{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T11:45:55Z","timestamp":1750419955963,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031306938"},{"type":"electronic","value":"9783031306945"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30694-5_1","type":"book-chapter","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T06:03:12Z","timestamp":1681884192000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["How Blockchain and\u00a0Artificial Intelligence influence Digital Sovereignty"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6098-7917","authenticated-orcid":false,"given":"Martha","family":"Klare","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2807-7777","authenticated-orcid":false,"given":"Lisa","family":"Verlande","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3830-7000","authenticated-orcid":false,"given":"Maximilian","family":"Greiner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3184","authenticated-orcid":false,"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,20]]},"reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s10479-020-03620-w","volume":"308","author":"S Akter","year":"2020","unstructured":"Akter, S., Michael, K., Uddin, M.R., McCarthy, G., Rahman, M.: Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics. Ann. Oper. Res. 308(1), 7\u201339 (2020). https:\/\/doi.org\/10.1007\/s10479-020-03620-w","journal-title":"Ann. Oper. Res."},{"key":"1_CR2","unstructured":"Blossfeld, H.P., et al.: Digitale Souver\u00e4nit\u00e4t und Bildung. Waxmann, Gutachten. M\u00fcnster (2018)"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s12525-020-00421-8","volume":"30","author":"RWH Bons","year":"2020","unstructured":"Bons, R.W.H., Versendaal, J., Zavolokina, L., Shi, W.L.: Potential and limits of Blockchain technology for networked businesses. Electron. Mark. 30(2), 189\u2013194 (2020). https:\/\/doi.org\/10.1007\/s12525-020-00421-8","journal-title":"Electron. Mark."},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Bruckner, F., Howar, F.: Utilizing remote evaluation for providing data sovereignty in data-sharing ecosystems. In: 54th Hawaii International Conference on System Sciences (2021). https:\/\/doi.org\/10.24251\/HICSS.2021.842","DOI":"10.24251\/HICSS.2021.842"},{"key":"1_CR5","unstructured":"Buhl, H.U., Schweizer, A., Urbach, N.: Blockchain-Technologie als Schl\u00fcssel f\u00fcr die Zukunft. Zeitschrift f\u00fcr das gesamte Kreditwesen 12 (2017)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Calp, M.H.: The role of artificial intelligence within the scope of digital transformation in enterprises. In: Advanced MIS and Digital Transformation for Increased Creativity and Innovation in Business. IGI Global (2020)","DOI":"10.4018\/978-1-5225-9550-2.ch006"},{"issue":"1","key":"1_CR7","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s13132-020-00719-0","volume":"13","author":"EG Carayannis","year":"2022","unstructured":"Carayannis, E.G., Christodoulou, K., Christodoulou, P., Chatzichristofis, S.A., Zinonos, Z.: Known unknowns in an era of technological and viral disruptions-implications for theory, policy, and practice. J. Knowl. Econ. 13(1), 587\u2013610 (2022)","journal-title":"J. Knowl. Econ."