{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:36:42Z","timestamp":1777901802583,"version":"3.51.4"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004871","name":"Technische Universit\u00e4t Braunschweig","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004871","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Car manufacturers and suppliers in the Automotive industry increasingly face the issue of optimization of highly complex supply chains that need to accommodate each customer's precise demands, requiring a vast array of parts and information to be available at the right place and at the right time. This involves data sharing between organizations, which is hindered by various issues, such as fear of data misappropriation by the data receiver or the involuntary disclosure of business secrets. The paper proposes design principles for a novel type of Inter-Organizational Information System, which addresses these challenges through the technical implementation of data sovereignty. The study reports on an Action Design Research study in the Automotive industry between a car manufacturer and a 1st-tier supplier. It contributes (a) design requirements, (b) design features, (c) an instantiation, and (d) design principles for this type of data sovereign inter-organizational information system.<\/jats:p>","DOI":"10.1007\/s12599-024-00893-4","type":"journal-article","created":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T07:02:51Z","timestamp":1724914971000},"page":"833-853","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Data Sovereignty in Inter-organizational Information Systems"],"prefix":"10.1007","volume":"67","author":[{"given":"Sebastian","family":"Opriel","sequence":"first","affiliation":[]},{"given":"Frederik","family":"M\u00f6ller","sequence":"additional","affiliation":[]},{"given":"Gero","family":"Strobel","sequence":"additional","affiliation":[]},{"given":"Boris","family":"Otto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,29]]},"reference":[{"issue":"2","key":"893_CR1","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1504\/IJSOM.2019.10022079)","volume":"33","author":"W Ahmed","year":"2019","unstructured":"Ahmed W, Omar M (2019) Drivers of supply chain transparency and its effects on performance measures in the automotive industry: case of a developing country. Int J Serv Oper Manag 33(2):159\u2013186. https:\/\/doi.org\/10.1504\/IJSOM.2019.10022079)","journal-title":"Int J Serv Oper Manag"},{"key":"893_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-59665-5_6","volume-title":"Distributed applications and interoperable systems","author":"S Alboaie","year":"2017","unstructured":"Alboaie S, Cosovan D (2017) Private data system enabling self-sovereign storage managed by executable choreographies. In: Chen LY, Reiser HP (eds) Distributed applications and interoperable systems. Springer, Cham, pp 83\u201398. https:\/\/doi.org\/10.1007\/978-3-319-59665-5_6"},{"issue":"2","key":"893_CR3","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3926\/jiem.2835","volume":"12","author":"J Aldoori","year":"2019","unstructured":"Aldoori J (2019) The impact of supply chain collaboration on performance in automotive industry: empirical evidence. J Ind Eng Manag 12(2):241\u2013253. https:\/\/doi.org\/10.3926\/jiem.2835","journal-title":"J Ind Eng Manag"},{"issue":"1","key":"893_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1177\/0309132516662147","volume":"42","author":"L Amoore","year":"2016","unstructured":"Amoore L (2016) Cloud geographies: computing, data, sovereignty. Progr Hum Geogr 42(1):4\u201324. https:\/\/doi.org\/10.1177\/0309132516662147","journal-title":"Progr Hum Geogr"},{"issue":"2","key":"893_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1111\/j.1475-682X.1964.tb00583.x","volume":"34","author":"PM Blau","year":"1964","unstructured":"Blau PM (1964) Justice in social exchange. Sociol Inq 34(2):193\u2013206. https:\/\/doi.org\/10.1111\/j.1475-682X.1964.tb00583.x","journal-title":"Sociol Inq"},{"key":"893_CR6","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638775","author":"B Boehm","year":"2003","unstructured":"Boehm B (2003) Value-based software engineering: reinventing. ACM SIGSOFT Soft Eng Not. https:\/\/doi.org\/10.1145\/638750.638775","journal-title":"ACM SIGSOFT Soft Eng Not"},{"issue":"5","key":"893_CR7","doi-asserted-by":"publisher","first-page":"302","DOI":"10.3152\/147154303781780290","volume":"30","author":"D