
Tatiana ErmakovaHochschule für Technik und Wirtschaft Berlin | HTW
Tatiana Ermakova
PhD, M.Sc. Information Systems
About
71
Publications
70,341
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
945
Citations
Citations since 2017
Introduction
Additional affiliations
November 2015 - present
April 2012 - October 2015
December 2010 - February 2012
Education
April 2012 - April 2015
October 2008 - January 2011
Publications
Publications (71)
The EPCglobal Network is an emerging global information architecture for supporting Radio-Frequency Identification (RFID) in supply chains. Discovery services for the EPCglobal Network are distributed services that serve the following pivotal lookup function: Given an identifier for a real-world object, e.g., an Electronic Product Code (EPC) stored...
The accelerated adoption of cloud computing among enterprises is due to the multiple benefits the technology provides, one of them the simplification of inter-organizational information sharing, which is of utmost importance in healthcare. Nevertheless, moving sensitive health records to the cloud still implies severe security and privacy risks. Wi...
Over the years, a drastic increase in online information disclosure spurs a wave of concerns from multiple stakeholders. Among others, users resent the “behind the closed doors” processing of their personal data by companies. Privacy policies are supposed to inform users how their personal information is handled by a website. However, several studi...
In healthcare, inter-organizational sharing and collaborative use of big data become increasingly important. The cloud computing paradigm is expected to provide an environment perfectly matching the needs of collaborating healthcare workers. However, there are still many security and privacy challenges impeding the wide adoption of cloud computing...
Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These concerns can be addressed through corresponding security and privacy requirements within the syste...
The Residue Number System (RNS) is a non-positional number system that allows parallel computations without transfers between digits. However, some operations in RNS require knowledge of the positional characteristic of a number. Among these operations is the conversion from RNS to the positional number system. The methods of reverse conversion for...
In recent years, artificial intelligence has essentially contributed to the progress of human society in various application areas. However, it also gave raise to questioning its ethical principles in application domains such as autonomous driving. Despite a plethora of research related to acceptance of autonomously driving vehicles in the MIS rese...
Security threats have increased in recent years. To motivate the developers to stick to the security policies, the notion of usable security is investigated. Enhancing the usability of security services leads to developing software products that are resilient against security threats. In this paper, we investigate the role of usable security in dev...
Motivated by their increasing popularity and usefulness in the English-speaking world, we model and analyze patient referral networks for medical specialties based on Germany-wide claims data from the fourth quarter of 2015. Based on the average values of local graph measures, different groups of medical specialties could be distinguished. Family p...
Autonomous systems (AS) that relay Internet traffic are not equally well connected. The failure of just a tiny portion of them can render multiple sites inaccessible and disconnect multiple service providers from the global network, while targeted attacks can severely impact Internet connectivity. Modeling Internet topology and measuring Internet c...
Empirical insights into high-promising commercial sentiment analysis solutions that go beyond their vendors’ claims are rare. Moreover, due to ongoing advances in the field, earlier studies are far from reflecting the current situation due to the constant evolution of the field. The present research aims to evaluate and compare current solutions. B...
European Union (EU) member states consider themselves bulwarks of democracy and freedom of speech. However, there is a lack of empirical studies assessing possible violations of these principles in the EU through Internet censorship. This work starts addressing this research gap by investigating Internet censorship in Spain over 2016-2020, includin...
Patients with unilateral vocal fold cancer (T1a) have a favorable prognosis. In addition to the oncological results of CO2 transoral laser microsurgery (TOLMS), voice function is among the outcome measures. Previous early glottic cancer studies have reported voice function in patients grouped into combined T stages (Tis, T1, T2) and merged cordecto...
Vibrato is one of the most frequently investigated parameters in singing. Most studies examine a very limited number of sound samples to answer specific questions. In the novel approach of our interdisciplinary vibrato project, a sophisticated database of 1723 sound samples was compiled, containing examples from 30 operas, one oratorio and 73 vocal...
Despite substantial investments, data science has failed to deliver significant business value in many companies. So far, the reasons for this problem have not been explored systematically. This study tries to find possible explanations for this shortcoming and analyses the specific challenges in data-driven projects. To identify the reasons that m...
