{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T20:06:30Z","timestamp":1776369990725,"version":"3.51.2"},"reference-count":93,"publisher":"MIS Quarterly","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,1]]},"abstract":"<jats:p>Digital platforms have radically transformed how we work, shop, and socialize. Despite their numerous benefits, they may also threaten social justice due to unforeseen consequences of specific design choices, preventing end users from participating equitably in the digital economy. As platform owners compete by leveraging personal data, it remains unclear how digital platforms can be designed to empower end users to control, legally own, and benefit from their data in a privacy-preserving way. Integrating design science research with heuristic theorizing, this study proposes a design theory for end user-centric digital platforms. We derive design theory components from over nine years of data regarding the Dataswyft platform, including five meta-requirements and eight design principles. They reveal how digital platforms can be designed for social justice by empowering end users, both technically and legally, to protect and control their data through a containerized microservice platform infrastructure. This platform design includes multiple data protection layers, end user-driven data collection, reconfiguration, and exchange functionalities, safeguarding mechanisms, and semicentralized ecosystem governance structures. By evaluating an expository instantiation of the proposed design principles, we demonstrate the applicability and utility of our design theory, paving the way for data self-sovereignty and social sustainability.<\/jats:p>","DOI":"10.25300\/misq\/2024\/18334","type":"journal-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T15:42:31Z","timestamp":1723045351000},"page":"1771-1802","source":"Crossref","is-referenced-by-count":7,"title":["Designing Digital Platforms for Social Justice: Empowering End Users Through the Dataswyft Platform"],"prefix":"10.25300","volume":"48","author":[{"given":"Ilias","family":"Danatzis","sequence":"first","affiliation":[{"name":"Marketing Department, King\u2019s Business School, King\u2019s College London London, U.K."}]},{"given":"Jennifer D.","family":"Chandler","sequence":"additional","affiliation":[{"name":"Department of Management, College of Business & Economics, California State University Fullerton, CA, U.S.A."}]},{"given":"Melissa A.","family":"Akaka","sequence":"additional","affiliation":[{"name":"Marketing Department, Daniels College of Business, University of Denver Denver, CO, U.S.A."}]},{"given":"Irene C. L.","family":"Ng","sequence":"additional","affiliation":[{"name":"WMG, University of Warwick Coventry, U.K."}]}],"member":"10933","published-online":{"date-parts":[[2024,12,1]]},"reference":[{"key":"2025082212340541300_b1-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-01115-4","article-title":"IT security risk management","volume-title":"Perceived IT security risks in the context of cloud computing","author":"Ackermann","year":"2013"},{"issue":"2","key":"2025082212340541300_b2-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","article-title":"The economics of privacy","volume":"54","author":"Acquisti","year":"2016","journal-title":"Journal of Economic Literature"},{"issue":"1","key":"2025082212340541300_b3-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1","DOI":"10.24297\/ijmit.v2i1.1406","article-title":"Data ownership: Who owns \u201cmy data","volume":"2","author":"Al-Khouri","year":"2012","journal-title":"International Journal of Management & Information Technology"},{"issue":"4","key":"2025082212340541300_b4-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1287\/isre.2020.0931","article-title":"An empirical investigation of the antecedents and consequences of privacy uncertainty in the context of mobile apps","volume":"31","author":"Al-Natour","year":"2020","journal-title":"Information Systems Research"},{"issue":"February","key":"2025082212340541300_b5-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.is.2018.09.002","article-title":"Personal data management systems: The security and functionality standpoint","volume":"80","author":"Anciaux","year":"2019","journal-title":"Information Systems"},{"issue":"4","key":"2025082212340541300_b6-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","article-title":"Privacy in the digital age: A review of information privacy research in information systems","volume":"35","author":"B\u00e9langer, & Crossler","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212340541300_b7-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1287\/ISRE.2019.0900","article-title":"A theory of multilevel information privacy management for the digital era","volume":"31","author":"B\u00e9langer","year":"2020","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212340541300_b8-18_si_10.25300_misq_2024_18334","doi-asserted-by":"crossref","first-page":"471","DOI":"10.25300\/MISQ\/2013\/37:2.3","article-title":"Digital business strategy: Toward a next generation of insights","volume":"37","author":"Bharadwaj","year":"2013","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212340541300_b9-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/20539517211017308","article-title":"Data as asset? The measurement, governance, and valuation of digital personal data by big tech","volume":"8","author":"Birch","year":"2021","journal-title":"Big Data & Society"},{"issue":"6","key":"2025082212340541300_b10-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1111\/isj.12326","article-title":"Digital platforms for development: Foundations and research agenda","volume":"31","author":"Bonina","year":"2021","journal-title":"Information Systems Journal"},{"issue":"5","key":"2025082212340541300_b11-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1287\/orsc.1110.0678","article-title":"Let