{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:24:19Z","timestamp":1740173059014,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"6","license":[{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Bayrisches Staatsministerium f\u00fcr Wirtschaft, Energie und Technologie","award":["07 03\/686 69\/675\/18\/97\/19\/98\/20\/99\/21\/100\/22"],"award-info":[{"award-number":["07 03\/686 69\/675\/18\/97\/19\/98\/20\/99\/21\/100\/22"]}]},{"DOI":"10.13039\/100009613","name":"Universit\u00e4t Hohenheim","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009613","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Der unternehmens\u00fcbergreifende Datenaustausch in der Welt von Industrie\u00a04.0 birgt f\u00fcr Unternehmen immense Potenziale. So k\u00f6nnen Unternehmen wertvolles Wissen \u00fcber den Einsatz ihrer Produkte gewinnen und ihren Kunden innovative Dienstleistungen anbieten. Umgekehrt k\u00f6nnen Kunden die Produkte zielgerichteter einsetzen, wenn sie beispielsweise Produktions- und Materialdetails kennen. Doch dabei m\u00f6chte kein Unternehmen f\u00fcr sich gesch\u00e4ftskritisches Wissen an einen Partner im Wertsch\u00f6pfungsnetzwerk freigeben. Zu gro\u00df ist das Risiko, Einblicke in beispielsweise Forschungs- und Entwicklungsergebnisse zu gew\u00e4hren oder dem Kunden eine Kostenkalkulation aufgrund des genauen Prozessablaufes zu erm\u00f6glichen. Es ergibt sich die Frage, welche Daten bedenkenlos ausgetauscht werden k\u00f6nnen und in welchen Daten implizit wertvolles Wissen enthalten ist. Aus diesem Grund stellt der vorliegende Beitrag ein Vorgehensmodell zur Identifikation von sch\u00fctzenswertem Wissen vor dem Hintergrund des unternehmens\u00fcbergreifenden automatisierten Datenaustauschs von Maschinen \u00fcber Netzwerkplattformen vor. Mit Hilfe des Modells lassen sich Daten und Wissen analysieren und auf Basis der Schutzbedarfe und enthaltenen Potenziale einstufen. Ein m\u00f6glichst umfangreicher unternehmens\u00fcbergreifender Datenaustausch bei m\u00f6glichst geringem Verlust von Know-how soll erm\u00f6glicht werden. Anschlie\u00dfend wird die Erprobung des Modells im Rahmen eines Anwendungsbeispiels vorgestellt und ein Ausblick gegeben.<\/jats:p>","DOI":"10.1365\/s40702-020-00704-w","type":"journal-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T10:03:19Z","timestamp":1610704999000},"page":"1521-1534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Auf dem Weg zum vertrauensvollen, unternehmens\u00fcbergreifenden automatisierten Datenaustausch von Maschinen\u00a0\u2013 Identifikation von sch\u00fctzenswertem Wissen im Zeitalter von Industrie\u00a04.0","Towards Trustworthy, Cross-Company, Automated Data Exchange Between Machines \u2013 Identification of Know-How Worthy of Protection in the Age of Industry 4.0"],"prefix":"10.1365","volume":"58","author":[{"given":"Leon","family":"Adler","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Frank","sequence":"additional","affiliation":[]},{"given":"Henner","family":"Gimpel","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Heger","sequence":"additional","affiliation":[]},{"given":"Niclas","family":"N\u00fcske","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"Starke","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"Waldmann","sequence":"additional","affiliation":[]},{"given":"Moritz","family":"W\u00f6hl","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"704_CR1","first-page":"368","volume":"79","author":"J Bahrs","year":"2010","unstructured":"Bahrs\u00a0J, Vladova\u00a0G, Gronau\u00a0N (2010) Mit Wissensflussmanagement Produktpiraterie unterbinden; Koordinierte Geheimhaltung in Wersch\u00f6pfungsnetzwerken. ZFO 79:368","journal-title":"ZFO"},{"key":"704_CR2","volume-title":"Towards effective monetization of the Internet of things\u2014a conceptual model to assess the value of IoT-solutions in an industrial context","author":"D Baltuttis","year":"2019","unstructured":"Baltuttis\u00a0D, H\u00e4ckel\u00a0B, Oberl\u00e4nder\u00a0AM, R\u00f6glinger\u00a0M, Seyfried\u00a0J (2019) Towards effective monetization of the Internet of things\u2014a conceptual model to assess the value of IoT-solutions in an industrial context (Working Paper)"},{"key":"704_CR3","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1177\/014920639101700108","volume":"17","author":"J Barney","year":"1991","unstructured":"Barney\u00a0J (1991) Firm resources and sustained competitive advantage. J\u00a0Manage 17:99\u2013120. https:\/\/doi.org\/10.1177\/014920639101700108","journal-title":"J Manage"},{"key":"704_CR4","volume-title":"Industrie 4.0 \u2013 Volkswirtschaftliches Potenzial f\u00fcr Deutschland","author":"W Bauer","year":"2014","unstructured":"Bauer\u00a0W, Schlund\u00a0S, Marrenbach\u00a0D, Ganschar\u00a0O (2014) Industrie 4.0 \u2013 Volkswirtschaftliches Potenzial f\u00fcr Deutschland. BITKOM Bundesverband