Auflistung nach Autor:in "Schneider, Bettina"
Gerade angezeigt 1 - 20 von 32
- Treffer pro Seite
- Sortieroptionen
Publikation A practical guideline for developing a managerial information security awareness program(2020) Schneider, Bettina; Asprion, Petra; Androvicsova, Simona; Azan, Wilfrid04B - Beitrag KonferenzschriftPublikation Adaptable GDPR assessment tool for micro and small enterprises(SciTePress, 2022) Löffler, Emanuel; Schneider, Bettina; Goerre, Andreas; Asprion, Petra; Filipe, Joaquim; Smialek, Michal; Brodsky, Alexander; Hammoudi, Slimane04B - Beitrag KonferenzschriftPublikation Blockchain technologies towards data privacy – Hyperledger Sawtooth as unit of analysis(Springer, 2020) Moriggl, Pascal; Asprion, Petra; Schneider, Bettina; Dornberger, Rolf04A - Beitrag SammelbandPublikation Blockchain und Datenschutz – Hyperledger Sawtooth im Fokus(Springer, 2023) Moriggl, Pascal; Asprion, Petra; Schneider, Bettina; Dornberger, RolfDaten gehören heute zu den zentralen Elementen digitaler Geschäftsmodelle, daher ist ein Bewusstsein für angemessene Maßnahmen zum Schutz von Daten und insbesondere personenbezogener Daten essenziell. Die Datenschutzgrundverordnung der Europäischen Union (EU) ist eine Folge der Diskussionen zum Schutz der Privatsphäre im digitalen Raum. Die Verordnung zwingt Organisationen dazu, sicherzustellen, dass ihre Prozesse zur Verarbeitung von Daten mit den relevanten Regularien übereinstimmen. Seit einigen Jahren wird die Blockchain-Technologie zunehmend beliebter, um den Austausch von Daten zu unterstützen. Die neue Technologie macht es möglich, auf eine zentrale Datenhaltung zu verzichten. Das Ziel dieser Forschung war es, Entscheidungsträgerinnen und Entscheidungsträgern bei der Auswahl einer geeigneten Blockchain-Konfiguration zu helfen, die den gesetzlichen Datenschutzanforderungen gerecht wird. Mit Hilfe der „Design-Science“-Methodik haben wir einen sogenannten morphologischen Kasten, sowie ein dazugehöriges Raster entwickelt, die als „Bewertungswerkzeuge“ für die Blockchain-Konfiguration „Hyperledger Sawtooth“ verwendet werden können. Die Forschungsergebnisse können mit wenigen Anpassungen verallgemeinert werden, um auch andere Blockchain-Konfigurationen zu bewerten.04A - Beitrag SammelbandPublikation Bloxxgame – A simulation game for teaching blockchain(2020) Dettling, Walter; Schneider, Bettina; Marfisi-Schottman, Iza; Bellotti, Francesco; Hamon, Ludovic; Klemke, Roland04B - Beitrag KonferenzschriftPublikation Challenges, opportunities and application fields of quantum computing - an introductory overview(2022) Kech, Benjamin; Schneider, Bettina; Gachnang, Phillip; Azan, Wilfrid06 - PräsentationPublikation Challenges, opportunities and application fields of quantum computing - an introductory overview(Association Information et Management, 2022) Kech, Benjamin; Schneider, Bettina; Gachnang, Phillip; Azan, WilfridThis paper elaborates on the technology of quantum computing. It is aimed at people new to this field and introduces characteristics of quantum computing along with comparisons to classical computing. Furthermore, the paper describes the challenges and opportunities of quantum computing. In addition, applications have been explored where quantum computing could create value for businesses. The findings include three categories. First, quantum computing might make a difference in simulating nature, which was also the initial idea that led to the invention of quantum computing. Second, quantum computing could benefit the category of machine learning. Last, optimization problems will take advantage of quantum computing. It is concluded that quantum computing is still in its early stages and there are many challenges to overcome ‚ in particular the challenge of error correction. To gain in the foreseeable future from the advantages that quantum computing pledges, more advances in research have to be made to have a fault-tolerant system. A fault-tolerant quantum computer is a promising technology that could create significant value for various branches, such as finance.04B - Beitrag KonferenzschriftPublikation Cybersecurity by design for smart home environments(2019) Siddhanti, Pragati; Asprion, Petra; Schneider, Bettina; Filipe, Joaquim; Smialek, Michal; Brodsky, Alexander; Hammoudi, SlimaneThe Internet of Things (IoT) is being increasingly adopted by businesses to improve operations, processes, and products. While it opens endless opportunities, it also