients with unilateral vocal fold cancer (T1a) have a favorable prognosis. In addition to the oncological results of CO2 transoral laser microsurgery (TOLMS), voice function is among the outcome measures. Previous early glottic cancer studies have reported voice function in patients grouped into combined T stages (Tis, T1, T2) and merged cordecto...
Article
Vibrato is one of the most frequently investigated parameters in singing. Most studies examine a very limited number of sound samples to answer specific questions. In the novel approach of our interdisciplinary vibrato project, a sophisticated database of 1723 sound samples was compiled, containing examples from 30 operas, one oratorio and 73 vocal...
Conference Paper
Full-text available
Despite substantial investments, data science has failed to deliver significant business value in many companies. So far, the reasons for this problem have not been explored systematically. This study tries to find possible explanations for this shortcoming and analyses the specific challenges in data-driven projects. To identify the reasons that m...
Article
Full-text available
Background Some patients have symptoms of both asthma and chronic obstructive pulmonary disease (COPD). This is referred to as asthma-COPD overlap (ACO). The current study examines the prevalence of concurrent diagnoses of asthma and COPD and its regional differences in outpatient care. Methods We used nationwide outpatient claims data of statutory...
Article
Full-text available
The aim of this study was to estimate the prevalence of concurrent diagnoses of asthma/COPD and examine its full spectrum of comorbid disorders in Germany. We used nationwide outpatient claims data comprising diagnoses of all statutory health insurees (40+ years) in 2017 (N = 40,477,745). The ICD-10 codes J44 (COPD) and J45 (asthma) were used to id...
Article
Victims of child sexual abuse suffer from physical, psychological, and emotional trauma. The detection and deletion of illicit online child sexual abuse material (CSAM) helps in reducing and even stopping the continuous re-victimization of children. Furthermore, automatic detection may also support legal authorities to search for and review the mas...
Book
The “HPI Future SOC Lab” is a cooperation of the Hasso Plattner Institute (HPI) and industry partners. Its mission is to enable and promote exchange and interaction between the research community and the industry partners. The HPI Future SOC Lab provides researchers with free of charge access to a complete infrastructure of state of the art hard an...
Article
Objective: This study examined the full spectrum of comorbid disorders in all statutory-health-insured children aged 5 to 14 years with ADHD in 2017 by using nationwide claims data in Germany. Method: Children with ADHD ( n = 258,662) were compared for the presence of 864 comorbid diseases with a control group matched by gender, age, and region of...
Article
Full-text available
Since the 2016 U.S. presidential election, the problem of fake news on social media gained renewed public attention. Consequently, a huge amount of research literature concerning this matter is published each year. With this study, we seek to identify and integrate the findings of relevant and high quality studies across several research discipline...
Article
Full-text available
Against the importance of online privacy, this paper investigates German tourism websites previously shown as actively adopting mail tracking technology. For a sample of 50 highly visited websites, we analyse the quantity and type of data both mandatory and optional for registration. We further examine the extent to which personal data is collected...
Chapter
Full-text available
Social Media Daten im Spannungsfeld der digitalen und raumbezogenen Epidemiologie, Verfahren zur automatisierten Extraktion von Nutzerinformationen, Potenzial der digitalen Epidemiologie für die Versorgungsforschung, Potenzial der digital räumlichen Epidemiologie für die Versorgungsforschung, Potenzial digitaler Informationen für die Gesundheitserh...
Article
Full-text available
Internet connectivity of cloud services is of exceptional importance for both their providers and consumers. This article demonstrates the outlines of a method for measuring cloud-service connectivity at the Internet Protocol level from a client’s perspective. For this, we actively collect connectivity data via traceroute measurements from PlanetLa...
Article
Full-text available
The Internet has developed into a communication infrastructure of critical importance for global society and business. In this study, we analyze the impact of systematically attacking border routers and the resulting effects on global Internet connectivity at the autonomous-system level. For this, we simulate several malware-propagation strategies...
Article
Full-text available
The evolution of Internet has radically changed the way millions of people conduct their financial affairs today. Online payment solutions and online banking services attract more and more customers every day, whereas Internet connectivity is essential for their availability. This study models the Internet structure in the context of known online f...
Article
Full-text available
Purpose: Decentralized, blockchain-based equity crowdfunding has potential to close the equity-funding gap faced by startups. The present paper investigates the driving forces of equity crowdfunding and the impact of the blockchain. Design: In a two-round, expert-based Delphi survey, ten market-driving forces within equity crowdfunding are identifi...
Article
Full-text available
Introduction: Functional and organic impairments of the singing voice are common career-threatening problems of singers presenting in phoniatric and laryngological departments. The objective was to evaluate the efficacy of phonosurgery, logopedic voice treatment and vocal pedagogy in common organic and functional voice problems of singers, includi...
