Ali Sunyaev

University of Cologne

Albertus-Magnus-Platz

Cologne, 50923

Germany

http://www.isq.uni-koeln.de

SCHOLARLY PAPERS

76

DOWNLOADS
Rank 35,964

SSRN RANKINGS

Top 35,964

in Total Papers Downloads

1,211

CITATIONS
Rank 17,013

SSRN RANKINGS

Top 17,013

in Total Papers Citations

41

Scholarly Papers (76)

1.

Comparative Evaluation of Google Health API vs. Microsoft Healthvault API

Proceedings of the Third International Conference on Health Informatics (HealthInf 2010), January 20-23, 2010, Valen­cia, Spain, pp. 195-201
Number of pages: 7 Posted: 29 Sep 2012 Last Revised: 01 Nov 2012
University of Cologne, Technische Universität München (TUM) and Technische Universität München (TUM)
Downloads 192 (156,719)

Abstract:

Loading...

API, Comparative evaluation, Google Health, Microsoft HealthVault

2.

From Hype to Reality: A Taxonomy of Blockchain Applications

Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS 2019), January 8-11, 2019, Wailea, Maui, HI, USA, Forthcoming
Number of pages: 10 Posted: 10 Oct 2018
Olga Lavazova, Tobias Dehling and Ali Sunyaev
University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 153 (191,164)

Abstract:

Loading...

Blockchains, Distributed Ledger Technology

3.

German Health IT Infrastructure: A Large-Scale Network Alleviating Challenges in Health IT Development

Number of pages: 8 Posted: 26 Jul 2013 Last Revised: 06 May 2014
Tobias Dehling and Ali Sunyaev
Karlsruhe Institute of Technology and University of Cologne
Downloads 109 (248,332)

Abstract:

Loading...

health information technology, health IT, infrastructure, network, telematics, Germany, patient-centered, ehealth, health, health care, electronic health card, health professional card, software engineering, applications

4.

Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing

IEEE Transactions on Cloud Computing, Forthcoming
Number of pages: 14 Posted: 18 Feb 2016
University of Cologne, University of Cologne and University of Cologne
Downloads 87 (288,191)

Abstract:

Loading...

certification, cloud computing, continuous auditing

5.

One Size Does Not Fit All: Information Security and Information Privacy for Genomic Cloud Services

ECIS 2016 Proceedings
Number of pages: 11 Posted: 28 Apr 2016
Scott Thiebes, Tobias Dehling and Ali Sunyaev
University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 84 (294,541)

Abstract:

Loading...

Information Security and Information Privacy, Genomic Cloud Computing, Healthcare Infor-mation Systems, Design Science Research

6.

Useful Privacy Policy Content - Research Outline and First Results

Proceedings of the Pre-ECIS 2014 eHealth Workshop
Number of pages: 8 Posted: 13 Jun 2014
Fangjian Gao, Tobias Dehling and Ali Sunyaev
University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 61 (351,739)

Abstract:

Loading...

mHealth, Mobile Health, Application, App, Privacy, Privacy Policy, Privacy Notice

7.

Architecture and Design of a Patient-Friendly eHealth Web Application: Patient Information Leaflets and Supplementary Services

Proceedings of the 18th Americas Conference on Informati­on Systems (AMCIS 2012), August 9-11, 2012, Seattle, Washington, Article 5
Number of pages: 8 Posted: 28 Sep 2012 Last Revised: 07 Jun 2013
Tobias Dehling and Ali Sunyaev
Karlsruhe Institute of Technology and University of Cologne
Downloads 58 (360,516)

Abstract:

Loading...

web application, usability, patient information leaflet, written information, pharmaceutical, architecture, design

8.

Improved Medication Compliance Through Health IT: Design and Mixed Methods Evaluation of the Application ePill

Proceedings of the 34th International Conference on Information Systems (ICIS 2013)
Number of pages: 11 Posted: 09 Feb 2014 Last Revised: 06 May 2014
Tobias Dehling and Ali Sunyaev
Karlsruhe Institute of Technology and University of Cologne
Downloads 56 (366,744)

Abstract:

Loading...

design science research, health information technology, medication compliance, mixed methods evaluation, patient information leaflet, web application, artifact

9.

