Schneider, Bettina
Lade...
E-Mail-Adresse
Geburtsdatum
Projekt
Organisationseinheiten
Berufsbeschreibung
Nachname
Schneider
Vorname
Bettina
Name
Schneider, Bettina
20 Ergebnisse
Suchergebnisse
Gerade angezeigt 1 - 10 von 20
- PublikationTouching space: distributed ledger technology for tracking and tracing certificates(2023) Moriggl, Pascal; Asprion, Petra; Schneider, Bettina; Scherb, Christopher; Bui, Tung X. [in: Proceedings of the 56th Hawaii International Conference on System Sciences]Components built into space vehicles and equipment (space products) must meet different regulatory requirements; in detail, each component must be certified and sustainably traceable at all times. Space engineers have expressed the need for an interoperable system to collect, manage and route certifications for components, parts and materials that go into space products. The lack of a unified approach in the European space industry is a challenge for companies involved in product development. This research proposes an open-source, secure, fast and distributed ledger technology (DLT) based solution that fits into any IT environment and is well adapted to the needs of manufacturing companies in the space sector. The results show that a blockchain-based solution based on ‘Hyperledger Fabric’ combined with the InterPlanetary File System is viable. The results can guide other researchers and practitioners to consider DLTs when changing their certification management paradigm with suppliers, customers and auditors.04B - Beitrag Konferenzschrift
- PublikationPeer instruction as teaching method in cybersecurity and data privacy(International School for Social and Business Studies, 2023) Schneider, Bettina; Asprion, Petra [in: International Journal of Management, Knowledge and Learning]Cybersecurity and data privacy are important fields today. Basic education in these two interconnected areas should already be offered in schools, as practically everyone today can encounter the dangers and risks of the Internet in terms of data theft, data manipulation or the like. However, the topics of cybersecurity and data privacy are generally abstract, and many people are not interested in such rather technical topics. To arouse interest and provide a certain basic education, we used ‘peer instruction’ combined with storytelling as a promising method. Within the framework of an EU project called GEIGER and with the support of students who have learned data privacy by means of the presented method, the method has been further developed, applied, tested, reflected, and iteratively improved. In summary, the method presented is useful for the topics of cybersecurity and data privacy, but the recommendations compiled must be considered in particular with regard to careful preparation and testing.01A - Beitrag in wissenschaftlicher Zeitschrift
- PublikationPersona-oriented data protection impact assessment for small businesses(2023) Schneider, Bettina; Asprion, Petra; Misyura, Ilya; Jonkers, Natalie; Zaugg, Esther [in: Proceedings of Society 5.0 Conference 2023]The European (EU) General Data Protection Regulation (GDPR) is applicable since May 2018 and has since posed major challenges for small businesses with limited knowledge and resources. According to Art. 35 of the GDPR, a so-called ‘Data Protection Impact Assessment’ (DPIA) is mandatory if a processing of personal data is likely to result in a high risk to the rights and freedoms of natural persons. There is a demand for low-threshold, practical instruments that support the required DPIA. The objective of this research was to develop a new DPIA instrument that meets the needs – as unit of analysis – of non-technology small businesses and complies with the requirements of the EU GDPR. Design Science Research was used as the methodological framework and identified personas were drivers in the development. The result is two variants of instruments that have been carefully evaluated and proven to be valuable.04B - Beitrag Konferenzschrift
- PublikationBlockchain und Datenschutz – Hyperledger Sawtooth im Fokus(Springer, 2023) Moriggl, Pascal; Asprion, Petra; Schneider, Bettina; Dornberger, Rolf [in: Neue Trends in Wirtschaftsinformatik und eingesetzte Technologien. Digitale Innovation und digitale Transformation]Daten gehören heute zu den zentralen Elementen digitaler Geschäftsmodelle, daher ist ein Bewusstsein für angemessene Maßnahmen zum Schutz von Daten und insbesondere personenbezogener Daten essenziell. Die Datenschutzgrundverordnung der Europäischen Union (EU) ist eine Folge der Diskussionen zum Schutz der Privatsphäre im digitalen Raum. Die Verordnung zwingt Organisationen dazu, sicherzustellen, dass ihre Prozesse zur Verarbeitung von Daten mit den relevanten Regularien übereinstimmen. Seit einigen Jahren wird die Blockchain-Technologie zunehmend beliebter, um den Austausch von Daten zu unterstützen. Die neue Technologie macht es möglich, auf eine zentrale Datenhaltung zu verzichten. Das Ziel dieser Forschung war es, Entscheidungsträgerinnen und Entscheidungsträgern bei der Auswahl einer geeigneten Blockchain-Konfiguration zu helfen, die den gesetzlichen Datenschutzanforderungen gerecht wird. Mit Hilfe der „Design-Science“-Methodik haben wir einen sogenannten morphologischen Kasten, sowie ein dazugehöriges Raster entwickelt, die als „Bewertungswerkzeuge“ für die Blockchain-Konfiguration „Hyperledger Sawtooth“ verwendet werden können. Die Forschungsergebnisse können mit wenigen Anpassungen verallgemeinert werden, um auch andere Blockchain-Konfigurationen zu bewerten.04A - Beitrag Sammelband
- PublikationCybersecurity governance – An adapted practical framework for small enterprises(2023) Asprion, Petra; Gossner, Philipp; Schneider, Bettina; Bui, Tung X. [in: Proceedings of the 56th Hawaii International Conference on System Sciences]04B - Beitrag Konferenzschrift