Braun","year":"2003","unstructured":"Braun D, Guston DH (2003) Principal-agent theory and research policy: an introduction. Sci Publ Policy 30(5):302\u2013308. https:\/\/doi.org\/10.3152\/147154303781780290","journal-title":"Sci Publ Policy"},{"key":"893_CR8","unstructured":"Britannica (2023) Sovereignty. https:\/\/www.britannica.com\/topic\/sovereignty. Accessed 9 Oct 2023"},{"issue":"8","key":"893_CR9","doi-asserted-by":"publisher","first-page":"1032","DOI":"10.1287\/mnsc.46.8.1032.12029","volume":"46","author":"GP Cachon","year":"2000","unstructured":"Cachon GP, Fisher M (2000) Supply chain inventory management and the value of shared information. Manag Sci 46(8):1032\u20131048. https:\/\/doi.org\/10.1287\/mnsc.46.8.1032.12029","journal-title":"Manag Sci"},{"key":"893_CR10","unstructured":"Campbell J (2019) FBI says hackers are targeting us auto industry. https:\/\/edition.cnn.com\/2019\/11\/20\/politics\/fbi-us-auto-industry-hackers\/index.html. Accessed 5 Aug 2024"},{"issue":"2","key":"893_CR11","first-page":"134","volume":"63","author":"JI Cash","year":"1985","unstructured":"Cash JI, Konsynski BR (1985) IS redraws competitive boundaries. Harv Bus Rev 63(2):134\u2013142","journal-title":"Harv Bus Rev"},{"key":"893_CR12","unstructured":"Catena-X (2024) Landing page of Catena-X. https:\/\/catena-x.net\/de\/. Accessed 16 Jul 2024"},{"key":"893_CR13","unstructured":"Chandra Kruse L, Seidel S (2017) Tensions in design principle formulation and reuse. In: Proceedings of the 12th international conference on design science research in information systems and technology, Karlsruhe"},{"key":"893_CR14","doi-asserted-by":"publisher","unstructured":"Chandra Kruse L, Seidel S, Gregor S (2015) Prescriptive knowledge in IS research: conceptualizing design principles in terms of materiality, action, and boundary conditions. In: Proceedings of the 48th Hawaii international conference on system sciences, Hawaii. https:\/\/doi.org\/10.1109\/HICSS.2015.485","DOI":"10.1109\/HICSS.2015.485"},{"issue":"1","key":"893_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.8.1.1","volume":"8","author":"V Choudhury","year":"1997","unstructured":"Choudhury V (1997) Strategic choices in the development of interorganizational information systems. Inf Syst Res 8(1):1\u201324. https:\/\/doi.org\/10.1287\/isre.8.1.1","journal-title":"Inf Syst Res"},{"key":"893_CR16","unstructured":"European Commission (2020) A European strategy for data. COM 66"},{"key":"893_CR17","volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"J Corbin","year":"2014","unstructured":"Corbin J, Strauss A (2014) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage"},{"key":"893_CR18","unstructured":"Cowley S (2018) Big red flag: automakers' trade secrets exposed in data leak. https:\/\/www.nytimes.com\/2018\/07\/20\/business\/suppliers-data-leak-automakers.html. Accessed 11 Nov 2022"},{"issue":"3","key":"893_CR19","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1162\/074793601750357196","volume":"17","author":"N Cross","year":"2001","unstructured":"Cross N (2001) Designerly ways of knowing: design discipline versus design science. Des Issues 17(3):49\u201355. https:\/\/doi.org\/10.1162\/074793601750357196","journal-title":"Des Issues"},{"issue":"1","key":"893_CR20","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1108\/13598540410517610","volume":"9","author":"D Doran","year":"2004","unstructured":"Doran D (2004) Rethinking the supply chain: an automotive perspective. Supply Chain Manag Int J 9(1):102\u2013109. https:\/\/doi.org\/10.1108\/13598540410517610","journal-title":"Supply Chain Manag Int J"},{"issue":"4","key":"893_CR21","doi-asserted-by":"publisher","first-page":"532","DOI":"10.2307\/258557","volume":"14","author":"K Eisenhardt","year":"1989","unstructured":"Eisenhardt K (1989) Building theories from case study research. Acad Manag Rev 14(4):532\u2013550. https:\/\/doi.org\/10.2307\/258557","journal-title":"Acad Manag Rev"},{"key":"893_CR22","unstructured":"Eitel A, Jung C, Brandst\u00e4dter R, Hosseini SH, Bader S, K\u00fchnle C, Birnstill P, Brost G, Gall M, Bruckner F, Wei\u00dfenberg N, Korth B (2021) Usage control in the international data spaces. Position Paper Version 3.0, International Data Space Association"},{"key":"893_CR23","doi-asserted-by":"crossref","unstructured":"Fassnacht M, Benz C, Heinz D, Leimstoll J, Satzger G (2023) Analyzing barriers to data sharing among private sector organizations: combined insights from research