What Does Not Fit Can Be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs

Number of pages: 10 Posted: 11 Jan 2019
Karlsruhe Institute of Technology - Institute of Applied Informatics and Formal Description Methods (AIFB), University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 45 (403,388)

Abstract:

Loading...

Blockchain, Distributed Ledger Technology, Trade-Offs, Suitability

10.

Availability and Quality of Mobile Health App Privacy Policies

Journal of the American Medical Informatics Association, August 2014
Number of pages: 12 Posted: 23 Aug 2014 Last Revised: 12 Feb 2016
University of Cologne, Karlsruhe Institute of Technology, Harvard University - Harvard Medical School and Harvard University - Harvard Medical School
Downloads 41 (418,097)

Abstract:

Loading...

mHealth, mobile health, app, privacy policy, privacy notice, privacy statement, information privacy, iOS, Android, application, eHealth, health information technology

11.

Improving Comprehensibility of Medical Information Proof-of-Concept for Patient Information Leaflets

Proceedings of the Multikonferenz Wirtschaftsinformatik 2014; Paderborn, Germany; February 26-28, 2014
Number of pages: 12 Posted: 07 May 2014
Till Blesik, Tobias Dehling and Ali Sunyaev
University of Cologne - Faculty of Management, Economics and Social Sciences, Karlsruhe Institute of Technology and University of Cologne
Downloads 40 (421,956)

Abstract:

Loading...

Crowdsourcing, Health IT, Medication Information, Translation, Web Application

12.

User Archetypes for Effective Information Privacy Communication

Proceedings of the Pre-ICIS Workshop on Information Security and Privacy, Dublin, Ireland (2016)
Number of pages: 16 Posted: 10 Nov 2016
Karlsruhe Institute of Technology, University of Cologne, University of Cologne, Yale University and University of Cologne
Downloads 39 (425,919)

Abstract:

Loading...

information privacy, user archetypes, information privacy communication, information privacy information needs, information privacy segregation, information privacy partitioning, information privacy segmentation, hierarchical clustering, privacy enhancing technologies

13.

Information Security and Privacy of Patient-Centered Health IT Services: What Needs to Be Done?

Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS 2014)
Number of pages: 10 Posted: 09 Feb 2014 Last Revised: 06 May 2014
Tobias Dehling and Ali Sunyaev
Karlsruhe Institute of Technology and University of Cologne
Downloads 36 (438,163)

Abstract:

Loading...

patient-centered, health IT, information security, information privacy, requirements, eHealth

14.

The Nature of Adherence to Planning as Criterion for Information System Project Success

JAIS Theory Development Workshop (Pre-ICIS), International Conference on Information Systems (ICIS 2011), Shang­hai, December 3, 2011, Sprouts: Working Papers on Information Systems, 11(142)
Number of pages: 32 Posted: 28 Sep 2012 Last Revised: 25 Oct 2012
Dirk Basten and Ali Sunyaev
University of Cologne and University of Cologne
Downloads 27 (479,620)
Citation 1

Abstract:

Loading...

explaining theory, adherence to planning, information system, project success, literature review

15.

Verbraucherorientierter Datenschutz: Identifizierung von Verbraucherarchetypen zur effektiven Kommunikation von Datenschutzpraktiken (Consumer Privacy: Identification of Consumer Archetypes for Effective Communication of Privacy Practices)

Jenseits des Otto Normalverbrauchers: Verbraucherpolitik in Zeiten des "unmanageable consumer". Beiträge zur Verbraucherforschung 8. Düsseldorf, Germany. Verbraucherzentrale; ISBN 978-3-86336-919-4
Number of pages: 17 Posted: 23 Aug 2018
University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 23 (501,442)

Abstract:

Loading...

information privacy, user archetypes, privacy communication, information privacy information needs, information privacy segregation, information privacy partitioning, information privacy segmentation, hierarchical clustering, privacy enhancing technologies

16.

An Information Privacy Risk Index for mHealth Apps

Proceedings Annual Privacy Forum 2016
Number of pages: 13 Posted: 14 Jul 2016 Last Revised: 10 Sep 2016
University of Cologne, University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 23 (501,442)

Abstract:

Loading...

information privacy, risks, mhealth, mobile health, privacy enhancing technologies, usable privacy

17.

