{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:40:08Z","timestamp":1748806808041,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031942624","type":"print"},{"value":"9783031942631","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94263-1_15","type":"book-chapter","created":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:14:27Z","timestamp":1748805267000},"page":"251-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Digital Product Supply Chain: Demonstrating Digital Sovereignty in\u00a0Real-World Scenarios"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9227-8773","authenticated-orcid":false,"given":"Razvan","family":"Hrestic","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3040-1764","authenticated-orcid":false,"given":"Manfred","family":"Hofmeier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3184","authenticated-orcid":false,"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"15_CR1","unstructured":"AISBL, G.X.E.A.f.D., Cloud: Gaia-X Dataspaces (2025). https:\/\/gaia-x.eu\/what-is-gaia-x\/. Accessed 29 Mar 2025"},{"issue":"2","key":"15_CR2","first-page":"1","volume":"35","author":"A Albizri","year":"2021","unstructured":"Albizri, A., Appelbaum, D.: Trust but verify: the oracle paradox of blockchain smart contracts. J. Inf. Syst. 35(2), 1\u201316 (2021)","journal-title":"J. Inf. Syst."},{"key":"15_CR3","unstructured":"Alliance, O.: Sovereign Cloud Stack Initiative (2024). https:\/\/scs.community\/index.html. Accessed 27 Jan 2025"},{"key":"15_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108738","volume":"109","author":"M Alsadi","year":"2023","unstructured":"Alsadi, M., Arshad, J., Ali, J., Prince, A., Shishank, S.: Trucert: blockchain-based trustworthy product certification within autonomous automotive supply chains. Comput. Electr. Eng. 109, 108738 (2023)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.3390\/su15032109","volume":"15","author":"A Chandan","year":"2023","unstructured":"Chandan, A., John, M., Potdar, V.: Achieving UN SDGs in food supply chain using blockchain technology. Sustainability 15(3), 2109 (2023)","journal-title":"Sustainability"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"157113","DOI":"10.1109\/ACCESS.2019.2949951","volume":"7","author":"P Cui","year":"2019","unstructured":"Cui, P., Dixon, J., Guin, U., Dimase, D.: A blockchain-based framework for supply chain provenance. IEEE Access 7, 157113\u2013157125 (2019)","journal-title":"IEEE Access"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Fries, I., Greiner, M., Hofmeier, M., Hrestic, R., Lechner, U., Wendeborn, T.: Towards a layer model for digital sovereignty: a holistic approach. In: H\u00e4mmerli, B., Helmbrecht, U., Hommel, W., Kunczik, L., Pickl, S. (eds.) Critical Information Infrastructures Security (LNCS), pp. 119\u2013139. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-35190-7_9"},{"key":"15_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2024.107948","volume":"212","author":"E Gervais","year":"2025","unstructured":"Gervais, E., Sprecher, B., Nold, S., Brailovsky, P., Kleijn, R.: Tracing the propagation of disruptions in supply chain scenarios: a case study of photovoltaics diversification. Resour. Conserv. Recycl. 212, 107948 (2025)","journal-title":"Resour. Conserv. Recycl."},{"issue":"9","key":"15_CR9","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1108\/IJPDLM-11-2018-0371","volume":"49","author":"A Gurtu","year":"2019","unstructured":"Gurtu, A., Johny, J.: Potential of blockchain technology in supply chain management: a literature review. Int. J. Phys. Distrib. Logist. Manag. 49(9), 881\u2013900 (2019)","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Hellmeier, M., von Scherenberg, F.: A delimitation of data sovereignty from digital and technological sovereignty. In: Proceedings of the European Conference on Information Systems (ECIS) (2023)","DOI":"10.1007\/s12525-024-00693-4"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 75\u2013105 (2004)","DOI":"10.2307\/25148625"},{"issue":"3","key":"15_CR12","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1515\/ngs-2021-0015","volume":"16","author":"M Kaloudis","year":"2022","unstructured":"Kaloudis, M.: Sovereignty in the digital age-how can we measure digital sovereignty and support the EU\u2019s action plan? New Glob. Stud. 16(3), 275\u2013299 (2022)","journal-title":"New Glob. Stud."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Kamilaris, A., Fonts, A., Prenafeta-Bold$$\\acute{\\nu }$$, F.X.: The rise of blockchain technology in agriculture and food supply chains. Trends Food Sci. Technol. 91, 640\u2013652 (2019)","DOI":"10.1016\/j.tifs.2019.07.034"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Klare, M., Lechner, U.: Digital sovereignty: affordances in open source projects. In: Papatheocharous, E., Farshidi, S., Jansen, S., Hyrynsalmi, S. (eds.) 15th International Conference on Software Business (ICSOB 2024). LNBIP, vol.\u00a053, pp. 20\u201334. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-85849-9_2","DOI":"10.1007\/978-3-031-85849-9_2"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Klare, M., Verlande, L., Greiner, M., Lechner, U.: How blockchain and artificial intelligence influence digital sovereignty. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, pp. 3\u201316. Springer (2022)","DOI":"10.1007\/978-3-031-30694-5_1"},{"issue":"4","key":"15_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s12599-014-0334-4","volume":"6","author":"H Lasi","year":"2014","unstructured":"Lasi, H., Fettke, P., Kemper, H.-G., Feld, T., Hoffmann, M.: Industry 4.0. Bus. Inf. Syst. Eng. 6(4), 239\u2013242 (2014). https:\/\/doi.org\/10.1007\/s12599-014-0334-4","journal-title":"Bus. Inf. Syst. Eng."},{"key":"15_CR17","unstructured":"Lass, S., Bender, B.: Dedicated data sovereignty as enabler for platform-based business models. ESSN: 2701-6277 (2021)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Leipold, B., Haunschild, I.M.: Soziale Mediennutzung und digitales Sicherheitsverhalten bei Berufst\u00e4tigen: Die Rolle motivationaler Variablen. In: Individuen in digitalen Arbeitswelten: Interdisziplin\u00e4re Perspektiven auf Individuum und Organisation, pp. 265\u2013282. Springer (2024)","DOI":"10.1007\/978-3-658-44612-3_13"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"March, C., Schieferdecker, I.: Technological sovereignty as ability, not autarky. Int. Stud. Rev. 25(2), viad012 (2023)","DOI":"10.1093\/isr\/viad012"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Mylrea, M., Gourisetti, S.N.G.: Blockchain for supply chain cybersecurity, optimization and compliance. In: Resilience Week (RWS), pp. 70\u201376. IEEE (2018)","DOI":"10.1109\/RWEEK.2018.8473517"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Nuerk, J., Da\u0159ena, F.: Systems engineering methodology for digital supply chain business models. Syst. Eng. (2025)","DOI":"10.1002\/sys.21802"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Otto, B., Hompel, M.t., Wrobel, S.: International data spaces: reference architecture for the digitization of industries. Digit. Transform. 109\u2013128 (2019)","DOI":"10.1007\/978-3-662-58134-6_8"},{"key":"15_CR23","unstructured":"Pan, B., Zhang, L., Li, C., Chen, L.: Supply chain management system\u2019s cybersecurity based on blockchain technology. Int. J. Sci. Adv. Technol. 11 (2023)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Posch, R.: Digital sovereignty and IT-security for a prosperous society. In: Informatics in the Future: Proceedings of the 11th European Computer Science Summit (ECSS 2015), pp. 77\u201386. Springer International Publishing, Cham (2017)","DOI":"10.1007\/978-3-319-55735-9_7"},{"issue":"2","key":"15_CR25","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1108\/SCM-03-2018-0143","volume":"25","author":"MM Queiroz","year":"2020","unstructured":"Queiroz, M.M., Telles, R., Bonilla, S.H.: Blockchain and supply chain management integration: a systematic review of the literature. Supply Chain Manag. Int. J. 25(2), 241\u2013254 (2020)","journal-title":"Supply Chain Manag. Int. J."},{"key":"15_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107334","volume":"157","author":"K Reddy","year":"2021","unstructured":"Reddy, K., Gunasekaran, A., Kalpana, P., Sreedharan, V.R., Kumar, S.A.: Developing a blockchain framework for the automotive supply chain: a systematic review. Comput. Ind. Eng. 157, 107334 (2021)","journal-title":"Comput. Ind. Eng."},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Seidenfad, K., Hoiss, T., Lechner, U.: A blockchain to bridge business information systems and industrial automation environments in supply chains. In: Proceedings of Innovations for Community Services: 21st International Conference, I4CS 2021, Bamberg, Germany, 26\u201328 May 2021, pp. 22\u201340. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-75004-6_3"},{"key":"15_CR28","unstructured":"Thieulin, B.: Towards a European digital sovereignty policy. Opin. Paris France Econ. Soc. Environ. Counc. 13 (2019)"},{"issue":"2","key":"15_CR29","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/52.663783","volume":"15","author":"K Weidenhaupt","year":"1998","unstructured":"Weidenhaupt, K., Pohl, K., et al.: Scenarios in system development: current practice. IEEE Softw. 15(2), 34\u201345 (1998)","journal-title":"IEEE Softw."},{"issue":"3","key":"15_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3315571","volume":"24","author":"X Xu","year":"2019","unstructured":"Xu, X., Rahman, F., Shakya, B., Vassilev, A., Forte, D., Tehranipoor, M.: Electronics supply chain integrity enabled by blockchain. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 24(3), 1\u201325 (2019)","journal-title":"ACM Trans. Des. Autom. Electron. Syst. (TODAES)"}],"container-title":["Communications in Computer and Information Science","Innovations for Community Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94263-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:14:33Z","timestamp":1748805273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94263-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031942624","9783031942631"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94263-1_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"I4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations for Community Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i4cs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.i4cs-conference.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}