{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:11:43Z","timestamp":1774926703344,"version":"3.50.1"},"reference-count":83,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Patent Transformation Special Project of Qinhuangdao of China","award":["Z2023-126"],"award-info":[{"award-number":["Z2023-126"]}]},{"name":"Patent Transformation Special Project of Qinhuangdao of China","award":["Z2024-139"],"award-info":[{"award-number":["Z2024-139"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The management and protection of data-based intellectual property have attracted increasing attention in the academic community due to the rapid development of digital technologies and data-driven industries. However, a comprehensive and multidimensional examination of the research landscape is still required to better understand its structure and evolution. Using CiteSpace software, this study conducts a bibliometric analysis, revealing key trends and patterns in collaboration, co-citation, and keyword co-occurrence in the field of data-based intellectual property. Our findings show a growing body of literature on data IP management, with a significant increase in publications since 2013. We identify that collaboration between regions, especially the United States, China, and the United Kingdom, leads global efforts, but institutional collaboration remains underdeveloped. In terms of co-citation, seminal works by Jaffe, Hall, and Samuelson form the foundation of the current research, while emerging research focuses on technological innovations like blockchain and AI. The analysis further reveals that future research is likely to explore the intersections of data privacy, innovation, and legal frameworks. Compared with previous studies, this paper builds a knowledge framework for data-based intellectual property management from a holistic perspective of bibliometrics, analyses the current challenges, and outlines future research directions, which is of significant reference value to both scholars and practitioners.<\/jats:p>","DOI":"10.3390\/info15120780","type":"journal-article","created":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T08:33:51Z","timestamp":1733387631000},"page":"780","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property"],"prefix":"10.3390","volume":"15","author":[{"given":"Hanyue","family":"Sun","sequence":"first","affiliation":[{"name":"Library, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China"}]},{"given":"Jiajia","family":"Liu","sequence":"additional","affiliation":[{"name":"Library, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8482-5605","authenticated-orcid":false,"given":"Bingyuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Library, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China"}]},{"given":"Le","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Control and Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.im.2009.12.001","article-title":"Who owns enterprise information? Data ownership rights in Europe and the US","volume":"47","author":"Harison","year":"2010","journal-title":"Inf. Manag."},{"key":"ref_2","first-page":"1149","article-title":"Reconciling data privacy and the first amendment","volume":"52","author":"Richards","year":"2005","journal-title":"Ucla Law Rev."},{"key":"ref_3","first-page":"707","article-title":"The Law of Employee Data: Privacy, Property, Governance","volume":"97","author":"Bodie","year":"2022","journal-title":"Ind. Law J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.im.2010.04.001","article-title":"Governing the data commons: Policy, practice, and the advancement of science","volume":"47","author":"Fisher","year":"2010","journal-title":"Inf. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.clsr.2014.07.006","article-title":"Legal aspects of managing Big Data","volume":"30","author":"Kemp","year":"2014","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Leistner, M., and Antoine, L. (2023). IP Law and Policy for the Data Economy in the EU. Economics, 17.","DOI":"10.1515\/econ-2022-0043"},{"key":"ref_7","first-page":"861","article-title":"Data Protection of Internet Enterprise Platforms in the Era of Big Data","volume":"21","author":"Zhang","year":"2022","journal-title":"J. Web Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1049\/el.2015.3879","article-title":"Intellectual property core protection of control data flow graphs using robust watermarking during behavioural synthesis based on user resource constraint and loop unrolling factor","volume":"52","author":"Sengupta","year":"2016","journal-title":"Electron. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"20180083","DOI":"10.1098\/rsta.2018.0083","article-title":"Algorithms that remember: Model inversion attacks and data protection law","volume":"376","author":"Veale","year":"2018","journal-title":"Philos. Trans. R. Soc. A Math. Phys. Eng. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"233","DOI":"10.31577\/cai_2022_1_233","article-title":"How to overcome lack of health record data and privacy obstacles in initial phases of medical data analysis projects","volume":"41","author":"Mohamad","year":"2022","journal-title":"Comput. Inform."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1177\/1460458212462077","article-title":"Aggregate health data in the United States: Steps toward a public good","volume":"19","author":"Rolnick","year":"2013","journal-title":"Health Inform. J."},{"key":"ref_12","first-page":"1001","article-title":"Correlations on the protection of personal data and intellectual property rights in medical research","volume":"59","author":"Popescu","year":"2018","journal-title":"Rom. J. Morphol. Embryol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10734-020-00639-7","article-title":"The future of value in digitalised higher education: Why data privacy should not be our biggest concern","volume":"83","author":"Komljenovic","year":"2022","journal-title":"Higher Educ."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.hlpt.2020.07.003","article-title":"Policy strategies for personalising medicine \u201cin the data moment\u201d","volume":"9","author":"Rajam","year":"2020","journal-title":"Health Policy Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1016\/j.future.2019.03.042","article-title":"Economic perspective analysis of protecting big data security and privacy","volume":"98","author":"Tao","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","first-page":"369","article-title":"Accountability and transparency: Public access to federally funded research data","volume":"37","author":"Shelby","year":"2000","journal-title":"Harvard J. Legis."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"100433","DOI":"10.1016\/j.esr.2019.100433","article-title":"Open data for electricity modeling: Legal aspects","volume":"27","author":"Hirth","year":"2020","journal-title":"Energy Strateg. Rev."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chen, C. (2018, January 11\u201315). Visualizing and Exploring Scientific Literature with CiteSpace. Proceedings of the 2018 Conference on Human Information Interaction & Retrieval, CHIIR \u203218, New Brunswick, NJ, USA.","DOI":"10.1145\/3176349.3176897"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1108\/eb026481","article-title":"Empirical Hyperbolic Distributions (Bradford-Zipf-Mandelbrot) for Bibliometric Description and Prediction","volume":"25","author":"FAIRTHORNE","year":"1969","journal-title":"J. Doc."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"101270","DOI":"10.1016\/j.esr.2023.101270","article-title":"Progress and framework of clean energy production: Bibliometric analysis from 2002 to 2022","volume":"52","author":"Geng","year":"2024","journal-title":"Energy Strateg. Rev."},{"key":"ref_21","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)","volume":"119","author":"European","year":"2016","journal-title":"Off. J. Eur. Union"},{"key":"ref_22","unstructured":"Japan Patent Office (2022). 2022 Report: Revisions to the Patent and Copyright Laws."},{"key":"ref_23","unstructured":"European Commission (2022). 2022 Legislation Enhancing Trade Secrets and Data Protection in the EU."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s00779-019-01344-8","article-title":"Analysis and data mining of intellectual property using GRNN and SVM","volume":"24","author":"Li","year":"2020","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hamza, R., and Pradana, H. (2022). A Survey of Intellectual Property Rights Protection in Big Data Applications. Algorithms, 15.","DOI":"10.3390\/a15110418"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"112059","DOI":"10.1016\/j.ecolind.2024.112059","article-title":"Research progress of tourism marketing over 30 years: Bibliometrics based on CiteSpace","volume":"162","author":"Geng","year":"2024","journal-title":"Ecol. Indic."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"101111","DOI":"10.1016\/j.esr.2023.101111","article-title":"Research progress analysis of sustainable smart grid based on CiteSpace","volume":"48","author":"Geng","year":"2023","journal-title":"Energy Strateg. Rev."