Assessment Instrument for Privacy Policy Content: Design and Evaluation of PPC

Proceedings of the Pre-ICIS Workshop on Information Security and Privacy. Auckland, New Zealand, 2014
Number of pages: 18 Posted: 19 Aug 2015
Tobias Dehling, Fangjian Gao and Ali Sunyaev
Karlsruhe Institute of Technology, University of Cologne and University of Cologne
Downloads 22 (507,253)

Abstract:

Loading...

information security, information privacy, privacy policy, privacy practices, privacy policy content, P3P, mHealth, health IT

18.

User Assistance for Health Care Information Systems

SIG-Health Pre-ICIS Workshop, Seoul, South Korea, 2017
Number of pages: 9 Posted: 21 Nov 2017
Karlsruhe Institute of Technology, Karlsruhe Institute of Technology, Karlsruhe Institute of Technology and University of Cologne
Downloads 19 (524,746)

Abstract:

Loading...

Health IT, Information Systems, Health Care, User Assistance, Health Information Systems

19.

Method Engineering: A Formal De­scription

Proceedings ISD 2008, 17th International Conference on Information Systems Development, Paphos, Cyprus, 25.-27.08.2008, Information Sys­tems Development - Towards a Service Provision Society. Publisher/Verlag: Springer, pp. 645-654
Number of pages: 12 Posted: 27 Sep 2012 Last Revised: 25 Oct 2012
Ali Sunyaev, Matthias Hansen and Helmut Krcmar
University of Cologne, Technische Universität München (TUM) and Technische Universität München (TUM)
Downloads 16 (542,110)

Abstract:

Loading...

20.

Consumer Perceptions of Online Behavioral Advertising

Proceedings of the 21 st IEEE Conference on Business Informatics, July 15-17, 2019. Moscow, Russia
Number of pages: 10 Posted: 06 Jun 2019 Last Revised: 08 Jun 2019
Tobias Dehling, Yuchen Zhang and Ali Sunyaev
Karlsruhe Institute of Technology, affiliation not provided to SSRN and University of Cologne
Downloads 13 (559,995)

Abstract:

Loading...

online behavioral advertising, behavioral targeting, profiling, marketing, consumer, perception, process model, exploratory research, qualitative research

21.

Towards Proactive Health-Enabling Living Environments: Simulation-Based Study and Research Challenges

Proceedings of the 31st International Conference on Architecture of Computing Systems, 2018
Number of pages: 8 Posted: 26 Feb 2018
Independent, Karlsruhe Institute of Technology, Independent, University of Kassel, University of Kassel, University of Kassel - Information Systems, Independent, University of Cologne and Independent
Downloads 11 (572,423)

Abstract:

Loading...

Health IT, smart homes, health-enablement

22.

Modular Architecture of Value-Added Applications for German Healthcare Telematics

Business & Information Systems Engineering (BISE) February 2013, Volume 5, Issue 1, pp 3-16
Number of pages: 15 Posted: 01 Aug 2014
Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)
Downloads 11 (572,423)

Abstract:

Loading...

Electronic health card, Healthcare telematics, Value-added applications, Value-added services, Soft- ware architecture, Design research

23.

No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications

Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS 2019), Forthcoming
Number of pages: 10 Posted: 13 Oct 2018
University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 10 (578,704)

Abstract:

Loading...

information privacy, mHealth, static code analysis, breach of confidentiality, mobile health

24.

Domain-Specific Languages and Digital Preserva­tion: Supporting Knowledge-Management

Proceedings of Multikonferenz Wirt­schaftsinformatik (MKWI 2012), 29 February - 2 March, 2012, Braunschweig, Germa­ny, pp. 1273-1284
Number of pages: 12 Posted: 29 Sep 2012 Last Revised: 07 Jun 2013
Tobias Dehling and Ali Sunyaev
Karlsruhe Institute of Technology and University of Cologne
Downloads 8 (591,299)

Abstract:

Loading...

25.

Taxonomy of Health IT and Medication Adherence

Health Policy and Technology, doi:10.1016/j.hlpt.2015.04.003
Number of pages: 10 Posted: 17 Apr 2015 Last Revised: 18 Feb 2016
Rafael Mrosek, Tobias Dehling and Ali Sunyaev
University of Cologne, Karlsruhe Institute of Technology and University of Cologne
Downloads 7 (597,727)

Abstract:

Loading...

