This page has only limited features, please log in for full access.

Dr. Selinde Van van Engelenburg
Delft University of Technology

Basic Info


Research Keywords & Expertise

0 Automated Reasoning
0 Information Sharing
0 Logic
0 Machine Learning
0 Blockchain

Fingerprints

Information Sharing
Business to government information sharing
Blockchain
Context Awareness
Context aware systems
Design Science Research

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Sélinde van Engelenburg is a researcher at the Organisation & Governance section at the faculty of Technology, Policy and Management of Delft University of Technology. Her research is on the role of new technological developments in cybersecurity. Her main focus is on the risks and benefits of Artificial Intelligence, and Machine Learning in particular. Previously, Sélinde obtained her PhD at Delft University of Technology in the field of ICT. Her PhD research was on designing context-aware architectures for business-to-government information sharing for enhancing security and safety in international container shipping. The large-scale overarching architecture she developed helps to ensure that information sharing is compliant with laws and regulations. Furthermore, it provides businesses with control over their data, reducing their risks of sharing and improving their willingness to share. The architecture uses distributed ledger technology to provide secure access control. In addition, she developed a new method for designing context-aware systems in complex multi-stakeholder environments. Sélinde obtained a master’s degree in Artificial Intelligence from Utrecht University with a specialization in logic and intelligent systems.

Following
Followers
Co Authors
Profile ImageYiwei Gong Wuhan University
Profile ImageMarijn Janssen Delft University of Technolo...
Following: 2 users
View all

Feed

Journal article
Published: 07 March 2021 in Journal of Theoretical and Applied Electronic Commerce Research
Reads 0
Downloads 0

Companies increasingly tender knowledge-intensive tasks using crowdsourcing platforms to gain access to scarce knowledge and skills otherwise out of reach, and in this way, gaining competitive advantage. Despite its potential, existing crowdsourcing platforms encounter several challenges, including (1) fragmentation of expertise, as there are many platforms, (2) distrust between task providers and crowdsourcing participants, as identity and past performance are often not known, and (3) inability to learn from experience due to a lack of openness. A reference architecture for blockchain-based knowledge-intensive crowdsourcing platforms to mediate transactions between demand and supply of knowledge is designed in this paper to overcome these challenges. A design science research method is followed to develop the architecture. The reference architecture shows how blockchain and smart contract components can be integrated to support and coordinate knowledge-intensive crowdsourcing activities. By removing traditional e-commerce intermediaries, blockchain reduces search friction, knowledge transfer costs, and cheating by task providers or crowdsourcing participants.

ACS Style

Yiwei Gong; Sélinde van Engelenburg; Marijn Janssen. A Reference Architecture for Blockchain-Based Crowdsourcing Platforms. Journal of Theoretical and Applied Electronic Commerce Research 2021, 16, 937 -958.

AMA Style

Yiwei Gong, Sélinde van Engelenburg, Marijn Janssen. A Reference Architecture for Blockchain-Based Crowdsourcing Platforms. Journal of Theoretical and Applied Electronic Commerce Research. 2021; 16 (4):937-958.

Chicago/Turabian Style

Yiwei Gong; Sélinde van Engelenburg; Marijn Janssen. 2021. "A Reference Architecture for Blockchain-Based Crowdsourcing Platforms." Journal of Theoretical and Applied Electronic Commerce Research 16, no. 4: 937-958.

Conference paper
Published: 24 August 2020 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Governance requirements for systems supporting information sharing between businesses and government organisations (B&G) are determined by a high variety of stakeholders with often conflicting interests. These conflicting interests can hamper the introduction and scaling-up of ICT-innovations that change their roles and authorities. We address one such innovation: the introduction of blockchain technologies in the B&G context. Who can govern data and the system depends on several elements of the design of a blockchain-based system, particularly the data structure, consensus mechanism and network topology. Design choices regarding these elements affect who can make decisions and hence we call them blockchain control points. These control points require an explicit and well-understood relationship between the design decisions and the interests of stakeholders. Yet, the literature on blockchain technology and governance does not offer such insight. Therefore, we developed a framework to assess the alignment between stakeholders interest and blockchain design choices. This framework consists of three views and their interrelationships, 1) a stakeholder view providing insight into the tensions between stakeholder’s interests and governance requirements, 2), a governance view on the rights concerning the data and the system, and 3) a blockchain control view describing how design decisions on the control points affect whether governance requirements are met and how parties can exercise their rights. Making these links explicit enables an understanding of how technical design choices can trigger organizational dynamics from the stakeholder view and vice versa. Based on the framework we formulate a research agenda concerning blockchain design choices and governance.