Article
Full-text available
Investigating the correlations between graph metrics in various networks is a prosperous research topic that only starts to evolve. Knowledge about graph metrics interrelations may be beneficial in many other aspects of networks studying, starting from optimizing computations to even detecting particular network types by looking at their correlatio...
Article
Full-text available
The Internet is an important global critical infrastructure. Yet, it has remained unclear how it is organized in different regions and areas of political influence. This explorative study analyses geographic aspects of the Autonomous System networks in different countries. By using Internet geolocation information for locating autonomous systems, w...
Article
Full-text available
Bitcoin is a digital monetary system that functions without any central authority and pre-assumed identities among participants. Contrary to a popular belief, Bitcoin is not inherently anonymous or secure. In this article, we survey security and privacy risks in Bitcoin and related countermeasures. We also examine self-reported and actual adoption...
Article
Full-text available
While information technology has been advancing rapidly during the past years, the dawn of the information age has not only elevated the importance of privacy in theory and practice but also raised concerns about how to protect a users' private information. Within the information systems literature, there exist multiple approaches for studying onli...
Technical Report
Full-text available
Based on BGP and traceroute data integrated from global-scale mapping projects, we analyze the Internet graph with respect to connectivity and robustness. In an evolution of the initial project, we assess several malware strategies that could affect border routers and their corresponding Autonomous Systems. In this project phase, we consolidated ea...
Conference Paper
Full-text available
Web tracking seems to become ubiquitous in online business and leads to increased privacy concerns of users. This paper provides an overview over the current state of the art of web-tracking research, aiming to reveal the relevance and methodologies of this research area and create a foundation for future work. In particular, this study addresses t...
Article
Involvement of disadvantaged individuals into entrepreneurship facilitates their social integration into mainstream societies. The present study addresses the drivers of social entrepreneurial appraisal among hearing-impaired individuals within a unique social minority environment. In prior research, social appraisal was empirically shown to determ...
Article
Involvement of disadvantaged individuals into entrepreneurship facilitates their social integration into mainstream societies. The present study addresses the drivers of social entrepreneurial appraisal among hearing-impaired individuals within a unique social minority environment. In prior research, social appraisal was empirically shown to determ...
Article
Methods: In a prospective clinical study, surgery was performed via microlaryngoscopy in 37 female patients with chronic VFN manifestations (38±12 yrs, mean±SD). Pre- and postoperative evaluations of treatment efficacy comprised videolaryngostroboscopy, auditory-perceptual voice assessment, voice range profile (VRP), acoustic-aerodynamic analysis,...
Working Paper
Full-text available
Purpose: Despite intensive research during the last two decades, the detailed structural composition of the Internet is still opaque to researchers. Nevertheless, due to the importance of Internet maps for the development of more effective routing algorithms, security mechanisms, and resilience management, more detailed insights are required. This...
Article
Full-text available
Damit auf unerklärte und unerwünschte regionale Unterschiede der Gesundheitsversorgung gezielt reagiert werden kann, ist es notwendig, die beobachteten Befunde dem Handeln der einzelnen Akteure (Patienten, Ärzte, Krankenhäuser) zuzuordnen. Die verschiedenen Akteure teilen sich in der Regel die Verantwortung für die Versorgungsprozesse und Behandlun...
Conference Paper
Full-text available
Online privacy policies notify users of a Website how their personal information is collected, processed and stored. Against the background of rising privacy concerns, privacy policies seem to represent an influential instrument for increasing customer trust and loyalty. However, in practice, consumers seem to actually read privacy policies only in...
Article
Full-text available
The Bitcoin digital currency increasingly attracts an essential number of Internet users. This study focuses on the future outlook of Bitcoin by identifying drivers and impediments of the currency's adoption. For this aim, we conduct an empirical survey of around one hundred Bitcoin experts and discuss the results. Our research contributes to the p...
Conference Paper
Full-text available
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the fac...
Technical Report
Full-text available
Based on our traceroute data integrated from global-scale mapping projects aimed to generate comprehensive Internet maps at different abstraction levels, we analyze the Internet graph in terms of important nodes. In an evolution of the initial project, we start to assess several malware strategies that could affect border routers. We present some p...
Article
Full-text available
In the digital age, the careful handling of personal data plays an important role, since privacy is vital for users. Therefore, it is of utmost importance for users that data collection is minimized and their data is treated strictly confidential. This paper analyzes the data a user needs to provide for an E-Commerce website. Specifically, our case...
Article
Full-text available
There are few data analysing to what specific extent phonomicrosurgery improves vocal function in patients suffering from Reinke's oedema (RE). The recently introduced parameter vocal extent measure (VEM) seems to be suitable to objectively quantify vocal performance. The purpose of this clinical prospective study was to investigate the outcomes of...
