This page has only limited features, please log in for full access.
Sélinde van Engelenburg is a researcher at the Organisation & Governance section at the faculty of Technology, Policy and Management of Delft University of Technology. Her research is on the role of new technological developments in cybersecurity. Her main focus is on the risks and benefits of Artificial Intelligence, and Machine Learning in particular. Previously, Sélinde obtained her PhD at Delft University of Technology in the field of ICT. Her PhD research was on designing context-aware architectures for business-to-government information sharing for enhancing security and safety in international container shipping. The large-scale overarching architecture she developed helps to ensure that information sharing is compliant with laws and regulations. Furthermore, it provides businesses with control over their data, reducing their risks of sharing and improving their willingness to share. The architecture uses distributed ledger technology to provide secure access control. In addition, she developed a new method for designing context-aware systems in complex multi-stakeholder environments. Sélinde obtained a master’s degree in Artificial Intelligence from Utrecht University with a specialization in logic and intelligent systems.
Companies increasingly tender knowledge-intensive tasks using crowdsourcing platforms to gain access to scarce knowledge and skills otherwise out of reach, and in this way, gaining competitive advantage. Despite its potential, existing crowdsourcing platforms encounter several challenges, including (1) fragmentation of expertise, as there are many platforms, (2) distrust between task providers and crowdsourcing participants, as identity and past performance are often not known, and (3) inability to learn from experience due to a lack of openness. A reference architecture for blockchain-based knowledge-intensive crowdsourcing platforms to mediate transactions between demand and supply of knowledge is designed in this paper to overcome these challenges. A design science research method is followed to develop the architecture. The reference architecture shows how blockchain and smart contract components can be integrated to support and coordinate knowledge-intensive crowdsourcing activities. By removing traditional e-commerce intermediaries, blockchain reduces search friction, knowledge transfer costs, and cheating by task providers or crowdsourcing participants.
Yiwei Gong; Sélinde van Engelenburg; Marijn Janssen. A Reference Architecture for Blockchain-Based Crowdsourcing Platforms. Journal of Theoretical and Applied Electronic Commerce Research 2021, 16, 937 -958.
AMA StyleYiwei Gong, Sélinde van Engelenburg, Marijn Janssen. A Reference Architecture for Blockchain-Based Crowdsourcing Platforms. Journal of Theoretical and Applied Electronic Commerce Research. 2021; 16 (4):937-958.
Chicago/Turabian StyleYiwei Gong; Sélinde van Engelenburg; Marijn Janssen. 2021. "A Reference Architecture for Blockchain-Based Crowdsourcing Platforms." Journal of Theoretical and Applied Electronic Commerce Research 16, no. 4: 937-958.
Governance requirements for systems supporting information sharing between businesses and government organisations (B&G) are determined by a high variety of stakeholders with often conflicting interests. These conflicting interests can hamper the introduction and scaling-up of ICT-innovations that change their roles and authorities. We address one such innovation: the introduction of blockchain technologies in the B&G context. Who can govern data and the system depends on several elements of the design of a blockchain-based system, particularly the data structure, consensus mechanism and network topology. Design choices regarding these elements affect who can make decisions and hence we call them blockchain control points. These control points require an explicit and well-understood relationship between the design decisions and the interests of stakeholders. Yet, the literature on blockchain technology and governance does not offer such insight. Therefore, we developed a framework to assess the alignment between stakeholders interest and blockchain design choices. This framework consists of three views and their interrelationships, 1) a stakeholder view providing insight into the tensions between stakeholder’s interests and governance requirements, 2), a governance view on the rights concerning the data and the system, and 3) a blockchain control view describing how design decisions on the control points affect whether governance requirements are met and how parties can exercise their rights. Making these links explicit enables an understanding of how technical design choices can trigger organizational dynamics from the stakeholder view and vice versa. Based on the framework we formulate a research agenda concerning blockchain design choices and governance.