Health IT, medication adherence, taxonomy, non-adherence factors, eHealth, medication compliance

26.

Information Security of Patient-Centered Services Utilising the German Nationwide Health Information Technology Infrastructure

Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec 2012), August 2012, 21st USENIX Security Symposium (USENIX Security '12), August 2012
Number of pages: 10 Posted: 28 Sep 2012 Last Revised: 06 Sep 2013
Tobias Dehling and Ali Sunyaev
Karlsruhe Institute of Technology and University of Cologne
Downloads 7 (597,727)

Abstract:

Loading...

27.

How Do Patients Expect Apps to Provide Drug Information?

50th Hawaii International Conference on System Sciences 2017
Number of pages: 10 Posted: 30 Aug 2016 Last Revised: 13 Aug 2018
Anton Grube, Tobias Dehling and Ali Sunyaev
University of Kassel - Information Systems, Karlsruhe Institute of Technology and University of Cologne
Downloads 5 (610,965)

Abstract:

Loading...

drug adherence, drug information provision, Health IT, mHealth, patient-centered

28.

Promoting Use of Patient-Centered Health IT: Assessment and Ranking of Incentive Mechanisms

Grube, A., et al. (2018). Promoting Use of Patient-Centered Health IT: Assessment and Ranking of Incentive Mechanisms. Hawaii International Conference on System Sciences 2018. Waikoloa Village, HI, USA.
Number of pages: 10 Posted: 22 Aug 2018
University of Kassel - Information Systems, Karlsruhe Institute of Technology, University of Cologne and University of Cologne
Downloads 3 (625,847)

Abstract:

Loading...

Personal Health Management and Technologies assessment and ranking, improved health IT use, incentive mechanisms, mobile health IT, patient-centerd health care

29.

Erratum to: How Do Requirements Evolve Over Time? A Case Study Investigating the Role of Context and Experiences in the Evolution of Enterprise Software Requirements

Journal of Information Technology, Vol. 33, Issue 2, 2017
Number of pages: 1 Posted: 13 Jun 2018
University of Cologne, Fortiss, Technische Universität München, Technische Universität München (TUM) and University of Cologne
Downloads 3 (625,847)
  • Add to Cart

Abstract:

Loading...

30.

How Do Requirements Evolve Over Time? A Case Study Investigating the Role of Context and Experiences in the Evolution of Enterprise Software Requirements

Journal of Information Technology, Vol. 33, Issue 2, 2016
Number of pages: 20 Posted: 13 Jun 2018
University of Cologne, Fortiss, Technische Universität München, Technische Universität München (TUM) and University of Cologne
Downloads 2 (635,688)
  • Add to Cart

Abstract:

Loading...

enterprise software, requirements evolution, context, cloud computing, case study

31.

Security of Critical Information Infrastructures

Reuter C, ed. Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. (Springer Fachmedien Wiesbaden, Wiesbaden, Germany), 319–339; ISBN 978-3-658-25652-4
Posted: 11 Apr 2019
Tobias Dehling, Sebastian Lins and Ali Sunyaev
Karlsruhe Institute of Technology, University of Cologne and University of Cologne

Abstract:

Loading...

critical information infrastructures, information security

32.

On Methodological and Technological Challenges for Proactive Health Management in Smart Homes

Studies in Health Technology and Informatics, 238, p. 209-212, doi:10.3233/978-1-61499-781-8-209
Posted: 17 Jul 2017
Independent, Karlsruhe Institute of Technology, Independent, Independent, University of Cologne and Independent

Abstract:

Loading...

Active homes, ambient assisted living, health-enabling technologies, machine learning, pattern recognition, information privacy, sensor-enhanced health information systems, user-oriented design

33.

Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Applications on iOS and Android

JMIR mHealth uHealth, 3(1), doi:10.2196/mhealth.3672 .
Posted: 23 Jan 2015
Karlsruhe Institute of Technology, University of Cologne, University of Cologne and University of Cologne

Abstract:

Loading...

mobile health, mobile apps, data security, software and application security, patient privacy, health information technology

34.

Usability of Patient-Centered Health IT: Mixed-Methods Usability Study of EPILL

Proceedings of the eHealth2014; Vienna, Austria; May 22-23, 2014
Posted: 07 May 2014
University of Cologne, Karlsruhe Institute of Technology and University of Cologne

Abstract:

Loading...

