{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:35:35Z","timestamp":1743089735865,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319986890"},{"type":"electronic","value":"9783319986906"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98690-6_21","type":"book-chapter","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T14:48:51Z","timestamp":1533134931000},"page":"249-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Regulatory Compliance and Over-Compliant Information Sharing \u2013 Changes in the B2G Landscape"],"prefix":"10.1007","author":[{"given":"Bram","family":"Klievink","sequence":"first","affiliation":[]},{"given":"Marijn","family":"Janssen","sequence":"additional","affiliation":[]},{"given":"Haiko","family":"van der Voort","sequence":"additional","affiliation":[]},{"given":"S\u00e9linde","family":"van Engelenburg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,2]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.giq.2012.08.006","volume":"30","author":"N Bharosa","year":"2013","unstructured":"Bharosa, N., et al.: Tapping into existing information flows: the transformation to compliance by design in business-to-government information exchange. Gov. Inf. Q. 30, 9\u201318 (2013)","journal-title":"Gov. Inf. Q."},{"key":"21_CR2","volume-title":"Challenging the Chain: Governing the Automated Exchange and Processing of Business Information","author":"N Bharosa","year":"2015","unstructured":"Bharosa, N., van Wijk, R., de Winne, N., Janssen, M.: Challenging the Chain: Governing the Automated Exchange and Processing of Business Information. IOS Press, Amsterdam (2015)"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.4018\/IJEGR.2017100103","volume":"13","author":"S van der Pligt-Benito Ruano","year":"2017","unstructured":"van der Pligt-Benito Ruano, S., Hulstijn, J.: Governance and collaboration in regulatory supervision: a case in the customs domain. Int. J. Electron. Gov. Res. 13, 34\u201352 (2017)","journal-title":"Int. J. Electron. Gov. Res."},{"key":"21_CR4","unstructured":"Veenstra, A.W., Hulstijn, J., Christiaanse, R., Tan, Y.-H.: Information exchange in global logistics chains: an application for model-based auditing (2013)"},{"key":"21_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15669-4","volume-title":"Accelerating Global Supply Chains with IT-Innovation. ITAIDE Tools and Methods","author":"Y-H Tan","year":"2011","unstructured":"Tan, Y.-H., Bj\u00f8rn-Andersen, N., Klein, S., Rukanova, B.: Accelerating Global Supply Chains with IT-Innovation. ITAIDE Tools and Methods. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-15669-4"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.giq.2015.12.002","volume":"33","author":"B Klievink","year":"2016","unstructured":"Klievink, B., Bharosa, N., Tan, Y.-H.: The collaborative realization of public values and business goals: governance and infrastructure of public\u2013private information platforms. Gov. Inf. Q. 33, 67\u201379 (2016)","journal-title":"Gov. Inf. Q."},{"key":"21_CR7","unstructured":"Van Veenstra, A.F.: IT-Induced Public Sector Transformation (2012)"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.giq.2013.06.001","volume":"30","author":"L Urciuoli","year":"2013","unstructured":"Urciuoli, L., Hintsa, J., Ahokas, J.: Drivers and barriers affecting usage of e-customs \u2014 a global survey with customs administrations using multivariate analysis techniques. Gov. Inf. Q. 30, 473\u2013485 (2013)","journal-title":"Gov. Inf. Q."},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1057\/palgrave.ejis.3000673","volume":"16","author":"JR Gil-garcia","year":"2007","unstructured":"Gil-garcia, J.R., Chengalur-Smith, I., Duchessi, P.: Collaborative e-government: impediments and benefits of information-sharing projects in the public sector. Eur. J. Inf. Syst. 16, 121\u2013133 (2007)","journal-title":"Eur. J. Inf. Syst."},{"key":"21_CR10","first-page":"497","volume":"9","author":"D Robey","year":"2008","unstructured":"Robey, D., Im, G., Wareham, J.D.: Theoretical foundations of empirical research on interorganizational systems: assessing past contributions and guiding future directions. J. Assoc. Inf. Syst. 9, 497\u2013518 (2008)","journal-title":"J. Assoc. Inf. Syst."},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1287\/orsc.8.1.23","volume":"8","author":"P Hart","year":"1997","unstructured":"Hart, P., Saunders, C.: Power and trust: critical factors in the adoption and use of electronic data interchange. Organ. Sci. 8, 23\u201342 (1997)","journal-title":"Organ. Sci."