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Chatterjee, R.: An overview of the emerging technology: blockchain. In: 3rd International Conference on Computational Intelligence and Networks (CINE). IEEE (2017)","DOI":"10.1109\/CINE.2017.33"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Circiumaru, A.: The EU\u2019s digital sovereignty-the role of artificial intelligence and competition policy. SSRN: 3831815 (2021)","DOI":"10.2139\/ssrn.3831815"},{"key":"1_CR11","unstructured":"Dalmolen, S., Bastiaansen, H., Kollenstart, M., Punter, M.: Infrastructural sovereignty over agreement and transaction data (\u2019metadata\u2019) in an open network-model for multilateral sharing of sensitive data. In: 40th International Conference on Information Systems, ICIS 2019. Association for Information Systems (2020)"},{"key":"1_CR12","volume-title":"Datenstrategie der Bundesregierung: Eine Innovationsstrategie f\u00fcr gesellschaftlichen Fortschritt und nachhaltiges Wachstum","author":"D Bundesregierung","year":"2021","unstructured":"Bundesregierung, D.: Datenstrategie der Bundesregierung: Eine Innovationsstrategie f\u00fcr gesellschaftlichen Fortschritt und nachhaltiges Wachstum. Bundeskanzleramt, Berlin (2021)"},{"key":"1_CR13","volume-title":"Digitale Souver\u00e4nit\u00e4t: Positionsbestimmung und erste Handlungsempfehlungen f\u00fcr Deutschland und Europa","author":"G Diekmann","year":"2015","unstructured":"Diekmann, G.: Digitale Souver\u00e4nit\u00e4t: Positionsbestimmung und erste Handlungsempfehlungen f\u00fcr Deutschland und Europa. Bitkom, Berlin (2015)"},{"issue":"4","key":"1_CR14","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s12399-020-00829-2","volume":"13","author":"G Dreo","year":"2020","unstructured":"Dreo, G., Eiseler, V., Gehrke, W., Helmbrecht, U., Hommel, W., Zahn, J., et al.: Europ\u00e4ische Digitale Souver\u00e4nit\u00e4t: Weg zum Erfolg?-Ein Bericht zur Jahrestagung CODE 2020. Zeitschrift f\u00fcr Au\u00dfen-und Sicherheitspolitik 13(4), 399\u2013404 (2020)","journal-title":"Zeitschrift f\u00fcr Au\u00dfen-und Sicherheitspolitik"},{"key":"1_CR15","unstructured":"Europ\u00e4ische Kommission, Generaldirektion Kommunikationsnetze, Inhalte und Technologien Kommission: Ethikleitlinien f\u00fcr eine vertrauensw\u00fcrdige KI. Publications Office (2019). https:\/\/doi.org\/data.europa.eu\/doi\/10.2759\/22710"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Friedrichsen, M., Bisa, P.J. (eds.): Digitale Souver\u00e4nit\u00e4t. Springer Fachmedien Wiesbaden, Wiesbaden (2016). https:\/\/doi.org\/10.1007\/978-3-658-07349-7, http:\/\/link.springer.com\/10.1007\/978-3-658-07349-7","DOI":"10.1007\/978-3-658-07349-7"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Fries, I., Greiner, M., Hofmeier, M., Hrestic, R., Lechner, U., Wendeborn, T.: Towards a layer model for digital sovereignty: a holistic approach. In: Proceedings of the 17th International Conference on Critical Information Infrastructures Security (CRITIS 2022). Springer (2022). in preparation","DOI":"10.1007\/978-3-031-35190-7_9"},{"key":"1_CR18","unstructured":"Fritzsche, K., Pohle, J., Bauer, S., Haenel, F., Eichbaum, F.: Digitalisierung nachhaltig und souver\u00e4n gestalten. DINA, Positionspapier, CO (2022)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Glasze, G., Odzuck, E., Staples, R. (eds.): Was hei\u00dft digitale Souver\u00e4nit\u00e4t?: Diskurse, Praktiken und Voraussetzungen \u00bbindividueller\u00ab und \u00bbstaatlicher Souver\u00e4nit\u00e4t\u00ab im digitalen Zeitalter. Transcript Verlag (2022)","DOI":"10.1515\/9783839458273"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Hartmann, E.A.: Digitale Souver\u00e4nit\u00e4t: Soziotechnische Bewertung und Gestaltung von Anwendungen algorithmischer Systeme. In: Digitalisierung souver\u00e4n gestalten II. Springer Vieweg, Berlin, Heidelberg (2022)","DOI":"10.1007\/978-3-662-64408-9_1"},{"key":"1_CR21","unstructured":"Kagermann, H., Streibich, K.H.: Digitale Souver\u00e4nit\u00e4t - Status quo und Handlungsfelder. acatech IMPULS (2021)"},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/joitmc5030044","volume":"5","author":"J Lee","year":"2019","unstructured":"Lee, J., Suh, T., Roy, D., Baucus, M.: Emerging technology and business model innovation: the case of artificial intelligence. J. Open Innov. Technol. Market Complex. 