{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T23:41:47Z","timestamp":1773186107684,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T00:00:00Z","timestamp":1501113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"NWO","award":["438-13-601"],"award-info":[{"award-number":["438-13-601"]}]},{"DOI":"10.13039\/501100001831","name":"Delft University of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001831","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10844-017-0478-z","type":"journal-article","created":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T08:36:28Z","timestamp":1501144588000},"page":"595-618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Design of a software architecture supporting business-to-government information sharing to improve public safety and security"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5612-6794","authenticated-orcid":false,"given":"S\u00e9linde van","family":"Engelenburg","sequence":"first","affiliation":[]},{"given":"Marijn","family":"Janssen","sequence":"additional","affiliation":[]},{"given":"Bram","family":"Klievink","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"478_CR1","first-page":"19","volume-title":"Addison-Wesley Professional","author":"L Bass","year":"2003","unstructured":"Bass, L., Clements, P., Kazman, R., & Northrop, L. (2003). What is software architecture?. In Addison-Wesley Professional (pp. 19\u201346)."},{"key":"478_CR2","doi-asserted-by":"publisher","first-page":"S9","DOI":"10.1016\/j.giq.2012.08.006","volume":"30","author":"N Bharosa","year":"2013","unstructured":"Bharosa, N., Janssen, M., Van Wijk, R., De Winne, N., Van der Voort, H., Hulstijn, J., & Tan, Y.H. (2013). Tapping into existing information flows: The transformation to compliance by design in business-to-government information exchange. Government Information Quarterly, 30, S9\u2013S18. doi: 10.1016\/j.giq.2012.08.006 .","journal-title":"Government Information Quarterly"},{"key":"478_CR3","unstructured":"Buterin, V. (2015). On Public and Private Blockchains. https:\/\/blog.ethereum.org\/2015\/08\/07\/on-public-and-private-blockchains\/ ."},{"key":"478_CR4","doi-asserted-by":"publisher","unstructured":"Crockford, D. (2006). The application\/json media type for JavaScript object notation. RFC-4627 (July):1\u201310, doi: 10.17487\/rfc4627 .","DOI":"10.17487\/rfc4627"},{"key":"478_CR5","unstructured":"Customs Administration of the Netherlands (2014). Pushing boundaries: The Customs Administration of The Netherlands\u2019 Point on the Horizon for the Enforcement on Continuously Increasing Flows of Goods."},{"key":"478_CR6","unstructured":"European Court of Human Rights (2010). European Convention on Human Rights."},{"key":"478_CR7","first-page":"174","volume":"46","author":"European Economic and Social Committee","year":"2003","unstructured":"European Economic and Social Committee (2003). Opinion of the european economic and social committee on the \u2019security of transports\u2019. Official Journal of the European Union, 46, 174\u2013183.","journal-title":"Official Journal of the European Union"},{"key":"478_CR8","doi-asserted-by":"publisher","unstructured":"European Union Agency for Fundamental Rights and The Council of Europe (2014). Handbook on European data protection law. Publications Office of the European Union. doi: 10.2811\/69915 .","DOI":"10.2811\/69915"},{"issue":"5","key":"478_CR9","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1108\/13598540710776935","volume":"12","author":"SE Fawcett","year":"2007","unstructured":"Fawcett, S.E., Osterhaus, P., Magnan, G.M., Brau, J.C., & McCarter, M.W. (2007). Information sharing and supply chain performance: the role of connectivity and willingness. Supply Chain Management: An International Journal, 12(5), 358\u2013368. doi: 10.1108\/13598540710776935 .","journal-title":"Supply Chain Management: An International Journal"},{"key":"478_CR10","unstructured":"Fowler, M., & Scott, K. (1999). UML distilled: a brief guide to the standard object modeling language. Addison-Wesley."