Background
Some patients have symptoms of both asthma and chronic obstructive pulmonary disease (COPD). This is referred to as asthma-COPD overlap (ACO). The current study examines the prevalence of concurrent diagnoses of asthma and COPD and its regional differences in outpatient care.
Methods
We used nationwide outpatient claims data of statutory...
The aim of this study was to estimate the prevalence of concurrent diagnoses of asthma/COPD and examine its full spectrum of comorbid disorders in Germany. We used nationwide outpatient claims data comprising diagnoses of all statutory health insurees (40+ years) in 2017 (N = 40,477,745). The ICD-10 codes J44 (COPD) and J45 (asthma) were used to id...
Victims of child sexual abuse suffer from physical, psychological, and emotional trauma. The detection and deletion of illicit online child sexual abuse material (CSAM) helps in reducing and even stopping the continuous re-victimization of children. Furthermore, automatic detection may also support legal authorities to search for and review the mas...
The “HPI Future SOC Lab” is a cooperation of the Hasso Plattner Institute (HPI) and industry partners. Its mission is to enable and promote exchange and interaction between the research community and the industry partners. The HPI Future SOC Lab provides researchers with free of charge access to a complete infrastructure of state of the art hard an...
Objective: This study examined the full spectrum of comorbid disorders in all statutory-health-insured children aged 5 to 14 years with ADHD in 2017 by using nationwide claims data in Germany. Method: Children with ADHD ( n = 258,662) were compared for the presence of 864 comorbid diseases with a control group matched by gender, age, and region of...
Since the 2016 U.S. presidential election, the problem of fake news on social media gained renewed public attention. Consequently, a huge amount of research literature concerning this matter is published each year. With this study, we seek to identify and integrate the findings of relevant and high quality studies across several research discipline...
Against the importance of online privacy, this paper investigates German tourism websites previously shown as actively adopting mail tracking technology. For a sample of 50 highly visited websites, we analyse the quantity and type of data both mandatory and optional for registration. We further examine the extent to which personal data is collected...
Social Media Daten im Spannungsfeld der digitalen und raumbezogenen Epidemiologie, Verfahren zur automatisierten Extraktion von Nutzerinformationen, Potenzial der digitalen Epidemiologie für die Versorgungsforschung, Potenzial der digital räumlichen Epidemiologie für die Versorgungsforschung, Potenzial digitaler Informationen für
die Gesundheitserh...
Internet connectivity of cloud services is of exceptional importance for both their providers and consumers. This article demonstrates the outlines of a method for measuring cloud-service connectivity at the Internet Protocol level from a client’s perspective. For this, we actively collect connectivity data via traceroute measurements from PlanetLa...
The Internet has developed into a communication infrastructure of critical importance for global society and business. In this study, we analyze the impact of systematically attacking border routers and the resulting effects on global Internet connectivity at the autonomous-system level. For this, we simulate several malware-propagation strategies...
The evolution of Internet has radically changed the way millions of people conduct their financial affairs today. Online payment solutions and online banking services attract more and more customers every day, whereas Internet connectivity is essential for their availability. This study models the Internet structure in the context of known online f...
Purpose: Decentralized, blockchain-based equity crowdfunding has potential to close the equity-funding gap faced by startups. The present paper investigates the driving forces of equity crowdfunding and the impact of the blockchain. Design: In a two-round, expert-based Delphi survey, ten market-driving forces within equity crowdfunding are identifi...
Introduction:
Functional and organic impairments of the singing voice are common career-threatening problems of singers presenting in phoniatric and laryngological departments. The objective was to evaluate the efficacy of phonosurgery, logopedic voice treatment and vocal pedagogy in common organic and functional voice problems of singers, includi...
Investigating the correlations between graph metrics in various networks is a prosperous research topic that only starts to evolve. Knowledge about graph metrics interrelations may be beneficial in many other aspects of networks studying, starting from optimizing computations to even detecting particular network types by looking at their correlatio...
The Internet is an important global critical infrastructure. Yet, it has remained unclear how it is organized in different regions and areas of political influence. This explorative study analyses geographic aspects of the Autonomous System networks in different countries. By using Internet geolocation information for locating autonomous systems, w...