Sélinde Van Engelenburg; Boriana Rukanova; Wout Hofman; Jolien Ubacht; Yao-Hua Tan; Marijn Janssen. Aligning Stakeholder Interests, Governance Requirements and Blockchain Design in Business and Government Information Sharing. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 197 -209.
AMA StyleSélinde Van Engelenburg, Boriana Rukanova, Wout Hofman, Jolien Ubacht, Yao-Hua Tan, Marijn Janssen. Aligning Stakeholder Interests, Governance Requirements and Blockchain Design in Business and Government Information Sharing. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():197-209.
Chicago/Turabian StyleSélinde Van Engelenburg; Boriana Rukanova; Wout Hofman; Jolien Ubacht; Yao-Hua Tan; Marijn Janssen. 2020. "Aligning Stakeholder Interests, Governance Requirements and Blockchain Design in Business and Government Information Sharing." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 197-209.
Context-aware systems are systems that have the ability to sense and adapt to the environment. To operate in large-scale multi-stakeholder environments, systems often require context awareness. The context elements that systems in such environments should take into account are becoming ever more complex and go beyond elements like geographic location. In addition, these environments are themselves so complex that it is hard to determine what parts of them belong to the relevant context of a context-aware system. However, insight into what belongs to this context is needed to establish what the design of a context-aware system should be to meet its goal. The ambiguity of what belongs to context in these complex organizational environments causes the design process to become either inefficient or less effective. In this paper, we provide a method to identify what elements of the environment are relevant context and to then base the design on this insight. The proposed method consists of three steps: 1) getting insight into context, 2) determining what components are needed to sense and adapt to context, and 3) determining the rules for how the system should adapt in different situations. To reduce ambiguity by organizations, the method requires a more specified definition of context than the ones in current literature, which we also provide in this paper. In addition to reducing ambiguity, the highly structured way in which the components and rules are derived from insight into context provides a way to further deal with the high complexity of the context. The method was applied for the development of a context-aware system for business-to-government (B2G) information sharing in the container shipping domain. Information sharing in this domain is highly complex, as legislation, many stakeholders, and a mix of cooperation and competition result in a highly complex environment. The development of this B2G information sharing system thus provides an example of how the method can be used to develop a context-aware system in a highly complex environment.
Sélinde van Engelenburg; Marijn Janssen; Bram Klievink. Designing context-aware systems: A method for understanding and analysing context in practice. Journal of Logical and Algebraic Methods in Programming 2018, 103, 79 -104.
AMA StyleSélinde van Engelenburg, Marijn Janssen, Bram Klievink. Designing context-aware systems: A method for understanding and analysing context in practice. Journal of Logical and Algebraic Methods in Programming. 2018; 103 ():79-104.
Chicago/Turabian StyleSélinde van Engelenburg; Marijn Janssen; Bram Klievink. 2018. "Designing context-aware systems: A method for understanding and analysing context in practice." Journal of Logical and Algebraic Methods in Programming 103, no. : 79-104.
Business-to-government information exchange has over the past decades greatly benefited from data exchange standards and inter-organisational systems. The data era enables a new shift in the type of information sharing; from formal reporting to opening up full (and big) data sets. This enables new analytics and insights by government, more effective and efficient compliance assessment, and other uses. The emphasis here shifts from establishing formats to deciding what information can be shared, under what conditions, and how to create added value. There are numerous initiatives that explore how to put data to better use for businesses, for government and for their interactions. However, there is limited attention to exactly how these new forms of extensive data sharing affects the supervision relationships. In this paper, we exploratively look across three research projects to identify the implications of information sharing beyond the regulatory requirements (‘over-compliant’). We find that the lack of attention to those implications lead to solutions that are hard to scale up and present unexpected consequences down the line, which may negatively impact the future willingness to explore new potential added value of data sharing.
Bram Klievink; Marijn Janssen; Haiko van der Voort; Sélinde van Engelenburg. Regulatory Compliance and Over-Compliant Information Sharing – Changes in the B2G Landscape. Transactions on Petri Nets and Other Models of Concurrency XV 2018, 249 -260.