},{"key":"478_CR11","unstructured":"Gong, Y., & Janssen, M. (2014). A framework for translating legal knowledge into administrative processes: dynamic adaption of business processes. In Information technology and open source: applications for education, innovation, and sustainability (204\u2013211). Springer."},{"key":"478_CR12","unstructured":"Graham, I. (2006). Business rules management and service oriented architecture. Wiley."},{"issue":"3\u20134","key":"478_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1300\/J104v40n03_02","volume":"40","author":"J Greenberg","year":"2005","unstructured":"Greenberg, J. (2005). Understanding metadata and metadata schemes. Cataloging & Classification Quarterly, 40(3\u20134), 17\u201336. doi: 10.1300\/J104v40n03 .","journal-title":"Cataloging & Classification Quarterly"},{"issue":"2","key":"478_CR14","doi-asserted-by":"publisher","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","volume":"37","author":"S Gregor","year":"2013","unstructured":"Gregor, S., & Hevner, A.R. (2013). Positioning and presenting design science research for maximum impact. MIS Quarterly, 37(2), 337\u2013355. doi: 10.2753\/MIS0742-1222240302 .","journal-title":"MIS Quarterly"},{"issue":"1","key":"478_CR15","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1287\/orsc.8.1.23","volume":"8","author":"P Hart","year":"1997","unstructured":"Hart, P., & Saunders, C. (1997). Power and trust: Critical factors in the adoption and use of electronic data interchange. Organization Science, 8(1), 23\u201342. doi: 10.1287\/orsc.8.1.23 .","journal-title":"Organization Science"},{"issue":"2","key":"478_CR16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.55596\/001c.92008","volume":"4","author":"D Hesketh","year":"2010","unstructured":"Hesketh, D. (2010). Weaknesses in the supply chain: Who packed the box. World Customs Journal, 4(2), 3\u201320.","journal-title":"World Customs Journal"},{"issue":"1","key":"478_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), 75\u2013105. doi: 10.2307\/25148625 , \/dl.acm.org\/citation.cfm?id=2017212.2017217.","journal-title":"MIS Quarterly"},{"key":"478_CR18","doi-asserted-by":"publisher","unstructured":"Jensen, T., & Vatrapu, R. (2015). Ships & roses: A revelatory case study of affordances in international trade. In Proceedings ECIS 2015 (pp. 1\u201318), doi: 10.18151\/7217370 .","DOI":"10.18151\/7217370"},{"key":"478_CR19","doi-asserted-by":"publisher","unstructured":"Jensen, T., Bj\u00f8rn-andersen, N, & Vatrapu, R. (2014). Avocados crossing borders: The missing common information infrastructure for international trade. In Culture in international context (pp. 15\u201324), doi: 10.1145\/2631488.2631500 .","DOI":"10.1145\/2631488.2631500"},{"key":"478_CR20","first-page":"1","volume-title":"Current issues in maritime & transport law","author":"A Karampetsou","year":"2016","unstructured":"Karampetsou, A. (2016). Container information & privacy concerns: opening the \u201cPandora\u2019s\u201d box? Legal challenges of a Business-to-Customs Information Sharing with regard to Containerized Cargo. In Current issues in maritime & transport law (pp. 1\u201317). Bologna: Bonomo Editore."},{"key":"478_CR21","unstructured":"Karp, A.H., Haury, H., & Davis, M.H. (2010). From ABAC to ZBAC: the evolution of access control models. In International conference on cyber warfare and security. Academic Conferences International Limited."