Personal Information

Name:
E-mail:

Personal Interests:

Dr. Markus Tschersich
markus(a)tschersich.eu

Photography, Hiking, Traveling

 

 

 

 

 

 

Work Experience

Ich bin ein Textblock. Klicken Sie auf den Bearbeiten Button um diesen Text zu ändern. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

secunet Security Networks AG
Kronprinzenstraße 30
45128 Essen

Consulter

IT-Security Managment, Riskanalysis, Conceptual Reviews of Requirements & Target Specifications, Reporting

service-icon-5 www.secunet.com

Sep. 2014 to Jun. 2015

Deutsche Telekom Chair of Mobile Business & Multilateral Security
Goethe-University Frankfurt
Grüneburgplatz 1
60323 Frankfurt am Main

Postdoctoral Researcher

Management, project acquisition, development of concepts, strategic consulting, teaching, support of Phd. Students

service-icon-5 www.m-chair.de

Sep. 2008 to Sep. 2014

Deutsche Telekom Chair of Mobile Business & Multilateral Security
Goethe-University Frankfurt
Grüneburgplatz 1
60323 Frankfurt am Main

Research Assistant and Doctoral Student

Management, project acquisition, development of concepts, strategic consulting, teaching, writing doctoral thesis

service-icon-5 www.m-chair.de

July 1, 2011 to date: Coordinator of European Research Project ABC4Trust

ABC4Trust (Attribute–Based Credentials for Trust), 12 partners from 8 different European nations, operational management (planning, budgeting, reporting, personal management) of project partners (IBM, Microsoft, Nokia Solutions and Networks), budgetary responsibility (total budget of 13 Mio. €), reporting and justification towards the European Commission.

service-icon-5 www.abc4trust.eu

 

ABC4TrustAbstract:
The goal of ABC4Trust is to address the federation and interchangeability of technologies that support trustworthy yet privacy-preserving Attribute-based Credentials (ABC). So far credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user where not designed to respect the users privacy. They invariably reveal the identity of the holder even though the application at hand often needs much less information, for instance only confirmation that the holder is a teenager or is eligible for social benefits. In contrast to that, Attribute-based Credentials allow a holder to reveal just the minimal information required by the application, without giving away full identity information. These credentials thus facilitate the implementation of a trustworthy and at the same time privacy-protecting digital society.

September 16, 2008 to June 30, 2011: Coordination of European funded Research Project PICOS

PICOS (Privacy and Identity Management in Community Services), 11 partners from 7 different European nations. Management (planning, budgeting, reporting, personal management) of project partners (T-Mobile Germany/Deutsche Telekom AG, Hewlett-Packard Labs UK, ATOS Origin Research Spain). Conception, implementation and execution of user studies. Operational management, budgetary responsibility (total budget of 6 Mio. €), presentation of results (ICT 2008, MWC 2009, ICT 2010), reporting and justification towards the European Commission.

service-icon-5 www.picos-project.eu

 

Abstract:
PICOSThe objective of the project is to advance the state of the art in technologies that provide privacy-enhanced identity and trust management features within complex community-supporting services that are built on Next Generation Networks and delivered by multiple communication service providers. The approach taken by the project is to research, develop, build trial and evaluate an open, privacy-respecting, trust-enabling identity management platform that supports the provision of community services by mobile communication service providers.

2002 to 2008

KAB Deutschland e. V.
Bernhard-Letterhaus-Str. 26
50670 Cologne

Advisor, Consultant

Civic Education, Training
Preparation and execution of trainings of 3 to 5 days with students.

service-icon-5 www.kab.de

2004 to 2008

University of Duisburg-Essen
Universitätsstraße 9
45141 Essen

Intern, Student Assistant, Tutor

Assistance in the Management, Public Relations, Teaching, Programming

September 1, 2007 to August 30, 2008

Student assistant at faculty of business administration and economics.

October 1, 2004 to July 31, 2008

Supervision of students in the first semester at the University of Duisburg-Essen, Faculty of Business Administration and Economics.

April 1, 2007 bis Jul 31, 2007

Preparation and execution of seminars for the course “Corporation Management”.