ACS Style

Sélinde Van Engelenburg; Boriana Rukanova; Wout Hofman; Jolien Ubacht; Yao-Hua Tan; Marijn Janssen. Aligning Stakeholder Interests, Governance Requirements and Blockchain Design in Business and Government Information Sharing. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 197 -209.

AMA Style

Sélinde Van Engelenburg, Boriana Rukanova, Wout Hofman, Jolien Ubacht, Yao-Hua Tan, Marijn Janssen. Aligning Stakeholder Interests, Governance Requirements and Blockchain Design in Business and Government Information Sharing. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():197-209.

Chicago/Turabian Style

Sélinde Van Engelenburg; Boriana Rukanova; Wout Hofman; Jolien Ubacht; Yao-Hua Tan; Marijn Janssen. 2020. "Aligning Stakeholder Interests, Governance Requirements and Blockchain Design in Business and Government Information Sharing." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 197-209.

Journal article
Published: 15 November 2018 in Journal of Logical and Algebraic Methods in Programming
Reads 0
Downloads 0

Context-aware systems are systems that have the ability to sense and adapt to the environment. To operate in large-scale multi-stakeholder environments, systems often require context awareness. The context elements that systems in such environments should take into account are becoming ever more complex and go beyond elements like geographic location. In addition, these environments are themselves so complex that it is hard to determine what parts of them belong to the relevant context of a context-aware system. However, insight into what belongs to this context is needed to establish what the design of a context-aware system should be to meet its goal. The ambiguity of what belongs to context in these complex organizational environments causes the design process to become either inefficient or less effective. In this paper, we provide a method to identify what elements of the environment are relevant context and to then base the design on this insight. The proposed method consists of three steps: 1) getting insight into context, 2) determining what components are needed to sense and adapt to context, and 3) determining the rules for how the system should adapt in different situations. To reduce ambiguity by organizations, the method requires a more specified definition of context than the ones in current literature, which we also provide in this paper. In addition to reducing ambiguity, the highly structured way in which the components and rules are derived from insight into context provides a way to further deal with the high complexity of the context. The method was applied for the development of a context-aware system for business-to-government (B2G) information sharing in the container shipping domain. Information sharing in this domain is highly complex, as legislation, many stakeholders, and a mix of cooperation and competition result in a highly complex environment. The development of this B2G information sharing system thus provides an example of how the method can be used to develop a context-aware system in a highly complex environment.

ACS Style

Sélinde van Engelenburg; Marijn Janssen; Bram Klievink. Designing context-aware systems: A method for understanding and analysing context in practice. Journal of Logical and Algebraic Methods in Programming 2018, 103, 79 -104.

AMA Style

Sélinde van Engelenburg, Marijn Janssen, Bram Klievink. Designing context-aware systems: A method for understanding and analysing context in practice. Journal of Logical and Algebraic Methods in Programming. 2018; 103 ():79-104.

Chicago/Turabian Style

Sélinde van Engelenburg; Marijn Janssen; Bram Klievink. 2018. "Designing context-aware systems: A method for understanding and analysing context in practice." Journal of Logical and Algebraic Methods in Programming 103, no. : 79-104.

Conference paper
Published: 02 August 2018 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Business-to-government information exchange has over the past decades greatly benefited from data exchange standards and inter-organisational systems. The data era enables a new shift in the type of information sharing; from formal reporting to opening up full (and big) data sets. This enables new analytics and insights by government, more effective and efficient compliance assessment, and other uses. The emphasis here shifts from establishing formats to deciding what information can be shared, under what conditions, and how to create added value. There are numerous initiatives that explore how to put data to better use for businesses, for government and for their interactions. However, there is limited attention to exactly how these new forms of extensive data sharing affects the supervision relationships. In this paper, we exploratively look across three research projects to identify the implications of information sharing beyond the regulatory requirements (‘over-compliant’). We find that the lack of attention to those implications lead to solutions that are hard to scale up and present unexpected consequences down the line, which may negatively impact the future willingness to explore new potential added value of data sharing.