Patient-Centered, Health IT, Usability, Web Applications, Health Information, Health Information Technology, Research Design, Usability Studies, eHealth, Medication Adherence, Medication Compliance

Abstract:

Loading...

Health information technology, Security, Privacy, Patient-centered, eHealth, Infrastructure

36.

Empfehlungen zur Gestaltung von Cloud-Service-Zertifizierungen (Design Recommendations for Cloud Service Certifications)

Industrie Management. Volume 29, Issue 4, 13-17, 2013
Posted: 04 Oct 2013
Stephan Schneider, Jens Lansing and Ali Sunyaev
University of Cologne, Independent and University of Cologne

Abstract:

Loading...

cloud computing, cloud services, design recommendations, certification

37.

A Parallel Platform for Big Data Analytics: A Design Science Approach

International Journal of Computer Science Engineering and Technology (IJCSET). Volume 3, Issue 5, 152-156, 2013
Posted: 02 Aug 2013
Claudia Loebbecke, Joerg Bienert and Ali Sunyaev
University of Cologne - Department of Media and Technology Management, ParStream GmbH and University of Cologne

Abstract:

Loading...

Big Data Analytics, Parallel Platform Design, Design Science

38.

Cloud Service Certifications: Measuring Consumers' Preferences for Assurances

Proceedings of the 21st European Conference on Information Systems, Utrecht, Netherlands, June 5-8, 2013
Posted: 02 Aug 2013
Jens Lansing, Stephan Schneider and Ali Sunyaev
Independent, University of Cologne and University of Cologne

Abstract:

Loading...

cloud computing, certification, trust, best-worst scaling

39.

Evaluation of Microsoft Healthvault and Google Health Personal Health Records

Health and Technology, Volume 3, Issue 1, pp. 3-10
Posted: 02 Aug 2013
Ali Sunyaev
University of Cologne

Abstract:

Loading...

Consumer healthcare, Google Health, Microsoft HealthVault, Personal health records, Comparative evaluation

40.

A Business Process and Data Quality Management Perspective on ERP System Development in the Financial Service Sector

Proceedings and report of the PropelleR 2012 Workshop, Moscow, April 24 to 26, 2012, 67-73
Posted: 02 Aug 2013
Ali Sunyaev and Paul Glowalla
University of Cologne and University of Cologne

Abstract:

Loading...

enterprise resource planning, business process management, data quality, information quality, financial services

41.

Managing Data Quality with ERP Systems - Insights from the Insurance Sector

Proceedings of the 21st European Conference on Information Systems, Utrecht, Netherlands, June 5-8, 2013
Posted: 02 Aug 2013
Paul Glowalla and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

Data quality, ERP system, insurance, mergers and acquisitions, regulations, data analysis, expert interviews

42.

Explorative TTF Perspective on ERP Systems and Data Quality Management Interdependencies

Proceedings of the 73rd Academy of Management Annual Meeting, Orlando, Florida, USA, August 9-13
Posted: 01 Aug 2013 Last Revised: 09 Jan 2014
Paul Glowalla and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

Task-technology fit theory, data quality, ERP system, insurance, regulations, solvency, data analysis, expert interviews

43.

Modular Architecture of Value-Added Applications for German Healthcare Telematics

Business & Information Systems Engineering (BISE). Volume 5, Issue 1 (February 2013), pp. 3–16.
Posted: 16 Feb 2013
Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

electronic health card, healthcare telematics, value-added applications, value-added services, software architecture, design research

44.

Evaluation Framework for Personal Health Records: Microsoft Healthvault vs. Google Health

Procee­dings of the Hawaii International Conference on System Sciences (HICSS 43), Ja­nuary 5-8, 2010, Kauai, Hawaii
Posted: 30 Sep 2012
University of Cologne, Technische Universität München (TUM), Technische Universität München (TUM) and Technische Universität München (TUM)

Abstract:

Loading...

45.

Design and Application of a Security Analysis Method for Healthcare Telematics in Germany (HatSec)

Proceedings of the Fourth GI Gra­duate Workshop on Reactive Security (Spring), Number SR-2009-01 in GI SIG SIDAR Technical Reports, Stuttgart, Germany, 15 September 2009, GI SIG SIDAR, p. 19
Posted: 30 Sep 2012
Ali Sunyaev
University of Cologne

Abstract:

Loading...