Bitcoin is a digital monetary system that functions without any central authority and pre-assumed identities among participants. Contrary to a popular belief, Bitcoin is not inherently anonymous or secure. In this article, we survey security and privacy risks in Bitcoin and related countermeasures. We also examine self-reported and actual adoption...
While information technology has been advancing rapidly during the past years, the dawn of the information age has not only elevated the importance of privacy in theory and practice but also raised concerns about how to protect a users' private information. Within the information systems literature, there exist multiple approaches for studying onli...
Based on BGP and traceroute data integrated from global-scale mapping projects, we analyze the Internet graph with respect to connectivity and robustness. In an evolution of the initial project, we assess several malware strategies that could affect border routers and their corresponding Autonomous Systems. In this project phase, we consolidated ea...
Web tracking seems to become ubiquitous in online business and leads to increased privacy concerns of users. This paper provides an overview over the current state of the art of web-tracking research, aiming to reveal the relevance and methodologies of this research area and create a foundation for future work. In particular, this study addresses t...
Involvement of disadvantaged individuals into entrepreneurship facilitates their social integration into mainstream societies. The present study addresses the drivers of social entrepreneurial appraisal among
hearing-impaired individuals within a unique social minority environment. In prior research, social appraisal was empirically shown to determ...
Involvement of disadvantaged individuals into entrepreneurship facilitates their social integration into mainstream societies. The present study addresses the drivers of social entrepreneurial appraisal among hearing-impaired individuals within a unique social minority environment. In prior research, social appraisal was empirically shown to determ...
Methods:
In a prospective clinical study, surgery was performed via microlaryngoscopy in 37 female patients with chronic VFN manifestations (38±12 yrs, mean±SD). Pre- and postoperative evaluations of treatment efficacy comprised videolaryngostroboscopy, auditory-perceptual voice assessment, voice range profile (VRP), acoustic-aerodynamic analysis,...
Purpose: Despite intensive research during the last two decades, the detailed structural composition of the Internet is still opaque to researchers. Nevertheless, due to the importance of Internet maps for the development of more effective routing algorithms, security mechanisms, and resilience management, more detailed insights are required. This...
Damit auf unerklärte und unerwünschte regionale Unterschiede der Gesundheitsversorgung gezielt reagiert werden kann, ist es notwendig, die beobachteten Befunde dem Handeln der einzelnen Akteure (Patienten, Ärzte, Krankenhäuser) zuzuordnen. Die verschiedenen Akteure teilen sich in der Regel die Verantwortung für die Versorgungsprozesse und Behandlun...
Online privacy policies notify users of a Website how their personal information is collected, processed and stored. Against the background of rising privacy concerns, privacy policies seem to represent an influential instrument for increasing customer trust and loyalty. However, in practice, consumers seem to actually read privacy policies only in...
The Bitcoin digital currency increasingly attracts an essential number of Internet users. This study focuses on the future outlook of Bitcoin by identifying drivers and impediments of the currency's adoption. For this aim, we conduct an empirical survey of around one hundred Bitcoin experts and discuss the results. Our research contributes to the p...
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the fac...
Based on our traceroute data integrated from global-scale mapping projects aimed to generate comprehensive Internet maps at different abstraction levels, we analyze the Internet graph in terms of important nodes. In an evolution of the initial project, we start to assess several malware strategies that could affect border routers. We present some p...
In the digital age, the careful handling of personal data plays an important role, since privacy is vital for users. Therefore, it is of utmost importance for users that data collection is minimized and their data is treated strictly confidential. This paper analyzes the data a user needs to provide for an E-Commerce website. Specifically, our case...
There are few data analysing to what specific extent phonomicrosurgery improves vocal function in patients suffering from Reinke's oedema (RE). The recently introduced parameter vocal extent measure (VEM) seems to be suitable to objectively quantify vocal performance. The purpose of this clinical prospective study was to investigate the outcomes of...
This article analyzes how users perceive the degree of anonymity provided by the Bitcoin network, to what extent they are concerned about anonymity when using Bitcoin, whether they are knowledgeable of and concerned about specific de-anonymization attacks, and if they are aware of and adopt privacy-preserving countermeasures. A user survey with 125...