},{"key":"478_CR22","doi-asserted-by":"publisher","unstructured":"Klievink, B., & Lucassen, I. (2013). Facilitating adoption of international information infrastructures: a Living Labs approach. In International conference on electronic government (pp. 250\u2013261). Springer Berlin Heidelberg. doi: 10.1007\/978-3-642-40358-3_21 .","DOI":"10.1007\/978-3-642-40358-3_21"},{"issue":"4","key":"478_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/jegr.2012100104","volume":"8","author":"B Klievink","year":"2012","unstructured":"Klievink, B., Janssen, M., & Tan, Y.H. (2012a). A stakeholder analysis of business-to-government information sharing. International Journal of Electronic Government Research, 8(4), 54\u201364. doi: 10.4018\/jegr.2012100104 .","journal-title":"International Journal of Electronic Government Research"},{"issue":"4","key":"478_CR24","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/jegr.2012100102","volume":"8","author":"B Klievink","year":"2012","unstructured":"Klievink, B., Van Stijn, E., Hesketh, D., Aldewereld, H., Overbeek, S., Heijmann, F., & Tan, Y.H. (2012b). Enhancing visibility in international supply chains: The data pipeline concept. International Journal of Electronic Government Research (IJEGR), 8(4), 14\u201333. doi: 10.4018\/jegr.2012100102 .","journal-title":"International Journal of Electronic Government Research (IJEGR)"},{"key":"478_CR25","unstructured":"Klievink, B., Aldewereld, H., & Tan, Y.H. (2014). Establishing information infrastructures for international trade: discussing the role and governance of port-community systems. In 5th international conference on information systems, logistics and supply chain (ILS2014) (pp. 1\u201310). Dinalog."},{"issue":"3","key":"478_CR26","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1008773617579","volume":"13","author":"HB Lee","year":"1999","unstructured":"Lee, H.B., Kim, J.W., & Park, S.J. (1999). KWM: Knowledge-based workflow model for agile organization. Journal of Intelligent Information Systems, 13 (3), 261\u2013278. doi: 10.1023\/A:1008773617579 .","journal-title":"Journal of Intelligent Information Systems"},{"issue":"1","key":"478_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1504\/IJMTM.2000.001329","volume":"1","author":"HL Lee","year":"2000","unstructured":"Lee, H.L., & Whang, S. (2000). Information sharing in a supply chain. International Journal of Manufacturing Technology, 1(1), 79\u201393.","journal-title":"International Journal of Manufacturing Technology"},{"key":"478_CR28","unstructured":"Levi, M.D. (2005). International finance, 4th Edn. Routledge."},{"key":"478_CR29","unstructured":"Levinson, M. (2010). The world the box made. In The Box: how the shipping container made the world smaller and the world economy bigger (pp. 1\u201315). Princeton University Press."},{"key":"478_CR30","unstructured":"Luu, L., Narayanan, V., Baweja, K., Zheng, C., Gilbert, S., & Saxena, P. (2015). SCP: a computationally-scalable byzantine consensus protocol for blockchains. IACR Cryptology ePrint Archive (pp. 1\u201316)."},{"issue":"3","key":"478_CR31","first-page":"38","volume":"3","author":"M Mainelli","year":"2015","unstructured":"Mainelli, M., & Smith, M. (2015). Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology). The Journal of Financial Perspectives, 3(3), 38\u201369.","journal-title":"The Journal of Financial Perspectives"},{"key":"478_CR32","unstructured":"Massias, H., Serret Avila, X., & Quisquater, J.J. (1999). Design of a secure timestamping service with minimal trust requirement. In 20th symposium on information theory in the Benelux."