a thousand flowers bloom? An early look at large numbers of software app developers and patterns of innovation","volume":"23","author":"Boudreau","year":"2012","journal-title":"Organization Science"},{"key":"2025082212340541300_b12-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031195","article-title":"Docker container security in cloud computing","author":"Brady","year":"2020"},{"issue":"1","key":"2025082212340541300_b13-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/41410417","article-title":"Cocreation of value in a platform ecosystem: The case of enterprise software","volume":"36","author":"Ceccagnoli","year":"2012","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212340541300_b14-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1177\/0149206320916755","article-title":"Decentralized governance of digital platforms","volume":"47","author":"Chen","year":"2021","journal-title":"Journal of Management"},{"issue":"5","key":"2025082212340541300_b15-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"609","DOI":"10.24908\/ss.v15i5.6433","article-title":"Social injustice in surveillance capitalism","volume":"15","author":"Cinnamon","year":"2017","journal-title":"Surveillance and Society"},{"issue":"2","key":"2025082212340541300_b16-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1287\/isre.2018.0794","article-title":"Platforms and infrastructures in the digital age","volume":"29","author":"Constantinides","year":"2018","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212340541300_b17-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1287\/mnsc.2018.3273","article-title":"Reducing discrimination with reviews in the sharing economy: Evidence from field experiments on Airbnb","volume":"66","author":"Cui","year":"2020","journal-title":"Management Science"},{"issue":"1","key":"2025082212340541300_b18-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1287\/isre.1100.0306","article-title":"Modeling spatial and temporal set-based constraints during conceptual database design","volume":"23","author":"Currim","year":"2012","journal-title":"Information Systems Research"},{"key":"2025082212340541300_b19-18_si_10.25300_misq_2024_18334","volume-title":"The business of platforms: Strategy in the age of digital competition, innovation, and power","author":"Cusumano","year":"2019"},{"issue":"2","key":"2025082212340541300_b20-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1177\/10946705211032275","article-title":"Actor ecosystem readiness: Understanding the nature and role of human abilities and motivation in a service ecosystem","volume":"25","author":"Danatzis","year":"2022","journal-title":"Journal of Service Research"},{"issue":"2","key":"2025082212340541300_b21-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.clsr.2017.10.003","article-title":"The right to data portability in the GDPR: Towards user-centric interoperability of digital services","volume":"34","author":"De Hert","year":"2018","journal-title":"Computer Law and Security Review"},{"issue":"1","key":"2025082212340541300_b22-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.l060.0080","article-title":"An extended privacy calculus transactions model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212340541300_b23-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1057\/ejis.2012.23","article-title":"Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts","volume":"22","author":"Dinev","year":"2013","journal-title":"European Journal of Information Systems"},{"key":"2025082212340541300_b24-18_si_10.25300_misq_2024_18334","unstructured":"Docker\n          . (2023). Use containers to build, share and run your applications. https:\/\/www.docker.com\/resources\/what-container"},{"issue":"2","key":"2025082212340541300_b25-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1257\/app.20160213","article-title":"Racial discrimination in the sharing economy: Evidence from a field experiment","volume":"9","author":"Edelman","year":"2017","journal-title":"American Economic Journal: Applied Economics"},{"key":"2025082212340541300_b26-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","DOI":"10.2759\/299944","author":"European Commission","year":"2016","journal-title":"Legal study on ownership and access to data"},{"issue":"1","key":"2025082212340541300_b27-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"23","DOI":"10.2298\/CSIS200229041F","article-title":"Multi-objective optimization of container-based microservice scheduling in edge computing","volume":"18","author":"Fan","year":"2020","journal-title":"Computer Science and Information Systems"},{"issue":"6","key":"2025082212340541300_b28-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.5465\/amj.2015.0402","article-title":"Constructing a shared governance logic: The role of emotions in enabling dually embedded agency","volume":"60","author":"Fan","year":"2017","journal-title":"Academy of Management Journal"},{"issue":"3","key":"2025082212340541300_b29-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1086\/589478","article-title":"Abnormal justice","volume":"34","author":"Fraser","year":"2008","journal-title":"Critical Inquiry"},{"issue":"2","key":"2025082212340541300_b30-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.eswa.2005.04.005","article-title":"Modeling human behavior in user-adaptive systems: Recent advances using soft computing techniques","volume":"29","author":"Frias-Martinez","year":"2005","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"2025082212340541300_b31-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1287\/isre.2017.0730","article-title":"The role of user privacy concerns in shaping competition among platforms","volume":"29","author":"Gal-Or","year":"2018","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212340541300_b32-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1111\/j.1365-2575.2012.00406.x","article-title":"Balancing