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"E42","DOI":"10.1093\/jamia\/ocv118","article-title":"Opportunities and challenges in the use of personal health data for health research","volume":"23","author":"Bietz","year":"2016","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"ref_29","first-page":"1","article-title":"No One Owns Data","volume":"70","author":"Determann","year":"2018","journal-title":"Hastings Law J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"iyad210","DOI":"10.1093\/genetics\/iyad210","article-title":"Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality","volume":"226","author":"Zhao","year":"2024","journal-title":"Genetics"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Thaldar, D.W., Townsend, B.A., Donnelly, D.L., Botes, M., Gooden, A., van Harmelen, J., and Shozi, B. (2022). The multidimensional legal nature of personal genomic sequence data: A South African perspective. Front. Genet., 13.","DOI":"10.3389\/fgene.2022.997595"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1093\/jamia\/ocaa260","article-title":"Ten principles for data sharing and commercialization","volume":"28","author":"Cole","year":"2021","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sorbie, A., Gueddana, W., Laurie, G., and Townend, D. (2021). Examining the power of the social imaginary through competing narratives of data ownership in health research. J. Law Biosci., 8.","DOI":"10.1093\/jlb\/lsaa068"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1111\/j.1654-1103.2011.01271.x","article-title":"Addressing data property rights concerns and providing incentives for collaborative data pooling: The West African Vegetation Database approach","volume":"22","author":"Janssen","year":"2011","journal-title":"J. Veg. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2416","DOI":"10.1109\/TIFS.2017.2707323","article-title":"Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP\u2014Part I: Framework Fundamentals","volume":"12","author":"Jin","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.aei.2010.05.007","article-title":"Using patent data for technology forecasting: China RFID patent analysis","volume":"25","author":"Trappey","year":"2011","journal-title":"Adv. Eng. Inform."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"24903","DOI":"10.1007\/s11042-019-7626-0","article-title":"A robust reversible data hiding scheme for color image using reed-solomon code","volume":"78","author":"Banerjee","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_38","first-page":"102420","article-title":"Hiding data in dual color images reversibly via weighted matrix","volume":"50","author":"Chowdhuri","year":"2020","journal-title":"J. Inform. Secur. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"8591","DOI":"10.1007\/s11042-023-15727-w","article-title":"Robust data hiding scheme for highly compressed image exploiting btc with hamming code","volume":"83","author":"Datta","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_40","first-page":"187","article-title":"Guidelines for FAIR Sharing of Preclinical Safety and Off-Target Pharmacology Data","volume":"38","author":"Briggs","year":"2021","journal-title":"Altex-Altern. Anim. Exp."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Fu, M., Li, Y., Guo, M., Wu, Z., and Li, Z. (2024, January 12\u201314). The scientific data reuse and intellectual property of data sharing in biomedical field. Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, BIC, Dalian, China.","DOI":"10.1145\/3665689.3665750"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Pettersson, A.B.V., Ballardini, R.M., Mimler, M., Li, P., Salmi, M., Minssen, T., Gibson, I., and Makitie, A. (2023). Legal issues and underexplored data protection in medical 3D printing: A scoping review. Front. Bioeng. Biotechnol., 11.","DOI":"10.3389\/fbioe.2023.1102780"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"108287","DOI":"10.1016\/j.compeleceng.2022.108287","article-title":"Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks","volume":"103","author":"Babu","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"20220040","DOI":"10.1515\/econ-2022-0040","article-title":"Is Data the New Gold? Considering Intellectual Property Protection and Regulation of Data","volume":"17","author":"Rockett","year":"2023","journal-title":"Economics"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1057\/s41267-020-00323-z","article-title":"A new approach to data access and research transparency (DART)","volume":"51","author":"Beugelsdijk","year":"2020","journal-title":"J. Int. Bus. Stud."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.1093\/ije\/dyu188","article-title":"DataSHIELD: Taking the analysis to the data, not the data to the analysis","volume":"43","author":"Gaye","year":"2014","journal-title":"Int. J. Epidemiol."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1002\/mde.3354","article-title":"Copyright\u2019s impact on data mining in academic research","volume":"42","author":"Handke","year":"2021","journal-title":"Manag. Decis. Econ."},{"key":"ref_48","first-page":"1438","article-title":"The right to benefit from big data as a public resource","volume":"96","author":"Fan","year":"2021","journal-title":"N. Y. Univ. Law Rev."