CII Forschungsgruppe auf der HICSS 2019/en
CII Research Group at HICSS 2019
Four papers of the CII research group have been accepted for publication at the Hawaii International Conference on System Sciences, which will take place January 8-11, 2019 in Wailea, Maui.
No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications
Authors: Thomas Brüggemann, Tobias Dehling, Ali Sunyaev
Abstract: With the rapidly rising number of mobile health (mHealth) applications (apps), it is unfeasible to manually review mHealth apps for information privacy risks. One salient information privacy risk of mHealth apps are confidentiality breaches. We explore whether and how static code analysis is a feasible technology for app review automation. Evaluation of our research prototype shows that, on average, our prototype detected one breach of confidentiality risk more than human reviewers. Contributions are the demonstration that static code analysis is a feasible technology for detection of confidentiality breaches in mHealth apps, the derivation of eight generic design patterns for confidentiality breach risk assessments, and the identification of architectural challenges that need to be resolved for wide-spread dissemination of breach of confidentiality risk assessment tools. In terms of effectiveness, humans still outperform computers. However, we build a foundation for leveraging computation power to scale up breach of confidentiality risk assessments.
What Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs
Authors: Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev
Abstract: Distributed ledger technology (DLT), including blockchain, enables secure processing of transac-tions between untrustworthy parties in a decentral-ized system. However, DLT is available in different designs that exhibit diverse characteristics. Moreo-ver, DLT design characteristics have complementary and conflicting interdependencies. Hence, there will never be an ideal DLT design for all DLT use cases; instead, DLT implementations need to be configured to contextual requirements. Successful DLT configu-ration requires, however, a sound understanding of DLT design characteristics and their interdependen-cies. In this manuscript, we review DLT design char-acteristics and organize them into six main groups. Furthermore, we condense interdependencies of DLT design characteristics into the main trade-offs that should be considered for successful deployment of DLT. Finally, we consolidate our findings into DLT archetypes for common design objectives, such as security, usability, or performance. Our work makes extant DLT research more transparent and fosters understanding of interdependencies and trade-offs between DLT design characteristics.
From Hype to Reality: A Taxonomy of Blockchain Applications
Authors: Olga Labazova, Tobias Dehling, Ali Sunyaev
Abstract: Blockchain is a decentralized digital ledger that challenges existing business models and theories by shifting the trust from institutions towards algorithms. However, the number of successfully developed blockchain-based systems remains low. This points towards a research gap between blockchain applications and technical blockchain characteristics. We answer the research question: What application areas fit blockchains with what technical characteristics? We develop a taxonomy, which comprises six blockchain application areas that are classified across eight technical dimensions. We demonstrate the utility of the taxonomy on ninety-nine blockchain-based systems. We contribute to the scientific literature by delimiting blockchain application areas, identifying new technical dimensions, and linking application and technical knowledge on blockchain to guide development of blockchain-based systems. For practitioners, we present an overview of current blockchain-based systems.
Investigating the Relationship Between User Ratings and Gamification – A Review of mHealth Apps in the Apple App Store and Google Play Store
Authors: Manuel Schmidt-Kraepelin, Scott Thiebes, Ali Sunyaev
Abstract: Gamification of mHealth apps is regarded as a promising approach to counteract decreasing long- term motivation of mHealth app users. Although gamification has received tremendous attention from researchers interested in mHealth apps, little is known about the extent to which gamification is used in real world mHealth apps today and whether the implementation of gamification actually pays off for app developers by, for example, positively influencing user ratings. Within this research, we investigate the implementation of game mechanics for 1,000 apps from the Apple App Store and Google Play Store as well as the potential relationship between the degree of gamification of mHealth apps and their user ratings. While our results highlight a high degree of adoption of gamification for both app stores, they also indicate a positive relationship between the degree of gamification of an mHealth app and user ratings for the Apple App Store only.
Further Informationen: http://hicss.hawaii.edu/
« Back to Critical Information Infrastructures