{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:33Z","timestamp":1750221213475,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T00:00:00Z","timestamp":1527638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["438-13-601, 451-13-020"],"award-info":[{"award-number":["438-13-601, 451-13-020"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011105","name":"European Commission","doi-asserted-by":"publisher","award":["603993"],"award-info":[{"award-number":["603993"]}],"id":[{"id":"10.13039\/100011105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,30]]},"DOI":"10.1145\/3209281.3209350","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T19:40:20Z","timestamp":1527795620000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparing the openness of archetypical business-to-government information sharing architectures"],"prefix":"10.1145","author":[{"given":"S\u00e9linde","family":"van Engelenburg","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, the Netherlands"}]},{"given":"Marijn","family":"Janssen","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, the Netherlands"}]},{"given":"Bram","family":"Klievink","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, the Netherlands"}]},{"given":"Yao-Hua","family":"Tan","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, the Netherlands"}]},{"given":"Boriana","family":"Rukanova","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, the Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2012.08.006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.442.0239"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"David W. Chadwick. 2009. Federated identity management. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5705 LNCS (2009) 96--120. arXiv:arXiv:1011.1669v3  David W. Chadwick. 2009. Federated identity management. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5705 LNCS (2009) 96--120. arXiv:arXiv:1011.1669v3","DOI":"10.1007\/978-3-642-03829-7_3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176994"},{"key":"e_1_3_2_1_5_1","unstructured":"Customs Administration of the Netherlands. 2014. Pushing boundaries: The Customs Administration of The Netherlands' Point on the Horizon for the Enforcement on Continuously Increasing Flows of Goods. (2014).  Customs Administration of the Netherlands. 2014. Pushing boundaries: The Customs Administration of The Netherlands' Point on the Horizon for the Enforcement on Continuously Increasing Flows of Goods. (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1108\/13598540710776935"},{"key":"e_1_3_2_1_7_1","first-page":"3","article-title":"Industry Platforms and Ecosystem Innovation","volume":"31","author":"Gawer Annabelle","year":"2013","journal-title":"Journal of Product Innovation Management"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2014.09.005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.8.1.23"},{"key":"e_1_3_2_1_10_1","first-page":"3","article-title":"Weaknesses in the supply chain: who packed the box","volume":"4","author":"Hesketh David","year":"2010","journal-title":"World Customs Journal"},{"volume-title":"14th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2015 Delft","year":"2015","author":"Homscheid Dirk","key":"e_1_3_2_1_11_1"},{"volume-title":"Towards Trusted Trade-Lanes. Electronic Government: Proceedings of the 15th IFIP WG 8.5 International Conference, EGOV 2016 Egov","year":"2016","author":"Hulstijn Joris","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Thomas Jensen and Yao-Hua Tan. 2015. Key Design Properties for Shipping Information Pipeline. In Open and Big Data Management and Innovation. Marijn Janssen Matti M\u00e4ntym\u00e4ki Jan Hidders Bram Klievink and David Hutchison (Eds.). Springer International Publishing 491--502.  Thomas Jensen and Yao-Hua Tan. 2015. Key Design Properties for Shipping Information Pipeline. In Open and Big Data Management and Innovation. Marijn Janssen Matti M\u00e4ntym\u00e4ki Jan Hidders Bram Klievink and David Hutchison (Eds.). Springer International Publishing 491--502.","DOI":"10.1007\/978-3-319-25013-7_40"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/248839"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4018\/jegr.2012100104"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3085228.3085270"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4018\/jegr.2012100102"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280407"},{"volume-title":"IT Innovations Enabling Seamless and Secure Supply Chains WITNESS","year":"2011","author":"Overbeek Sietse","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/sys.v11:3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64930-6_14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-5273(01)00187-6"},{"key":"e_1_3_2_1_23_1","unstructured":"Yao-Hua Tan Niels Bj\u00f8rn-Andersen Stefan Klein and Boriana Rukanova. 2011. Accelerating Global Supply Chains with IT-Innovation. 1--379 pages.  Yao-Hua Tan Niels Bj\u00f8rn-Andersen Stefan Klein and Boriana Rukanova. 2011. Accelerating Global Supply Chains with IT-Innovation. 1--379 pages."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0318"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0323"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.06.001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"S\u00e9linde van Engelenburg Marijn Janssen and Bram Klievink. 2017. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems (2017).  S\u00e9linde van Engelenburg Marijn Janssen and Bram Klievink. 2017. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems (2017).","DOI":"10.1007\/s10844-017-0478-z"},{"volume-title":"Electronic Government, 16th IFIP WG 8.5 International Conference, EGOV2017","year":"2017","author":"van Engelenburg S\u00e9linde","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","volume-title":"The Data Pipeline. In Global Trade Facilitation Conference","volume":"3","author":"van Stijn Eveline","year":"2011"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.2.209.14992"},{"key":"e_1_3_2_1_31_1","first-page":"18","article-title":"Secure information sharing in internet-based supply chain management systems","volume":"46","author":"Zhang C","year":"2006","journal-title":"Journal of Computer Information Systems"}],"event":{"name":"dg.o '18: 19th Annual International Conference on Digital Government Research","acronym":"dg.o '18","location":"Delft The Netherlands"},"container-title":["Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209281.3209350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209281.3209350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:46Z","timestamp":1750210786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209281.3209350"}},"subtitle":["balancing advantages of openness with the control of risks"],"short-title":[],"issued":{"date-parts":[[2018,5,30]]},"references-count":31,"alternative-id":["10.1145\/3209281.3209350","10.1145\/3209281"],"URL":"https:\/\/doi.org\/10.1145\/3209281.3209350","relation":{},"subject":[],"published":{"date-parts":[[2018,5,30]]},"assertion":[{"value":"2018-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}