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"577","DOI":"10.2307\/2118401","article-title":"Geographic localization of knowledge spillovers as evidenced by patent citations","volume":"108","author":"Jaffe","year":"1993","journal-title":"Q. J. Econ."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1080\/10438599900000006","article-title":"International knowledge flows: Evidence from patent citations","volume":"8","author":"Jaffe","year":"1999","journal-title":"Econ. Innov. New Technol."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/S0048-7333(99)00088-8","article-title":"The U.S. patent system in transition: Policy innovation and the innovation process","volume":"29","author":"Jaffe","year":"2000","journal-title":"Res. Policy"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1257\/mic.20200200","article-title":"Too Much Data: Prices and Inefficiencies in Data Markets","volume":"14","author":"Acemoglu","year":"2022","journal-title":"Am. Econ. J. Microecon."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.agsy.2017.01.023","article-title":"Big Data in Smart Farming\u2014A review","volume":"153","author":"Wolfert","year":"2017","journal-title":"Agric. Syst."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"160018","DOI":"10.1038\/sdata.2016.18","article-title":"Comment: The FAIR Guiding Principles for scientific data management and stewardship","volume":"3","author":"Wilkinson","year":"2016","journal-title":"Sci. Data"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1001\/jama.287.4.473","article-title":"Data withholding in academic genetics\u2014Evidence from a national survey","volume":"287","author":"Campbell","year":"2002","journal-title":"JAMA-J. Am. Med. Assoc."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"17003","DOI":"10.1007\/s11042-019-7557-9","article-title":"An improved high capacity data hiding scheme using pixel value adjustment and modulus operation","volume":"79","author":"Sairam","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jinteco.2009.12.002","article-title":"Do stronger patent rights raise high-tech exports to the developing world?","volume":"81","author":"Ivus","year":"2010","journal-title":"J. Int. Econ."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1080\/17530350.2019.1639068","article-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","volume":"12","author":"Giles","year":"2019","journal-title":"J. Cult. Econ."},{"key":"ref_59","unstructured":"Mowery, D.C. (2004). Ivory Tower and Industrial Innovation: University-Industry Technology Transfer Before and After the Bayh-Dole Act in the United States, Stanford University Press."},{"key":"ref_60","unstructured":"Adi, Y., Baum, C., Ciss\u00e9, M., Pinkas, B., and Keshet, J. (2018). Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. arXiv."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","article-title":"Watermarking relational data: Framework, algorithms and analysis","volume":"12","author":"Agrawal","year":"2003","journal-title":"VLDB J."},{"key":"ref_62","first-page":"51","article-title":"Intellectual Property Rights in Data?","volume":"50","author":"Reichman","year":"1997","journal-title":"Vanderbilt Law Rev."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/S0065-2660(03)50015-3","article-title":"Saving the Patent Law from Itself: Informal Remarks Concerning the Systemic Problems Afflicting Developed Intellectual Property Regimes","volume":"50","author":"Reichman","year":"2003","journal-title":"Adv. Genet."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"272","DOI":"10.2307\/4099298","article-title":"Intellectual property and constitutional norms","volume":"104","author":"Nachbar","year":"2004","journal-title":"Columbia Law Rev."},{"key":"ref_65","first-page":"315","article-title":"A Contractually Reconstructed Research Commons for Scientific Data in a Highly Protectionist Intellectual Property Environment","volume":"66","author":"Reichman","year":"2003","journal-title":"Law Contemp. Probl."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Balkin, J.M. (2017). Digital speech and democratic culture: A theory of freedom of expression for the information society. Popular Culture and Law, Routledge.","DOI":"10.4324\/9781315089645-14"},{"key":"ref_67","first-page":"1161","article-title":"Sovereign immunity and intellectual property","volume":"73","author":"Volokh","year":"2000","journal-title":"South. Cali. Law Rev."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"875","DOI":"10.2307\/3312764","article-title":"Privately legislated intellectual property rights: Reconciling freedom of contract with public good uses of information","volume":"147","author":"Reichman","year":"1999","journal-title":"Univ. Pa. Law Rev."