presents tremendous challenges especially in the area of cyber risks and related security controls. With billions of interconnected devices worldwide, how do we ensure that they are sufficiently secure and resilient? As a reasonable solution, ‘Cybersecurity by Design’ seems a promising approach. In this research, ‘Smart Homes’ - as IoT containing products – are selected as unit of analysis because they are exposed to numerous cyber threats with corresponding adverse consequences for the life, safety and health of residents. By aiming to secure Smart Home Environments (SHEs) from cyber threats, we adopted ‘design science’ as methodology and developed a holistic approach, highlighting ‘good practices’, which can be applied in every phase of the SHEs product lifecycle. In addition to these good practices, a ‘Cyber Security Maturity Assessment’ tool for SHEs has been developed. Both artefacts have already been validated and incrementally improved, and are now awaiting their future application and further enhancements.04B - Beitrag KonferenzschriftPublikation Cybersecurity governance – An adapted practical framework for small enterprises(2023) Asprion, Petra; Gossner, Philipp; Schneider, Bettina; Bui, Tung X.04B - Beitrag KonferenzschriftPublikation CySecEscape – Escape room technique to raise cybersecurity awareness in SMEs(Filodiritto, 2020) Schneider, Bettina; Zanwar, TruptiWith the evolution of information technology, more and more small and medium-sized enterprises (SMEs) are using technology to support and grow businesses. With the prevalence of the internet, SMEs are constantly evaluating and adapting new technologies such as software as a service, cloud computing, or the internet of things. All these new opportunities are coming with inherent risks of everchanging cyberspace and overgrowing cybercrime. SMEs are soft targets for cybercriminals and the need for controls is evidenced by accumulating fraud incidents, identity thefts, denial of service attacks and illicit accesses or breaches of data over the last few years. This limits the ability of SMEs to innovate and gain business advantage. Previous research has shown that the human factor remains the weakest link in the cybersecurity chain, so it is paramount to make sure the employees receive effective training to embrace a security mindset. This study focuses on developing a prototype of a portable escape room to raise cybersecurity awareness in SMEs. Evaluation highlights that the escape room method is a worthy instrument.04B - Beitrag KonferenzschriftPublikation CySecEscape 2.0 - A virtual escape room to raise cybersecurity awareness(Serious Games Society, 2021) Löffler, Emanuel; Schneider, Bettina; Asprion, Petra; Zanwar, TruptiAn increasing number of small and medium-sized enterprises (SMEs) use the Internet to support and grow businesses. The application of new technologies comes with inherent risks of ever-changing cyberspace and increasing cybercrime. Previous research has shown that the human factor remains the core element in the cybersecurity chain, so it is paramount to make sure the employees receive effective training to embrace a security mindset. This study puts forward previous research that resulted in a portable escape room game to raise cybersecurity awareness. The purpose of the study is to elaborate the transformation of the physical game into a virtual learning experience to increase flexibility in times such as the Covid-19 lockdown. As main method, we applied the design science framework of Hevner et al. As main result, the research elaborates the design of the developed artifact—a virtual prototype of the escape room game addressing the cybersecurity challenges of SMEs. For the evaluation of the prototype, empirical data was collected in a qualitative study. As main conclusions we have observed that a physical escape room setting can be transformed into a virtual setting with little means without sacrificing player immersion. A limitation was identified in teaching targeted social engineering attacks.01A - Beitrag in wissenschaftlicher ZeitschriftPublikation Das Verstehen betriebswirtschaftlicher Zusammenhänge durch integrierte Unternehmenssoftware(Wochenschau Verlag, 2017) Schneider, Bettina; Arndt, Holger04A - Beitrag SammelbandPublikation Data privacy assessment: an exemplary case for higher education institutions(International School for Social and Business Studies, 2019) Habbabeh, Ali; Schneider, Bettina; Asprion, PetraThe