{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:31:04Z","timestamp":1771335064464,"version":"3.50.1"},"reference-count":124,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T00:00:00Z","timestamp":1659139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T00:00:00Z","timestamp":1659139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["825225"],"award-info":[{"award-number":["825225"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>\u2009Abstract\u2009<\/jats:title><jats:p>Firms are often reluctant to share data because of mistrust, concerns over control, and other risks. Multi-party computation (MPC) is a new technique to compute meaningful insights without having to transfer data. This paper investigates if MPC affects known antecedents for data sharing decisions: control, trust, and risks. Through 23 qualitative interviews in the automotive industry, we find that MPC (1) enables new ways of technology-based control, (2) reduces the need for inter-organizational trust, and (3) prevents losing competitive advantage due to data leakage. However, MPC also creates the need to trust technology and introduces new risks of data misuse. These impacts arise if firms perceive benefits from sharing data, have high organizational readiness, and perceive data as non-sensitive. Our findings show that known antecedents of data sharing should be specified differently with MPC in place. Furthermore, we suggest reframing MPC as a data collaboration technology beyond enhancing privacy.<\/jats:p>","DOI":"10.1007\/s12525-022-00572-w","type":"journal-article","created":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T06:02:51Z","timestamp":1659160971000},"page":"1577-1602","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["It is not (only) about privacy: How multi-party computation redefines control, trust, and risk in data sharing"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8588-8421","authenticated-orcid":false,"given":"Wirawan","family":"Agahari","sequence":"first","affiliation":[]},{"given":"Hosea","family":"Ofe","sequence":"additional","affiliation":[]},{"given":"Mark","family":"de Reuver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,30]]},"reference":[{"issue":"7","key":"572_CR1","doi-asserted-by":"publisher","first-page":"3321","DOI":"10.3390\/jtaer16070180","volume":"16","author":"AE Abbas","year":"2021","unstructured":"Abbas, A. E., Agahari, W., van de Ven, M., Zuiderwijk, A., & de Reuver, M. (2021). Business data sharing through data marketplaces: A systematic literature review. Journal of Theoretical and Applied Electronic Commerce Research, 16(7), 3321\u20133339. https:\/\/doi.org\/10.3390\/jtaer16070180","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"key":"572_CR2","unstructured":"Agahari, W., Dolci, R., & de Reuver, M. (2021). Business model implications of privacy-preserving technologies in data marketplaces: The case of multi-party computation. ECIS 2021 Research Papers, 59.\u00a0https:\/\/aisel.aisnet.org\/ecis2021_rp\/59"},{"key":"572_CR3","doi-asserted-by":"publisher","unstructured":"Agrawal, N., Binns, R., Van Kleek, M., Laine, K., & Shadbolt, N. (2021). Exploring design and governance challenges in the development of privacy-preserving computation. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1\u201313. https:\/\/doi.org\/10.1145\/3411764.3445677","DOI":"10.1145\/3411764.3445677"},{"key":"572_CR4","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5334\/dsj-2018-031","volume":"17","author":"G Alter","year":"2018","unstructured":"Alter, G., Falk, B. H., Lu, S., & Ostrovsky, R. (2018). Computing statistics from private data. Data Science Journal, 17, 31. https:\/\/doi.org\/10.5334\/dsj-2018-031","journal-title":"Data Science Journal"},{"issue":"2","key":"572_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.5465\/amr.2009.0188","volume":"36","author":"M Alvesson","year":"2011","unstructured":"Alvesson, M., & Sandberg, J. (2011). Generating research questions through problematization. Academy of Management Review, 36(2), 247\u2013271. https:\/\/doi.org\/10.5465\/amr.2009.0188","journal-title":"Academy of Management Review"},{"key":"572_CR6","unstructured":"Apfelbeck, F. (2018). Evaluation of privacy-preserving technologies for machine learning. Outlier Ventures. https:\/\/outlierventures.io\/research\/evaluation-of-privacy-preserving-technologies-for-machine-learning\/"},{"issue":"12","key":"572_CR7","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1093\/comjnl\/bxy090","volume":"61","author":"DW Archer","year":"2018","unstructured":"Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P., & Wright, R. N. (2018). From keys to databases\u2014real-world applications of secure multi-party computation. The Computer Journal, 61(12), 1749\u20131771. https:\/\/doi.org\/10.1093\/comjnl\/bxy090","journal-title":"The Computer Journal"},{"key":"572_CR8","unstructured":"Arnaut, C., Pont, M., Scaria, E., Berghmans, A., & Leconte, S. (2018). Study on data sharing between companies in Europe. A Study Prepared for the European Commission Directorate-General for Communications Networks, Content and Technology by Everis Benelux, 24. https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/8b8776ff-4834-11e8-be1d-01aa75ed71a1\/language-en"},{"issue":"1","key":"572_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/JBIM-02-2015-0022","volume":"31","author":"AK Asare","year":"2016","unstructured":"Asare, A. K., Brashear-Alejandro, T. G., & Kang, J. (2016). B2B technology adoption in customer driven supply chains. Journal of Business & Industrial Marketing, 31(1), 1\u201312. https:\/\/doi.org\/10.1108\/JBIM-02-2015-0022","journal-title":"Journal of Business & Industrial Marketing"},{"key":"572_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.futures.2019.04.001","volume":"109","author":"A Athanasopoulou","year":"2019","unstructured":"Athanasopoulou, A., de Reuver, M., Nikou, S., & Bouwman, H. (2019). What technology enabled services impact business models in the automotive industry? An exploratory study. Futures, 109, 