Conference Paper
Full-text available
This article analyzes how users perceive the degree of anonymity provided by the Bitcoin network, to what extent they are concerned about anonymity when using Bitcoin, whether they are knowledgeable of and concerned about specific de-anonymization attacks, and if they are aware of and adopt privacy-preserving countermeasures. A user survey with 125...
Article
Full-text available
Background: Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. Objectives: This study examines the effect of confidentiality assurance in a cloud-computing environment on...
Conference Paper
Full-text available
Empirical studies have repeatedly pointed out that the readability of a privacy policy is a potential source of trust of online users. Nevertheless, many online companies still keep the readability of their privacy policies at a low level. This could possibly coincide with a low compliance of their privacy policies with the guidelines of fair infor...
Article
Objective: This study aimed to present vocal extent measure (VEM), demonstrate its changes with phonomicrosurgical treatment in patients with vocal fold polyps (VFPs), and to compare its performance to that of established vocal parameters. Study design: This is an individual cohort study. Methods: Microlaryngoscopic ablation was executed in 61...
Conference Paper
Full-text available
Due to demographic changes, health information technologies comprising electronic health records (EHR), electronic medical records (EMR), personal health records (PHR), remote patient monitoring (RPM) and other healthcare related websites are gaining significant relevance. They constitute a great opportunity for efficiency gains and further benefit...
Conference Paper
Full-text available
Health-related personal information is very privacy-sensitive. Online privacy policies inform Website users about the ways their personal information is gathered, processed and stored. In the light of increasing privacy concerns, privacy policies seem to be an important mechanism for increasing customer loyalty. However, in practice, consumers only...
Article
Full-text available
Recently proposed health applications are able to enforce essential advancements in the healthcare sector. The design of these innovative solutions is often enabled through the cloud computing model. With regards to this technology, high concerns about information security and privacy are common in practice. These concerns with respect to sensitive...
Thesis
Aufgrund der zu erwartenden starken Verschiebung in der Altersstruktur der Weltbevölkerung in der Zukunft kann das Gesundheitssystem unter Druck geraten. In den letzten Jahren bietet Cloud Computing erhebliche technologische Fortschritte. Im Gesundheitswesen können die Möglichkeiten von Cloud Computing eingesetzt werden, um die medizinische Behandl...
Conference Paper
Cloud platforms providing healthcare cloud services are supposed to start a new era in the healthcare industry. Nevertheless, appropriate marketplace business models have not been examined in this domain so far. This paper contributes by presenting a first business model draft for such a marketplace. Following the action research principles, we col...
Conference Paper
Full-text available
In a multi-stakeholder cloud computing environment, data access control is of essential importance. Nowadays, it is usually handled in and deployed by every single cloud service on its own which makes the configuration of fine-grained access privileges cumbersome and economically expensive. In this paper, we introduce a novel cloud ecosystem archit...
Conference Paper
Full-text available
E-Health solutions using the Internet provide many benefits for health centers; hosting such solutions in public Cloud Computing environments as Software-as-a-Service becomes increasingly popular. However, the deployment of e-health services in shared environments is restricted due to regulations prohibiting medical data access by illegitimate part...
Conference Paper
Full-text available
The cloud computing paradigm promises to significantly improve the transfer of crucial medical records during medical service delivery. However, since cloud computing technology is still known for unsolved security and privacy challenges, severe concerns could prevent patients and medical workers from accepting such an application scenario. Owing t...
Conference Paper
Full-text available
Cloud Computing stellt einen vielversprechenden Ansatz dar, die steigenden und an Bedeutung gewinnenden Bedürfnisse der Unternehmen sowie im Einzelnen der Krankenhauseinrichtungen an Informations- und Kommunikationstechnologien (IKT) vorteilhaft abzudecken. Trotz zahlreicher Publikationen im Bereich Cloud Computing im Gesundheitswesen, gibt es bish...
Conference Paper
Full-text available
The emerging cloud computing technology enables new scenarios in healthcare. However, there are still many security and privacy concerns. Although there are numerous publications in the context of cloud computing in healthcare, we found no typical security and privacy requirements framework so far. With this background we survey security and privac...
Conference Paper
Full-text available
Nowadays, IT resources are increasingly being used in all areas of the health sector. Cloud computing offers a promising approach to satisfy the IT needs in a favorable way. Despite numerous publications in the context of cloud computing in healthcare, there is no systematic review on current research so far. This paper addresses the gap and is aim...
Conference Paper
Full-text available
Der vorliegende Artikel stellt eine innovative Cloud Computing-Architektur vor, die eine Reihe von Herausforderungen im Einsatz von Cloud Computing adressiert: Datensicherheit, Konformität mit rechtlichen und organisatorischen Richtlinien sowie die Interoperabilität von Cloud-Lösungen. Diese ungelösten Herausforderungen bewirken, dass in vielen Bra...

Network