5(3), 44 (2019)","journal-title":"J. Open Innov. Technol. Market Complex."},{"key":"1_CR23","volume-title":"Marketing Research","author":"DR Lehmann","year":"1998","unstructured":"Lehmann, D.R., Gupta, S., Steckel, J.H., Gupta, S.: Marketing Research. Addison-Wesley Reading, Boston (1998)"},{"issue":"6","key":"1_CR24","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Ind. Inf. 16(6), 4177\u20134186 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Massaro, M.: Digital transformation in the healthcare sector through blockchain technology. Insights Acad. Res. Bus. Dev. Technovation, 102386 (2021)","DOI":"10.1016\/j.technovation.2021.102386"},{"key":"1_CR26","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics. PMLR (2017)"},{"key":"1_CR27","volume-title":"Letter to the President-Digital Sovereignty","author":"A Merkel","year":"2021","unstructured":"Merkel, A., Frederiksen, M., Marin, S., Kallas, K.: Letter to the President-Digital Sovereignty. European Commission, Berlin (2021)"},{"key":"1_CR28","unstructured":"M\u00fcller-B\u00f6ling, D., Klandt, H.: Methoden empirischer Wirtschafts-und Sozialforschung. Eine Einf\u00fchrung mit wirtschaftswissenschaftlichem Schwerpunkt 3 (1996)"},{"key":"1_CR29","unstructured":"Philipp, U.: Schriftliche Frage an die Bundesregierung (2022). https:\/\/mdb.anke.domscheit-berg.de\/wp-content\/uploads\/2022\/03\/1-76-Domscheit-BergGeschwaerzt.pdf"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Pohle, J.: Digital sovereignty. a new key concept of digital policy in Germany and Europe. Konrad-Adenauer-Stiftung, Berlin (2020)","DOI":"10.14763\/2020.4.1532"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Pohle, J., Thiel, T.: Digitale Souver\u00e4nit\u00e4t \u2013 Von der Karriere eines einenden und doch problematischen Konzepts. In: Der Wert der Digitalisierung: Gemeinwohl in der digitalen Welt. Bielefeld: Transcript Verlag (2021)","DOI":"10.1515\/9783839456590-014"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Shinde, P.P., Shah, S.: A review of machine learning and deep learning applications. In: 4th International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE (2018)","DOI":"10.1109\/ICCUBEA.2018.8697857"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Vogt, R.: Digitale Souver\u00e4nit\u00e4t und K\u00fcnstliche Intelligenz f\u00fcr den Menschen. In: Digitalisierung souver\u00e4n gestalten. Springer Vieweg, Berlin (2021)","DOI":"10.1007\/978-3-662-62377-0_11"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Weber, H.: Digitale Souver\u00e4nit\u00e4t. Informatik Spektrum 1\u201312 (2022)","DOI":"10.1007\/s00287-022-01439-2"},{"key":"1_CR35","volume-title":"IT Governance: How Top Performers Manage IT Decision Rights for Superior Results","author":"P Weill","year":"2004","unstructured":"Weill, P., Ross, J.W.: IT Governance: How Top Performers Manage IT Decision Rights for Superior Results. Harvard Business Press, Boston (2004)"},{"issue":"1","key":"1_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40854-019-0147-z","volume":"5","author":"M Xu","year":"2019","unstructured":"Xu, M., Chen, X., Kou, G.: A systematic review of blockchain. Fin. Innov. 5(1), 1\u201314 (2019). https:\/\/doi.org\/10.1186\/s40854-019-0147-z","journal-title":"Fin. Innov."}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30694-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T23:39:19Z","timestamp":1702251559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30694-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031306938","9783031306945"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30694-5_1","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easyacademic.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"136","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}