Location

Hilton Hawaiian Village, Honolulu, Hawaii

Event Website

https://hicss.hawaii.edu/

Start Date

3-1-2024 12:00 AM

End Date

6-1-2024 12:00 AM

Description

With the growing digitization in our modern world, data is becoming an increasingly valuable business asset. Therefore, it is crucial that individuals and organizations are aware of their data sovereignty when it comes to selling and sharing data assets. This research paper aims to identify the essential requirements for the application of data sovereignty in the context of data exchange. Currently, the literature falls short of providing a comprehensive overview of this subject. The study conducts a literature review and expert interviews to identify key requirements for applying data sovereignty in the context of data exchange. The result identifies eight key requirements including access control, usage control, location, technical aspects, legal considerations, organizational compliance, monetization, and data quality. Understanding and considering these requirements can enable organizations to achieve data sovereignty and facilitate secure and trusted data exchange.

Share

COinS
 
Jan 3rd, 12:00 AM Jan 6th, 12:00 AM

Identification of Key Requirements for the Application of Data Sovereignty in the Context of Data Exchange

Hilton Hawaiian Village, Honolulu, Hawaii

With the growing digitization in our modern world, data is becoming an increasingly valuable business asset. Therefore, it is crucial that individuals and organizations are aware of their data sovereignty when it comes to selling and sharing data assets. This research paper aims to identify the essential requirements for the application of data sovereignty in the context of data exchange. Currently, the literature falls short of providing a comprehensive overview of this subject. The study conducts a literature review and expert interviews to identify key requirements for applying data sovereignty in the context of data exchange. The result identifies eight key requirements including access control, usage control, location, technical aspects, legal considerations, organizational compliance, monetization, and data quality. Understanding and considering these requirements can enable organizations to achieve data sovereignty and facilitate secure and trusted data exchange.

https://aisel.aisnet.org/hicss-57/in/data_ecosystems/3