},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-40358-3_21","volume-title":"Electronic Government","author":"B Klievink","year":"2013","unstructured":"Klievink, B., Lucassen, I.: Facilitating adoption of international information infrastructures: a living labs approach. In: Wimmer, M.A., Janssen, M., Scholl, H.J. (eds.) EGOV 2013. LNCS, vol. 8074, pp. 250\u2013261. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40358-3_21"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1287\/trsc.2014.0518","volume":"49","author":"RA Zuidwijk","year":"2015","unstructured":"Zuidwijk, R.A., Veenstra, A.W.: The value of information in container transport. Transp. Sci. 49, 675\u2013685 (2015)","journal-title":"Transp. Sci."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Bharosa, N., Janssen, M., Hulstijn, J., van Wijk, R., de Winne, N., Tan, Y.: Towards a lean-government using new IT-architectures for compliance monitoring. In: Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance - ICEGOV 2011, p. 147 (2011)","DOI":"10.1145\/2072069.2072095"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-322-83669-4_21","volume-title":"Organisation und Recht. Jahrbuch f\u00fcr Rechtssoziologie und Rechtstheorie","author":"RA Kagan","year":"1980","unstructured":"Kagan, R.A., Scholz, J.: The criminology of the corporation and regulatory enforcement strategies. In: Blankenburg, E., Lenk, K. (eds.) Organisation und Recht. Jahrbuch f\u00fcr Rechtssoziologie und Rechtstheorie, vol. 7, pp. 352\u2013357. Springer, Heidelberg (1980). https:\/\/doi.org\/10.1007\/978-3-322-83669-4_21"},{"key":"21_CR16","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198275145.001.0001","volume-title":"Environment and Enforcement, Regulation and the Social Definition of Pollution","author":"K Hawkins","year":"1984","unstructured":"Hawkins, K.: Environment and Enforcement, Regulation and the Social Definition of Pollution. Clarendon Press, Oxford (1984)"},{"key":"21_CR17","unstructured":"Braithwaite, J.: To Punish or Persuade: Enforcement of Coal Mine Safety (1985)"},{"key":"21_CR18","unstructured":"Sparrow, M.: The Regulatory Craft: Controlling Risks, Solving Problems, and Managing Compliance (2011)"},{"key":"21_CR19","first-page":"260","volume-title":"The Routledge Handbook of White-Collar and Corporate Crime in Europe","author":"K van Wingerde","year":"2015","unstructured":"van Wingerde, K.: The limits of environmental regulation in the global economy. In: van Erp, J., Huisman, W., Vandewalle, G. (eds.) The Routledge Handbook of White-Collar and Corporate Crime in Europe, pp. 260\u2013275. Routledge, London (2015)"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"83","DOI":"10.2307\/1191688","volume":"47","author":"A Reiss","year":"1984","unstructured":"Reiss, A.: Consequences of compliance and deterrence models of law enforcement for the exercise of police discretion. Law Contemp. Probl. 47, 83 (1984)","journal-title":"Law Contemp. Probl."},{"key":"21_CR21","unstructured":"de Bruijn, H., ten Heuvelhof, E., Koopmans, M.: Law Enforcement: The Game Between Inspectors and Inspectees (2007)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Ayres, I., Braithwaite, J.: Responsive Regulation: Transcending the Deregulation Debate (1992)","DOI":"10.1093\/oso\/9780195070705.001.0001"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4337\/9781785365577","volume-title":"Trust in Regulatory Regimes","author":"FE Six","year":"2017","unstructured":"Six, F.E., Verhoest, K.: Trust in regulatory regimes; scoping the field. In: Six, F.E., Verhoest, K. (eds.) Trust in Regulatory Regimes, pp. 1\u201336. Edward Elgar, Cheltenham (2017)"},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.4337\/9781785365577.00011","volume-title":"Trust in Regulatory Regimes","author":"H Van Der Voort","year":"2017","unstructured":"Van Der Voort, H.: Trust and cooperation over the public-private divide. In: Six, F.E., Verhoest, K. (eds.) Trust in Regulatory Regimes, pp. 181\u2013204. Edward Elgar, Cheltenham (2017)"},{"key":"21_CR25","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1748-5991.2007.00002.x","volume":"1","author":"P May","year":"2007","unstructured":"May, P.: Regulatory regimes and accountability. Regul. Gov. 1, 8 (2007)","journal-title":"Regul. Gov."},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1046\/j.0023-9216.2003.03703001.x","volume":"37","author":"C Coglianese","year":"2003","unstructured":"Coglianese, C.: Management-based regulation: prescribing private management to achieve public goals. Law Soc. Rev. 37, 691 (2003)","journal-title":"Law Soc. Rev."