73\u201383. https:\/\/doi.org\/10.1016\/j.futures.2019.04.001","journal-title":"Futures"},{"key":"572_CR11","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.procs.2015.08.363","volume":"63","author":"M Azarm-Daigle","year":"2015","unstructured":"Azarm-Daigle, M., Kuziemsky, C., & Peyton, L. (2015). A review of cross organizational healthcare data sharing. Procedia Computer Science, 63, 425\u2013432. https:\/\/doi.org\/10.1016\/j.procs.2015.08.363","journal-title":"Procedia Computer Science"},{"issue":"2","key":"572_CR12","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1177\/0170840601222007","volume":"22","author":"R Bachmann","year":"2001","unstructured":"Bachmann, R. (2001). Trust, power and control in trans-organizational relations. Organization Studies, 22(2), 337\u2013365. https:\/\/doi.org\/10.1177\/0170840601222007","journal-title":"Organization Studies"},{"key":"572_CR13","unstructured":"Balson, D., & Dixon, W. (2020). Cyber Information Sharing: Building Collective Security. World Economic Forum. https:\/\/www3.weforum.org\/docs\/WEF_Cyber_Information_Sharing_2020.pdf"},{"key":"572_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-022-00547-x","author":"R Bergman","year":"2022","unstructured":"Bergman, R., Abbas, A. E., Jung, S., Werker, C., & de Reuver, M. (2022). Business model archetypes for data marketplaces in the automotive industry. Electronic Markets, 32(2). https:\/\/doi.org\/10.1007\/s12525-022-00547-x","journal-title":"Electronic Markets"},{"issue":"2","key":"572_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/3029603","volume":"60","author":"A Bestavros","year":"2017","unstructured":"Bestavros, A., Lapets, A., & Varia, M. (2017). User-centric distributed solutions for privacy-preserving analytics. Communications of the ACM, 60(2), 37\u201339. https:\/\/doi.org\/10.1145\/3029603","journal-title":"Communications of the ACM"},{"key":"572_CR16","doi-asserted-by":"publisher","unstructured":"Bogdanov, D., J\u00f5emets, M., Siim, S., & Vaht, M. (2015). How the estonian tax and customs board evaluated a tax fraud detection system based on secure multi-party computation. In R. B\u00f6hme & T. Okamoto (Eds.), Financial Cryptography and Data Security (pp. 227\u2013234). Springer. https:\/\/doi.org\/10.1007\/978-3-662-47854-7_14","DOI":"10.1007\/978-3-662-47854-7_14"},{"key":"572_CR17","doi-asserted-by":"publisher","unstructured":"Bogetoft, P., Christensen, D. L., Damg\u00e5rd, I., Geisler, M., Jakobsen, T., Kr\u00f8igaard, M., Nielsen, J. D., Nielsen, J. B., Nielsen, K., Pagter, J., Schwartzbach, M., & Toft, T. (2009). Secure multiparty computation goes live. In R. Dingledine & P. Golle (Eds.), Financial Cryptography and Data Security (pp. 325\u2013343). Springer. https:\/\/doi.org\/10.1007\/978-3-642-03549-4_20","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"572_CR18","doi-asserted-by":"publisher","unstructured":"Bonazzi, R., Fritscher, B., & Pigneur, Y. (2010). Business model considerations for privacy protection in a mobile location based context. 2010 14th International Conference on Intelligence in Next Generation Networks, 1\u20138. https:\/\/doi.org\/10.1109\/ICIN.2010.5640885","DOI":"10.1109\/ICIN.2010.5640885"},{"issue":"3","key":"572_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1080\/10864415.1998.11518316","volume":"2","author":"R Bons","year":"1998","unstructured":"Bons, R., Lee, R. M., & Wagenaar, R. W. (1998). Designing trustworthy interorganizational trade procedures for open electronic commerce. International Journal of Electronic Commerce, 2(3), 61\u201383. https:\/\/doi.org\/10.1080\/10864415.1998.11518316","journal-title":"International Journal of Electronic Commerce"},{"issue":"1","key":"572_CR20","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/10864415.2000.11044200","volume":"5","author":"R Bons","year":"2000","unstructured":"Bons, R., Dignum, F., Lee, R. M., & Tan, Y.-H. (2000). A formal analysis of auditing principles for electronic trade procedures. International Journal of Electronic Commerce, 5(1), 57\u201382. https:\/\/doi.org\/10.1080\/10864415.2000.11044200","journal-title":"International Journal of Electronic Commerce"},{"key":"572_CR21","unstructured":"Bons, R., Lee, R. M., & Nguyen, V. H. (2012). Generating procedural controls to facilitate trade: The role of control in the absence of trust. BLED 2012 \u2013 Special Issue, 10, 198\u2013225. https:\/\/aisel.aisnet.org\/bled2012_special_issue\/10"},{"issue":"2","key":"572_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1111\/1467-8322.12562","volume":"36","author":"MH Bruun","year":"2020","unstructured":"Bruun, M. H., Andersen, A. O., & Mannov, A. (2020). Infrastructures of trust and distrust: The politics and ethics of emerging cryptographic technologies. Anthropology Today, 36(2), 13\u201317. https:\/\/doi.org\/10.1111\/1467-8322.12562","journal-title":"Anthropology Today"},{"key":"572_CR23","doi-asserted-by":"publisher","DOI":"10.4135\/9781848607941","author":"A Bryant","year":"2007","unstructured":"Bryant, A., & Charmaz, K. (2007). The SAGE handbook of grounded theory. SAGE Publications Ltd. https:\/\/doi.org\/10.4135\/9781848607941","journal-title":"SAGE Publications Ltd"},{"issue":"4","key":"572_CR24","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1177\/1094428116641191","volume":"20","author":"C Busse","year":"2017","unstructured":"Busse, C., Kach, A. P., & Wagner, S. M. (2017). Boundary conditions: What they are, how to explore them, why we need them, and when to consider them. Organizational Research Methods, 20(4), 574\u2013609. https:\/\/doi.org\/10.1177\/1094428116641191","journal-title":"Organizational Research Methods"},{"issue":"5","key":"572_CR25","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1016\/j.im.2014.03.007","volume":"51","author":"Y-H Chen","year":"2014","unstructured":"Chen, Y.-H., Lin, T.-P., & Yen, D. C. (2014). How to facilitate inter-organizational knowledge sharing: The impact of trust. Information & Management, 51(5), 568\u2013578. https:\/\/doi.org\/10.1016\/j.im.2014.03.007","journal-title":"Information & Management"},{"key":"572_CR26","doi-asserted-by":"publisher","first-page":"1368905","DOI":"10.1155\/2019\/1368905","volume":"2019","author":"JI Choi","year":"2019","unstructured":"Choi, J. I., & Butler, K. R. B. (2019). Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities. Security and Communication Networks, 2019, 1368905. https:\/\/doi.org\/10.1155\/2019\/1368905","journal-title":"Security and Communication Networks"},{"key":"572_CR27","unstructured":"European Commission. (2020). A European strategy for data. https:\/\/ec.europa.eu\/info\/sites\/default\/files\/communication-european-strategy-data-19feb2020_en.pdf"},{"issue":"5","key":"572_CR28","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1111\/j.1365-2575.2012.00402.x","volume":"23","author":"S Conger","year":"2013","unstructured":"Conger, S., Pratt, J. H., & Loch, K. D. (2013). Personal information privacy and emerging technologies. Information Systems Journal, 23(5), 401\u2013417. https:\/\/doi.org\/10.1111\/j.1365-2575.2012.00402.x","journal-title":"Information Systems Journal"},{"issue":"4","key":"572_CR29","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1287\/isre.5.4.400","volume":"5","author":"D Constant","year":"1994","unstructured":"Constant, D., Kiesler, S., & Sproull, L. (1994). What\u2019s mine is ours, or is it? A study of attitudes about information sharing. Information Systems Research, 5(4), 400\u2013421. https:\/\/doi.org\/10.1287\/isre.5.4.400","journal-title":"Information Systems Research"},{"issue":"6","key":"572_CR30","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1177\/0149206305279602","volume":"31","author":"R Cropanzano","year":"2005","unstructured":"Cropanzano, R., & Mitchell, M. S. (2005). Social exchange theory: An interdisciplinary review. Journal of Management, 31(6), 874\u2013900. https:\/\/doi.org\/10.1177\/0149206305279602","journal-title":"Journal of Management"},{"key":"572_CR31","doi-asserted-by":"crossref","unstructured":"Dahlberg, T., & Nokkala, T. (2019). Willingness to share supply chain data in an ecosystem governed platform\u2013An interview study.","DOI":"10.18690\/978-961-286-280-0.33"},{"issue":"1","key":"572_CR32","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/JSYST.2020.2970456","volume":"15","author":"SDC di Vimercati","year":"2021","unstructured":"di Vimercati, S. D. C., Foresti, S., Livraga, G., & Samarati, P. (2021). Toward owners\u2019 control in digital data markets. IEEE Systems Journal, 15(1), 1299\u20131306. https:\/\/doi.org\/10.1109\/JSYST.2020.2970456","journal-title":"IEEE Systems Journal"},{"key":"572_CR33","first-page":"114","volume":"115","author":"I Docherty","year":"2018","unstructured":"Docherty, I., Marsden, G., & Anable, J. (2018). The governance of smart mobility. Transportation Research Part a: Policy and Practice, 115, 114\u2013125.","journal-title":"Transportation Research Part a: Policy and Practice"},{"issue":"2","key":"572_CR34","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.im.2011.10.003","volume":"49","author":"TC Du","year":"2012","unstructured":"Du, T. C., Lai, V. S., Cheung, W., & Cui, X. (2012). Willingness to share information in a supply chain: A partnership-data-process perspective. Information & Management, 49(2), 89\u201398. https:\/\/doi.org\/10.1016\/j.im.2011.10.003","journal-title":"Information & Management"},{"key":"572_CR35","doi-asserted-by":"publisher","unstructured":"Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 9(3\u20134), 211\u2013407. https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"572_CR36","doi-asserted-by":"publisher","unstructured":"Dwork, C. (2006). Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, & I. Wegener (Eds.), Automata, Languages and Programming (pp. 1\u201312). Springer. https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"issue":"1","key":"572_CR37","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1146\/annurev.so.02.080176.002003","volume":"2","author":"RM Emerson","year":"1976","unstructured":"Emerson, R. M. (1976). Social exchange theory. Annual Review of Sociology, 2(1), 335\u2013362. https:\/\/doi.org\/10.1146\/annurev.so.02.080176.002003","journal-title":"Annual Review of Sociology"},{"issue":"3","key":"572_CR38","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1506\/car.24.3.7","volume":"24","author":"D Emsley","year":"2007","unstructured":"Emsley, D., & Kidon, F. (2007). The relationship between trust and control in international joint ventures: Evidence from the airline industry*. Contemporary Accounting Research, 24(3), 829\u2013858. https:\/\/doi.org\/10.1506\/car.24.3.7","journal-title":"Contemporary Accounting Research"},{"issue":"3","key":"572_CR39","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10660-010-9062-0","volume":"10","author":"M Eurich","year":"2010","unstructured":"Eurich, M., Oertel, N., & Boutellier, R. (2010). The impact of perceived privacy risks on organizations\u2019 willingness to share item-level event data across the supply chain. Electronic Commerce Research, 10(3), 423\u2013440. https:\/\/doi.org\/10.1007\/s10660-010-9062-0","journal-title":"Electronic Commerce Research"},{"key":"572_CR40","doi-asserted-by":"crossref","unstructured":"Fruhwirth, M., Rachinger, M., & Prlja, E. (2020). Discovering business models of data marketplaces. Proceedings of the 53rd Hawaii International Conference on System Sciences.","DOI":"10.24251\/HICSS.2020.704"},{"issue":"5","key":"572_CR41","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1108\/JBIM-04-2012-0070","volume":"29","author":"H-P Fu","year":"2014","unstructured":"Fu, H.-P., Chang, T.-H., Ku, C.-Y., Chang, T.-S., & Huang, C.-H. (2014). The critical success factors affecting the adoption of inter-organization systems by SMEs. Journal of Business & Industrial Marketing, 29(5), 400\u2013416. https:\/\/doi.org\/10.1108\/JBIM-04-2012-0070","journal-title":"Journal of Business & Industrial Marketing"},{"key":"572_CR42","unstructured":"Garrido, G. M., Sedlmeir, J., Uluda\u011f, \u00d6., Alaoui, I. S., Luckow, A., & Matthes, F. (2021). Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review. ArXiv:2107.11905 [Cs]. http:\/\/arxiv.org\/abs\/2107.11905"},{"key":"572_CR43","unstructured":"Gartner. (2021). Gartner says digital ethics is at the peak of inflated expectations in the 2021 gartner hype cycle for privacy. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-09-30-gartner-says-digital-ethics-is-at-the-peak-of-inflate"},{"key":"572_CR44","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.indmarman.2018.12.007","volume":"77","author":"J Gast","year":"2019","unstructured":"Gast, J., Gundolf, K., Harms, R., & Matos Collado, E. (2019). Knowledge management and coopetition: How do cooperating competitors balance the needs to share and protect their knowledge? Industrial Marketing Management, 77, 65\u201374. https:\/\/doi.org\/10.1016\/j.indmarman.2018.12.007","journal-title":"Industrial Marketing Management"},{"key":"572_CR45","doi-asserted-by":"publisher","unstructured":"Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, 169\u2013178,. https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"issue":"3","key":"572_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2019.100254","volume":"29","author":"M Gkeredakis","year":"2019","unstructured":"Gkeredakis, M., & Constantinides, P. (2019). Phenomenon-based problematization: Coordinating in the digital era. Information and Organization, 29(3), 100254.","journal-title":"Information and Organization"},{"issue":"3","key":"572_CR47","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.im.2017.07.003","volume":"55","author":"T Goldbach","year":"2018","unstructured":"Goldbach, T., Benlian, A., & Buxmann, P. (2018). Differential effects of formal and self-control in mobile platform ecosystems: Multi-method findings on third-party developers\u2019 continuance intentions and application quality. Information & Management, 55(3), 271\u2013284. https:\/\/doi.org\/10.1016\/j.im.2017.07.003","journal-title":"Information & Management"},{"issue":"3","key":"572_CR48","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.jsis.2017.07.003","volume":"26","author":"WA G\u00fcnther","year":"2017","unstructured":"G\u00fcnther, W. A., Mehrizi, M. H. R., Huysman, M., & Feldberg, F. (2017). Debating big data: A literature review on realizing value from big data. The Journal of Strategic Information Systems, 26(3), 191\u2013209.","journal-title":"The Journal of Strategic Information Systems"},{"key":"572_CR49","unstructured":"Hall, H., & Wid\u00e9n-Wulff, G. (2008). Social exchange, social capital and information sharing in online environments: Lessons from three case studies. In M.-L. Huotari & D. Elisabeth (Eds.), From Information Provision to Knowledge Production (p. 21). University of Oulu."},{"issue":"1","key":"572_CR50","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.csi.2006.01.004","volume":"29","author":"D Harris","year":"2007","unstructured":"Harris, D., Khan, L., Paul, R., & Thuraisingham, B. (2007). Standards for secure data sharing across organizations. Computer Standards & Interfaces, 29(1), 86\u201396. https:\/\/doi.org\/10.1016\/j.csi.2006.01.004","journal-title":"Computer Standards & Interfaces"},{"issue":"10","key":"572_CR51","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1108\/IJOPM-02-2014-0098","volume":"36","author":"PM Hartmann","year":"2016","unstructured":"Hartmann, P. M., Zaki, M., Feldmann, N., & Neely, A. (2016). Capturing value from big data \u2013 a taxonomy of data-driven business models used by start-up firms. International Journal of Operations & Production Management, 36(10), 1382\u20131406. https:\/\/doi.org\/10.1108\/IJOPM-02-2014-0098","journal-title":"International Journal of Operations & Production Management"},{"key":"572_CR52","doi-asserted-by":"publisher","first-page":"1220","DOI":"10.1109\/SP.2019.00028","volume":"2019","author":"M Hastings","year":"2019","unstructured":"Hastings, M., Hemenway, B., Noble, D., & Zdancewic, S. (2019). SoK: General purpose compilers for secure multi-party computation. IEEE Symposium on Security and Privacy (SP), 2019, 1220\u20131237. https:\/\/doi.org\/10.1109\/SP.2019.00028","journal-title":"IEEE Symposium on Security and Privacy (SP)"},{"key":"572_CR53","doi-asserted-by":"crossref","unstructured":"Helminger, L., & Rechberger, C. (2022). Multi-party computation in the GDPR. Privacy Symposium 2022-Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT).","DOI":"10.1007\/978-3-031-09901-4_2"},{"key":"572_CR54","doi-asserted-by":"publisher","unstructured":"Hemenway, B., Lu, S., Ostrovsky, R., & Welser IV, W. (2016). High-precision secure computation of satellite collision probabilities. In V. Zikas & R. De Prisco (Eds.), Security and Cryptography for Networks (pp. 169\u2013187). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-44618-9_9","DOI":"10.1007\/978-3-319-44618-9_9"},{"key":"572_CR55","unstructured":"Jernigan, S., Kiron, D., & Ransbotham, S. (2016). Data sharing and analytics are driving success with IoT. MIT Sloan Management Review, 58(1)."},{"key":"572_CR56","doi-asserted-by":"publisher","unstructured":"Johnson, M. E. (2009). Managing information risk and the economics of security. In Managing Information Risk and the Economics of Security (pp. 1\u201316). Springer. https:\/\/doi.org\/10.1007\/978-0-387-09762-6_1","DOI":"10.1007\/978-0-387-09762-6_1"},{"issue":"12","key":"572_CR57","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/2.970591","volume":"34","author":"L Kagal","year":"2001","unstructured":"Kagal, L., Finin, T., & Joshi, A. (2001). Trust-based security in pervasive computing environments. Computer, 34(12), 154\u2013157. https:\/\/doi.org\/10.1109\/2.970591","journal-title":"Computer"},{"key":"572_CR58","doi-asserted-by":"publisher","unstructured":"Kaiser, C., Stocker, A., Viscusi, G., Fellmann, M., & Richter, A. (2021). Conceptualising value creation in data-driven services: The case of vehicle data. International Journal of Information Management, 59,\u00a0102335. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2021.102335","DOI":"10.1016\/j.ijinfomgt.2021.102335"},{"issue":"12","key":"572_CR59","doi-asserted-by":"publisher","first-page":"2954","DOI":"10.1111\/jan.13031","volume":"72","author":"H Kallio","year":"2016","unstructured":"Kallio, H., Pietil\u00e4, A.