and practice. In: Proceedings of the 56th Hawaii international conference on system sciences, Hawaii","DOI":"10.24251\/HICSS.2023.453"},{"key":"893_CR24","unstructured":"Gaia-X (2024) https:\/\/gaia-x.eu\/who-we-are\/vertical-ecosystems\/. Accessed 16 Jul 2024"},{"issue":"3","key":"893_CR25","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/0364-0213(92)90038-V","volume":"16","author":"V Goel","year":"1992","unstructured":"Goel V, Pirolli P (1992) The structure of design problem spaces. Cogn Sci 16(3):395\u2013429. https:\/\/doi.org\/10.1016\/0364-0213(92)90038-V","journal-title":"Cogn Sci"},{"issue":"2","key":"893_CR26","first-page":"59","volume":"6","author":"G Goldkuhl","year":"2004","unstructured":"Goldkuhl G (2004) Design theories in information systems: a need for multi-grounding. J Inf Technol Theor Appl 6(2):59\u201372","journal-title":"J Inf Technol Theor Appl"},{"issue":"2","key":"893_CR27","doi-asserted-by":"publisher","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","volume":"37","author":"S Gregor","year":"2013","unstructured":"Gregor S, Hevner AR (2013) Positioning and presenting design science research for maximum impact. MIS Q 37(2):337\u2013355. https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.2.01","journal-title":"MIS Q"},{"issue":"5","key":"893_CR28","doi-asserted-by":"publisher","first-page":"312","DOI":"10.17705\/1JAIS.00129","volume":"8","author":"S Gregor","year":"2007","unstructured":"Gregor S, Jones D (2007) The anatomy of a design theory. J Assoc Inf Syst 8(5):312\u2013335. https:\/\/doi.org\/10.17705\/1JAIS.00129","journal-title":"J Assoc Inf Syst"},{"issue":"6","key":"893_CR29","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.17705\/1jais.00649","volume":"21","author":"S Gregor","year":"2020","unstructured":"Gregor S, Chandra Kruse L, Seidel S (2020) The anatomy of a design principle. J Assoc Inf Syst 21(6):1622\u20131652. https:\/\/doi.org\/10.17705\/1jais.00649","journal-title":"J Assoc Inf Syst"},{"key":"893_CR30","doi-asserted-by":"publisher","unstructured":"Gregor S (2009) Building theory in the sciences of the artificial. In: Proceedings of the 4th international conference on design science research in information systems and technology, Malvern. https:\/\/doi.org\/10.1145\/1555619.1555625","DOI":"10.1145\/1555619.1555625"},{"key":"893_CR31","doi-asserted-by":"publisher","unstructured":"Gu L, Ding X, Deng RH., Xie B, Mei H (2008) Remote attestation on program execution. In: Proceedings of the 3rd ACM workshop on scalable trusted computing, New York, pp 11\u201320. https:\/\/doi.org\/10.1145\/1456455.1456458","DOI":"10.1145\/1456455.1456458"},{"key":"893_CR32","doi-asserted-by":"crossref","unstructured":"Hellmeier M, von Scherenberg F (2023) A delimitation of data sovereignty from digital and technological sovereignty. In: Proceedings of the 31st European conference on information systems, Kristiansand","DOI":"10.1007\/s12525-024-00693-4"},{"key":"893_CR33","doi-asserted-by":"publisher","unstructured":"Hellmeier M, Pampus J, Qarawlus H, Howar F (2023) Implementing data sovereignty: requirements & challenges from practice. In: Proceedings of the 18th international conference on availability, reliability and security, New York. https:\/\/doi.org\/10.1145\/3600160.3604995","DOI":"10.1145\/3600160.3604995"},{"key":"893_CR34","first-page":"188","volume-title":"Requirements engineering: foundation for software quality","author":"T-M Hesse","year":"2016","unstructured":"Hesse T-M, Paech B (2016) Documenting relations between requirements and design decisions: a case study on design session transcripts. In: Daneva M, Pastor O (eds) Requirements engineering: foundation for software quality. Springer, Cham, pp 188\u2013204"},{"issue":"1","key":"893_CR35","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A Hevner","year":"2004","unstructured":"Hevner A, March ST, Park J, Ram S (2004) Design science in information systems research. MIS Q 28(1):75\u2013105. https:\/\/doi.org\/10.2307\/25148625","journal-title":"MIS Q"},{"issue":"2","key":"893_CR36","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/0963-8687(95)80020-Q","volume":"4","author":"CP Holland","year":"1995","unstructured":"Holland CP (1995) Cooperative supply chain management: the impact of interorganizational information systems. J Strateg Inf Syst 4(2):117\u2013133. https:\/\/doi.org\/10.1016\/0963-8687(95)80020-Q","journal-title":"J Strateg Inf