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Gunningham, N., Grabosky, P., Sinclair, D.: Smart Regulation: Designing Environmental Policy (1998)","DOI":"10.1093\/oso\/9780198268574.001.0001"},{"key":"21_CR28","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1093\/clp\/54.1.103","volume":"54","author":"J Black","year":"2001","unstructured":"Black, J.: Decentring regulation: understanding the role of regulation and self-regulation in a \u201cpost-regulatory\u201d world. Curr. Leg. Probl. 54, 103 (2001)","journal-title":"Curr. Leg. Probl."},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Haines, F.: The Paradox of Regulation: What Regulation Can Achieve and What It Cannot (2011)","DOI":"10.4337\/9780857933157"},{"key":"21_CR30","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1080\/13669877.2012.743157","volume":"16","author":"M Garcia Martinez","year":"2013","unstructured":"Garcia Martinez, M., Verbruggen, P., Fearne, A.: Risk-based approaches to food safety regulation: what role for co-regulation? J. Risk Res. 16, 1101 (2013)","journal-title":"J. Risk Res."},{"key":"21_CR31","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1111\/j.1468-2230.2008.00681.x","volume":"71","author":"R Baldwin","year":"2008","unstructured":"Baldwin, R., Black, J.: Really responsive regulation. Mod. Law Rev. 71, 59 (2008)","journal-title":"Mod. Law Rev."},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1111\/j.1467-9930.2010.00318.x","volume":"32","author":"J Black","year":"2010","unstructured":"Black, J., Baldwin, R.: Really responsive risk-based regulation. Law Policy 32, 181 (2010)","journal-title":"Law Policy"},{"key":"21_CR33","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/09540960903492406","volume":"30","author":"H Van der Voort","year":"2010","unstructured":"Van der Voort, H., Kerpershoek, E.: Measuring measures: introducing performance measurement in the Dutch health care sector. Pub. Money Manag. 30, 63\u201368 (2010)","journal-title":"Pub. Money Manag."},{"key":"21_CR34","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/jegr.2012100102","volume":"8","author":"B Klievink","year":"2012","unstructured":"Klievink, B., et al.: Enhancing visibility in international supply chains: the data pipeline concept. Int. J. Electron. Gov. Res. 8, 14\u201333 (2012)","journal-title":"Int. J. Electron. Gov. Res."},{"key":"21_CR35","doi-asserted-by":"publisher","unstructured":"Van Engelenburg, S., Janssen, M., Klievink, B.: Design of a software architecture supporting business-to-government information sharing to improve public safety and security: combining business rules, events and blockchain technology. J. Intell. Inf. Syst. 1\u201324 (2017). https:\/\/doi.org\/10.1007\/s10844-017-0478-z","DOI":"10.1007\/s10844-017-0478-z"},{"key":"21_CR36","first-page":"3","volume":"4","author":"D Hesketh","year":"2010","unstructured":"Hesketh, D.: Weaknesses in the supply chain: who packed the box? World Cust. J. 4, 3\u201320 (2010)","journal-title":"World Cust. J."},{"key":"21_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/10196780701797656","volume":"18","author":"Z Baida","year":"2008","unstructured":"Baida, Z., Rukanova, B., Liu, J., Tan, Y.: Preserving control in trade procedure redesign \u2013 the beer living lab. Electron. Mark. 18, 53\u201364 (2008)","journal-title":"Electron. Mark."},{"key":"21_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-74781-1_8","volume-title":"Software Engineering and Formal Methods","author":"S van Engelenburg","year":"2018","unstructured":"van Engelenburg, S., Janssen, M., Klievink, B.: What belongs to context? In: Cerone, A., Roveri, M. (eds.) SEFM 2017. LNCS, vol. 10729, pp. 101\u2013116. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74781-1_8"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98690-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:34:09Z","timestamp":1710261249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-98690-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319986890","9783319986906"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98690-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"2 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EGOV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Electronic Government","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krems","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"egov2018a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/depts.washington.edu\/egcdep18\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}