platform control and external contribution in third-party development: The boundary resources model","volume":"23","author":"Ghazawneh","year":"2013","journal-title":"Information Systems Journal"},{"issue":"3","key":"2025082212340541300_b33-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1057\/jit.2015.16","article-title":"A paradigmatic analysis of digital application marketplaces","volume":"30","author":"Ghazawneh","year":"2015","journal-title":"Journal of Information Technology"},{"issue":"1","key":"2025082212340541300_b34-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1177\/1094428112452151","article-title":"Seeking qualitative rigor in inductive research: Notes on the Gioia methodology","volume":"16","author":"Gioia","year":"2012","journal-title":"Organizational Research Methods"},{"issue":"3","key":"2025082212340541300_b35-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"611","DOI":"10.2307\/25148742","article-title":"The nature of theory in information systems","volume":"30","author":"Gregor","year":"2006","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212340541300_b36-18_si_10.25300_misq_2024_18334","doi-asserted-by":"crossref","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","article-title":"Positioning and presenting design science research for maximum impact","volume":"37","author":"Gregor","year":"2013","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212340541300_b37-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"312","DOI":"10.17705\/1jais.00129","article-title":"The anatomy of a design theory","volume":"8","author":"Gregor","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"2025082212340541300_b38-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2014.0533","article-title":"Heuristic theorizing: Proactively generating design theories","volume":"25","author":"Gregory","year":"2014","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212340541300_b39-18_si_10.25300_misq_2024_18334","first-page":"71","article-title":"Strategic decisions for multisided platforms","volume":"55","author":"Hagiu","year":"2014","journal-title":"MIT Sloan Management Review"},{"issue":"1","key":"2025082212340541300_b40-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design science in information systems research","volume":"28","author":"Hevner","year":"2004","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212340541300_b41-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"97","DOI":"10.2307\/25148830","article-title":"Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged","volume":"32","author":"Hsieh","year":"2008","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212340541300_b42-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951720982012","article-title":"Data sovereignty: A review","volume":"8","author":"Hummel","year":"2021","journal-title":"Big Data & Society"},{"issue":"1","key":"2025082212340541300_b43-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1057\/ejis.2013.35","article-title":"Distinguishing and contrasting two strategies for design science research","volume":"24","author":"Iivari","year":"2015","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"2025082212340541300_b44-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1080\/0960085X.2020.1793697","article-title":"A proposal for minimum reusability evaluation of design principles","volume":"30","author":"Iivari","year":"2021","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"2025082212340541300_b45-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1111\/j.1365-2575.2010.00351.x","article-title":"Varieties of user-centredness: an analysis of four systems development methods","volume":"21","author":"Iivari","year":"2011","journal-title":"Information Systems Journal"},{"issue":"1","key":"2025082212340541300_b46-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"104906","DOI":"10.1016\/j.respol.2023.104906","article-title":"Externalities and complementarities in platforms and ecosystems: From structural solutions to endogenous failures","volume":"53","author":"Jacobides","year":"2024","journal-title":"Research Policy"},{"issue":"3","key":"2025082212340541300_b47-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MPRV.2002.1037723","article-title":"Modeling privacy control in context-aware systems","volume":"1","author":"Jiang","year":"2002","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"2025082212340541300_b48-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"23","DOI":"10.17705\/1jais.00147","article-title":"Business value of IT: An essay on expanding research directions to keep up with the times","volume":"9","author":"Kahli","year":"2008","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"2025082212340541300_b49-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1257\/app.20190188","article-title":"Can information reduce ethnic discrimination? Evidence from Airbnb","volume":"14","author":"Laou\u00e9nan","year":"2022","journal-title":"American Economic Journal: Applied Economics"},{"issue":"6","key":"2025082212340541300_b50-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1057\/s41303-017-0066-x","article-title":"Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda","volume":"26","author":"Lowry","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"2025082212340541300_b51-18_si_10.25300_misq_2024_18334","first-page":"1","article-title":"Social sustainability: Towards some definitions","volume":"27","author":"Mckenzie","year":"2004","journal-title":"University of South Australia"},{"issue":"1","key":"2025082212340541300_b52-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1287\/mnsc.2019.3525","article-title":"When transparency fails: Bias and financial incentives in ridesharing platforms","volume":"67","author":"Mejia","year":"2021","journal-title":"Management