European General Data Protection Regulation (GDPR), which has become applicable in May 2018, obliges companies and thus Higher Education Institutions (HEIs) to (re)assess their data privacy procedures in particular the processing of personal data. As the new law unfolds an extraterritorial scope, HEIs located outside the European Union (EU) also need to examine whether they are affected, and, if so, take the necessary measures. There is a lack of discussion and approaches in the current literature as to how HEIs can comply with the GDPR regulations. The aim of this study is therefore to analyse scientific publications in order to deliver two results: Firstly, consolidated relevant recommendations and requirements in the context of GDPR, and, secondly, an instrument to help HEIs to raise their GDPR awareness. The latter was built by applying design science guidelines and resulted on a whole of 44 controls that yield a total score. The resulting value can serve as an indicator of a HEI's accordance with GDPR regulations. In addition, the compiled controls can be used as a management instrument to assess the measures taken and to continuously promote compliance with GDPR.01A - Beitrag in wissenschaftlicher ZeitschriftPublikation Data protection impact assessment guidelines in the context of the general data protection regulation(2019) Grütter, Bodo Jeremy; Schneider, Bettina; Dermol, ValerijThe European General Data Protection Regulation (EU GDPR) requires companies to carry out a so-called Data Protection Impact Assessment (DPIA) if the processing of personal data is likely to result in a high risk to the rights and freedoms of individuals. But how can it be determined whether a risk should be considered ‘high’ and thus makes a DPIA necessary? Furthermore, if a DPIA is required, how exactly should this be performed? In response to these questions, various guidelines concerning DPIA have been published. The aim of this paper is to give those affected by the new Data Protection law an insight into three current DPIA guidelines and to support them in implementing a GDPR-compliant impact assessment. To this end, each of the selected guidelines will be described, and evaluated in terms of GDPR compliance and DPIA feasibility, i.e. on the one hand, whether the guideline complies with the relevant GDPR articles, and on the other hand what tools are provided to facilitate the operational execution of a DPIA. The study results in an overall evaluation matrix, which shows that all three guidelines have different strengths and propose differing methods for DPIA implementation.04B - Beitrag KonferenzschriftPublikation Decentralized autonomous organizations – Evolution, challenges, and opportunities(2022) Schneider, Bettina; Ballesteros, Ruben; Moriggl, Pascal; Asprion, Petra; Bork, Dominik; Barat, Souvik; Asprion, Petra; Marcelletti, Alessandro; Morichetta, Andrea; Schneider, Bettina; Kulkarni, Vinay; Breu, Ruth; Zech, PhilippA decentralized autonomous organization (DAO) is an emerging entity facilitated through blockchain technology. It operates under the principle of a decentralized governance structure void of hierarchical leadership, and decisions are made based on community consensus. As DAO and its mechanisms are still in an early stage, its potential evolution and future influence on enterprises remain unclear. This work elaborates on this emerging type of organization through a literature review and case studies of DAOs to demonstrate the current state of the art. The findings presented include a brief discussion of the technology that facilitates these organizations. Additionally, advancements and the common characteristics of existing DAOs are presented. Examining current and defunct DAOs revealed the challenges these organizations should address to reach their full potential in future application areas. Finally, it is concluded which organizations and industries could most likely benefit from the DAO concept in future.04B - Beitrag KonferenzschriftPublikation ERP systems towards digital transformation(Springer, 2018) Asprion, Peter; Schneider, Bettina; Grimberg, Frank; Dornberger, RolfEnterprise Resource Planning (ERP) systems employ highly integrated business software solutions that have existed for many years. Being the base of the IT application landscape of most enterprises, ERP systems remain fairly commoditized and scarcely leave room for differentiation. In view of the