Tobias Dehling

Tobias Dehling
Karlsruhe Institute of Technology | KIT · Institute of Applied Informatics and Formal Description Methods

PhD

About

40
Publications
25,839
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
760
Citations
Introduction
Tobias Dehling currently works at the Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology. Tobias does research in Information Systems on Distributed Ledger Technology, Healthcare Informatics, and Information Privacy.
Additional affiliations
April 2018 - present
Karlsruhe Institute of Technology
Position
  • Research Associate
March 2016 - March 2018
Universität Kassel
Position
  • Research Associate
February 2012 - February 2016
University of Cologne
Position
  • Research Associate
Education
February 2012 - December 2017
University of Kassel
Field of study
  • Information Systems
October 2006 - January 2012
University of Cologne
Field of study
  • Information Systems

Publications

Publications (40)
Article
Patient-centered health information technology services (PHS) provide personalized electronic health services to patients. Since provision of PHS entails handling sensitive medical information, a special focus on information security and privacy aspects is required. We present information security and privacy requirements for PHS and examine how se...
Article
Full-text available
Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35 000 mHealth apps are available for iOS and Android. Of the 6...
Article
Full-text available
Background: Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora an...
Article
Full-text available
When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Fur...
Conference Paper
Full-text available
Online behavioral advertising, on websites and in online applications, requires companies to make intricate trade-offs between promises of increased revenue and potential risks for alienation of consumers. To guide companies in making such trade-offs, we answer the research question: How do consumers perceive online behavioral advertising? We conso...
Chapter
During interaction with today’s internet services and platform ecosystems, consumer data is often harvested and shared without their consent; that is, consumers seized to be the sovereigns of their own data with the proliferation of the internet. Due to the rapid and abundant nature of interactions in today’s platform ecosystems, manual consent man...
Conference Paper
Full-text available
One barrier to more widespread adoption of differentially private neural networks is the entailed accuracy loss. To address this issue, the relationship between neural network architectures and model accuracy under differential privacy constraints needs to be better understood. As a first step, we test whether extant knowledge on architecture desig...
Article
Full-text available
Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentrali...
Conference Paper
Full-text available
Patient-centered health care information systems (PHSs) on peer-to-peer (P2P) networks promise decentralization benefits. P2P PHSs, such as decentralized personal health records or interoperable Covid-19 proximity trackers, can enhance data sovereignty and resilience to single points of failure, but the openness of P2P networks introduces new secur...
Presentation
Full-text available
When using today's internet services and platform ecosystems, data of consumers is often harvested and shared without their consent; that is, consumers seized to be sovereigns of their own data. Due to the rapid and abundant nature of interactions in today's platform ecosystems, manual consent management is impracticable. To support development of...
Presentation
Full-text available
Nowadays, sophisticated techniques have been developed to determine users’ behavioral tendencies and to find and display content suitable to users. Companies collect huge amounts of information about users in order to better identify content and respond to user contexts. How and for what purposes the information is collected is, however, often not...
Preprint
Full-text available
While design decisions determine the quality and viability of applications in general, in Distributed Ledger Technology (DLT), the decision for a suitable DLT design (e.g., Ethereum, IOTA) is of particular relevance because the retroactive change of the underlying DLT design is currently very hard and often even impossible. Extant research has reve...
Poster
Full-text available
During the last decade Blockchain or more general Distributed Ledger Technology (DLT) became of high interest for a broad range of applications in fields such as Finance, HealthIT, Internet of Things, and Supply Chain Management. DLT designs (e.g., Ethereum, IOTA, or Tezos) come with inherent trade-offs between DLT characteristics (e.g., availabili...
Conference Paper
Full-text available
Blockchain is a decentralized digital ledger that challenges existing business models and theories by shifting the trust from institutions towards algorithms. However, the number of successfully developed blockchain-based systems remains low. This points towards a research gap between blockchain applications and technical blockchain characteristics...
Conference Paper
Full-text available
With the rapidly rising number of mobile health (mHealth) applications (apps), it is unfeasible to manually review mHealth apps for information privacy risks. One salient information privacy risk of mHealth apps are confidentiality breaches. We explore whether and how static code analysis is a feasible technology for app review automation. Evaluati...