Syst"},{"key":"893_CR37","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720982012","author":"P Hummel","year":"2021","unstructured":"Hummel P, Braun M, Tretter M, Dabrock P (2021) Data sovereignty: a review. Big Data Soc. https:\/\/doi.org\/10.1177\/2053951720982012","journal-title":"Big Data Soc"},{"key":"893_CR38","unstructured":"ISO\/IEC\/IEEE (2018) Systems and software engineering: life cycle processes \u2013 requirements engineering. Vernier"},{"key":"893_CR39","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MS.2018.2141039","volume":"35","author":"P Jamshidi","year":"2018","unstructured":"Jamshidi P, Pahl C, Mendon\u00e7a N, Lewis J, Tilkov S (2018) Microservices: the journey so far and challenges ahead. IEEE Softw 35:24\u201335. https:\/\/doi.org\/10.1109\/MS.2018.2141039","journal-title":"IEEE Softw"},{"issue":"5","key":"893_CR40","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s12599-019-00614-2","volume":"61","author":"M Jarke","year":"2019","unstructured":"Jarke M, Otto B, Ram S (2019) Data sovereignty and data space ecosystems. Bus Inf Syst Eng 61(5):549\u2013550. https:\/\/doi.org\/10.1007\/s12599-019-00614-2","journal-title":"Bus Inf Syst Eng"},{"key":"893_CR41","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-3-030-49435-3_34","volume-title":"Advanced information systems engineering","author":"M Jarke","year":"2020","unstructured":"Jarke M (2020) Data sovereignty and the Internet of Production. In: Dustdar S et al (eds) Advanced information systems engineering. Springer, Cham, pp 549\u2013558"},{"issue":"2","key":"893_CR42","doi-asserted-by":"publisher","first-page":"153","DOI":"10.2307\/248839","volume":"12","author":"HR Johnston","year":"1988","unstructured":"Johnston HR, Vitale MR (1988) Creating competitive advantage with interorganizational information systems. MIS Q 12(2):153\u2013165. https:\/\/doi.org\/10.2307\/248839","journal-title":"MIS Q"},{"key":"893_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2024.102280","volume":"150","author":"I Jussen","year":"2024","unstructured":"Jussen I, M\u00f6ller F, Schweihoff J, Gie\u00df A, Giussani G, Otto B (2024) Issues in inter-organizational data sharing: findings from practice and research challenges. Data Knowl Eng 150:102280. https:\/\/doi.org\/10.1016\/j.datak.2024.102280","journal-title":"Data Knowl Eng"},{"key":"893_CR44","doi-asserted-by":"publisher","unstructured":"Jussen I, Schweihoff J, M\u00f6ller F (2023) Tensions in inter-organizational data sharing: findings from literature and practice. In: IEEE 25th conference on business informatics. https:\/\/doi.org\/10.1109\/CBI58679.2023.10187530","DOI":"10.1109\/CBI58679.2023.10187530"},{"key":"893_CR45","unstructured":"Kern J, Wolff P (2019) The digital transformation of the automotive supply chain \u2013 an empirical analysis with evidence from Germany and China: case study contribution to the OECD TIP Digital and Open Innovation project"},{"issue":"1","key":"893_CR46","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3923\/ijmsaj.2011.9.29","volume":"1","author":"M Khurana","year":"2011","unstructured":"Khurana M, Mishra P, Singh AR (2011) Barriers to information sharing in supply chain of manufacturing industries. Int J Manuf Syst 1(1):9\u201329. https:\/\/doi.org\/10.3923\/ijmsaj.2011.9.29","journal-title":"Int J Manuf Syst"},{"key":"893_CR47","doi-asserted-by":"crossref","unstructured":"Klein S, Poulymenakou A, Riemer K, Papakiriakopoulos D. Gogolin M, Nikas A (2005) IOIS and interfirm networks-interdependents and managerial challenges. In: Eom SB (ed) Inter-organizational Information Systems in the Internet Age, IGI Global, pp 170\u2013213","DOI":"10.4018\/978-1-59140-318-0.ch007"},{"key":"893_CR48","doi-asserted-by":"crossref","unstructured":"Kukutai T, Taylor J (2016) Data sovereignty for indigenous peoples: current practice and future needs. In: Kukutai T, Taylor J (eds) Indigenous data sovereignty. ANU Press, pp 1\u201322","DOI":"10.22459\/CAEPR38.11.2016.01"},{"issue":"3","key":"893_CR49","doi-asserted-by":"publisher","first-page":"279","DOI":"10.2307\/249657","volume":"20","author":"K Kumar","year":"1996","unstructured":"Kumar K, van Dissel HG (1996) Sustainable collaboration: managing conflict and cooperation in interorganizational systems. MIS Q 20(3):279\u2013300. https:\/\/doi.org\/10.2307\/249657","journal-title":"MIS Q"},{"issue":"3","key":"893_CR50","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1504\/IJLSM.2018.095821","volume":"31","author":"RS