ACS Style

Bram Klievink; Marijn Janssen; Haiko van der Voort; Sélinde van Engelenburg. Regulatory Compliance and Over-Compliant Information Sharing – Changes in the B2G Landscape. Transactions on Petri Nets and Other Models of Concurrency XV 2018, 249 -260.

AMA Style

Bram Klievink, Marijn Janssen, Haiko van der Voort, Sélinde van Engelenburg. Regulatory Compliance and Over-Compliant Information Sharing – Changes in the B2G Landscape. Transactions on Petri Nets and Other Models of Concurrency XV. 2018; ():249-260.

Chicago/Turabian Style

Bram Klievink; Marijn Janssen; Haiko van der Voort; Sélinde van Engelenburg. 2018. "Regulatory Compliance and Over-Compliant Information Sharing – Changes in the B2G Landscape." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 249-260.

Conference paper
Published: 30 June 2018 in Business Information Systems
Reads 0
Downloads 0

Supply chain management is hampered by a lack of information sharing among partners. Information is not shared as organizations in the supply chain do not have direct contact and/or do not want to share competitive and privacy sensitive information. In addition, companies are often part of multiple supply chains and trading partners vary over time. Blockchains are distributed ledgers in which all parties in a network can have access to data under certain conditions. Private blockchains can be used to support parties in making their demand data directly available to all other parties in their supply chain. These parties can use this data to improve their planning and reduce the bullwhip effect. However, the transparency that blockchain technology offers makes it more difficult to protect sensitive data. The dynamics between these properties are not well understood. In this paper, we design and evaluate a blockchain architecture to explore its feasibility for reducing information asymmetry, while at the same time protecting sensitive data. We found that blockchain technology can allow parties to balance their need for inventory management with their need for flexibility for changing partners. However, measures to protect sensitive data lead either to reduced information, or to reduced speed by which the information can be accessed.

ACS Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink. A Blockchain Architecture for Reducing the Bullwhip Effect. Business Information Systems 2018, 69 -82.

AMA Style

Sélinde Van Engelenburg, Marijn Janssen, Bram Klievink. A Blockchain Architecture for Reducing the Bullwhip Effect. Business Information Systems. 2018; ():69-82.

Chicago/Turabian Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink. 2018. "A Blockchain Architecture for Reducing the Bullwhip Effect." Business Information Systems , no. : 69-82.

Conference paper
Published: 30 May 2018 in Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13
Reads 0
Downloads 0
ACS Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan; Boriana Rukanova. Comparing the openness of archetypical business-to-government information sharing architectures. Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13 2018, 88 .

AMA Style

Sélinde Van Engelenburg, Marijn Janssen, Bram Klievink, Yao-Hua Tan, Boriana Rukanova. Comparing the openness of archetypical business-to-government information sharing architectures. Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13. 2018; ():88.

Chicago/Turabian Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan; Boriana Rukanova. 2018. "Comparing the openness of archetypical business-to-government information sharing architectures." Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13 , no. : 88.

Conference paper
Published: 02 February 2018 in Privacy Enhancing Technologies
Reads 0
Downloads 0

Context-awareness refers to the ability to sense and adapt to context. With the rise of context-aware systems, designers are struggling with what variables should be sensed from the context. According to the definitions found in the literature, whether something belongs to context, has to do with whether it is relevant. However, what it means to be relevant is left implicit in these definitions. Most work on context-aware systems is based on assumptions of the context that should be taken into account. Hence, it is unclear how to decide whether something belongs to context or should be left out. In this paper, first we analyse what is meant with context and provide a definition. In this definition we introduce the notion of a context variable, defined as an attribute of an object that is relevant. Context is then defined as the set of context variables. We establish explicit criteria for deciding whether an attribute of an object is a context variable based on the proposed definition and the designer’s goal. We also provide a straightforward method to help designers to determine whether the criterion is met and a variable should be included in the context. This method is based on filling out a scheme to describe context variables.

ACS Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink. What Belongs to Context? Privacy Enhancing Technologies 2018, 101 -116.

AMA Style

Sélinde Van Engelenburg, Marijn Janssen, Bram Klievink. What Belongs to Context? Privacy Enhancing Technologies. 2018; ():101-116.

Chicago/Turabian Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink. 2018. "What Belongs to Context?" Privacy Enhancing Technologies , no. : 101-116.