46.

Standardized De­vice Services: A Design Pattern for Service Oriented Integration of Medical De­vices

Proceedings of the Hawaii International Conference on System Scien­ces (HICSS 43), January 5-8, 2010, Kauai, Hawaii
Posted: 30 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

47.

Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructu­re

Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS 2010). Funchal, Madeira - Portugal, 8 - 12 June, 2010. Volume DISI, pp. 229-235
Posted: 29 Sep 2012
University of Cologne, Technische Universität München (TUM), Technische Universität München (TUM) and Technische Universität München (TUM)

Abstract:

Loading...

Security Analysis, Electronic Health Card, Health Information Infrastructure

48.

An Exploratory Study on Physicians' Diligence when Dealing with Patient Data

Proceedings of the 18th European Conference on Information Systems (ECIS 2010), June 6-9, 2010, Pretoria, South Africa
Posted: 29 Sep 2012
affiliation not provided to SSRN, Santa Clara University - Operations and Management Information Systems, University of Cologne and Technische Universität München (TUM)

Abstract:

Loading...

Privacy, Healthcare, Hospital, Patient Data, Workflow Impediments

49.

A Process Management Perspective on Future ERP System Development in the Financial Service Sector

AIS Transactions on Enterprise Systems (AIS-TES), Vol. 3, No. 1, Article 2 (August 2012), pp. 18–27
Posted: 29 Sep 2012
Paul Glowalla and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

Data quality management, information quality management, business process management, ERP system, IT trends, financial services, insurance

50.

Exploring Information Flow Issues during the Implementation of a Campus Management System

Proceedings of Multikonfe­renz Wirtschaftsinformatik (MKWI 2012), 29 February - 2 March, 2012, Braunschweig, Germany, pp. 475-486
Posted: 29 Sep 2012
Paul Glowalla and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

51.

Research Toward the Practical Application of a Risk Evaluation Framework: Security Analysis of the Clinical Area within the German Electronic Health Information System

Proceedings of International Bled eCon­ference (Bled 2011), Bled, Slovenia, June 12-15, 2011, pp. 156-168
Posted: 29 Sep 2012
Ali Sunyaev and Johannes Pflug
University of Cologne and University of Vienna

Abstract:

Loading...

electronic health card, eHealth, organizational risk analysis, information security management

52.

Development of an Internet-Based Chronic Disea­se Self-Management System

Proceedings of International Bled eConference (Bled 2011), Bled, Slovenia, 12-15 June, 2011, pp. 185-196
Posted: 29 Sep 2012
Ali Sunyaev and Dmitry Chornyi
University of Cologne and Technische Universität München (TUM)

Abstract:

Loading...

distributed information systems, medical services, programming, user-centered design

53.

mediEPCs - A Model to Abstract Complex and Dynamic Processes in Healthcare Environments

Proceedings of the 16th Americas Conference on Information Systems (AMCIS 2010), Lima, Peru, 12-15 August 2010, Paper 587
Posted: 29 Sep 2012
University of Cologne, affiliation not provided to SSRN, University of St. Gallen, Technische Universität München (TUM) and affiliation not provided to SSRN

Abstract:

Loading...

Business process management, healthcare processes, model-based approach, healthcare workflows, business process modelling

54.

Open Security Issues in Ger­man Healthcare Telematics

Proceedings of the Third International Confe­rence on Health Informatics (HealthInf 2010), January 20-23, 2010, Valencia, Spain, pp. 187-194
Posted: 29 Sep 2012
Ali Sunyaev, J. M. Leimeister and Helmut Krcmar
University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Security analysis, Healthcare telematics, Electronic health card, Information systems security, Healthcare IS security

55.

Charac­teristics of IS Security Approaches with Respect to Healthcare

Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Fran­cisco, California, 6-9 August 2009, Article 609
Posted: 29 Sep 2012
University of Cologne, Technische Universität München (TUM), Technische Universität München (TUM), University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

IS Security, Healthcare Information Security, Healthcare Security Characteristics

56.

A Reclassification of IS Security Analysis Approaches

Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Fran­cisco, California, 6-9 August 2009, Article 570
Posted: 29 Sep 2012
University of Cologne, Technische Universität München (TUM), Technische Universität München (TUM), University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Information Systems Security, Security Management, Risk Management, Information Security Management Standards

57.