Kumar","year":"2018","unstructured":"Kumar RS, Pugazhendhi S, Muralidharan C, Murali S (2018) An empirical study on effect of information sharing on supply chain performance \u2013 the case of Indian automotive industry. Int J Logist Syst Manag 31(3):299\u2013319. https:\/\/doi.org\/10.1504\/IJLSM.2018.095821","journal-title":"Int J Logist Syst Manag"},{"issue":"4","key":"893_CR51","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1287\/mnsc.43.4.546","volume":"43","author":"HL Lee","year":"1997","unstructured":"Lee HL, Padmanabhan V, Whang S (1997) Information distortion in a supply chain: the bullwhip effect. Manag Sci 43(4):546\u2013558. https:\/\/doi.org\/10.1287\/mnsc.43.4.546","journal-title":"Manag Sci"},{"issue":"5","key":"893_CR52","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1287\/mnsc.46.5.626.12047","volume":"46","author":"HL Lee","year":"2000","unstructured":"Lee HL, So KC, Tang CS (2000) The value of information sharing in a two-level supply chain. Manag Sci 46(5):626\u2013643. https:\/\/doi.org\/10.1287\/mnsc.46.5.626.12047","journal-title":"Manag Sci"},{"key":"893_CR53","first-page":"1","volume-title":"Service-oriented perspectives in design science research","author":"JS Lee","year":"2011","unstructured":"Lee JS, Pries-Heje J, Baskerville R (2011) Theorizing in design science research. In: Jain H et al (eds) Service-oriented perspectives in design science research. Springer, Heidelberg, pp 1\u201316"},{"issue":"2","key":"893_CR54","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ijinfomgt.2013.10.003","volume":"34","author":"H Lee","year":"2014","unstructured":"Lee H, Kim MS, Kim KK (2014) Interorganizational information systems visibility and supply chain performance. Int J Inf Manag 34(2):285\u2013295. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2013.10.003","journal-title":"Int J Inf Manag"},{"issue":"4","key":"893_CR55","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12599-017-0484-2","volume":"59","author":"C Legner","year":"2017","unstructured":"Legner C, Eymann T, Hess T, Matt C, B\u00f6hmann T, Drews P, M\u00e4dche A, Urbach N, Ahlemann F (2017) Digitalization: opportunity and challenge for the business and information systems community. Bus Inf Syst Eng 59(4):301\u2013308. https:\/\/doi.org\/10.1007\/s12599-017-0484-2","journal-title":"Bus Inf Syst Eng"},{"key":"893_CR56","doi-asserted-by":"crossref","unstructured":"Lempinen H, Rossi M, Tuunainen VK (2012) Design principles for inter-organizational systems development \u2013 case Hansel. In: Peffers K, et al (eds) Design science research in information systems. Advances in theory and practice. Springer, Heidelberg, pp 52\u201365","DOI":"10.1007\/978-3-642-29863-9_5"},{"issue":"5","key":"893_CR57","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1057\/ejis.2010.71","volume":"20","author":"K Lyytinen","year":"2011","unstructured":"Lyytinen K, Damsgaard J (2011) Inter-organizational information systems adoption \u2013 a configuration analysis approach. Eur J Inf Syst 20(5):496\u2013509. https:\/\/doi.org\/10.1057\/ejis.2010.71","journal-title":"Eur J Inf Syst"},{"issue":"6","key":"893_CR58","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/CC.2017.7961371","volume":"14","author":"Z Ma","year":"2017","unstructured":"Ma Z (2017) Digital rights management: model, technology and application. China Commun 14(6):156\u2013167. https:\/\/doi.org\/10.1109\/CC.2017.7961371","journal-title":"China Commun"},{"key":"893_CR59","doi-asserted-by":"publisher","unstructured":"Maedche A, Gregor S, Morana S, Feine J (2019) Conceptualization of the problem space in design science research. In: Tulu B (ed) Extending the boundaries of design science theory and practice \u2013 14th International conference on design science research in information systems and technology, Worcester. Springer, Cham, pp 18\u201331. https:\/\/doi.org\/10.1007\/978-3-030-19504-5_2","DOI":"10.1007\/978-3-030-19504-5_2"},{"issue":"4","key":"893_CR60","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March ST, Smith GF (1995) Design and natural science research on information technology. Decis Support Syst 15(4):251\u2013266. https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","journal-title":"Decis Support Syst"},{"issue":"6","key":"893_CR61","doi-asserted-by":"publisher","first-page":"822","DOI":"10.2307\/2095506","volume":"50","author":"B Markovsky","year":"1985","unstructured":"Markovsky B (1985) Toward a multilevel distributive justice