{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:11:23Z","timestamp":1742911883595,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031715143"},{"type":"electronic","value":"9783031715150"}],"license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71515-0_7","type":"book-chapter","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:24:47Z","timestamp":1729005887000},"page":"91-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Compliance Risk to Business Model - Cloud Sovereignty as a Door Opener for the EU Market"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Hofer","sequence":"first","affiliation":[]},{"given":"Georg","family":"Herzwurm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,16]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.21552\/EDPL\/2016\/3\/4","volume":"2","author":"JP Albrecht","year":"2016","unstructured":"Albrecht, J.P.: How the GDPR will change the world. Eur. Data Prot. Law Rev. 2, 287\u2013289 (2016)","journal-title":"Eur. Data Prot. Law Rev."},{"key":"7_CR2","unstructured":"Daskal, J.: Microsoft Ireland, the CLOUD Act, and International Lawmaking 2.0. (2018)"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Voigt, P., Von dem Bussche, A.: The EU general data protection regulation (GDPR). Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57959-7","DOI":"10.1007\/978-3-319-57959-7"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Hummel, P., Braun, M., Tretter, M., Dabrock, P.: Data Sovereignty: A Review. Big Data Soc. 8 (2021)","DOI":"10.1177\/2053951720982012"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Christakis, T.: \u201cEuropean Digital Sovereignty\u201d: Successfully Navigating Between the \u201cBrussels Effect\u201d and Europe\u2019s Quest for Strategic Autonomy (2020)","DOI":"10.2139\/ssrn.3748098"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30056-3","volume":"2016","author":"C Tankard","year":"2016","unstructured":"Tankard, C.: What the GDPR means for businesses. Netw. Secur. 2016, 5\u20138 (2016)","journal-title":"Netw. Secur."},{"key":"7_CR7","unstructured":"European Commission: Data Act: Proposal for a Regulation on harmonised rules on fair access to and use of data (2022)"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Blancato, F.G.: The cloud sovereignty nexus: how the European Union seeks to reverse strategic dependencies in its digital ecosystem. Policy Internet, 1\u201321 (2023). https:\/\/doi.org\/10.1002\/poi3.358","DOI":"10.1002\/poi3.358"},{"key":"7_CR9","unstructured":"Court of Justice of the European Union: Judgment of the Court (Grand Chamber) of 16 July 2020, Data Protection Commissioner v Facebook Ireland Limited and Maximillian Schrems, Case C-311\/18 (2020)"},{"key":"7_CR10","unstructured":"European Commission: EU-US Data Privacy Framework (2023)"},{"key":"7_CR11","unstructured":"Deutscher Bundestag, Wissenschaftliche Dienste: Herausgabepflichten von Daten und Informationen an US-amerikanische Sicherheitsbeh\u00f6rden (2024)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MNET.2021.9387709","volume":"35","author":"A Braud","year":"2021","unstructured":"Braud, A., Fromentoux, G., Radier, B., Le Grand, O.: The road to European digital sovereignty with Gaia-X and IDSA. IEEE Network 35, 4\u20135 (2021)","journal-title":"IEEE Network"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Urban, M., Garloff, K.: Sovereign cloud stack 46, 616\u2013621 (2022). https:\/\/doi.org\/10.1007\/s11623-022-1669-5","DOI":"10.1007\/s11623-022-1669-5"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Irwin, A., Ungar, D.: Digital sovereignty and governance in the data economy: data trusteeship instead of property rights on data (2023). https:\/\/doi.org\/10.1007\/978-3-662-65974-8_15","DOI":"10.1007\/978-3-662-65974-8_15"},{"key":"7_CR15","unstructured":"T-Systems International GmbH: Public Cloud IM \u00f6ffentlichen Sektor. https:\/\/cloud.telekom.de\/de\/resource\/open-telekom-cloud-whitepaper-public-sector"},{"key":"7_CR16","unstructured":"Warsmann, J.