Association for Computing Machinery. https://doi.org
/10.1145/3487553.3524632
Eclipse Foundation. (2024). Eclipse Dataspace Components.
https://projects.eclipse.org/projects/technology.edc
European Union Agency for Cybersecurity. (2022). Digital
identity: Leveraging the SSI concept to build trust.
Publications Office. https://doi.org/10.2824/8646
Ferguson, N., & Schneier, B. (2003). Practical
cryptography. Schneier's cryptography classics library /
Bruce Schneier. Wiley.
Fürstenau, D., Gersch, M., & Schreiter, S. (2023). Digital
Therapeutics (DTx). Business & Information Systems
Engineering, 65(3), 349–360. https://doi.org/10.1007/
s12599-023-00804-z
Gelhaar, J., & Otto, B [B.] (2020). Challenges in the
Emergence of Data Ecosystems. Pacific Asia
Conference on Information Systems (PACIS) 2020.
Ghayyur, S., Pappachan, P., Wang, G., Mehrotra, S., &
Venkatasubramanian, N. (2020). Designing privacy
preserving data sharing middleware for internet of
things. In ACM Digital Library, Proceedings of the
Third Workshop on Data: Acquisition To Analysis
(pp. 1–6). Association for Computing Machinery.
https://doi.org/10.1145/3419016.3431484
Gieß, A., Hupperz, M., Schoormann, T., & Möller, F
[Frederik] (2024). What Does it Take to Connect?
Unveiling Characteristics of Data Space Connectors.
Proceedings of the 57th Hawaii International
Conference on System Sciences (HICSS).
Gregor, S., & Hevner, A. R. (2013). Positioning and
Presenting Design Science Research for Maximum
Impact. MIS Quarterly, 37(2), 337–355.
https://doi.org/10.25300/MISQ/2013/37.2.01
Haoyang Che. (2006). Managing trust in peer-to-peer
systems: The last few years have seen an explosive
growth of diversified peer-to-peer (P2P) systems over
the internet, such as Gnutella, Chord, Freenet, and
KaZaA. https://www.bcs.org/articles-opinion-and-
research/managing-trust-in-peer-to-peer-systems/
Hevner, March, Park, & Ram (2004). Design Science in
Information Systems Research. MIS Quarterly, 28(1),
75. https://doi.org/10.2307/25148625
Huang, J., & Nicol, D. M. (2013). Trust mechanisms for
cloud computing. Journal of Cloud Computing:
Advances, Systems and Applications, 2(1), 9.
https://doi.org/10.1186/2192-113X-2-9
Hupperz, M., & Gieß, A. (2024). The Interplay of Data-
Driven Organizations and Data Spaces: Unlocking
Capabilities for Transforming Organizations in the Era
of Data Spaces. Proceedings of the 57th Hawaii
International Conference on System Sciences (HICSS).
Janiesch, C., Rosenkranz, C., & Scholten, U. (2020). An
Information Systems Design Theory for Service
Network Effects. Journal of the Association for
Information Systems, 21, 1402–1460.
https://doi.org/10.17705/1jais.00642
John R. Venable, Jan Pries-Heje, & Richard L. Baskerville
(2017). Choosing a Design Science Research
Methodology.
Lechte, H., Menck, J. H. D., Stocker, A., Lembcke, T.‑B.,
& Kolbe, L. M. (2023). Exploring threat-specific
privacy assurances in the context of connected vehicle
applications. ECIS 2023.
Lucy, D., Mason, B., Sinclair, A., Bosley, A., & Gifford, J.
(2023). Fair selection: An evidence review: Scientific
summary. www.cipd.co.uk
Maaß, W. (2022). Contract-based Data-sharing for AI-
based Decision Making on the Web. 55th Hawaii
International Conference on.
Möller, F [Frederik], Guggenberger, T. M., & Otto, B
[Boris]. (2020). Towards a Method for Design Principle
Development in Information Systems. In S. Hofmann
(Ed.), Lecture Notes in Computer Science: Vol. 12388.
Designing for digital transformation: Co-creating
services with citizens and industry : 15th international
conference on design science research in information
systems and technology, DESRIST 2020, Kristiansand,
Norway, December 2-4, 2020 : proceedings (Vol.
12388, pp. 208–220). Springer. https://doi.org/10.1007/
978-3-030-64823-7_20
Munoz-Arcentales, A., López-Pernas, S., Pozo, A.,
Alonso, Á., Salvachúa, J., & Huecas, G. (2019). An
Architecture for Providing Data Usage and Access
Control in Data Sharing Ecosystems. Procedia
Computer Science, 160, 590–597. https://doi.org/10.
1016/j.procs.2019.11.042
Österle, H. (Ed.). (2010). Gestaltungsorientierte
Wirtschaftsinformatik: Ein Plädoyer für Rigor und
Relevanz. Infowerk.
Otto, B [Boris], & Jarke, M. (2019). Designing a multi-
sided data platform: findings from the International
Data Spaces case. Electronic Markets, 29(4), 561–580.
https://doi.org/10.1007/s12525-019-00362-x
Peffers, K., Tuunanen, T., Rothenberger, M. A., &
Chatterjee, S. (2007). A Design Science Research
Methodology for Information Systems Research.
Journal of Management Information Systems, 24(3),
45–77. https://doi.org/10.2753/MIS0742-1222240302
Potoczny-Jones, I., Kenneally, E., & Ruffing, J. (2019).
Encrypted Dataset Collaboration. In ACM Digital
Library, Proceedings of the 2nd ACM/EIGSCC
Symposium on Smart Cities and Communities (pp. 1–
8). Association for Computing Machinery.
https://doi.org/10.1145/3357492.3358630
Recker, Rosemann, Green, & Indulska (2011). Do
Ontological Deficiencies in Modeling Grammars
Matter? MIS Quarterly, 35(1), 57. https://doi.org/10.2
307/23043489
Sänger, J., Richthammer, C., & Pernul, G. (2015).
Reusable components for online reputation systems.
Journal of Trust Management, 2(1).
https://doi.org/10.1186/s40493-015-0015-3
Schinke, L., Hoppen, M., Atanasyan, A., Gong, X.,
Heinze, F., Stollenwerk, K., & Roßmann, H.‑J. (2023).
Trustful Data Sharing in the Forest-based Sector -
Opportunities and Challenges for a Data Trustee.
https://doi.org/10.18154/RWTH-2023-08214