August 1, 2006 to January 31, 2007

Internship at the European funded research project TRIANGLE.

service-icon-5 www.efquel.org

July 1, 2005 to January 31, 2006

Student assistant at the Chair of Education Sciences, development of an online database

service-icon-5 www.handbuch-jugendschutz.de

 

 

 

 

 

 

Education

Section

2008 to 2014

Goethe-University Frankfurt
Doctoral studies in economics and information science, Dr. rer. pol.
Title of the thesis: „„Privacy by Default in the European Union Proposal for Data Protection Regulation – Studies on the Impact of Restrictive Default Privacy Settings on the Exchange of Personal Information on Social Network Sites

Abstract

European Commission plans to force online services to implement Privacy by Default (PbDef). PbDef obliges services providers to have the most restrictive privacy option as the preselected one for all settings that manage the revelation of personal information. While regulators and literature see a high potential to protect citizens, especially providers of social network sites (SNS) see threats for their business model. Their business success is highly depending on users’ participation, especially by sharing personal information. By regulating the default of privacy settings, SNS providers expect that PbDef will lead to less shared personal information.

To assess the impact of PbDef on the exchange of personal information, two relevant factors concerning the numbers of addressees and the quantity of shared personal are analysed in more detail. Empirical results show that restrictive default privacy settings reduce the number of addressees a user is sharing personal information with. The analysis of the impact on the quantity of shared personal information demonstrate that users do not share less in the case of PbDef, but in general they perceive less privacy concerns. Summarized, the empirical evidence does not support the assumptions of a potential threat towards the business model and functionality of SNS.

Goethe-Logo

Studies

2003 to 2008

University of Duisburg-Essen
Diploma as Wirtschaftsinformatiker (Business Informatics)
Topic of diploma thesis: “Success-factors of Mobile Communities”

document Download Document (German)

 

Projects:

VISuM (Visually Impaired Suitable Mobility)

VISuM is a project of the Chair of Business Informatics and Software-Development at the University of Duisburg-Essen and is developed in cooperation with UNIAKTIV, the Center of societal learning and social responsibility of the University of Duisburg-Essen. The projects targets to support the integration of blind and visually impaired humans in the daily-life with the development of software for mobile navigation systems.

service-icon-5 see Project-Website (German)

ViewBeyond: Virtual Library

Aufgabenstellung dieser Veranstaltung war es, ein Massendatenvisualisierungssystem zu entwerfen. In diesem Zusammenhang entschieden wir uns für den Entwurf einer Online- Bibliothek, welcher die Suche und das Stöbern nach Büchern in dem riesigen Bestand einer Bibliothek unterstützen soll.

service-icon-5 see Project-Website (German)

Universität Duisburg-Essen Logo

Abitur

1999 to 2002

Berufskolleg der Stadt Bottrop
Higher education entrance qualification

service-icon-5 www.berufskolleg-bottrop.de

BKB

Realschule

1993 bis 1999

Erich-Klausener-Schule (Realschule), Dorsten
Qualification for secondary school

service-icon-5 www.erich-klausener-realschule.de

 

 

 

 

Personal Skills, Competences and Interests

Languages:

Native Language:

German

Foreign Languages:

English: Business fluent
French: Basic knowledge

Technical Skills:

Microsoft Office

  • Word
  • Excel
  • Power Point
  • Outlook
  • OneNote
  • Access
  • Project
  • Visio
  • Mac Office

Microsoft Server

  • Windows Server 2008, 2013
  • Exchange Server 2007, 2010
  • Forefront Threat Management Gateway 2010, ISA Server

Creative-Software

  • Adobe Photoshop
  • Adobe Illustrator
  • Adobe InDesign
  • Adobe Acrobat
  • Adobe Lightroom
  • Adobe Premiere
  • Corel Draw
  • Corel Photo Paint
  • Apple Final Cut Pro X
  • Apple Motion 5

Analysis-Software

  • IBM SPSS

Programming Experiences:

  • PHP
  • Java
  • C#
  • Visual Basic
  • JavaScript
  • ASP.NET
  • XAML
  • Silverlight
  • HTML
  • CSS
  • XML
  • MS SQL
  • MySQL
  • Visual Studio
  • Eclipse

 

 

 

 

 

 

Publications

Journals

Towards Privacy-enhanced Mobile Communities – Architecture, Concepts and User Trials (2011)

Tschersich, Markus; Kahl, Christian; Heim, Stephan; Krontiris, Ioannis; Böttcher, Katja; Crane, Stephen; Rannenberg, Kai. 2011Towards Privacy-enhanced Mobile Communities – Architecture Concepts and User Trials, in: Journal of Systems and Software, Special Issue: Mobile Applications, Elsevier.