Conference paper
Published: 04 August 2017 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Advanced architectures for business-to-government (B2G) information sharing can benefit both businesses and government. An essential choice in the design of such an architecture is whether information is shared using a thick or a thin information flow. In an architecture with a thick flow, all information is shared via a shared infrastructure, whereas only metadata and pointers referring to the information are shared via the shared infrastructure in a thin flow architecture. These pointers can then be used by parties to access the information directly. Yet, little is known about what their implications for design choices are. Design choices are influenced by the properties of the architecture as well as the situation in which B2G information sharing takes place. In this paper, we identify the properties of architectures with a thin and thick flow. Next, we determine what this implies for the suitability of the architectures in different situations. We will base our analysis on the case of the Shipping Information Pipeline (SIP) for container transport. While both architectures have their pros and cons, we found that architectures with a thin flow are more suitable when non-standardized, and flexible sharing of sensitive information is required. In contrast, we found that architectures with a thick flow are more suitable when in-depth integration is required.

ACS Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan. Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow. Transactions on Petri Nets and Other Models of Concurrency XV 2017, 10428, 228 -239.

AMA Style

Sélinde Van Engelenburg, Marijn Janssen, Bram Klievink, Yao-Hua Tan. Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow. Transactions on Petri Nets and Other Models of Concurrency XV. 2017; 10428 ():228-239.

Chicago/Turabian Style

Sélinde Van Engelenburg; Marijn Janssen; Bram Klievink; Yao-Hua Tan. 2017. "Comparing a Shipping Information Pipeline with a Thick Flow and a Thin Flow." Transactions on Petri Nets and Other Models of Concurrency XV 10428, no. : 228-239.

Article
Published: 27 July 2017 in Journal of Intelligent Information Systems
Reads 0
Downloads 0

To ensure public safety and security, it is vitally important for governments to collect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share additional information for fear of sharing competitively sensitive information, becoming liable and not being compliant with the law. These reasons are often overlooked in the design of software architectures for information sharing. In the present research, we followed a design science approach to develop a software architecture for business-to-government information sharing. Based on literature and a case study, we elicited the requirements an architecture that provides for the sharing of information should meet to make it acceptable to businesses. We then developed the architecture and evaluated it against the requirements. The architecture consists of a blockchain that stores events and rules for information sharing that are controlled by businesses. For each event, two parties use their private keys to encrypt its Merkle root to confirm that they know the data are correct. This makes it easy to check whether information is reliable and whether an event should be accepted. Access control, metadata and context information enable the context-based sharing of information. This is combined with the encryption and decryption of data to provide access to certain data within an organisation.

ACS Style

Sélinde Van Engelenburg; M.F.W.H.A. Janssen; Bram Klievink. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems 2017, 52, 595 -618.

AMA Style

Sélinde Van Engelenburg, M.F.W.H.A. Janssen, Bram Klievink. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems. 2017; 52 (3):595-618.

Chicago/Turabian Style

Sélinde Van Engelenburg; M.F.W.H.A. Janssen; Bram Klievink. 2017. "Design of a software architecture supporting business-to-government information sharing to improve public safety and security." Journal of Intelligent Information Systems 52, no. 3: 595-618.

Conference paper
Published: 01 January 2015 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design science approach to develop an software architecture that is acceptable by businesses. From a case study we derive the requirements an architecture should meet in order to contribute to increasing willingness to share information. In this paper the architecture is developed and evaluated according to the requirements. We recommend the use of different types of business rules that provide businesses with control over their data, in combination with encryption and decryption of data to provide access to parts of the data within an organization.

ACS Style

Sélinde van Engelenburg; Marijn Janssen; Bram Klievink. Design of a Business-to-Government Information Sharing Architecture Using Business Rules. Transactions on Petri Nets and Other Models of Concurrency XV 2015, 124 -138.

AMA Style

Sélinde van Engelenburg, Marijn Janssen, Bram Klievink. Design of a Business-to-Government Information Sharing Architecture Using Business Rules. Transactions on Petri Nets and Other Models of Concurrency XV. 2015; ():124-138.

Chicago/Turabian Style

Sélinde van Engelenburg; Marijn Janssen; Bram Klievink. 2015. "Design of a Business-to-Government Information Sharing Architecture Using Business Rules." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 124-138.