theory. Am Sociol Rev 50(6):822\u2013839. https:\/\/doi.org\/10.2307\/2095506","journal-title":"Am Sociol Rev"},{"issue":"3","key":"893_CR62","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709\u2013734. https:\/\/doi.org\/10.2307\/258792","journal-title":"Acad Manag Rev"},{"issue":"2","key":"893_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/j.2158-1592.2001.tb00001.x","volume":"22","author":"JT Mentzer","year":"2001","unstructured":"Mentzer JT, DeWitt W, Keebler JS, Min S, Nix NW, Smith CD, Zacharia ZG (2001) Defining supply chain management. J Bus Logist 22(2):1\u201325","journal-title":"J Bus Logist"},{"key":"893_CR64","volume-title":"Designing for digital transformation. Co-creating services with citizens and industry","author":"F M\u00f6ller","year":"2020","unstructured":"M\u00f6ller F, Guggenberger T, Otto B (2020) Towards a method for design principle development in information systems. In: Hofmann S et al (eds) Designing for digital transformation. Co-creating services with citizens and industry. Springer, Cham"},{"key":"893_CR65","doi-asserted-by":"crossref","unstructured":"M\u00f6ller F, Chandra Kruse L, Schoormann T, Otto B (2022a) Design principles for boundary spanning in transdisciplinary design science research. In: Drechsler A, et al (eds) The transdisciplinary reach of design science research. Springer Cham, pp 42\u201354","DOI":"10.1007\/978-3-031-06516-3_4"},{"key":"893_CR66","unstructured":"M\u00f6ller F, Schoormann T, Strobel G, Hansen M (2022b) Unveiling the cloak: kernel theory use in design science research. In: Proceedings of the 43rd international conference on information systems, Kopenhagen"},{"issue":"1","key":"893_CR67","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/0960085X.2018.1451811","volume":"28","author":"MT Mullarkey","year":"2019","unstructured":"Mullarkey MT, Hevner AR (2019) An elaborated action design research process model. Eur J Inf Syst 28(1):6\u201320","journal-title":"Eur J Inf Syst"},{"issue":"4","key":"893_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2070710.2070711","volume":"2","author":"J Nunamaker","year":"2012","unstructured":"Nunamaker J, Briggs RO (2012) Toward a broader vision for information systems. ACM Trans Manag Inf Syst 2(4):1\u201312","journal-title":"ACM Trans Manag Inf Syst"},{"key":"893_CR69","unstructured":"OASIS (2013) eXtensible Access Control Markup Language (XACML) Version 3.0: OASIS Standard. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html#_Toc325047170. Accessed 11 September 2022"},{"key":"893_CR70","doi-asserted-by":"crossref","unstructured":"Opriel S, M\u00f6ller F, Burkhardt U, Otto B (2021) Requirements for usage control based exchange of sensitive data in automotive supply chains. In: Proceedings of the 54th Hawaii international conference on system sciences, Hawaii","DOI":"10.24251\/HICSS.2021.051"},{"key":"893_CR71","unstructured":"Opriel S (2021) Austausch sensibler Informationen in Liefernetzwerken der Automobilindustrie, Praxiswissen Service"},{"key":"893_CR72","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s12525-019-00362-x","volume":"29","author":"B Otto","year":"2019","unstructured":"Otto B, Jarke M (2019) Designing a multi-sided data platform: findings from the international data spaces case. Electron Mark 29:561\u2013580. https:\/\/doi.org\/10.1007\/s12525-019-00362-x","journal-title":"Electron Mark"},{"key":"893_CR73","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-93975-5_1","volume-title":"Designing data spaces : the ecosystem approach to competitive advantage","author":"B Otto","year":"2022","unstructured":"Otto B (2022) The evolution of data spaces. In: Otto B et al (eds) Designing data spaces: the ecosystem approach to competitive advantage. Springer, Cham, pp 3\u201315. https:\/\/doi.org\/10.1007\/978-3-030-93975-5_1"},{"key":"893_CR74","unstructured":"Otto B, Steinbu\u00df S, Teuscher A, Lohmann S, Bader S, Birnstil P, B\u00f6hmer M, Brost G, Cirullies J, Eitel A (2019) Reference architecture model. Version 3.0. International Data Spaces Association"},{"issue":"1","key":"893_CR75","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park J, Sandhu R (2004) The UCONABC usage control model. ACM Trans Inf Syst Secur 7(1):128\u2013174. https:\/\/doi.org\/10.1145\/984334.984339","journal-title":"ACM Trans Inf Syst Secur"},{"key":"893_CR76","unstructured":"Polatin-Reuben D, Wright J (2014) An internet with BRICS characteristics: data sovereignty and the balkanisation