AMA StyleBram Klievink, Marijn Janssen, Haiko van der Voort, Sélinde van Engelenburg. Regulatory Compliance and Over-Compliant Information Sharing – Changes in the B2G Landscape. Transactions on Petri Nets and Other Models of Concurrency XV. 2018; ():249-260.
Chicago/Turabian StyleBram Klievink; Marijn Janssen; Haiko van der Voort; Sélinde van Engelenburg. 2018. "Regulatory Compliance and Over-Compliant Information Sharing – Changes in the B2G Landscape." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 249-260.
Supply chain management is hampered by a lack of information sharing among partners. Information is not shared as organizations in the supply chain do not have direct contact and/or do not want to share competitive and privacy sensitive information. In addition, companies are often part of multiple supply chains and trading partners vary over time. Blockchains are distributed ledgers in which all parties in a network can have access to data under certain conditions. Private blockchains can be used to support parties in making their demand data directly available to all other parties in their supply chain. These parties can use this data to improve their planning and reduce the bullwhip effect. However, the transparency that blockchain technology offers makes it more difficult to protect sensitive data. The dynamics between these properties are not well understood. In this paper, we design and evaluate a blockchain architecture to explore its feasibility for reducing information asymmetry, while at the same time protecting sensitive data. We found that blockchain technology can allow parties to balance their need for inventory management with their need for flexibility for changing partners. However, measures to protect sensitive data lead either to reduced information, or to reduced speed by which the information can be accessed.
Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink. A Blockchain Architecture for Reducing the Bullwhip Effect. Business Information Systems 2018, 69 -82.
AMA StyleSélinde Van Engelenburg, Marijn Janssen, Bram Klievink. A Blockchain Architecture for Reducing the Bullwhip Effect. Business Information Systems. 2018; ():69-82.
Chicago/Turabian StyleSélinde Van Engelenburg; Marijn Janssen; Bram Klievink. 2018. "A Blockchain Architecture for Reducing the Bullwhip Effect." Business Information Systems , no. : 69-82.
Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan; Boriana Rukanova. Comparing the openness of archetypical business-to-government information sharing architectures. Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13 2018, 88 .
AMA StyleSélinde Van Engelenburg, Marijn Janssen, Bram Klievink, Yao-Hua Tan, Boriana Rukanova. Comparing the openness of archetypical business-to-government information sharing architectures. Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13. 2018; ():88.
Chicago/Turabian StyleSélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan; Boriana Rukanova. 2018. "Comparing the openness of archetypical business-to-government information sharing architectures." Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13 , no. : 88.
Context-awareness refers to the ability to sense and adapt to context. With the rise of context-aware systems, designers are struggling with what variables should be sensed from the context. According to the definitions found in the literature, whether something belongs to context, has to do with whether it is relevant. However, what it means to be relevant is left implicit in these definitions. Most work on context-aware systems is based on assumptions of the context that should be taken into account. Hence, it is unclear how to decide whether something belongs to context or should be left out. In this paper, first we analyse what is meant with context and provide a definition. In this definition we introduce the notion of a context variable, defined as an attribute of an object that is relevant. Context is then defined as the set of context variables. We establish explicit criteria for deciding whether an attribute of an object is a context variable based on the proposed definition and the designer’s goal. We also provide a straightforward method to help designers to determine whether the criterion is met and a variable should be included in the context. This method is based on filling out a scheme to describe context variables.
Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink. What Belongs to Context? Privacy Enhancing Technologies 2018, 101 -116.
AMA StyleSélinde Van Engelenburg, Marijn Janssen, Bram Klievink. What Belongs to Context? Privacy Enhancing Technologies. 2018; ():101-116.
Chicago/Turabian StyleSélinde Van Engelenburg; Marijn Janssen; Bram Klievink. 2018. "What Belongs to Context?" Privacy Enhancing Technologies , no. : 101-116.
