Vladimir Stantchev

Vladimir Stantchev
SRH Hochschule Berlin | SRH · Institute of Information Systems

Prof. Dr. rer. nat.

About

99
Publications
50,282
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,576
Citations
Introduction
Academic and IT exec with broad experience in all aspects of governance, IT, e-business and R&D management. Launched initiatives in strategic development and risk management, built research and software engineering teams, created IT Security and IT processes (ITIL, COBIT), managed international teams and research portfolios, launched start-ups and obtained venture capital.
Additional affiliations
March 2016 - April 2016
Universidad de Buenos Aires
Position
  • Professor
Description
  • Conducted joint research actions and gave lectures to approx. 210 students (topics: IT management, IT governance; subject: information systems; degree programs: undergraduates in accounting, business administration, information systems
July 2015 - August 2015
Bulgarian Academy of Sciences
Position
  • Professor
June 2015 - present
University of Granada
Position
  • Professor (Full)
Education
September 2005 - January 2008
Technische Universität Berlin
Field of study
  • Computer Science
September 2000 - April 2005
Humboldt-Universität zu Berlin
Field of study
  • Computer Science
September 1993 - September 1997

Publications

Publications (99)
Article
Purpose Without effective implementation, no information technology (IT) strategy can succeed. There has been much re-search into IT planning, but few studies have developed one of the most important phases of IT strategy: IT Implementation. IT implementation can be improved at information and communication technology (ICT) organizations through th...
Article
Loyalty in tourism is one of the main concerns for tourist organizations and researchers alike. Recently, technology in general and CRM and social networks in particular have been identified as important enablers for loyalty in tourism. This paper presents POST-VIA 360, a platform devoted to support the whole life-cycle of tourism loyalty after the...
Article
Full-text available
Information overload is becoming bigger as internet grows. This entails several problems such as difficulty in finding information and redundancy of knowledge. In this paper, a solution of these problems is presented as a global representation of knowledge based on human perception, and modelled by means of ontologies. In this study we present the...
Chapter
Full-text available
Web services are emerging as the technology of choice for providing functionality in distributed computing environments. They facilitate the integration of different systems to seamless IT supporting infrastructure for business processes. Designing a service-oriented architecture (SOA) for this task provides a set of technical services and composit...
Article
Full-text available
Abstract Adjustment and cost-effectiveness are key elements of a successful Information Security Management System (ISMS). ISMS-Processes, as basic elements of every ISMS, need to be aligned to the organization and its mission. As of today, a specific ISMS process framework does not exist. ISMS processes are not in focus of current research. This a...
Article
Full-text available
Blockchain technology has the potential to drive innovations across various industries, businesses, and use cases. It is broadly recognized that innovation is a vital source of competitive advantage in a rapidly changing environment. High expectations surround blockchain’s potential for contributing to sustainable economic and social development. H...
Chapter
The effect of digitalization and its transformative power in all aspects of corporate strategies and organizations are visible everywhere. As leaders try to make sense of the “digital tornado” and prepare, try out, and set courses in new business directions, the authors propose to take a step back and focus on what is still at the core of corporate...
Article
This paper provide an overview of the benefits that the integration of IoT and Blockchain can produce on the Humanitarian Aid Supply Chain (HASC). Consdering the large number of partner involved in HASC, traditional centralized information systems become very vulnerable. In the same sense, the lack of mutual knowledge obstruct the needed cooperatio...
Chapter
This case study addresses online contracts associated with providing software as Software-as-a-Service (SaaS)—a provision model of cloud computing. It investigates a company planning to migrate from an on-premise scenario to using SaaS services for its CRM system. The SaaS services can only be accessed by clicking the service agreement with no oppo...
Article
Blockchain aims to transform businesses and other forms of transactions from a centralized, human-based to a shared, algorithm-based trust model, which enables a new risk management paradigm. Misaligned incentives in different principal – agent scenarios are important risk factors from governance point of view. With blockchain, these misalignments...
Article
Full-text available
Cloud computing is changing the way organizations approach technology and its infrastructure. However, in spite of its attractiveness, cloud computing can be seen as a threat in terms of compliance. Given its intrinsic distributed nature, regulations and laws may differ and customers and cloud providers must find a way to balance increasing complia...
Article
This article describes how because of the ongoing demographic development in most European countries, especially IT-companies, need to find a way to retain or gain productivity with the same or less amount of employees. Therefore, the allocation of available resources in the best possible way is even more important. The challenge for companies is t...
Article
The authors propose a resource management process for information security management systems to more transparently plan and assign costs of controls. The process relies on and is compliant with international standards of the ISO/IEC 27000 family and can be implemented by all organizations regardless of type, size, or nature.