of the internet. In: 4th USENIX workshop on free and open communications on the internet"},{"issue":"3","key":"893_CR77","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1080\/07421222.2015.1099390","volume":"32","author":"N Prat","year":"2015","unstructured":"Prat N, Comyn-Wattiau I, Akoka J (2015) A taxonomy of evaluation methods for information systems artifacts. J Manag Inf Syst 32(3):229\u2013267. https:\/\/doi.org\/10.1080\/07421222.2015.1099390","journal-title":"J Manag Inf Syst"},{"issue":"9","key":"893_CR78","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A Pretschner","year":"2006","unstructured":"Pretschner A, Hilty M, Basin D (2006) Distributed usage control. Commun ACM 49(9):39\u201344","journal-title":"Commun ACM"},{"issue":"1","key":"893_CR79","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s40319-018-00777-7","volume":"50","author":"H Richter","year":"2019","unstructured":"Richter H, Slowinski PR (2019) The data sharing economy: on the emergence of new intermediaries. Int Rev Intellect Prop Compet Law 50(1):4\u201329. https:\/\/doi.org\/10.1007\/s40319-018-00777-7","journal-title":"Int Rev Intellect Prop Compet Law"},{"issue":"1","key":"893_CR80","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1111\/j.1540-5915.2010.00300.x","volume":"42","author":"KA Saeed","year":"2011","unstructured":"Saeed KA, Malhotra MK, Grover V (2011) Interorganizational system characteristics and supply chain integration: an empirical assessment*. Decis Sci 42(1):7\u201342. https:\/\/doi.org\/10.1111\/j.1540-5915.2010.00300.x","journal-title":"Decis Sci"},{"key":"893_CR81","volume-title":"The coding manual for qualitative researchers","author":"J Salda\u00f1a","year":"2015","unstructured":"Salda\u00f1a J (2015) The coding manual for qualitative researchers. Sage"},{"key":"893_CR82","doi-asserted-by":"publisher","unstructured":"Sarabia-J\u00e1come D, Lacalle I, Palau CE, Esteve M (2019) Enabling industrial data space architecture for seaport scenario. In: IEEE 5th World Forum on Internet of Things, pp 101\u2013106. https:\/\/doi.org\/10.1109\/WF-IoT.2019.8767216","DOI":"10.1109\/WF-IoT.2019.8767216"},{"key":"893_CR83","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-021-00466-3","author":"T Schoormann","year":"2021","unstructured":"Schoormann T, Stadtl\u00e4nder M, Knackstedt R (2021) Designing business model development tools for sustainability \u2013 a design science study. Electron Mark. https:\/\/doi.org\/10.1007\/s12525-021-00466-3","journal-title":"Electron Mark"},{"issue":"1","key":"893_CR84","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1057\/ejis.2011.9","volume":"21","author":"PB Seddon","year":"2012","unstructured":"Seddon PB, Scheepers R (2012) Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples. Eur J Inf Syst 21(1):6\u201321. https:\/\/doi.org\/10.1057\/ejis.2011.9","journal-title":"Eur J Inf Syst"},{"issue":"2","key":"893_CR85","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1057\/s41303-017-0039-0","volume":"27","author":"S Seidel","year":"2017","unstructured":"Seidel S, Chandra Kruse L, Sz\u00e9kely N, Gau M, Stieger D (2017) Design principles for sensemaking support systems in environmental sustainability transformations. Eur J Inf Syst 27(2):221\u2013247. https:\/\/doi.org\/10.1057\/s41303-017-0039-0","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"893_CR86","doi-asserted-by":"publisher","first-page":"37","DOI":"10.2307\/23043488","volume":"35","author":"MK Sein","year":"2011","unstructured":"Sein MK, Henfridsson O, Purao S, Rossi M, Lindgren R (2011) Action design research. MIS Q 35(1):37\u201356. https:\/\/doi.org\/10.2307\/23043488","journal-title":"MIS Q"},{"key":"893_CR87","volume-title":"Information rules: a strategic guide to the network economy","author":"C Shapiro","year":"1998","unstructured":"Shapiro C, Varian HR (1998) Information rules: a strategic guide to the network economy. Harvard Business School Press, Boston"},{"key":"893_CR88","doi-asserted-by":"publisher","first-page":"441","DOI":"10.2307\/249551","volume":"22","author":"D Straub","year":"1998","unstructured":"Straub D, Welke R (1998) Coping with systems risk: security planning models for management decision making. MIS Q 22:441\u2013469. https:\/\/doi.org\/10.2307\/249551","journal-title":"MIS Q"},{"issue":"1","key":"893_CR89","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s12599-013-0308-y","volume":"6","author":"D Veit","year":"2014","unstructured":"Veit