},{"issue":"2","key":"478_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/j.2158-1592.2001.tb00001.x","volume":"22","author":"JT Mentzer","year":"2001","unstructured":"Mentzer, J.T., Dewitt, W., Keebler, J.S., Min, S., Nix, N.W., Smith, C.D., & Zacharia, Z.G. (2001). Defining supply chain management. Journal of Business Logistics, 22(2), 1\u201325. doi: 10.1002\/j.2158-1592.2001.tb00001.x .","journal-title":"Journal of Business Logistics"},{"key":"478_CR34","doi-asserted-by":"publisher","unstructured":"Merkle, R.C. (1987). A digital signature based on a conventional encryption function. In Pomerance, C. (Ed.) Advances in cryptology - CRYPT0 87, lecture notes in computer science (Vol. 369\u2013378). Springer Berlin Heidelberg. doi: 10.1007\/3-540-48184-2_32 .","DOI":"10.1007\/3-540-48184-2_32"},{"key":"478_CR35","first-page":"261","volume-title":"Trust in organizations","author":"AK Mishra","year":"1996","unstructured":"Mishra, A.K. (1996). Organizational responses to crisis: the centrality of trust. In Kramer, R. M., & Tyler, T. (Eds.) Trust in organizations (pp. 261\u2013287). Sage: Newbury Park, CA."},{"key":"478_CR36","doi-asserted-by":"publisher","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. doi: 10.1007\/s10838-008-9062-0 , 43543534534v343453.","DOI":"10.1007\/s10838-008-9062-0"},{"key":"478_CR37","unstructured":"NWO (2013). Innovation in Supply Chain Compliance and Border Management (ISCOM). https:\/\/www.nwo.nl\/onderzoek-en-resultaten\/onderzoeksprojecten\/i\/95\/11895.html ."},{"issue":"04","key":"478_CR38","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1142\/S0218843012500062","volume":"21","author":"S Overbeek","year":"2012","unstructured":"Overbeek, S., Janssen, M., & Tan, Y.H. (2012). An event-driven architecture for integrating information, processes and services in a plastic toys supply chain. International Journal of Cooperative Information Systems, 21(04), 343\u2013381. doi: 10.1142\/S0218843012500062 .","journal-title":"International Journal of Cooperative Information Systems"},{"key":"478_CR39","doi-asserted-by":"publisher","unstructured":"Palmirani, M., Governatori, G., Rotolo, A., Tabet, S., Boley, H., & Paschke, A. (2011). LegalRuleML: XML-Based rules and norms. In RuleML 2011 - America, (Vol. 7018, pp. 298\u2013312). Berlin Heidelberg: Springer-Verlag. doi: 10.1007\/978-3-642-24908-2_30 .","DOI":"10.1007\/978-3-642-24908-2_30"},{"issue":"3","key":"478_CR40","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45\u201377. doi: 10.2753\/MIS0742-1222240302 .","journal-title":"Journal of Management Information Systems"},{"key":"478_CR41","doi-asserted-by":"crossref","unstructured":"Pilkington, M., & Zhegu, M. (2016). Blockchain technology: Principles and applications. In Olleros, F. X. (Ed.) Research handbook on digital transformations (227\u2013253). Edward Elgar Publishing.","DOI":"10.4337\/9781784717766.00019"},{"key":"478_CR42","doi-asserted-by":"publisher","unstructured":"Prakken, H., & Vreeswijk, G. (2002). Logics for defeasible argumentation. In Gabbay, D., & Guenthner, F. (Eds.) Handbook of philosophical logic (Vol. 4, pp. 218\u2013319). Kluwer Academic Publishers. doi: 10.1007\/978-94-017-0456-4_3 .","DOI":"10.1007\/978-94-017-0456-4_3"},{"key":"478_CR43","unstructured":"Ross, R.G. (2003). Principles of the business rule approach. Addison-Wesley Professional."},{"issue":"4","key":"478_CR44","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1111\/j.1752-1688.2008.00192.x","volume":"44","author":"N Schuurman","year":"2008","unstructured":"Schuurman, N., Deshpande, A., & Allen, D.M. (2008). Data integration across borders: a case study of the Abbotsford-Sumas aquifer (British Columbia\/Washington State). Journal of the American Water Resources Association, 44(4), 921\u2013934.","journal-title":"Journal of the American Water Resources Association"},{"key":"478_CR45","doi-asserted-by":"publisher","unstructured":"Tan, Y.H., Bj\u00f8rn-Andersen, N., Klein, S., & Rukanova, B. (2011). Accelerating Global Supply Chains with IT-Innovation. doi: 10.1007\/978-3-642-15669-4 .","DOI":"10.1007\/978-3-642-15669-4"},{"key":"478_CR46","unstructured":"The Commission Of The European Communities (2006). EU Regulation 1875\/2006."