Science"},{"issue":"1","key":"2025082212340541300_b53-18_si_10.25300_misq_2024_18334","doi-asserted-by":"crossref","first-page":"7","DOI":"10.69554\/TKHN9787","article-title":"The GDPR: Halfway between consumer protection and data ownership rights","volume":"3","author":"Milkau","year":"2018","journal-title":"Journal of Digital Banking"},{"key":"2025082212340541300_b54-18_si_10.25300_misq_2024_18334","volume-title":"Building microservices","author":"Newman","year":"2015"},{"key":"2025082212340541300_b55-18_si_10.25300_misq_2024_18334","volume-title":"Creating new markets in the digital economy: Value and worth","author":"Ng","year":"2014"},{"issue":"3","key":"2025082212340541300_b56-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1080\/07421222.1990.11517898","article-title":"Systems development in information systems research","volume":"7","author":"Nunamaker","year":"1990","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"2025082212340541300_b57-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2753\/MIS0742-1222280102","article-title":"Embodied conversational agent-based kiosk for automated interviewing","volume":"28","author":"Nunamaker","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"2025082212340541300_b58-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1177\/1461444818799523","article-title":"Personal data literacies\u2019: A critical literacies approach to enhancing understandings of personal digital data","volume":"21","author":"Pangrazio","year":"2019","journal-title":"New Media & Society"},{"issue":"3","key":"2025082212340541300_b59-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","article-title":"A design science research methodology for information systems research","volume":"24","author":"Peffers","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"2025082212340541300_b60-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","article-title":"Context aware computing for the internet of things: A Survey","volume":"16","author":"Perera","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"2025082212340541300_b61-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","article-title":"Privacy concerns and consumer willingness to provide personal information","volume":"19","author":"Phelps","year":"2000","journal-title":"Journal of Public Policy & Marketing"},{"issue":"1","key":"2025082212340541300_b62-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.intmar.2019.10.004","article-title":"Thinking beyond privacy calculus: Investigating reactions to customer surveillance","volume":"50","author":"Plangger","year":"2020","journal-title":"Journal of Interactive Marketing"},{"issue":"3","key":"2025082212340541300_b63-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1080\/07421222.2015.1099390","article-title":"A taxonomy of evaluation methods for information systems artifacts","volume":"32","author":"Prat","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"2025082212340541300_b64-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"731","DOI":"10.2307\/25148870","article-title":"The design theory nexus","volume":"32","author":"Pries-Heje, & Baskerville","year":"2008","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212340541300_b65-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/0022242920953847","article-title":"Consumers and artificial intelligence: An experiential perspective","volume":"85","author":"Puntoni","year":"2021","journal-title":"Journal of Marketing"},{"issue":"1","key":"2025082212340541300_b66-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/17579961.2015.1052646","article-title":"The illusion of personal data as no one\u2019s property","volume":"7","author":"Purtova","year":"2015","journal-title":"Law, Innovation and Technology"},{"issue":"4","key":"2025082212340541300_b67-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.ijinfomgt.2016.03.005","article-title":"Towards performance evaluation of cloud service providers for cloud data security","volume":"36","author":"Ramachandran","year":"2016","journal-title":"International Journal of Information Management"},{"issue":"4","key":"2025082212340541300_b68-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1287\/isre.2016.0683","article-title":"Special section introduction: Ubiquitous IT and digital vulnerabilities","volume":"27","author":"Ransbotham","year":"2016","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212340541300_b69-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1093\/idpl\/ips015","article-title":"The European data protection framework for the twenty-first century","volume":"2","author":"Reding","year":"2012","journal-title":"International Data Privacy Law"},{"key":"2025082212340541300_b70-18_si_10.25300_misq_2024_18334","unstructured":"Regulation (EU)\n          . (2016). General data protection regulation."},{"issue":"2","key":"2025082212340541300_b71-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1111\/anti.12595","article-title":"The internet of landlords: Digital platforms and new mechanisms of rentier capitalism","volume":"52","author":"Sadowski","year":"2020","journal-title":"Antipode"},{"issue":"4","key":"2025082212340541300_b72-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1177\/1094670518770034","article-title":"Access-based services for the base of the pyramid","volume":"21","author":"Schaefers","year":"2018","journal-title":"Journal of Service Research"},{"key":"2025082212340541300_b73-18_si_10.25300_misq_2024_18334","article-title":"Towards understanding social sustainability: An information systems research-perspective","author":"Schoormann","year":"2021"},{"key":"2025082212340541300_b74-18_si_10.25300_misq_2024_18334","volume-title":"The intention economy: When customers take charge","author":"Searls","year":"2012"},{"key":"2025082212340541300_b75-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"40","DOI":"10.17705\/1cais.04003","article-title":"The sustainability