- PublikationGamification to support data protection awareness in small businesses(2022) Schneider, Bettina06 - Präsentation
- PublikationPost-quantum cryptography: an introductory overview and implementation challenges of quantum-resistant algorithms(2022) Käppler, Sherdel; Schneider, Bettina; Hinkelmann, Knut; Gerber, Aurona [in: Proceedings of the Society 5.0 Conference 2022 - Integrating digital world and real world to resolve challenges in business and society]Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of internet communication. The development of quantum computers (QCs) and their potential to utilize Shor’s Law, is increasingly recognized as a threat to asymmetric cryptography. In response, post-quantum cryptography (PQC) is gaining prominence as a notable field of research aiming to standardize quantum resistant algorithms before the operational usage of QCs. This paper is addressed to people with preliminary knowledge in the field of cryptography and QC. Based on a literature review, the authors provide an overview of challenges faced by the research community and elaborate the advancements in addressing post-quantum threats. A migration strategy from classical cryptosystems to PQC systems is in development, but obstacles such as time constraints and improper implementation complicate the process. Full implementation could take a decade or more. Until then, our paper aims to create awareness for potential challenges when transitioning towards PQC. As categorization scheme for these potential obstacles, we refer to a well- established model in cybersecurity – the McCumber Cube. Conclusions embrace preparing for risks of improper implementation and deriving a multi-step migration. Special attention is expected to be needed for data migration of existing data sets. As a request for future research in PQC, the authors identified the process of implementing post-cryptography standards, e.g., from the National Institute of Standards and Technology (NIST), and an assessment of the perceived readiness of industry to adapt.04B - Beitrag Konferenzschrift
- PublikationDecentralized autonomous organizations – Evolution, challenges, and opportunities(2022) Schneider, Bettina; Ballesteros, Ruben; Moriggl, Pascal; Asprion, Petra; Bork, Dominik; Barat, Souvik; Asprion, Petra; Marcelletti, Alessandro; Morichetta, Andrea; Schneider, Bettina; Kulkarni, Vinay; Breu, Ruth; Zech, Philipp [in: Proceedings of the PoEM 2022 Workshops and Models at Work]A decentralized autonomous organization (DAO) is an emerging entity facilitated through blockchain technology. It operates under the principle of a decentralized governance structure void of hierarchical leadership, and decisions are made based on community consensus. As DAO and its mechanisms are still in an early stage, its potential evolution and future influence on enterprises remain unclear. This work elaborates on this emerging type of organization through a literature review and case studies of DAOs to demonstrate the current state of the art. The findings presented include a brief discussion of the technology that facilitates these organizations. Additionally, advancements and the common characteristics of existing DAOs are presented. Examining current and defunct DAOs revealed the challenges these organizations should address to reach their full potential in future application areas. Finally, it is concluded which organizations and industries could most likely benefit from the DAO concept in future.04B - Beitrag Konferenzschrift
- PublikationPerceptions and misconceptions of blockchain: the potential of applying threshold concept theory(2022) Schneider, Bettina; Azan, Wilfrid [in: 2022 IEEE 6th International Conference on Logistics Operations Management (GOL)]Blockchain is a technology of increasing importance. It is difficult to build a thorough understanding of blockchain as it relies on multiple abstract and technological building blocks. Therefore, it is not surprising that a number of misconceptions circulate on the topic of blockchain. This paper filters and categorizes existing research on people’s perceptions of blockchain technology and misconceptions. The identified gap in addressing and overcoming misconceptions leads to the theory of threshold concepts. The fundamentals and potentials of the approach in the field of blockchain are elaborated. The paper ends with a call for future research in this direction.04B - Beitrag Konferenzschrift
- PublikationChallenges, opportunities and application fields of quantum computing - an introductory overview(Association Information et Management, 2022) Kech, Benjamin; Schneider, Bettina; Gachnang, Phillip; Azan, WilfridThis paper elaborates on the technology of quantum computing. It is aimed at people new to this field and introduces characteristics of quantum computing along with comparisons to classical computing. Furthermore, the paper describes the challenges and opportunities of quantum computing. In addition, applications have been explored where quantum computing could create value for businesses. The findings include three categories. First, quantum computing might make a difference in simulating nature, which was also the initial idea that led to the invention of quantum computing. Second, quantum computing could benefit the category of machine learning. Last, optimization problems will take advantage of quantum computing. It is concluded that quantum computing is still in its early stages and there are many challenges to overcome ‚ in particular the challenge of error correction. To gain in the foreseeable future from the advantages that quantum computing pledges, more advances in research have to be made to have a fault-tolerant system. A fault-tolerant quantum computer is a promising technology that could create significant value for various branches, such as finance.04B - Beitrag Konferenzschrift