major digital transformations currently taking place, the role of ERP systems needs to be reconsidered. Geoffrey Moore’s concept of “Systems of Engagement” stresses the need for enterprise applications to become more user-oriented in order to support collaboration and to empower employees. Based on this understanding, we developed a model that classifies how ERP systems can evolve depending on its people-centricity focus and its level of integration.04A - Beitrag SammelbandPublikation Exploring cyber security awareness through LEGO serious play part I: the learning experience(ToKnowPress, 2020) Asprion, Petra; Schneider, Bettina; Moriggl, Pascal; Grimberg, Frank; Dermol, ValerijLego Serious Play (LSP) is a methodology that helps people brainstorm and discuss complex ideas through storytelling and metaphors. LSP has been successfully applied as a mechanism for creative learning and team building. In this paper, we discuss using LSP to teach core topics of Cyber Security and Resilience (CS&R) in higher education. Initial results suggest that LSP has a positive impact on student learning, while also improving student engagement both, within the course and in their business environment. While the use of LSP discussed here focuses on its implementation in CS&R courses, this highly transferable methodology can be applied across the spectrum of disciplines and for multiple purposes. In addition, it can also be used to facilitate cyber security awareness or risk assessment workshops in various environments.04B - Beitrag KonferenzschriftPublikation Gamification to support data protection awareness in small businesses(2022) Schneider, Bettina06 - PräsentationPublikation Human-centered artificial intelligence: a multidimensional approach towards real world evidence(2019) Schneider, Bettina; Asprion, Petra; Grimberg, Frank; Filipe, Joaquim; Smialek, Michal; Brodsky, Alexander; Hammoudi, SlimaneThis study indicates the significance of a human-centered perspective in the analysis and interpretation of Real World Data. As an exemplary use-case, the construct of perceived ‘Health-related Quality of Life’ is chosen to show, firstly, the significance of Real World Data and, secondly, the associated ‘Real World Evidence’. We settled on an iterative methodology and used hermeneutics for a detailed literature analysis to outline the relevance and the need for a forward-thinking approach to deal with Real World Evidence in the life science and health care industry. The novelty of the study is its focus on a human-centered artificial intelligence, which can be achieved by using ‘System Dynamics’ modelling techniques. The outcome – a human-centered ‘Indicator Set’ can be combined with results from data-driven, AI-based analytics. With this multidimensional approach, human intelligence and artificial intelligence can be intertwined towards an enriched Real World Evidence. The developed approach considers three perspectives – the elementary, the algorithmic and – as novelty – the human-centered evidence. As conclusion, we claim that Real World Data are more valuable and applicable to achieve patient-centricity and personalization if the human-centered perspective is considered ‘by design’.04B - Beitrag KonferenzschriftPublikation Interconnected enterprise systems - A call for new teaching approaches(2018) Schneider, Bettina; Asprion, Petra; Grimberg, Frank; Shi, Yong; Fu, Haohuan; Tian, Yingjie; Krzhizhanovskaya, Valeria V.; Lees, Michael Harold; Dongarra, Jack; Sloot, Peter M. A.Enterprise Resource Planning Systems (ERPS) have continually extended their scope over the last decades. The evolution has currently reached a stage where ERPS support the entire value chain of an enterprise. This study deals with the rise of a new era, where ERPS is transformed into so-called interconnected Enterprise Systems (iES), which have a strong outside-orientation and provide a networked ecosystem open to human and technological actors (e.g. social media, Internet of Things). Higher education institutions need to prepare their students to understand the shift and to transfer the implications to today’s business world. Based on literature and applied learning scenarios the study shows existing approaches to the use of ERPS in teaching and elaborates whether and how they can still be used. In addition, implications are outlined and the necessary changes towards new teaching approaches for iES are proposed.04B - Beitrag Konferenzschrift