-M., Johnson, M., & Kangasniemi, M. (2016). Systematic methodological review: Developing a framework for a qualitative semi-structured interview guide. Journal of Advanced Nursing, 72(12), 2954\u20132965. https:\/\/doi.org\/10.1111\/jan.13031","journal-title":"Journal of Advanced Nursing"},{"key":"572_CR60","doi-asserted-by":"publisher","unstructured":"Kanger, L., & Pruulmann-Vengerfeldt, P. (2015). Social need for secure multiparty computation. Applications of Secure Multiparty Computation, 43\u201357,. https:\/\/doi.org\/10.3233\/978-1-61499-532-6-43","DOI":"10.3233\/978-1-61499-532-6-43"},{"key":"572_CR61","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ijpe.2017.06.032","volume":"193","author":"J Kembro","year":"2017","unstructured":"Kembro, J., N\u00e4slund, D., & Olhager, J. (2017). Information sharing across multiple supply chain tiers: A Delphi study on antecedents. International Journal of Production Economics, 193, 77\u201386. https:\/\/doi.org\/10.1016\/j.ijpe.2017.06.032","journal-title":"International Journal of Production Economics"},{"key":"572_CR62","first-page":"310","volume":"9","author":"W Kerber","year":"2018","unstructured":"Kerber, W. (2018). Data governance in connected cars: The problem of access to in-vehicle data. Journal of Intellectual Property, Information Technology and Electronic Commerce Law, 9, 310.","journal-title":"Journal of Intellectual Property, Information Technology and Electronic Commerce Law"},{"key":"572_CR63","doi-asserted-by":"publisher","unstructured":"Klein, T., & Verhulst, S. (2017). Access to new data sources for statistics: Business models and incentives for the corporate sector (SSRN Scholarly Paper ID 3141446). Social Science Research Network. https:\/\/doi.org\/10.2139\/ssrn.3141446","DOI":"10.2139\/ssrn.3141446"},{"key":"572_CR64","doi-asserted-by":"publisher","unstructured":"Koch, K., Krenn, S., Pellegrino, D., & Ramacher, S. (2021). Privacy-preserving analytics for data markets using MPC. In M. Friedewald, S. Schiffner, & S. Krenn (Eds.), Privacy and Identity Management (pp. 226\u2013246). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-72465-8_13","DOI":"10.1007\/978-3-030-72465-8_13"},{"issue":"6","key":"572_CR65","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/S0378-7206(02)00068-X","volume":"40","author":"KE Kolekofski","year":"2003","unstructured":"Kolekofski, K. E., & Heminger, A. R. (2003). Beliefs and attitudes affecting intentions to share information in an organizational setting. Information & Management, 40(6), 521\u2013532. https:\/\/doi.org\/10.1016\/S0378-7206(02)00068-X","journal-title":"Information & Management"},{"issue":"3","key":"572_CR66","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1093\/icc\/dtaa002","volume":"29","author":"P Koutroumpis","year":"2020","unstructured":"Koutroumpis, P., Leiponen, A., & Thomas, L. D. (2020). Markets for data. Industrial and Corporate Change, 29(3), 645\u2013660.","journal-title":"Industrial and Corporate Change"},{"key":"572_CR67","doi-asserted-by":"publisher","unstructured":"Lapets, A., Jansen, F., Albab, K. D., Issa, R., Qin, L., Varia, M., & Bestavros, A. (2018). Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities. Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 1\u20135. https:\/\/doi.org\/10.1145\/3209811.3212701","DOI":"10.1145\/3209811.3212701"},{"key":"572_CR68","doi-asserted-by":"publisher","unstructured":"Lee, R. M. (Eds). (1998). Distributed electronic trade scenarios: Representation design prototyping. International Journal of Electronic Commerce, 3(2), 105\u2013136. https:\/\/doi.org\/10.1080\/10864415.1998.11518336","DOI":"10.1080\/10864415.1998.11518336"},{"issue":"1","key":"572_CR69","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.dss.2004.12.003","volume":"42","author":"J Li","year":"2006","unstructured":"Li, J., Sikora, R., Shaw, M. J., & Tan, G. W. (2006). A strategic analysis of inter organizational information sharing. Decision Support Systems, 42(1), 251\u2013266. https:\/\/doi.org\/10.1016\/j.dss.2004.12.003","journal-title":"Decision Support Systems"},{"issue":"2","key":"572_CR70","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TDSC.2017.2754249","volume":"17","author":"H Li","year":"2020","unstructured":"Li, H., Chen, Q., Zhu, H., Ma, D., Wen, H., & Shen, X. S. (2020). Privacy leakage via de-anonymization and aggregation in heterogeneous social networks. IEEE Transactions on Dependable and Secure Computing, 17(2), 350\u2013362. https:\/\/doi.org\/10.1109\/TDSC.2017.2754249","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"572_CR71","doi-asserted-by":"publisher","unstructured":"Lumineau, F., Schilke, O., & Wang, W. (2020). Organizational trust in the age of the fourth industrial revolution: Shifts in the nature, production, and targets of trust. https:\/\/doi.org\/10.13140\/RG.2.2.20789.50401","DOI":"10.13140\/RG.2.2.20789.50401"},{"key":"572_CR72","unstructured":"Lundy-Bryan, L. (2021). Privacy enhancing technologies: Part 2- The coming age of collaborative computing (Lunar Insight Series). Lunar Ventures."},{"issue":"3","key":"572_CR73","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709\u2013734. https:\/\/doi.org\/10.5465\/amr.1995.9508080335","journal-title":"Academy of Management Review"},{"key":"572_CR74","volume-title":"Qualitative data analysis: An expanded sourcebook","author":"MB Miles","year":"1994","unstructured":"Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook. Sage."