-L., Latombe, P.: Rapport d\u2019information parla Mission d'information sur le th\u00e9me \u201cB\u00e2tir et promouvoir une souverainete\u0300 num\u00e8rique nationale et europ\u00e8enne\u201d (2021)"},{"key":"7_CR17","unstructured":"Nextcloud GmbH: Nextcloud Solution Architecture (2018)"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.clsr.2012.09.007","volume":"28","author":"SY Esayas","year":"2012","unstructured":"Esayas, S.Y.: A walk into the cloud and cloudy it remains: the challenges and prospects of \u2018processing\u2019 and \u2018transferring\u2019 personal data. Comput. Law Secur. Rev. 28, 662\u2013678 (2012). https:\/\/doi.org\/10.1016\/j.clsr.2012.09.007","journal-title":"Comput. Law Secur. Rev."},{"key":"7_CR19","first-page":"619","volume":"3","author":"MP Johnston","year":"2017","unstructured":"Johnston, M.P.: Secondary data analysis: a method of which the time has come. Qual. Quant. Methods Libr. 3, 619\u2013626 (2017)","journal-title":"Qual. Quant. Methods Libr."},{"key":"7_CR20","unstructured":"Smith, E.: Using Secondary Data in Educational and Social Research. McGraw-Hill Education (UK) (2008)"},{"key":"7_CR21","unstructured":"IDC: IDC Forecasts Worldwide Public Cloud Services Spending to Reach $1.35 Trillion in 2027 (2023)"},{"key":"7_CR22","unstructured":"Research and Markets: Global Cloud Infrastructure Services Market (2023\u20132028) Competitive Analysis, Impact of Economic Slowdown & Impending Recession, Ansoff Analysis (2024)"},{"key":"7_CR23","unstructured":"Gartner: Forecast: Public Cloud Services, Worldwide, 2021\u20132027, 4Q23 Update (2023)"},{"key":"7_CR24","unstructured":"Lundborg, M., Gull, I., Baischew, D.: Strategische Bedeutung von Cloud-Diensten f\u00fcr die digitale Souver\u00e4nit\u00e4t von KMU. Teil 1 - Markt\u00fcbersicht Cloud-Anbieter (2022)"},{"key":"7_CR25","unstructured":"PwC: How businesses will unlock the transformational power of cloud: PwC EMEA Cloud Business Survey 2023. https:\/\/www.pwc.com\/gx\/en\/issues\/technology\/cloud-business-survey.pdf"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Joshua, S., Gans, J., Mika\u00ebl, H.: Economic analysis of proposed regulations of cloud ser- vices in Europe. Eur. Competition J. 1, 1\u201347 (2023). https:\/\/doi.org\/10.1080\/17441056.2023.2228668","DOI":"10.1080\/17441056.2023.2228668"},{"key":"7_CR27","unstructured":"Capgemini Research Institute: The Journey to Cloud Sovereignty: Assessing Cloud Potential to Drive Transformation and Build Trust (2022)"},{"key":"7_CR28","unstructured":"Synergy Research Group: Cloud Market Gets its Mojo Back; AI Helps Push Q4 Increase in Cloud Spending to New Highs. https:\/\/www.srgresearch.com\/articles\/cloud-market-gets-its-mojo-back-q4-increase-in-cloud-spending-reaches-new-highs. Accessed 23 May 2024"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. In: Information Sciences, pp. 357\u2013383. Elsevier (2015)","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"101469","DOI":"10.1016\/j.is.2019.101469","volume":"91","author":"DA Tamburri","year":"2020","unstructured":"Tamburri, D.A.: Design principles for the General Data Protection Regulation (GDPR): a formal concept analysis and its evaluation. Inf. Syst. 91, 101469\u2013101470 (2020)","journal-title":"Inf. Syst."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Alruwaili, F.F., Gulliver, T.A.: Secure migration to compliant cloud services: a case study. J. Inf. Secur. Appl., 50\u201364 (2018)","DOI":"10.1016\/j.jisa.2017.11.004"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TCC.2014.2344653","volume":"4","author":"K Djemame","year":"2014","unstructured":"Djemame, K., Armstrong, D., Guitart, J., Macias, M.: A risk assessment framework for cloud computing. IEEE Trans. Cloud Comput. 4, 265\u2013278 (2014)","journal-title":"IEEE Trans. Cloud Comput."}],"container-title":["Lecture Notes in Business Information Processing","Digital Product Management in the Era of Data Economy, Artificial Intelligence, and Ecosystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71515-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:27:47Z","timestamp":1729006067000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71515-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"ISBN":["9783031715143","9783031715150"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71515-0_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2024,10,16]]},"assertion":[{"value":"16 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Product Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdpm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/digitalproductmanagementweek.org\/icdpm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}