imperative in information systems research","volume":"40","author":"Seidel","year":"2017","journal-title":"Communications of the Association for Information Systems"},{"issue":"2","key":"2025082212340541300_b76-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1057\/s41303-017-0039-0","article-title":"Design principles for sensemaking support systems in environmental sustainability transformations","volume":"27","author":"Seidel","year":"2018","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025082212340541300_b77-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: An interdisciplinary review","volume":"35","author":"Smith","year":"2011","journal-title":"MIS Quarterly"},{"key":"2025082212340541300_b78-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"94","DOI":"10.2139\/ssrn.3852744","article-title":"Harming competition and consumers under the guise of protecting privacy: An analysis of Apple\u2019s iOS 14 policy updates","volume":"107","author":"Sokol","year":"2021","journal-title":"Cornell Law Review Online"},{"issue":"2","key":"2025082212340541300_b79-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","article-title":"The challenges of personal data markets and privacy","volume":"25","author":"Spiekermann","year":"2015","journal-title":"Electronic Markets"},{"issue":"1","key":"2025082212340541300_b80-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1057\/jit.2016.4","article-title":"Towards a value theory for personal data","volume":"32","author":"Spiekermann","year":"2017","journal-title":"Journal of Information Technology"},{"issue":"4","key":"2025082212340541300_b81-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1111\/isj.12076","article-title":"Introduction to the special issue on \u201cdark side of information technology use\u201d: Part two","volume":"25","author":"Tarafdar","year":"2015","journal-title":"Information Systems Journal"},{"key":"2025082212340541300_b82-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"115","DOI":"10.14778\/1453856.1453874","article-title":"Privacy-preserving anonymization of set-valued data","author":"Terrovitis","year":"2008"},{"issue":"2","key":"2025082212340541300_b83-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1287\/isre.2015.0573","article-title":"Evolutionary competition in platform ecosystems","volume":"26","author":"Tiwana","year":"2015","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212340541300_b84-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1287\/isre.1100.0323","article-title":"Platform evolution: Coevolution of platform architecture, governance, and environmental dynamics","volume":"21","author":"Tiwana","year":"2010","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212340541300_b85-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","article-title":"The effect of online privacy information on purchasing behavior: An experimental study","volume":"22","author":"Tsai","year":"2011","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212340541300_b86-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1080\/07421222.2014.995535","article-title":"Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals","volume":"31","author":"Twyman","year":"2014","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"2025082212340541300_b87-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1287\/isre.1120.0416","article-title":"Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services","volume":"23","author":"Xu","year":"2012","journal-title":"Information Systems Research"},{"key":"2025082212340541300_b88-18_si_10.25300_misq_2024_18334","volume-title":"Case study research: Design and materials","author":"Yin","year":"2009","edition":"4th"},{"issue":"4","key":"2025082212340541300_b89-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1287\/isre.1100.0322","article-title":"The new organizing logic of digital innovation: An agenda for information systems research","volume":"21","author":"Yoo","year":"2010","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212340541300_b90-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1287\/isre.2021.1010","article-title":"Network interconnectivity and entry into platform markets","volume":"32","author":"Zhu","year":"2021","journal-title":"Information Systems Research"},{"issue":"2014","key":"2025082212340541300_b91-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.ins.2012.01.030","article-title":"A human-centric framework for context-aware flowable services in cloud computing environments","volume":"257","author":"Zhu","year":"2014","journal-title":"Information Sciences"},{"issue":"3","key":"2025082212340541300_b92-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","article-title":"Addressing cloud computing security issues","volume":"28","author":"Zissis","year":"2012","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"2025082212340541300_b93-18_si_10.25300_misq_2024_18334","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1057\/jit.2015.5","article-title":"Big other: Surveillance capitalism and the prospects of an information civilization","volume":"30","author":"Zuboff","year":"2015","journal-title":"Journal of Information Technology"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/48\/4\/1771\/9553\/18_si_10_25300_misq_2024_18334.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/48\/4\/1771\/9553\/18_si_10_25300_misq_2024_18334.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:34:18Z","timestamp":1755880458000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/48\/4\/1771\/2298\/Designing-Digital-Platforms-for-Social-Justice"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,1]]},"references-count":93,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,12,1]]},"published-print":{"date-parts":[[2024,12,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2024\/18334","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,1]]}}}