Background: Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns.
Objectives: This study examines the effect of confidentiality assurance in a cloud-computing environment on...
Empirical studies have repeatedly pointed out that the readability of a privacy policy is a potential source of trust of online users. Nevertheless, many online companies still keep the readability of their privacy policies at a low level. This could possibly coincide with a low compliance of their privacy policies with the guidelines of fair infor...
Objective:
This study aimed to present vocal extent measure (VEM), demonstrate its changes with phonomicrosurgical treatment in patients with vocal fold polyps (VFPs), and to compare its performance to that of established vocal parameters.
Study design:
This is an individual cohort study.
Methods:
Microlaryngoscopic ablation was executed in 61...
Due to demographic changes, health information technologies comprising electronic health records (EHR), electronic medical records (EMR), personal health records (PHR), remote patient monitoring (RPM) and other healthcare related websites are gaining significant relevance. They constitute a great opportunity for efficiency gains and further benefit...
Health-related personal information is very privacy-sensitive. Online privacy policies inform Website users about the ways their personal information is gathered, processed and stored. In the light of increasing privacy concerns, privacy policies seem to be an important mechanism for increasing customer loyalty. However, in practice, consumers only...
Recently proposed health applications are able to enforce essential advancements in the healthcare sector. The design of these innovative solutions is often enabled through the cloud computing model. With regards to this technology, high concerns about information security and privacy are common in practice. These concerns with respect to sensitive...
Aufgrund der zu erwartenden starken Verschiebung in der Altersstruktur der Weltbevölkerung in der Zukunft kann das Gesundheitssystem unter Druck geraten. In den letzten Jahren bietet Cloud Computing erhebliche technologische Fortschritte. Im Gesundheitswesen können die Möglichkeiten von Cloud Computing eingesetzt werden, um die medizinische Behandl...
Cloud platforms providing healthcare cloud services are supposed to start a new era in the healthcare industry. Nevertheless, appropriate marketplace business models have not been examined in this domain so far. This paper contributes by presenting a first business model draft for such a marketplace. Following the action research principles, we col...
In a multi-stakeholder cloud computing environment, data access control is of essential importance. Nowadays, it is usually handled in and deployed by every single cloud service on its own which makes the configuration of fine-grained access privileges cumbersome and economically expensive. In this paper, we introduce a novel cloud ecosystem archit...
E-Health solutions using the Internet provide many benefits for health centers; hosting such solutions in public Cloud Computing environments as Software-as-a-Service becomes increasingly popular. However, the deployment of e-health services in shared environments is restricted due to regulations prohibiting medical data access by illegitimate part...
The cloud computing paradigm promises to significantly improve the transfer of crucial medical records during medical service delivery. However, since cloud computing technology is still known for unsolved security and privacy challenges, severe concerns could prevent patients and medical workers from accepting such an application scenario. Owing t...
Cloud Computing stellt einen vielversprechenden Ansatz dar, die steigenden und an Bedeutung gewinnenden Bedürfnisse der Unternehmen sowie im Einzelnen der Krankenhauseinrichtungen an Informations- und Kommunikationstechnologien (IKT) vorteilhaft abzudecken. Trotz zahlreicher Publikationen im Bereich Cloud Computing im Gesundheitswesen, gibt es bish...
The emerging cloud computing technology enables new scenarios in healthcare. However, there are still many security and privacy concerns. Although there are numerous publications in the context of cloud computing in healthcare, we found no typical security and privacy requirements framework so far. With this background we survey security and privac...
Nowadays, IT resources are increasingly being used in all areas of the health sector. Cloud computing offers a promising approach to satisfy the IT needs in a favorable way. Despite numerous publications in the context of cloud computing in healthcare, there is no systematic review on current research so far. This paper addresses the gap and is aim...
Der vorliegende Artikel stellt eine innovative Cloud Computing-Architektur vor, die eine Reihe von Herausforderungen im Einsatz von Cloud Computing adressiert: Datensicherheit, Konformität mit rechtlichen und organisatorischen Richtlinien sowie die Interoperabilität von Cloud-Lösungen. Diese ungelösten Herausforderungen bewirken, dass in vielen Bra...
Network
Cited