},{"key":"478_CR47","doi-asserted-by":"publisher","unstructured":"The Software Engineering Standards Committee of IEEE Computer Society (2000). 1471-2000 - IEEE Recommended Practice for Architectural Description for Software-Intensive Systems. Technical Report. 42010, IEEE Computer Society. doi: 10.1109\/IEEESTD.2000.91944 .","DOI":"10.1109\/IEEESTD.2000.91944"},{"key":"478_CR48","doi-asserted-by":"publisher","unstructured":"Tsay, A.A., Nahmias, S., & Agrawal, N. (1999). Modeling supply chain contracts: A review. In Tayur, S., Ganeshan, R., & Magazine, M. (Eds.) Quantitative models for supply chain management (pp. 299\u2013336). US: Springer. doi: 10.1007\/978-1-4615-4949-9_10 .","DOI":"10.1007\/978-1-4615-4949-9_10"},{"issue":"4","key":"478_CR49","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.giq.2013.06.001","volume":"30","author":"L Urciuoli","year":"2013","unstructured":"Urciuoli, L., Hintsa, J., & Ahokas, J. (2013). Drivers and barriers affecting usage of e-Customs \u2014 A global survey with customs administrations using multivariate analysis techniques. Government Information Quarterly, 30(4), 473\u2013485. doi: 10.1016\/j.giq.2013.06.001 .","journal-title":"Government Information Quarterly"},{"key":"478_CR50","doi-asserted-by":"publisher","unstructured":"van Engelenburg, S., Janssen, M., & Klievink, B. (2015). Design of a business-to-government information sharing architecture using business rules. In Software engineering and formal methods (Vol. 9509, pp. 124\u2013138). Springer. doi: 10.1007\/978-3-319-15201-1 .","DOI":"10.1007\/978-3-319-15201-1"},{"issue":"2-3","key":"478_CR51","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1561\/0200000008","volume":"2","author":"P Baalen Van","year":"2009","unstructured":"Van Baalen, P., Zuidwijk, R., & Van Nunen, J. (2009). Port inter-organizational information systems: Capabilities to service global supply chains. Foundations and Trends in Technology Information and Operations Management, 2(2-3), 81\u2013241. doi: 10.1561\/0200000008 .","journal-title":"Foundations and Trends in Technology Information and Operations Management"},{"key":"478_CR52","unstructured":"Van Stijn, E., Hesketh, D., Tan, Y.H., Klievink, B., Overbeek, S., Heijmann, F., Pikart, M., & Butterly, T. (2011). Annex 3: The data pipeline. In Connecting international trade: single windows and supply chains in the next decade, united nations economic commission for Europe (pp. 158\u2013183)."},{"key":"478_CR53","unstructured":"Veenstra, A.W., Hulstijn, J., Christiaanse, R., & Tan, Y.H. (2013). Information exchange in global logistics chains: an application for model-based auditing. In BNAIC 2013: Proceedings of the 25th Benelux conference on artificial intelligence. Delft, Netherlands."},{"key":"478_CR54","unstructured":"Walport, M. (2015). Distributed ledger technology: Beyond block chain. Technical report, UK: Government Office for Science."},{"key":"478_CR55","unstructured":"Zomer, G.R. (2011). Smart trade logistics - compliance as an opportunity. In IT innovations enabling seamless and secure supply chains witness 2011 (Vol. 769, pp. 9\u201319)."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0478-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-017-0478-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0478-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:30:34Z","timestamp":1719347434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-017-0478-z"}},"subtitle":["Combining business rules, Events and blockchain technology"],"short-title":[],"issued":{"date-parts":[[2017,7,27]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["478"],"URL":"https:\/\/doi.org\/10.1007\/s10844-017-0478-z","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,27]]},"assertion":[{"value":"20 December 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}