Abstract
With the advent of mobile broadband technologies and capable mobile devices, social communities become a ubiquitous environment for people to stay in contact and share information with friends and fellows. This provides new opportunities for communities and their providers (e.g. regarding advertising) but also implies new question regarding the privacy and trust of their users. We argue that a glance needs to be found between these (partially) diverging interests and motivate, why a new approach to identity management and users privacy is necessary in this context. Based on requirements retrieved by real-life communities, we describe an architecture including privacy enhancing concepts and advanced privacy respecting advertising, which addresses such requirements. We further describe the architectures’ prototypical implementation, and present for the first time evaluation results based on user trials with two different mobile communities. 

counter-1 Journal document Download

Conference Proceedings

Development of a Measuring Instrument to Understand the Impact of Mobile Product Information Systems on Consumers’ Food Choice (2015 - Pre-Proceedings)

Hegen, Marvin & Tschersich, Markus. 2015 Development of a Measuring Instrument to Understand the Impact of Mobile Product Information Systems on Consumers’ Food Choice, Proceedings of the 21st Americas Conference on Information Systems, Puerto Rico.

Pros and Cons of Privacy by Default: Investigating the Impact on Users and Providers of Social Network Sites (2015)

Tschersich, Markus; Niekamp, Michael. 2015 Pros and Cons of Privacy by Default: Investigating the Impact on Users and Providers of Social Network Sites, Proceedings of the 48th Hawaii International Conference on System Science, Pre-Proceedings.

Abstract

Based on actual experimental findings, we present a new line of argumentation about the chances, risks and effects of a Privacy by Default regulation for users and providers of Social Network Sites (SNS). We describe three important factors that have an impact on the utility provided by SNS and measure their change through opposing status quos. On empirical grounds, the results challenge the widely accepted assumption that restrictive default privacy settings cause overly negative consequences for providers.

counter-1 Website

Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options (2015) *Best Paper Nomination*

Tschersich, Markus. 2015 Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options, Proceedings of the 48th Hawaii International Conference on System Science, Pre-Proceedings.

Abstract

Current privacy research in the context of social network sites is based on the assumption that all entered personal information is public available by default. Literature from the fields of default settings and sharing behavior in social network sites lacks empirical insights how restrictive privacy default settings that do not share personal information without the explicit decision of the users influence their behavior. To gain empirical insight a social network site privacy interface prototype with 14 different privacy settings was built to investigate in an experimental setting the influence of the preselected option on (1) the configuration behavior of the privacy settings, (2) the deviation from the default option, and (3) the size of deviation from the default option. In general, the results of our test show that users having restrictive privacy options as the preselected option significantly differ from users having non-restrictive default privacy options because they are more influenced by the status quo bias and anchoring effect.

counter-1 Website

Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites - Analyzing the Combined Effect of Default Settings and Interface Style (2014)

Tschersich, Markus. 2014 Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites – Analyzing the Combined Effect of Default Settings and Interface Style, Data Privacy Management – 9th International Workshop, Pre-Proceedings.

Abstract

Research about privacy in the context of social network sites has not addressed yet how user behave with restrictive default privacy settings. Literature about default settings and the sharing of personal information in social network sites lacks empirical insight into how restrictive privacy default settings influences the behavior of users. To gain empirical insight a social network site

privacy interface prototype was built to investigate the influence of default settings and interface style on the privacy configuration behavior of users. Results show configuration behavior differences between participants having restrictive or permissive privacy default settings. Further, interfaces with multiple pages of privacy settings induce participants to keep their default settings.

counter-1 Website

Exploring the impact of restrictive default privacy settings on the privacy calculus on social network sites (2014)

Tschersich, Markus & Botha, Reinhardt. 2014 Exploring the impact of restrictive default privacy settings on the privacy calculus on social network sites, ECIS 2014 Proceedings, Tel Aviv-Yafo.

Abstract
Research about self-disclosure on social network sites (SNS) is based on the assumption that all entered personal information is publicly available by default. Literature lacks empirical insights on how restrictive default privacy settings influence the privacy calculus and the self-disclosure on SNS. To gain empirical insight we analyzed how the perception of users regarding the benefits and privacy costs of self-disclosure on SNS changes by making users aware of restrictive default privacy settings. The results of our exploratory study using Facebook show that making users aware of restrictive default privacy settings significantly changes the perceived benefit of relationship maintenance and the perceived privacy costs of privacy concerns and the likelihood of a privacy violation.

counter-1 Proceedings

Understanding the Impact of Default Privacy Settings on Self-Disclosure in Social Network Services: Building a Conceptual Model and Measurement Instrument (2013)

Tschersich, Markus & Botha, Reinhardt. 2013 Understanding the Impact of Default Privacy Settings on Self-Disclosure in Social Network Services: Building a Conceptual Model and Measurement Instrument, Proceedings of the 19th Americas Conference on Information Systems, Chicago, IL.