Conference Paper
Full-text available
Distributed ledger technology (DLT), including blockchain, enables secure processing of transactions between untrustworthy parties in a decentralized system. However, DLT is available in different designs that exhibit diverse characteristics. Moreover , DLT characteristics have complementary and conflicting interdependencies. Hence, there will neve...
Chapter
The rapid evolution of information technologies in the past decades gave information systems an increasingly central role in society. Some of these information systems are now so critical that their disruption or unintended consequences can have detrimental effects on vital societal functions. This chapter clarifies the concept of critical informat...
Conference Paper
Full-text available
Nowadays, information and communication technology (ICT) has become a key driver for future health-enabling and ambient assisted living technologies. These future health-enabling living environments proactively anticipate the inhabitants' needs and adapt their behaviour accordingly. They further continuously monitor the behaviour of the inhabitants...
Conference Paper
Smart Homes sammeln eine Fülle von Daten über ihre Bewohner. Gut genutzt werden diese allerdings nicht. Smart Homes sind im Wesentlichen reaktiv. Im Hinblick auf die Gesundheitsversorgung ist der Wandel zu proaktiven Smart Homes vielversprechend. Um proaktive Smart Homes Wirklichkeit werden zu lassen, sollte zunächst ein vollständiges Bild dieser k...
Chapter
Full-text available
Datenschutzkommunikation wird nur dann funktionieren, wenn die Informationsbedürfnisse der Verbraucher, die weder statisch noch einheitlich sind, adressiert werden. Ein vielversprechender, praktisch realisierbarer Ansatz ist es, die Kommunikation an Verbraucherarchetypen anzupassen. Diese Studie identifiziert die verschiedenen Archetypen basierend...
Conference Paper
Full-text available
Health care is a domain characterized by low and slow adoption of IS compared to other domains, such as manufacturing or avionics. It seems to be promising to transfer existing (design) knowledge and solutions from these domains to the HIS context to increase effectiveness of HIS by, for example, improving usability of HIS and accessibility to assi...
Article
Health management in smart homes has advanced during the last years. With proactive health management in such environments further progress for health prevention and care is to be expected. Challenges for proactive health management in three areas are summarized and briefly discussed: pattern recognition and machine learning, information privacy an...
Conference Paper
Full-text available
Patients use various sources to obtain information on pharmaceutical drugs they take. Mobile health care applications (apps) providing drug information to users are increasingly made available and of increasing importance for the health care domain. However, apps usually only offer functionality that medical professionals or developers consider use...
Conference Paper
Full-text available
In an information systems context, information privacy communication will only work if information systems meet the information needs of their users. Since the needs are neither static nor uniform, a promising approach avoiding inadequacies of ignoring differences in users’ information needs and more practical than dedicated attention to each indiv...
Conference Paper
Full-text available
While the mobile application (app) market, including mobile health (mHealth) apps, is flourishing, communication and assessment of information privacy risks of app use has, in contrast, found only cursory attention. Neither research nor practice offers any useful and widely accepted tools facilitating communication and assessment of information pri...
Conference Paper
Full-text available
Most extant genomic cloud services strive to maximize information security and information privacy protection thereby neglecting the diversity of information practices in genomic research. Such a one- size-fits-all approach is not expedient and decreases the overall system usability and performance. While there is growing awareness that employed in...
Article
Full-text available
Background: Patients’ failure to take medication as prescribed – poor medication adherence – is a well-known issue. Health information technology (IT) presents itself as a promising approach to tackle poor medication adherence. Objectives: To deepen the understanding of what features health IT offers and how these address poor medication adherence,...
Data
(C)2015 by Tobias Dehling and Ali Sunyaev. The 10.1136_amiajnl-2013-002605 dataset of the article "Sunyaev, A., Dehling, T., Taylor, P. L. & Mandl, K. D. Availability and Quality of Mobile Health App Privacy Policies. Journal of the American Medical Informatics Association (2014). doi:10.1136/amiajnl-2013-002605" is made available under a Creative...
Conference Paper
Full-text available
Privacy policies are notices posted by providers and intended to inform users about privacy practices. However, extant research shows that privacy policies are often of poor quality and do not address users’ concerns. In this paper, we design and develop PPC – a privacy policy content assessment instrument to support assessments of whether offered...
Conference Paper
Full-text available