Informationswirtschaft, Telekommunikation und neue Medien eV, Berlin\/Fraunhofer Institut f\u00fcr Arbeitswirtschaft und Organisation IAO, Berlin (Studie)"},{"key":"704_CR5","first-page":"1","volume-title":"Daten- und Wissensmanagement","author":"F Bodendorf","year":"2006","unstructured":"Bodendorf\u00a0F (2006) Daten und Wissen. In: Bodendorf\u00a0F (Hrsg) Daten- und Wissensmanagement. Springer, Berlin, Heidelberg, S 1\u20135"},{"key":"704_CR6","unstructured":"Bundesministerium f\u00fcr Wirtschaft und Energie (Hrsg) (2019) Das Projekt GAIA\u2011X; Eine vernetzte Dateninfrastruktur als Wiege eines vitalen, europ\u00e4ischen \u00d6kosystems. https:\/\/www.bmwi.de\/Redaktion\/DE\/Publikationen\/Digitale-Welt\/das-projekt-gaia-x.html. Zugegriffen: 17.11.2020"},{"key":"704_CR7","volume-title":"Gesch\u00e4ftsmodell-Innovation durch Industrie 4.0: chancen und Risiken f\u00fcr den Maschinen-und Anlagenbau","author":"V Emmrich","year":"2015","unstructured":"Emmrich\u00a0V, D\u00f6bele\u00a0M, Bauernhansl\u00a0T, Paulus-Rohmer\u00a0D, Schatz\u00a0A, Weskamp\u00a0M (2015) Gesch\u00e4ftsmodell-Innovation durch Industrie 4.0: chancen und Risiken f\u00fcr den Maschinen-und Anlagenbau. Dr. Wieselhuber & Partner, Fraunhofer IPA, M\u00fcnchen, Stuttgart"},{"key":"704_CR8","volume-title":"Industrial internet insights report for 2015","author":"General Electric Company, Accenture Plc","year":"2015","unstructured":"General Electric Company, Accenture Plc (2015) Industrial internet insights report for 2015"},{"key":"704_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s35764-017-0103-5","volume":"9","author":"H Gimpel","year":"2017","unstructured":"Gimpel\u00a0H, R\u00f6glinger\u00a0M (2017) Disruptive Technologien \u2013 Blockchain, Deep Learning & Co. Wirtschaftsinformatik Manag 9:8\u201315","journal-title":"Wirtschaftsinformatik Manag"},{"volume-title":"Handbuch gegen Produktpiraterie; Pr\u00e4vention von Produktpiraterie durch Technologie, Organisation und Wissensflussmanagement","year":"2011","key":"704_CR10","unstructured":"Gronau\u00a0N (Hrsg) (2011) Handbuch gegen Produktpiraterie; Pr\u00e4vention von Produktpiraterie durch Technologie, Organisation und Wissensflussmanagement. Gito, Berlin"},{"key":"704_CR11","volume-title":"Studie Industrie 4.0 \u2013 Eine Standortbestimmung der Automobil- und Fertigungsindustrie","author":"O Kelkar","year":"2014","unstructured":"Kelkar\u00a0O, Heger\u00a0R, Dao\u00a0D\u2011K (2014) Studie Industrie 4.0 \u2013 Eine Standortbestimmung der Automobil- und Fertigungsindustrie"},{"key":"704_CR12","volume-title":"Industrial Data Space; Digitale Souver\u00e4nit\u00e4t \u00fcber Daten","author":"B Otto","year":"2016","unstructured":"Otto\u00a0B, J\u00fcrjens\u00a0J, Schon\u00a0J, Auer\u00a0S, Menz\u00a0N, Wenzel\u00a0S, Cirullies\u00a0J (2016) Industrial Data Space; Digitale Souver\u00e4nit\u00e4t \u00fcber Daten (www.industrialdataspace.org)"},{"key":"704_CR13","volume-title":"Datenschutz und Datensicherheit","author":"K Pommerening","year":"1991","unstructured":"Pommerening\u00a0K (1991) Datenschutz und Datensicherheit. BI-Wissenschaftsverlag, Mannheim, Wien, Z\u00fcrich"},{"key":"704_CR2000","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/BF03250765","volume":"42","author":"K Rannenberg","year":"2000","unstructured":"Rannenberg\u00a0K (2000) Mehrseitige Sicherheit \u2013 Schutz f\u00fcr Unternehmen und ihre Partner im Internet. Wirtschaftsinformatik 42:489\u2013497","journal-title":"Wirtschaftsinformatik"},{"key":"704_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"VS Verykios","year":"2004","unstructured":"Verykios\u00a0VS, Bertino\u00a0E, Fovino\u00a0IN, Provenza\u00a0LP, Saygin\u00a0Y, Theodoridis\u00a0Y (2004) State-of-the-art in privacy preserving data mining. Sigmod Rec 33:50. https:\/\/doi.org\/10.1145\/974121.974131","journal-title":"Sigmod Rec"},{"key":"704_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/jiit.2012040102","volume":"8","author":"G Vladova","year":"2012","unstructured":"Vladova\u00a0G, Bahrs\u00a0J, Gronau\u00a0N (2012) Managing knowledge distribution to prevent product imitation and counterfeiting. Int J Intell Inf Technol 8:14\u201330. https:\/\/doi.org\/10.4018\/jiit.2012040102","journal-title":"Int J Intell Inf Technol"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00704-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-020-00704-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00704-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T14:07:58Z","timestamp":1637244478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-020-00704-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,15]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["704"],"URL":"https:\/\/doi.org\/10.1365\/s40702-020-00704-w","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2021,1,15]]},"assertion":[{"value":"20 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}