Security Analysis of the German Electronic Health Card’s Peripheral Parts

Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS 2009), Milan, Italy, 6-10 May 2009, Volume ISAS, pp. 19-26
Posted: 29 Sep 2012
University of Cologne, Technische Universität München (TUM), Technische Universität München (TUM) and Technische Universität München (TUM)

Abstract:

Loading...

Security Analysis, Electronic Health Card, Health Care Telematics

58.

Strategies for Development and Adoption of EHR in German Ambulatory Care

Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health 2010), Munich, Germany, March 23-25, 2010
Posted: 29 Sep 2012 Last Revised: 30 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Ambulatory Care, Patient Data, Healthcare Telematics Infrastructure, Electronic Health Record, Personal Health Records, National Telemedicin Initiative

59.

Do German Physicians Want Electronic Health Services? A Characterization of Poten­tial Adopters and Rejectors in German Ambulatory Care

Proceedings of the Third International Conference on Health Informatics (HealthInf 2010), January 20-23, 2010, Valencia, Spain, pp. 202-209
Posted: 29 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Ambulatory care, Electronic health services, Health telematics infrastructure, Technology adoption, Standardization, Data security, Practice equipment, Clustering

60.

Inte­gration of Patient Health Portals into the German Healthcare Telematics Infrastruc­ture

Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Fran­cisco, California, 6-9 August 2009, Article 754
Posted: 29 Sep 2012
Technische Universität München (TUM), Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Patient Data, Healthcare Telematics Infrastructure, Electronic Health Record, Telemonitoring, Seamless Healthcare

61.

A Short Overview of the Security Concept of the Ger­man Electronic Health Information Infrastructure

Proceedings of the Internatio­nal Conference on Health Informatics (HealthInf 2011), Roma, Italy, 26-29 Janua­ry, 2011, pp. 555-558
Posted: 29 Sep 2012
Stefan Knipl and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

Security analysis, Healthcare telematics, Electronic health card, Information systems security, Healthcare IS security

62.

A Proposed Solution for Managing Doctor’s Smart Cards in Hospitals Using a Sin­gle Sign-On Central Architecture

Proceedings of the Hawaii International Con­ference on System Sciences (HICSS 41), January 7-10, 2008, Big Island, Ha­waii
Posted: 29 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen, Technische Universität München (TUM) and Technische Universität München (TUM)

Abstract:

Loading...

63.

Security Analysis of the Health Care Telematics Infrastructure in Germany

Proceedings of the Tenth International Conference on Enterprise Information Systems (ICEIS 2008), Vol. ISAS-2, pp. 144-153, Barcelona, Spain
Posted: 29 Sep 2012
Michael Huber, Ali Sunyaev and Helmut Krcmar
Technische Universität München (TUM), University of Cologne and Technische Universität München (TUM)

Abstract:

Loading...

Security analysis, Health Care Telematics, Electronic Health Card, Information Security Management Systems

64.

Information Systems and Healthcare XX: Toward Seamless Healthcare with Software Agents

Communications of the Association for Information Systems (CAIS), Vol. 19 (2007), Article 33, pp. 692-709
Posted: 29 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

healthcare information systems, information logistics, standards, software agent

65.

Analy­sis of the Applications of the Electronic Health Card in Germany

Pro­ceedings of Wirtschaftsinformatik 2009 (WI 2009) - Business Services: Konzepte, Technolo­gien und Anwendungen. Vienna, Austria, 25-27 February 2009. Band 2, pp. 749-758
Posted: 28 Sep 2012
University of Cologne, affiliation not provided to SSRN, Technische Universität München (TUM), University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

66.

Process-Driven Data and Information Quality Ma­nagement in the Financial Service Sector

Proceedings of the 18th Americas Conference on Information Systems (AMCIS 2012), August 9-11, 2012, Seattle, Wa­shington, Article 2
Posted: 28 Sep 2012
Paul Glowalla and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

Data quality management, information quality management, business process management, ERP, IT trends, financial services, insurance

67.

Supporting Chronic Disease Care Quality: De­sign and Implementation of a Health Service and Its Integration with Electronic Health Records

ACM Journal of Data and Information Quality (ACM JDIQ), ACM J. Data Inf. Qual., Vol. 3, No. 2, Article 3 (May 2012), pp. 3:1-3:21
Posted: 28 Sep 2012
Ali Sunyaev and Dmitry Chornyi
University of Cologne and Technische Universität München (TUM)

Abstract:

Loading...