Abstract
Restrictive default privacy settings might threaten the business model and functionality of social network services (SNS). As a first step in understanding the impact of default privacy settings on self-disclosure in SNS this paper proposes a conceptual model to reflect the decision-making and dimensions of self-disclosure in SNS. The conceptual model depicts aspects of benefits, costs and trust as impacting on five dimensions of self-disclosure. Thereafter, an instrument measuring the impact of default privacy settings on the Facebook SNS was developed. An item-sorting task, comprising three rounds, was performed to ensure the validity of the constructs used in the measurement instrument. The instrument comprises a 53-item questionnaire based on 16 constructs.

counter-1 Proceedings

Privacy respecting targeted advertising for social networks (2011)

Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai. 2011 Privacy respecting targeted advertising for social networks, in: Workshop in Information Security Theory and Practice (WISTP 11), Heraklion, Springer.

Abstract
Online Social Networks form an increasingly important part of people’s lives. As mobile technologies improve accessibility, concerns about privacy and trust are more apparent as advertising becomes a critical component of most social network’s economic model. In this paper we describe the PICOS project’s research into privacy preserving advertising options for social networks. We introduce an architecture that includes new concepts and technologies specifically designed to improve privacy and trust as well as advertising opportunities within social networks.

counter-1 Proceedings

Profit vs. Privacy – Advanced Targeted Advertising for Social Networks (2011)

Kahl, Christian; Crane Stephen; Tschersich, Markus; Rannenberg, Kai. 2011 Profit vs. Privacy – Advanced Targeted Advertising for Social Networks, in: Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS), Cyprus.

Abstract
Online social networks are getting increasingly popular. Their popularity and the availability of personal user information, makes them attractive for advertisers. Hence, social networks are often in tension between the needs of users and advertisers. While users want to keep control over their personal information, advertisers are interested in such information as a basis for targeted advertising campaigns. Mobile technologies allow additional new advertising opportunities, such as location based advertising. For the providers of social networks advertising becomes a critical component of their business model. In this context concerns about privacy and trust become ever more apparent. In this paper we describe the PICOS project’s research into privacy enhancing concepts for social networks and advanced targeted advertising options for social networks. In particular we describe the PICOS community platform architecture including stakeholders, trust model and the concepts it contains to enhance privacy among users. We further outline our approach of advanced targeted advertising and underlying concepts, as well as its prototypical implementation. The approach is based on a combination of targeted advertising and viral marketing. It is integrated within the privacy enhancing concepts included in the architecture. Thereby we aim to consider and balance the interests of the involved stakeholders.

counter-1 Proceedings

Design Guidelines for Mobile Group Recommender Systems to hande inaccurate or missing Location Data (2011)

Tschersich, Markus. 2011 Design Guidelines for Mobile Group Recommender Systems to hande inaccurate or missing Location Data, in: Proceedings of the ACM Recommender Systems, Chicago, IL.

Abstract
Today’s group recommender systems do not consider unavailable, inaccessible, or incomplete user information of one ore more members within a group. This is a problem for mobile group recommender system, because changed user behaviour or technical limitations of mobile services let user may not be willing or able to disclose all information, which are part of a user profile in a mobile environment. For location information, as one of the most important type of user information for an ad-hoc mobile recommendation service, this can lead to inaccurate, or missing location information. Inaccurate or missing location information has an impact on different parts of building group recommendations. This impact reduces the quality of recommendations, which is a key-challenge of recommender systems. Therefore, design guidelines are needed to address the problem of missing or inaccurate location information in mobile group recommender systems. This work describes the approach of building and validating those design guidelines and gives a first idea of impacts.

counter-1 Proceedings

How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project (2010)

Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai. 2010 How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project, in: Proceedings of 25th IFIP International Information Security Conference Security & Privacy – Silver Linings in the Cloud (IFIP SEC 2010), Brisbane, Australia, Springer.