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"76668","DOI":"10.1007\/s11356-022-23283-3","article-title":"Bibliometric review of carbon neutrality with CiteSpace: Evolution, trends, and framework","volume":"29","author":"Geng","year":"2022","journal-title":"Environ. Sci. Pollut. Res."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1111\/1467-8462.12147","article-title":"Intellectual Property Government Open Data: Australian Business Number Links to All Intellectual Property Data in Australia","volume":"49","author":"Johnson","year":"2016","journal-title":"Aust. Econ. Rev."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1111\/roie.12187","article-title":"Outsourcing, Importing and Innovation: Evidence from Firm-level Data for Emerging Economies","volume":"23","author":"Fritsch","year":"2015","journal-title":"Rev. Int. Econ."},{"key":"ref_72","first-page":"397","article-title":"The relevant research of intellectual property strategy, independent technical innovation and enterprises competitiveness-based on the data checking of China\u2019s industry clusters","volume":"4","author":"Li","year":"2012","journal-title":"Adv. Inf. Sci. Serv. Sci."},{"key":"ref_73","first-page":"829","article-title":"Australian Perspectives on the Ethical and Regulatory Considerations for Responsible Data Sharing in Response to the COVID-19 Pandemic","volume":"27","author":"Nicol","year":"2020","journal-title":"J. Law Med."},{"key":"ref_74","first-page":"1052","article-title":"Towards a Paradigm Shift in Governing Data Access and Related Intellectual Property Rights in Big Data and Health-Related Research","volume":"50","author":"Andanda","year":"2019","journal-title":"IIC Int. Rev. Intellect. Prop. Compet. Law"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.tcs.2022.04.018","article-title":"Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques","volume":"922","author":"Ahire","year":"2022","journal-title":"Theor. Comput. Sci."},{"key":"ref_76","first-page":"443","article-title":"In Search of Balance: Text, Data Mining and Copyright in the Digital Single Market Directive from a Fundamental Rights Perspective","volume":"48","author":"Manteghi","year":"2023","journal-title":"Eur. Law Rev."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1631","DOI":"10.1002\/ps.4316","article-title":"The importance of regulatory data protection or exclusive use and other forms of intellectual property rights in the crop protection industry","volume":"72","author":"Carroll","year":"2016","journal-title":"Pest Manag. Sci."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1089\/blr.2016.29030.mk","article-title":"A Decade of Data Protection for Innovative Drugs in Canada: Issues, Limitations, and Time for a Reassessment","volume":"35","author":"Kendall","year":"2016","journal-title":"Biotechnol. Law Rep."},{"key":"ref_79","first-page":"153","article-title":"Optimising the use of observational electronic health record data: Current issues, evolving opportunities, strategies and scope for collaboration","volume":"45","author":"Liaw","year":"2016","journal-title":"Aust. Fam. Phys."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/s10657-023-09789-2","article-title":"Intellectual property and fourth industrial revolution technologies: How the patent system is shaping the future in the data-driven economy","volume":"57","author":"Mertens","year":"2023","journal-title":"Eur. J. Law Econ."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11948-002-0062-x","article-title":"Who owns the data in a clinical trial?","volume":"8","author":"Drazen","year":"2002","journal-title":"Sci. Eng. Ethics"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1038\/s41597-019-0310-4","article-title":"Benefits and barriers in the design of harmonized access agreements for international data sharing","volume":"6","author":"Saulnier","year":"2019","journal-title":"Sci. Data"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Timotijevic, L., Carr, I., De La Cueva, J., Eftimov, T., Hodgkins, C.E., Korou\u0161i\u0107 Seljak, B., Mikkelsen, B.E., Selnes, T., Van\u2019t Veer, P., and Zimmermann, K. (2022). Responsible Governance for a Food and Nutrition E-Infrastructure: Case Study of the Determinants and Intake Data Platform. Front. Nutr., 8.","DOI":"10.3389\/fnut.2021.795802"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/12\/780\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:47:11Z","timestamp":1760114831000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/12\/780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,5]]},"references-count":83,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["info15120780"],"URL":"https:\/\/doi.org\/10.3390\/info15120780","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,5]]}}}