Mobile health (mHealth) applications (apps) can offer a variety of functionality to support users in health-and medical-related issues. However, users' privacy concerns impede users' willingness to share information. This reduces the potential benefits (e.g., chronic disease management, medical intervention support, or medication management) that c...
Article
Full-text available
To facilitate use of patient-centered health IT applications in everyday life, a high degree of usability is required. Based on the example of a patient-centered web application, we propose a usability study design enabling developers and researchers to assess usability of patient-centered health IT applications and derive implications for their im...
Technical Report
Full-text available
A central health information technology infrastructure (HTI) can alleviate challenges of health IT development by serving as a central hub for healthcare applications and stakeholders. We introduce establishment process of as well as information and services provided by the German HTI to encourage putting the inclusion of HTI features in health IT...
Conference Paper
Full-text available
Many patients have difficulties with comprehending written and spoken health information presented to them. Additionally, detailed explanation of medication use and further implications are too complex and expensive to be carried out by medical professionals whenever they are prescribing medication. An alternative approach to transform medical info...
Conference Paper
Full-text available
Patients increasingly want to access health information and services via tailored patient-centered health IT services (PHS). PHS produce value by managing, assessing, and working on users’ sensitive personal health information and leverage benefits of supporting technologies like cloud computing or mobile information and communication technology. T...
Conference Paper
Full-text available
Enhancing information provision in patient information leaflets for medication with health IT has the potential to improve lacking medication compliance. Following the design science research paradigm, a web application (ePill – electronic patient information leaflet) providing information on pharmaceuticals and supplementary services while avoidin...
Article
A central health information technology infrastructure (HTI) can alleviate challenges of health IT development by serving as a central hub for healthcare applications and stakeholders. We introduce establishment process of as well as information and services provided by the German HTI to encourage putting the inclusion of HTI features in health IT...
Conference Paper
Full-text available
Patients benefit from information on pharmaceuticals and most patients are willing to read patient information leaflets for their pharmaceuticals. However, the quality of written information on pharmaceuticals leaves room for improvement. To mend insufficiencies of patient information leaflets, an alternative approach for provision of information o...
Conference Paper
Full-text available
Health information technology can have positive impacts on healthcare delivery and is utilised for various applications. Patient-centred services are a special kind of health information technology and are designed to cater to patients' needs. They manage personal medical information and utilise such information to offer personalised, advantageous...
Conference Paper
Full-text available
Domain-specific languages (DSLs) are languages most suitable for a specific application domain. They abandon generality to increase expressiveness and ease of use. DSLs are an useful alternative to general-purpose languages, but their appropriateness and profitableness should be carefully considered. In this paper the utilisation of DSL knowledge t...

Network

Cited By

Projects

Projects (4)
Project
In this research project, we aim to i) investigate the possible and inherent security and privacy issues for future patient-centered health care information systems like the emerging Bluetooth-based SARS-CoV-2 (or Covid-19) contact trackers ii) design security models such as Identity-Based Authentication Protocols, Trust Reputation Systems, etc. to provide additional security, and iii) finally evaluate the effectiveness of our security models
Project
Information privacy–related organizational actions are obscured by enormous potential for hidden information and hidden action so that organizations have strong incentives to respond to normative requirements through lip service or even stronger forms of resistance. organizations that intend to act in a socially-responsible way with respect to information privacy are confronted with a vast array of opportunities for substantive action with unclear interdependencies, utility, and effects. To make substantive communication of privacy practices a reality, normative and commercial incentives must be bridged and matched. On the one hand, normative principles must be refined to enable organizations, regulators, and consumers to differentiate between lip service and substantive privacy communication, and to identify deficiencies in privacy communication. On the other hand, more general design knowledge is required to enable organizations that want to establish substantive privacy communication to ascertain not only what can be done but to ascertain what should be done under what conditions. In this project, we develop the fundamental knowledge to make substantive privacy communication the reality.