Article
ISMS budgets are often stressed and additional funding is often requested to implement necessary controls. However, in many cases controls are regularly not realized due to budget problems. Often it is assumed that controls are paid from the budget of the ISMS. This results in a non-transparent and irrational allocation of costs. Costs should be di...
Article
Full-text available
Abstract Adjustment and cost-effectiveness are key elements of a successful Information Security Management System (ISMS). ISMS-Processes, as basic elements of every ISMS, need to be aligned to the organization and their mission. Actually a specific ISMS process framework which clearly differentiates between ISMS processes and security measures con...
Article
Full-text available
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS process...
Article
Purpose In this article authors argue how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment. Design/methodology/approach This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT-Project in Germany. A clea...
Conference Paper
Full-text available
In this work a tailored approach for requirements engineering for risk management solutions is presented. The approach focuses on cross-disciplinary risk paradigms in inpatient healthcare and aims to provide a novel methodology that accounts for specific viewpoints of relevant expert groups. The presented results demonstrate the feasibility and use...
Article
In a field like Software Engineering, highly dependent on knowledge, continuing education is key to warrantee business sustainability. In this scenario, relying on continuing educational measures is crucial to support organizations in their competence management programs. In order to validate a set of measures, in this paper an interview study rega...
Article
Full-text available
Due to an unsatisfying demographic development in most European states, companies have to solve a trade-off between a needed increase of productivity on the one hand and fewer highly skilled employees on the other hand. In this paper, authors propose factors for different layers of a framework to manage scarce resources in IT-departments. These lay...
Article
Interactions among people have substantially changed since the emergence of social networks, the expansion of the Internet and the proliferation of connected mobile devices, and so have the possibilities of collaborative learning, with the inclusion of new e-learning platforms. From this point, assessing human knowledge in these virtual environment...
Conference Paper
Full-text available
The skill shortage is becoming an ever-increasing challenge for every industry and even more for IT departments, given that IT is personnel-intense. Therefore, the allocation of these scarce resources in the best possible way is even more important. The challenge for companies is to improve the enterprise not only on the side of the organizational...
Article
Full-text available
This paper provides an overview of cloud governance aspects based on a representative survey of trends in the perception, assessment and adoption of cloud computing within the enterprise. The survey was conducted through a twofold research approach and combined a meta-study of existing and published empirical studies with an own empirical study wit...
Article
Full-text available
The present paper introduces a hybrid technique to measure the expertise of users by analyzing their profiles and activities in social networks. Currently, both job seekers and talent hunters are looking for new and innovative techniques to filter jobs and candidates where candidates are trying to improve andmake their profilesmore attractive. In t...
Article
Full-text available
The complexity of providing medical care in a high-tech environment with a highly specialized, limited labour force makes hospitals more crisis-prone than other industries. An effective defence against crises is only possible if the organizational resilience and the capacity to handle crises become part of the hospitals' organizational culture. To...
Article
Full-text available
Purpose – This paper aims to present a solution that enables organizations to monitor and analyse the performance of their business processes by means of Big Data technology. Business process improvement can drastically influence in the profit of corporations and helps them to remain viable. However, the use of traditional Business Intelligence sys...
Conference Paper
Full-text available
Objectives/rationale: Healthcare systems all over the world are facing difficult challenges that have a direct impact and influence the delivery of healthcare services. As a response healthcare institutions are relying in the implementation of Information and communication technologies (ICTs) to overcome difficulties and satisfy patients’ demands i...
Article
Full-text available
In this article we argue that smart items and cloud computing can be powerful enablers of servitization as business trend. This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT-Project in Germany. We present a three-level architecture for a smart healthcare infrastructure. The approach is based...
Article
Full-text available
The skill shortage is becoming an ever-increasing challenge for IT departments. Allocation of resources in the best possible way is even more important. The challenge is to improve the enterprise not only on the side of the organizational and process level, but to develop new strategies and approaches in human resource management. Only a symbiosis...
Conference Paper
Full-text available
Use of cloud computing in healthcare is a promising trend, particularly in utilization of smart items. Access, affordability and quality to proper healthcare is a great challenge in world society. With the utilization of smart sensors, there are possibilities to improve the quality of healthcare services whenever needed. Hence, such smart items ser...
Article
In this paper, the authors analyze approaches for addressing sustainability in established IT-Governance frameworks. Such frameworks are considered to be a powerful tool for ensuring compliance and proper IT operation in modern organizations. The authors assume that - in the context of the seismic changes in IT provisioning and usage that current t...
Article
Full-text available
The authors analyze legal regulation issues surrounding cloud computing in healthcare. As a result of the authors' expertise in cloud-based data processing for organizations in the areas of healthcare and life sciences, they propose an implementation roadmap. The roadmap is intended to provide guidance for organizations in the life sciences regardi...