D, Clemons E, Benlian A, Buxmann P, Hess T, Kundisch D, Leimeister JM, Loos P, Spann M (2014) Business models: an information systems research agenda. Bus Inf Syst Eng 6(1):45\u201353. https:\/\/doi.org\/10.1007\/s12599-013-0308-y","journal-title":"Bus Inf Syst Eng"},{"issue":"3","key":"893_CR90","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MS.2008.73","volume":"25","author":"K Ven","year":"2008","unstructured":"Ven K, Verelst J, Mannaert H (2008) Should you adopt open source software? IEEE Softw 25(3):54\u201359","journal-title":"IEEE Softw"},{"key":"893_CR91","first-page":"423","volume-title":"Design science research in information systems. Advances in theory and practice","author":"J Venable","year":"2012","unstructured":"Venable J, Pries-Heje J, Baskerville R (2012) A comprehensive framework for evaluation in design science research. In: Peffers K et al (eds) Design science research in information systems. Advances in theory and practice. Springer, Heidelberg, pp 423\u2013438"},{"issue":"1","key":"893_CR92","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh V, Thong JYL, Xu X (2012) Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q 36(1):157\u2013178. https:\/\/doi.org\/10.2307\/41410412","journal-title":"MIS Q"},{"key":"893_CR93","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/978-3-540-78831-7_86","volume-title":"Springer handbook of automation","author":"FB Vernadat","year":"2009","unstructured":"Vernadat FB (2009) Enterprise integration and interoperability. In: Nof SY (ed) Springer handbook of automation. Springer, Heidelberg, pp 1529\u20131538. https:\/\/doi.org\/10.1007\/978-3-540-78831-7_86"},{"issue":"3","key":"893_CR94","doi-asserted-by":"publisher","first-page":"520","DOI":"10.17705\/1jais.00611","volume":"21","author":"J vom Brocke","year":"2020","unstructured":"vom Brocke J, Winter R, Hevner A, Maedche A (2020) Accumulation and evolution of design knowledge in design science research \u2013 a journey through time and space. J Assoc Inf Syst 21(3):520\u2013544. https:\/\/doi.org\/10.17705\/1jais.00611","journal-title":"J Assoc Inf Syst"},{"key":"893_CR95","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00420","author":"J Wall","year":"2016","unstructured":"Wall J, Lowry P, Barlow J (2016) Organizational violations of externally governed privacy and security rules: explaining and predicting selective violations under conditions of strain and excess. J Assoc Inf Syst. https:\/\/doi.org\/10.17705\/1jais.00420","journal-title":"J Assoc Inf Syst"},{"issue":"3","key":"893_CR96","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1365-2575.1995.tb00108.x","volume":"5","author":"Y Wand","year":"1995","unstructured":"Wand Y, Weber R (1995) On the deep structure of information systems. Inf Syst J 5(3):203\u2013223","journal-title":"Inf Syst J"},{"issue":"1","key":"893_CR97","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1108\/01443571311288039","volume":"33","author":"F Wiengarten","year":"2013","unstructured":"Wiengarten F, Humphreys P, McKittrick A, Fynes B (2013) Investigating the impact of e-business applications on supply chain collaboration in the German automotive industry. Int J Oper Prod Manag 33(1):25\u201348. https:\/\/doi.org\/10.1108\/01443571311288039","journal-title":"Int J Oper Prod Manag"},{"issue":"3","key":"893_CR98","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1108\/JEIM-03-2018-0058","volume":"32","author":"J Zrenner","year":"2019","unstructured":"Zrenner J, M\u00f6ller FO, Jung C, Eitel A, Otto B (2019) Usage control architecture options for data sovereignty in business ecosystems. J Enterp Inf Manag 32(3):477\u2013495. https:\/\/doi.org\/10.1108\/JEIM-03-2018-0058","journal-title":"J Enterp Inf Manag"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00893-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-024-00893-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00893-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T07:14:52Z","timestamp":1764314092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-024-00893-4"}},"subtitle":["Findings from Demand and Capacity Management in the Automotive Industry"],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":98,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["893"],"URL":"https:\/\/doi.org\/10.1007\/s12599-024-00893-4","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,29]]},"assertion":[{"value":"22 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}