},{"issue":"3","key":"572_CR75","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/002224299405800302","volume":"58","author":"RM Morgan","year":"1994","unstructured":"Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20\u201338. https:\/\/doi.org\/10.1177\/002224299405800302","journal-title":"Journal of Marketing"},{"key":"572_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2021.102331","volume":"108","author":"L Mosterd","year":"2021","unstructured":"Mosterd, L., Sobota, V. C. M., van de Kaa, G., Ding, A. Y., & de Reuver, M. (2021). Context dependent trade-offs around platform-to-platform openness: The case of the Internet of Things. Technovation, 108, 102331. https:\/\/doi.org\/10.1016\/j.technovation.2021.102331","journal-title":"Technovation"},{"issue":"3","key":"572_CR77","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1016\/j.tele.2015.12.008","volume":"33","author":"S Mukhopadhyay","year":"2016","unstructured":"Mukhopadhyay, S., de Reuver, M., & Bouwman, H. (2016). Effectiveness of control mechanisms in mobile platform ecosystem. Telematics and Informatics, 33(3), 848\u2013859. https:\/\/doi.org\/10.1016\/j.tele.2015.12.008","journal-title":"Telematics and Informatics"},{"key":"572_CR78","doi-asserted-by":"publisher","first-page":"106733","DOI":"10.1016\/j.cie.2020.106733","volume":"148","author":"JM M\u00fcller","year":"2020","unstructured":"M\u00fcller, J. M., Veile, J. W., & Voigt, K.-I. (2020). Prerequisites and incentives for digital information sharing in Industry 4.0 \u2013 An international comparison across data types. Computers & Industrial Engineering, 148, 106733. https:\/\/doi.org\/10.1016\/j.cie.2020.106733","journal-title":"Computers & Industrial Engineering"},{"key":"572_CR79","doi-asserted-by":"publisher","unstructured":"Naehrig, M., Lauter, K., & Vaikuntanathan, V. (2011). Can homomorphic encryption be practical? Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, 113\u2013124. https:\/\/doi.org\/10.1145\/2046660.2046682","DOI":"10.1145\/2046660.2046682"},{"issue":"4","key":"572_CR80","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1287\/isre.1060.0103","volume":"17","author":"AI Nicolaou","year":"2006","unstructured":"Nicolaou, A. I., & McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information Systems Research, 17(4), 332\u2013351. https:\/\/doi.org\/10.1287\/isre.1060.0103","journal-title":"Information Systems Research"},{"key":"572_CR81","unstructured":"Nokkala, T., Salmela, H., & Toivonen, J. (2019). Data governance in digital platforms. AMCIS 2019 Proceedings. https:\/\/aisel.aisnet.org\/amcis2019\/ebusiness\/ebusiness\/12"},{"key":"572_CR82","doi-asserted-by":"publisher","unstructured":"Noorian, Z., Iyilade, J., Mohkami, M., & Vassileva, J. (2014). Trust mechanism for enforcing compliance to secondary data use contracts. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 519\u2013526. https:\/\/doi.org\/10.1109\/TrustCom.2014.66","DOI":"10.1109\/TrustCom.2014.66"},{"key":"572_CR83","unstructured":"Opriel, S., Fraunhofer, I., Skubowius, G. E., Fraunhofer, I. M. L., & Lamberjohann, M. (2021). How usage control fosters willingness to share sensitive data in inter-organizational processes of supply chains. International Scientific Symposium on Logistics, 91."},{"key":"572_CR84","unstructured":"Otto, B., Steinbu\u00df, S., Teuscher, A., & Lohmann, S. (2019). Reference architecture model\u2014International data spaces (Version 3.0). International Data Spaces Association. https:\/\/internationaldataspaces.org\/wp-content\/uploads\/IDS-Reference-Architecture-Model-3.0-2019.pdf"},{"issue":"1","key":"572_CR85","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"PA Pavlou","year":"2004","unstructured":"Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37\u201359. https:\/\/doi.org\/10.1287\/isre.1040.0015","journal-title":"Information Systems Research"},{"issue":"4","key":"572_CR86","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/10864415.2018.1485083","volume":"22","author":"E Penttinen","year":"2018","unstructured":"Penttinen, E., Halme, M., Lyytinen, K., & Myllynen, N. (2018). What influences choice of business-to-business connectivity platforms? International Journal of Electronic Commerce, 22(4), 479\u2013509. https:\/\/doi.org\/10.1080\/10864415.2018.1485083","journal-title":"International Journal of Electronic Commerce"},{"key":"572_CR87","doi-asserted-by":"publisher","unstructured":"Pettai, M., & Laud, P. (2015). Combining differential privacy and secure multiparty computation. Proceedings of the 31st Annual Computer Security Applications Conference, pp. 421\u2013430. https:\/\/doi.org\/10.1145\/2818000.2818027","DOI":"10.1145\/2818000.2818027"},{"key":"572_CR88","doi-asserted-by":"crossref","unstructured":"Priego, L. P., Osimo, D., & Wareham, J. D. (2019). Data sharing practice in big data ecosystems. SSRN Electronic Journal.","DOI":"10.2139\/ssrn.3355696"},{"key":"572_CR89","unstructured":"Ratnasingam, P., Pavlou, P. A., & Tan, Y.-H. (2002). The importance of technology trust for B2B electronic commerce (SSRN Scholarly Paper ID 2380727). Social Science Research Network. https:\/\/papers.ssrn.com\/abstract=2380727"},{"key":"572_CR90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30048-6","volume-title":"Scientific research in information systems: A beginner\u2019s guide","author":"J Recker","year":"2013","unstructured":"Recker, J. (2013). Scientific research in information systems: A beginner\u2019s guide. Springer."},{"key":"572_CR91","doi-asserted-by":"publisher","unstructured":"Reimsbach-Kounatze, C. (2021). Enhancing access to and sharing of data: Striking the balance between openness and control over data. 25\u201368. https:\/\/doi.org\/10.5771\/9783748924999-25","DOI":"10.5771\/9783748924999-25"},{"issue":"1","key":"572_CR92","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s40319-018-00777-7","volume":"50","author":"H Richter","year":"2019","unstructured":"Richter, H., & Slowinski, P. R. (2019). The data sharing economy: On the emergence of new intermediaries. IIC-International Review of Intellectual Property and Competition Law, 50(1), 4\u201329. https:\/\/doi.org\/10.1007\/s40319-018-00777-7","journal-title":"IIC-International Review of Intellectual Property and Competition Law"},{"key":"572_CR93","doi-asserted-by":"publisher","unstructured":"Roman, D., & Vu, K. (2019). Enabling data markets using smart contracts and multi-party computation. In W. Abramowicz & A. Paschke (Eds.), Business Information Systems Workshops (pp. 258\u2013263). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-04849-5_23","DOI":"10.1007\/978-3-030-04849-5_23"},{"key":"572_CR94","unstructured":"Roseman Labs. (2022). Easier, safer and more collaboration on healthcare data. Roseman Labs. https:\/\/rosemanlabs.com\/blog\/zorg_whitepaper.html"},{"issue":"2","key":"572_CR95","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ejor.2005.01.059","volume":"174","author":"S Samaddar","year":"2006","unstructured":"Samaddar, S., Nargundkar, S., & Daley, M. (2006). Inter-organizational information sharing: The role of supply network configuration and partner goal congruence. European Journal of Operational Research, 174(2), 744\u2013765. https:\/\/doi.org\/10.1016\/j.ejor.2005.01.059","journal-title":"European Journal of Operational Research"},{"key":"572_CR96","doi-asserted-by":"publisher","unstructured":"Sangers, A., van Heesch, M., Attema, T., Veugen, T., Wiggerman, M., Veldsink, J., Bloemen, O., & Worm, D. (2019). Secure multiparty pagerank algorithm for collaborative fraud detection. In I. Goldberg & T. Moore (Eds.), Financial Cryptography and Data Security (pp. 605\u2013623). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-32101-7_35","DOI":"10.1007\/978-3-030-32101-7_35"},{"issue":"4","key":"572_CR97","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1108\/02635571211225512","volume":"112","author":"V Saprikis","year":"2012","unstructured":"Saprikis, V., & Vlachopoulou, M. (2012). Determinants of suppliers\u2019 level of use of B2B e-marketplaces. Industrial Management & Data Systems, 112(4), 619\u2013643. https:\/\/doi.org\/10.1108\/02635571211225512","journal-title":"Industrial Management & Data Systems"},{"key":"572_CR98","volume-title":"Research methods for business: A skill building approach","author":"U Sekaran","year":"2016","unstructured":"Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach. John Wiley & Sons."},{"issue":"11","key":"572_CR99","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Communications of the ACM"},{"issue":"2","key":"572_CR100","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2019","unstructured":"Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2019). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2), 331\u2013346. https:\/\/doi.org\/10.1109\/TIFS.2018.2850312","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"572_CR101","doi-asserted-by":"publisher","unstructured":"Son, J.-Y., Tu, L., & Benbasat, I. (2006). A descriptive content analysis of trust-building measures in B2B electronic marketplaces. Communications of the Association for Information Systems, 18. https:\/\/doi.org\/10.17705\/1CAIS.01806","DOI":"10.17705\/1CAIS.01806"},{"issue":"4","key":"572_CR102","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s10272-019-0826-z","volume":"54","author":"M Spiekermann","year":"2019","unstructured":"Spiekermann, M. (2019). Data marketplaces: Trends and monetisation of data goods. Intereconomics, 54(4), 208\u2013216. https:\/\/doi.org\/10.1007\/s10272-019-0826-z","journal-title":"Intereconomics"},{"key":"572_CR103","doi-asserted-by":"publisher","unstructured":"Spiekermann, S. (2005). Perceived control: Scales for privacy in ubiquitous computing (SSRN Scholarly Paper ID 761109). Social Science Research Network. https:\/\/doi.org\/10.2139\/ssrn.761109","DOI":"10.2139\/ssrn.761109"},{"issue":"1","key":"572_CR104","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/S0925-5273(01)00187-6","volume":"75","author":"G Stefansson","year":"2002","unstructured":"Stefansson, G. (2002). Business-to-business data sharing: A source for integration of supply chains. International Journal of Production Economics, 75(1), 135\u2013146. https:\/\/doi.org\/10.1016\/S0925-5273(01)00187-6","journal-title":"International Journal of Production Economics"},{"issue":"1","key":"572_CR105","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/3158333","volume":"61","author":"H Subramanian","year":"2017","unstructured":"Subramanian, H. (2017). Decentralized blockchain-based electronic marketplaces. Communications of the ACM, 61(1), 78\u201384. https:\/\/doi.org\/10.1145\/3158333","journal-title":"Communications of the ACM"},{"issue":"3","key":"572_CR106","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/08874417.2016.1222891","volume":"58","author":"S Sun","year":"2018","unstructured":"Sun, S., Cegielski, C. G., Jia, L., & Hall, D. J. (2018). Understanding the factors affecting the organizational adoption of big data. Journal of Computer Information Systems, 58(3), 193\u2013203. https:\/\/doi.org\/10.1080\/08874417.2016.1222891","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"572_CR107","doi-asserted-by":"publisher","first-page":"239","DOI":"10.25300\/MISQ\/2017\/41.1.12","volume":"41","author":"F Svahn","year":"2017","unstructured":"Svahn, F., Mathiassen, L., & Lindgren, R. (2017). Embracing digital innovation in incumbent firms: How volvo cars managed competing concerns. MIS Quarterly, 41(1), 239\u2013253. https:\/\/doi.org\/10.25300\/MISQ\/2017\/41.1.12","journal-title":"MIS Quarterly"},{"key":"572_CR108","doi-asserted-by":"publisher","unstructured":"Svensson, R. B., & Taghavianfar, M. (2020). Toward becoming a data-driven organization: Challenges and benefits. In F. Dalpiaz, J. Zdravkovic, & P. Loucopoulos (Eds.), Research Challenges in Information Science (pp. 3\u201319). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-50316-1_1","DOI":"10.1007\/978-3-030-50316-1_1"},{"key":"572_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-408066-9.00001-1","volume-title":"Platform ecosystems: Aligning architecture, governance, and strategy","author":"A Tiwana","year":"2014","unstructured":"Tiwana, A. (2014). Platform ecosystems: Aligning architecture, governance, and strategy. Elsevier."