Article
Full-text available
The preparation of this special collection has been partially supported by the European Commission (programme Lifelong Learning—action Leonardo da Vinci—Transfer of Innovation) through project ECQA Certified Social Media Networker Skills (2011-1-ES1_LEO05-35930), by the Spanish Ministry of Economy and Competitiveness through INNPACTO project Post-V...
Article
The aim of this paper is to investigate the motivations that lead higher education students to replace several Learning Management Systems (LMS) services with cloud file hosting services for information sharing and collaboration among them. The research approach is based on the Technology Acceptance Model (TAM). More specifically, the model is devo...
Chapter
Full-text available
1 Zusammenfassung Dieser Beitrag widmet sich den Steuerungsaspekten im Bereich der Informationssicherheit und der Heterogenität von deren Regulierung und Öffentlichkeitswahrnehmung innerhalb der EU. Ein Fokus bilden dabei die Public-Private Aspekte der Regulierung am Beispiel des Standards ISO 27001, sowie auch die Besonderheiten der Marktkoordinat...
Conference Paper
Full-text available
Bei der Datenerhebung und -verarbeitung durch AAL-Infrastruktur im Pflegesektor sind rechtliche Rahmenbedingungen zu prüfen, die die Nutzung der Messdaten juristisch zulässig machen. Hierzu wurden die in der praxisnahen Pflegeliteratur dargestellten Rechtsnormen zusammengefasst und kategorisiert. Somit ließ sich ermitteln, welche Daten als schützen...
Conference Paper
Full-text available
This contribution provides an overview of cloud governance aspects based on a representative survey of trends in the perception, assessment and adoption of Cloud Computing within the enterprise. The survey was conducted through a two-fold research approach and combined a meta-study of existing and published empirical studies with an own empirical s...
Article
When optimizing IT operations organizations typically aim to optimize resource usage. In general, there are two kinds of IT resources – IT infrastructures and IT staff. An optimized utilization of these resources requires both quantitative and qualitative analysis. While IT infrastructures can offer raw data for such analyses, data about IT staff o...
Article
Full-text available
The merging of semantic technologies with cloud computing is in the eye of the hurricane of web new developments. Taking into account the importance of web in today's society, it is worth to investigate the relevant perspectives and insights. In this special issue, readers will find the foundations together with cutting-edge developments in the sta...
Conference Paper
Full-text available
Service-oriented architecture (SOA) in the enterprise was one of the key enablers for cloud computing. Therefore, it can serve as a natural fit for bringing traditional IT governance approaches forward to the challenges of cloud governance. In this work we present an approach for mapping IT governance mindsets to the aspects of SOA governance. It a...
Article
Full-text available
Cloud computing, especially Software-as-a-Service (SaaS), changes the IT processes of companies for application deployment, access, usage, maintenance, governance and management. In an age of Bring-Your-Own-Device, small businesses through to globally operating companies increasingly support their employees and customers with SaaS-applications that...
Article
Cloud Computing is emerging as a predominant paradigm for obtaining and providing computing functionality in the enterprise. Organizations that are planning to use cloud computing offerings struggle with the question "How do I choose the right offering?" Cloud offerings exhibit a variety of pricing models and different levels of service and functio...
Article
Full-text available
Enterprises today often strive to keep up with the paces of technological development. A particular case in point is the IT function where traditional governance approaches are often questioned by technology trends. Examples for such trends in the last ten years are the service-oriented architecture (SOA) and cloud computing. The introduction of SO...
Article
Full-text available
Knowledge of behavioral patterns of a system can contribute to an optimized management and governance of the same system, or of similar systems. While human experience often manifests itself as intuition, intuition can be notoriously misleading, particularly in the case of quantitative data and subtle relations between different data sets. This art...
Article
The purpose of this work is to provide a representative survey of current trends in the perception, assessment and adoption of cloud computing within the enterprise. Cloud computing can be regarded as the general principle for using and providing web and grid services. First, we provide a meta-study, where we evaluate existing and published empiric...
Chapter
Full-text available
The assurance of availability and dependability for distributed applications is a challenging and nontrivial task. Massively distributed architectures are becoming more prevalent with the convergence of the Internet of Services and the Internet of Devices. Flexible provider models like Cloud Computing allow for nearly limitless scalability of appli...
Conference Paper
IT departments within enterprises often utilize incident management and ticketing systems. While performance data from such systems is often stored in logfiles it is rarely evaluated extensively. In this work we assess the applicability of an approach for extended evaluation of logged data from such systems. Our evaluation is focused on Key Perform...
Article
Full-text available
Dependability should be considered throughout the phases of the SOA life cycle. This article proposes the application of a service level management approach to address dependability and presents dependability-related activities for every stage (Model, Assemble, Deploy, and Manage) of the SOA life cycle. Furthermore, we describe the concepts and the...
