{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T21:20:54Z","timestamp":1768598454775,"version":"3.49.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032145178","type":"print"},{"value":"9783032145185","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T00:00:00Z","timestamp":1768608000000},"content-version":"vor","delay-in-days":16,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-14518-5_4","type":"book-chapter","created":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:13:13Z","timestamp":1768551193000},"page":"32-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["What Are Digital Identities in Practice? Initial Insight from Finnish B2B Software Companies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6118-8944","authenticated-orcid":false,"given":"Eerika","family":"Peltonen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1715-6250","authenticated-orcid":false,"given":"Sonja M.","family":"Hyrynsalmi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7043-0458","authenticated-orcid":false,"given":"Kari","family":"Smolander","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,17]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Alp\u00e1r, G., Hoepman, J.-H., Siljee, J.: The identity crisis security, privacy and usability issues in identity management. J. Inf. Syst. Secur. 9(1), 23\u201353 (2013). https:\/\/doi.org\/10.48550\/arXiv.1101.0427","DOI":"10.48550\/arXiv.1101.0427"},{"key":"4_CR2","unstructured":"Natarajan, H., Appaya, M.S., Balasubramanian, S.: Digital Identity Onboarding (2018)"},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.infoecopol.2006.04.002","volume":"18","author":"ML Mueller","year":"2006","unstructured":"Mueller, M.L., Park, Y., Lee, J., Kim, T.-Y.: Digital identity: how users value the attributes of online identifiers. Inf. Econ. Policy 18(4), 405\u2013422 (2006). https:\/\/doi.org\/10.1016\/j.infoecopol.2006.04.002","journal-title":"Inf. Econ. Policy"},{"key":"4_CR4","unstructured":"European Commission: European Digital Identity (EUDI) Regulation. https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/eudi-regulation. Last accessed 19 July 2024"},{"issue":"2","key":"4_CR5","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131\u2013164 (2009). https:\/\/doi.org\/10.1007\/s10664-008-9102-8","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infoandorg.2010.11.001","volume":"21","author":"U Schultze","year":"2011","unstructured":"Schultze, U., Avital, M.: Designing interviews to generate rich data for information systems research. Inf. Organ. 21(1), 1\u201316 (2011). https:\/\/doi.org\/10.1016\/j.infoandorg.2010.11.001","journal-title":"Inf. Organ."},{"key":"4_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69909-7_3470-2","volume-title":"Thematic Analysis: A Practical Guide","author":"V Braun","year":"2022","unstructured":"Braun, V., Clarke, V.: Thematic Analysis: A Practical Guide. SAGE Publications, London (2022)"},{"key":"4_CR8","unstructured":"Grayson, T.R.D.: Philosophy of Identity. https:\/\/timothygrayson.com\/PDFs\/PhilosophyOfIdentity.pdf. Last accessed 18 Nov 2024"},{"key":"4_CR9","unstructured":"Bakhaev, S., Naqvi, B., Wolff, A., Smolander, K.: Co-creating requirements for the emerging electronic identity management platform. In: 14th Scandinavian Conference on Information Systems, pp. 1\u201315. AIS, Porvoo, Finland (2023). https:\/\/aisel.aisnet.org\/scis2023\/1"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.indmarman.2024.03.007","volume":"119","author":"K Swani","year":"2024","unstructured":"Swani, K., Labrecque, L., Markos, E.: Are B2B data breaches concerning? Consequences of buyer\u2019s or firm\u2019s data loss on buyer and supplier related outcomes. Ind. Mark. Manage. 119, 43\u201361 (2024). https:\/\/doi.org\/10.1016\/j.indmarman.2024.03.007","journal-title":"Ind. Mark. Manage."}],"container-title":["Lecture Notes in Business Information Processing","Software Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-14518-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:13:18Z","timestamp":1768551198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-14518-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032145178","9783032145185"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-14518-5_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"17 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stuttgart","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsob2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsob2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}