Abstract

Mobility allows social communities to become a ubiquitous part of our daily lives. However, as users in such communities share huge amounts of personal data and contents, new challenges emerge with regard to privacy and trust. In this paper we motivate the necessity of advanced privacy enhancing concepts, especially for mobile communities and outline the approach of the PICOS project in order to elaborate such concepts. We explicate how we collected mobile community requirements and elaborated adequate concepts to address them. Finally, we conclude with details on how the concepts were prototypically implemented to demonstrate their feasibility, what distinguishes them from existing work, and how we intend to transfer the concepts to practice.

counter-1 Proceedings document Download

Enhanced Privacy and Identity Management for Community Services – Demo of the PICOS project (2010)

Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai. 2010 Enhanced Privacy and Identity Management for Community Services – Demo of the PICOS project, in: Di Nitto, Elisabeth; Yahapour, Ramin (Eds.). Towards a Service-Based Internet – Third European Conference, ServiceWave, Ghent, Belgium, Springer.

Abstract
As online communities get increasingly mobile, enabling new location based community services, including privacy and trust for their users gets more important. Within the PICOS project we investigated and elaborated innovative concepts to improve the privacy of users within mobile communities based on three exemplary communities.

counter-1 Publication

Working Papers

Einsatz von Multi-Touch beim Softwaredesign am Beispiel der CRC Card-Methode (2008)

Tschersich, Markus; Spies, Thorsten; Eicker, Stefan. 2008 Einsatz von Multi-Touch beim Softwaredesign am Beispiel der CRC Card-Methode, in: ICB-Research Report No. 25, Essen, Germany.

Abstract
Die Class, Responsibility and Collaboration (CRC) Card‐Methode wird im Rahmen der Softwareentwicklung als Designmethode insbesondere in agilen Softwareentwicklungsprozessen eingesetzt. Die Anwendung der Methode findet i.d.R. ohne Unterstützung digitaler Medien statt, da für den effizienten Einsatz große Interaktionsflächen benötigt werden. Entsprechende digitale Interaktionsflächen waren aber bislang zu teuer und bildeten keine Alternative zu klassischen Präsentationshilfsmitteln wie z.B. Karteikarten. Dank der großen Fortschritte im Bereich der Multi-Touch‐Technologie können aber nun skalierbare digitale Interaktionsflächen mit akzeptablen Investitionen geschaffen werden, die den Anforderungen der CRC‐Card‐Methode entsprechen. Der vorliegende Bericht zeigt auf, wie durch die Verwendung von Multi Touch‐Systemen die Class, Responsability and Collaboration Card‐Methode auf ein Computersystem übertragen werden kann. Durch die Übertragung wird eine signifikante Produktivitätssteigerung gegenüber der klassischen Methode erreicht.

counter-1 Download

Online Articles

Wird das schlechte Image von Google den Erfolg von Android verhindern? (2010)

In den letzen Wochen gab es kaum einen Tag, an dem Google nicht mit negativen Nachrichten über Datenschutz in der Presse vertreten war. Angefangen mit einer generellen Diskussion über StreetView in Deutschland, steigerte sich die Diskussion über Googles Datenschutz immer weiter. Es könnte fast der Eindruck entstehen, dass StreetView für Google die „Killer-App“ im negativen Sinne werden könnte. Selbst die von facebook schon fest gebuchte goldene Himbeere des Datenschutzes wurde an Google weitergereicht.

counter-1 Weiterlesen auf mobile-zeitgeist.de

Die bewusste Schizophrenie zur Wahrung der Privatsphäre (2010)

Ach, wie einfach war es doch früher mit seinen alten, doch viel zu großen Papierausweisen, die man hier und dort bekommen hat. Auf diesen waren die wichtigsten und notwendigsten Daten „gespeichert“, die für den jeweiligen Zweck des Ausweises notwendig waren. 

counter-1 Weiterlesen auf mobile-zeitgeist.de

Was ist ein mobiles Endgerät? (2010)

Es begleitet uns jeden Tag und ist das Tor zu vielen Diensten und Möglichkeiten der mobilen Welt. Das Mobile Endgerät ist der Enabler des Mobile Business. Durch die Entwicklung von neuen Gerätetypen, wie vor zwei Jahren die Netbooks oder aktuell des iPads, kommt regelmäßig die Frage auf, was nun wirklich unter einem Mobilen Endgerät zu verstehen ist. Der folgende wissenschaftlich getriebene Ansatz hat als Ziel Geräte zu klassifizieren, um so in der großen Menge von unterschiedlichsten Geräteklassen mobile Endgeräte zu identifizieren.

counter-1 Weiterlesen auf mobile-zeitgeist.de

 

 

 

 

 

 

Contact Me

Your Name (Mandatory)

Your E-Mail-Address (Mandatory)

Subject

Your Message