Chapter
Full-text available
The Information Technology Infrastructure Library (ITIL) is widely used as a model for IT service processes mainly due to its general nature. A drawback of this generality is that it greatly hinders the conversion of best practices into specific implementable processes. To assess such processes for their completeness and to find and overcome possib...
Conference Paper
Full-text available
Purely knowledge-based activities are of an increasing importance for modern enterprises. Moreover, innovative companies are focusing entirely on such high-profile activities and outsourcing the supporting tasks. In this work we focus on university spin-outs as an example. Such companies often enjoy the provision of administrative infrastructure (e...
Article
Full-text available
Dieses Sonderheft ist der Thematik Business Application Modernization gewidmet. Es geht also darum "alte" Fachanwendungen zu modernisieren. Eine "alte" (oder legacy) Anwendung ist dadurch gekennzeichnet, dass sie historisch gewachsen ist und eine meist unzureichende technische Dokumentation hat. Im Rahmen einer Studie haben wir im letzten Jahr die...
Article
Full-text available
Knowledge-based enterprises are typically conducting a large number of research and development projects simultaneously. This is a particularly challenging task in complex and diverse project landscapes. Project portfolio management (PPM) can be a viable framework for knowledge and innovation management in such landscapes. A standardised process wi...
Chapter
Knowledge transfer has a particular relevance for enterprises with large research and development (R&D) departments. Project Portfolio Management (PPM) is a discipline often applied to structure and align R&D activities. Typical functions of such standardized process are project data repository, project assessment, selection, reporting, and portfol...
Article
Berlin is a major European city with a vast network of public services institutions. These institutions are located at a number of public buildings ranging from small community centres and police stations to court buildings and police training polygons. Overall office space is approx. 20,000 m². In 2003 the Berlin Senate founded the 'Landesbetrieb...
Chapter
Full-text available
Current trends in usability evaluation research focus on providing the right mix of empirical and technical methods. This chapter presents an approach for continuous evaluation of increasingly complex systems based on such a mix. The approach is iterative and covers usability aspects continuously throughout the following phases: (1) evaluation of e...
Conference Paper
Full-text available
The emergence of the Internet of Services and the Internet of Devices opens new possibilities for societal computung scenarios. Ambient Intelligence (Ami) is a vision of an environment that puts the needs of the user in the center of the technological design process. An Ami environment consists of ubiquitous distributed devices such as sensors, dis...
Chapter
Full-text available
This work presents a development approach for mixed reality systems in health care. Although health-care service costs account for 5–15% of GDP in developed countries the sector has been remarkably resistant to the introduction of technology-supported optimizations. Digitalization of data storing and processing in the form of electronic patient rec...
Conference Paper
Full-text available
Advanced computing on cloud computing infrastructures can only become viable alternative for the enterprise if these infrastructures can provide proper levels of nonfunctional properties (NPFs). A company that focuses on service-oriented architectures (SOA) needs to know what configuration would provide the proper levels for individual services if...
Conference Paper
Full-text available
Knowledge-based enterprises are typically conducting a large number of research and development projects simultaneously. This is a particularly challenging task in complex and diverse project landscapes. Project Portfolio Management (PPM) can be a viable framework for knowledge and innovation management in such landscapes. A standardized process wi...
Conference Paper
Full-text available
Ambient Intelligence (AmI) is a vision of an environment with ubiquitous distributed devices embedded in everyday objects that are interconnected and seamlessly deliver applications and services. Based on concepts of ubiquitous computing, ubiquitous communication and intelligent interfaces, AmI puts the user in the center of future technological de...
Chapter
Intelligent systems can support healthcare activities in various ways. As an expensive and complex resource the operating room can benefit substantially from such systems. Of particular interest are techniques and systems that allow better utilization of operating rooms. Augmented and mixed reality systems, together with context awareness, can prov...
Conference Paper
Full-text available
Emerging grid computing infrastructures such as cloud computing can only become viable alternatives for the enterprise if they can provide stable service levels for business processes and SLA-based costing. In this paper we describe and apply a three-step approach to map SLA and QoS requirements of business processes to such infrastructures. We sta...
Conference Paper
Full-text available
Berlin is one of the major European capitals with an extensive network of public services. To provide these services Berlin operates a number of public buildings ranging from small community centers and police stations to court buildings and police training polygons. Overall office space is approx. 20 000 m 2 . In 2003 the Berlin Senate founded the...
Conference Paper
Full-text available
A typical citizen engages with governmental agencies at several hierarchical levels - local, regional and national. Federal and international communities add even more layers atop of them. We denote this as the concept of layered government. A citizen within such a community expects to find similar procedures and HCI interfaces to accomplish tasks,...
Conference Paper
Full-text available
Project Portfolio Management (PPM) systems can be a valuable contribution for a sustainable innovation management and product development. A major precondition is a standardized process with defined business services that encompasses project data repository, project assessment, selection, reporting, and portfolio reevaluation. This paper presents a...