Medical information systems, Health, Online Information Services, Data sharing, Web-based services, Software Architectures, Interoperability, Data quality, Chronic disease management, Personal health records, Health management system

68.

Risk Evaluation and Security Analysis of the Clinical Area within the German Health Information Infrastructure

Health and Technolo­gy, Vol. 2, No. 2 (June 2012), pp. 123-135
Posted: 28 Sep 2012
Ali Sunyaev and Johannes Pflug
University of Cologne and University of Vienna

Abstract:

Loading...

Electronic health card, eHealth, Organizational risk analysis, Information security management

69.

Security Analysis of the German Healthcare Telematics

Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), Article 32, August 2009
Posted: 28 Sep 2012
University of Cologne, affiliation not provided to SSRN, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

70.

Determi­nants of Physicians’ Technology Acceptance for e-Health in Ambulatory Care

International Journal of Medical Informatics (IJMI). DOI: 10.1016/j.​ijmedinf.2012.02.002. Online first
Posted: 28 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Technology acceptance, TAM, e-Health, Ambulatory care, Telemedicine, Telematics, Germany, Determinants, Standardization, IT utilization, Process orientation

71.

Market Enginee­ring for Electronic Health Services

Proceedings of the 45th Hawaii Internatio­nal Conference on System Sciences (HICSS 45), Maui, Hawaii, January 4-7, 2012, pp. 952-961
Posted: 28 Sep 2012
Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Market engineering, E-health, Telemedicine, Telemonitoring, Electronic health card, Telematics, Chronic heart failure

72.

Privacy Engineering: Personal Health Records in Cloud Computing Environments

Proceedings of Thirty Second International Conference on Information Systems (ICIS 2011), Shanghai, China, December 4-7, 2011, Article 2
Posted: 28 Sep 2012
Alexander Kaletsch and Ali Sunyaev
Technische Universität München (TUM) and University of Cologne

Abstract:

Loading...

Privacy/information privacy, Personal health record (PHR), Cloud computing

73.

Guidelines for Software Development Effort Esti­mation

IEEE Computer, 44 (10), October 2011, pp. 96-98
Posted: 28 Sep 2012
Dirk Basten and Ali Sunyaev
University of Cologne and University of Cologne

Abstract:

Loading...

74.

From Me­dical Processes to Workflows: Modeling of Clinical Pathways with the Unified Mo­deling Language

Third International Conference on Health Informatics (HealthInf 2010), pp. 388-391, January 2010
Posted: 28 Sep 2012
Technische Universität München (TUM), Technische Universität München (TUM), University of Cologne, University of St. Gallen and Technische Universität München (TUM)

Abstract:

Loading...

Clinical Pathways, Workflows, UML, Workflow Management Systems, Process Modeling

75.

IT - Standards and Standardization Approaches in Healthcare

Encyclopedia of Healthcare In­formation Systems. Hrsg./Editors: Wickramasinghe, N.; Geisler, Publisher/Ver­lag: Idea Group, Erscheinungsjahr/Year: 2008, pp. 813-820
Posted: 27 Sep 2012
University of Cologne, University of St. Gallen, Technische Universität München (TUM) and Technische Universität München (TUM)

Abstract:

Loading...

76.

Secure Information Systems Engi­neering: Experiences and Lessons Learned from Two Health Care Projects

Proceedings of the 21st International Conference on Advanced Infor­mation Systems (CAiSE 2009), Amsterdam, Netherlands, 8-12 June 2009, Advanced Informati­on Systems Engineering, Lecture Notes in Computer Science (LCNS), pp. 231-245
Posted: 27 Sep 2012
University of East London, University of Cologne and The Open University

Abstract:

Loading...

Other Papers (1)

Total Downloads: 0
1.

Cloud Services Certification

Communications of the ACM (CACM) Volume 56, Number 2, pp. 33-36
Posted: 05 Mar 2013 Last Revised: 27 Jan 2014
Ali Sunyaev and Stephan Schneider
University of Cologne and University of Cologne

Abstract:

Loading...

cloud computing, certification, audit, cloud service certification