},{"issue":"4","key":"572_CR110","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1287\/isre.1100.0323","volume":"21","author":"A Tiwana","year":"2010","unstructured":"Tiwana, A., Konsynski, B., & Bush, A. A. (2010). Research commentary\u2014platform evolution: Coevolution of platform architecture, governance, and environmental dynamics. Information Systems Research, 21(4), 675\u2013687. https:\/\/doi.org\/10.1287\/isre.1100.0323","journal-title":"Information Systems Research"},{"key":"572_CR111","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.techfore.2017.09.040","volume":"129","author":"T van den Broek","year":"2018","unstructured":"van den Broek, T., & van Veenstra, A. F. (2018). Governance of big data collaborations: How to balance regulatory compliance and disruptive innovation. Technological Forecasting and Social Change, 129, 330\u2013338. https:\/\/doi.org\/10.1016\/j.techfore.2017.09.040","journal-title":"Technological Forecasting and Social Change"},{"issue":"1","key":"572_CR112","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1186\/s12911-021-01582-y","volume":"21","author":"MB van Egmond","year":"2021","unstructured":"van Egmond, M. B., Spini, G., van der Galien, O., IJpma, A., Veugen, T., Kraaij, W., Sangers, A., Rooijakkers, T., Langenkamp, P., Kamphorst, B., van de L\u2019Isle, N., & Kooij-Janic, M. (2021). Privacy-preserving dataset combination and Lasso regression for healthcare predictions. BMC Medical Informatics and Decision Making, 21(1), 266. https:\/\/doi.org\/10.1186\/s12911-021-01582-y","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"572_CR113","doi-asserted-by":"crossref","unstructured":"van de Ven, M., Abbas, A. E., Kwee, Z., & de Reuver, M. (2021). Creating a taxonomy of business models for data marketplaces. 34th Bled EConference: Digital Support from Crisis to Progressive Change, 313\u2013325.","DOI":"10.18690\/978-961-286-485-9.23"},{"key":"572_CR114","unstructured":"Verschuren, P., & Doorewaard, H. (2010). Designing a research project (Vol. 2). Eleven International Publishing."},{"key":"572_CR115","doi-asserted-by":"publisher","unstructured":"Virkar, S., Viale Pereira, G., & Vignoli, M. (2019). Investigating the social, political, economic and cultural implications of data trading. In I. Lindgren, M. Janssen, H. Lee, A. Polini, M. P. Rodr\u00edguez Bol\u00edvar, H. J. Scholl, & E. Tambouris (Eds.), Electronic Government (pp. 215\u2013229). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-27325-5_17","DOI":"10.1007\/978-3-030-27325-5_17"},{"issue":"1","key":"572_CR116","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jsis.2007.01.004","volume":"16","author":"A White","year":"2007","unstructured":"White, A., Daniel, E., Ward, J., & Wilson, H. (2007). The adoption of consortium B2B e-marketplaces: An exploratory study. The Journal of Strategic Information Systems, 16(1), 71\u2013103. https:\/\/doi.org\/10.1016\/j.jsis.2007.01.004","journal-title":"The Journal of Strategic Information Systems"},{"issue":"3","key":"572_CR117","doi-asserted-by":"publisher","first-page":"741","DOI":"10.25300\/MISQ\/2016\/40.3.11","volume":"40","author":"M Wiener","year":"2016","unstructured":"Wiener, M., Mahring, M., Remus, U., & Saunders, C. (2016). Control configuration and control enactment in information systems projects: Review and expanded theoretical framework. Management Information Systems Quarterly, 40(3), 741\u2013774.","journal-title":"Management Information Systems Quarterly"},{"key":"572_CR118","doi-asserted-by":"publisher","unstructured":"Yao, A. C. (1982). Protocols for secure computations. 23rd Annual Symposium on Foundations of Computer Science (Sfcs 1982), 160\u2013164. https:\/\/doi.org\/10.1109\/SFCS.1982.38","DOI":"10.1109\/SFCS.1982.38"},{"key":"572_CR119","doi-asserted-by":"publisher","unstructured":"Yao, A. C. (1986). How to generate and exchange secrets. 27th Annual Symposium on Foundations of Computer Science (Sfcs 1986), 162\u2013167. https:\/\/doi.org\/10.1109\/SFCS.1986.25","DOI":"10.1109\/SFCS.1986.25"},{"issue":"2","key":"572_CR120","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1108\/IJLM-09-2015-0158","volume":"28","author":"N Zaheer","year":"2017","unstructured":"Zaheer, N., & Trkman, P. (2017). An information sharing theory perspective on willingness to share information in supply chains. The International Journal of Logistics Management, 28(2), 417\u2013443. https:\/\/doi.org\/10.1108\/IJLM-09-2015-0158","journal-title":"The International Journal of Logistics Management"},{"key":"572_CR121","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao, C., Zhao, S., Zhao, M., Chen, Z., Gao, C.-Z., Li, H., & Tan, Y. (2019). Secure multi-party computation: Theory, practice and applications. Information Sciences, 476, 357\u2013372. https:\/\/doi.org\/10.1016\/j.ins.2018.10.024","journal-title":"Information Sciences"},{"key":"572_CR122","doi-asserted-by":"publisher","unstructured":"Zhong, H., Sang, Y., Zhang, Y., & Xi, Z. (2020). Secure multi-party computation on blockchain: An overview. In H. Shen & Y. Sang (Eds.), Parallel Architectures, Algorithms and Programming (pp. 452\u2013460). Springer. https:\/\/doi.org\/10.1007\/978-981-15-2767-8_40","DOI":"10.1007\/978-981-15-2767-8_40"},{"key":"572_CR123","unstructured":"Z\u00f6ll, A., Olt, C., & Buxmann, P. (2021). Privacy-sensitive business models: Barriers of organizational adoption of privacy-enhancing technologies. ECIS 2021 Research Papers. https:\/\/aisel.aisnet.org\/ecis2021_rp\/34"},{"issue":"3","key":"572_CR124","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1108\/JEIM-03-2018-0058","volume":"32","author":"J Zrenner","year":"2019","unstructured":"Zrenner, J., M\u00f6ller, F. O., Jung, C., Eitel, A., & Otto, B. (2019). Usage control architecture options for data sovereignty in business ecosystems. Journal of Enterprise Information Management, 32(3), 477\u2013495. https:\/\/doi.org\/10.1108\/JEIM-03-2018-0058","journal-title":"Journal of Enterprise Information Management"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-022-00572-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12525-022-00572-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-022-00572-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,16]],"date-time":"2022-11-16T12:43:17Z","timestamp":1668602597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12525-022-00572-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,30]]},"references-count":124,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["572"],"URL":"https:\/\/doi.org\/10.1007\/s12525-022-00572-w","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,30]]},"assertion":[{"value":"18 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}