Advanced architectures for business-to-government (B2G) information sharing can benefit both businesses and government. An essential choice in the design of such an architecture is whether information is shared using a thick or a thin information flow. In an architecture with a thick flow, all information is shared via a shared infrastructure, whereas only metadata and pointers referring to the information are shared via the shared infrastructure in a thin flow architecture. These pointers can then be used by parties to access the information directly. Yet, little is known about what their implications for design choices are. Design choices are influenced by the properties of the architecture as well as the situation in which B2G information sharing takes place. In this paper, we identify the properties of architectures with a thin and thick flow. Next, we determine what this implies for the suitability of the architectures in different situations. We will base our analysis on the case of the Shipping Information Pipeline (SIP) for container transport. While both architectures have their pros and cons, we found that architectures with a thin flow are more suitable when non-standardized, and flexible sharing of sensitive information is required. In contrast, we found that architectures with a thick flow are more suitable when in-depth integration is required.
Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan. Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow. Transactions on Petri Nets and Other Models of Concurrency XV 2017, 10428, 228 -239.
AMA StyleSélinde Van Engelenburg, Marijn Janssen, Bram Klievink, Yao-Hua Tan. Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow. Transactions on Petri Nets and Other Models of Concurrency XV. 2017; 10428 ():228-239.
Chicago/Turabian StyleSélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan. 2017. "Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow." Transactions on Petri Nets and Other Models of Concurrency XV 10428, no. : 228-239.
To ensure public safety and security, it is vitally important for governments to collect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share additional information for fear of sharing competitively sensitive information, becoming liable and not being compliant with the law. These reasons are often overlooked in the design of software architectures for information sharing. In the present research, we followed a design science approach to develop a software architecture for business-to-government information sharing. Based on literature and a case study, we elicited the requirements an architecture that provides for the sharing of information should meet to make it acceptable to businesses. We then developed the architecture and evaluated it against the requirements. The architecture consists of a blockchain that stores events and rules for information sharing that are controlled by businesses. For each event, two parties use their private keys to encrypt its Merkle root to confirm that they know the data are correct. This makes it easy to check whether information is reliable and whether an event should be accepted. Access control, metadata and context information enable the context-based sharing of information. This is combined with the encryption and decryption of data to provide access to certain data within an organisation.
Sélinde Van Engelenburg; M.F.W.H.A. Janssen; Bram Klievink. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems 2017, 52, 595 -618.
AMA StyleSélinde Van Engelenburg, M.F.W.H.A. Janssen, Bram Klievink. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems. 2017; 52 (3):595-618.
Chicago/Turabian StyleSélinde Van Engelenburg; M.F.W.H.A. Janssen; Bram Klievink. 2017. "Design of a software architecture supporting business-to-government information sharing to improve public safety and security." Journal of Intelligent Information Systems 52, no. 3: 595-618.
Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design science approach to develop an software architecture that is acceptable by businesses. From a case study we derive the requirements an architecture should meet in order to contribute to increasing willingness to share information. In this paper the architecture is developed and evaluated according to the requirements. We recommend the use of different types of business rules that provide businesses with control over their data, in combination with encryption and decryption of data to provide access to parts of the data within an organization.
Sélinde van Engelenburg; Marijn Janssen; Bram Klievink. Design of a Business-to-Government Information Sharing Architecture Using Business Rules. Transactions on Petri Nets and Other Models of Concurrency XV 2015, 124 -138.
AMA StyleSélinde van Engelenburg, Marijn Janssen, Bram Klievink. Design of a Business-to-Government Information Sharing Architecture Using Business Rules. Transactions on Petri Nets and Other Models of Concurrency XV. 2015; ():124-138.
Chicago/Turabian StyleSélinde van Engelenburg; Marijn Janssen; Bram Klievink. 2015. "Design of a Business-to-Government Information Sharing Architecture Using Business Rules." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 124-138.