Location
Hilton Hawaiian Village, Honolulu, Hawaii
Event Website
https://hicss.hawaii.edu/
Start Date
3-1-2024 12:00 AM
End Date
6-1-2024 12:00 AM
Description
With the growing digitization in our modern world, data is becoming an increasingly valuable business asset. Therefore, it is crucial that individuals and organizations are aware of their data sovereignty when it comes to selling and sharing data assets. This research paper aims to identify the essential requirements for the application of data sovereignty in the context of data exchange. Currently, the literature falls short of providing a comprehensive overview of this subject. The study conducts a literature review and expert interviews to identify key requirements for applying data sovereignty in the context of data exchange. The result identifies eight key requirements including access control, usage control, location, technical aspects, legal considerations, organizational compliance, monetization, and data quality. Understanding and considering these requirements can enable organizations to achieve data sovereignty and facilitate secure and trusted data exchange.
Recommended Citation
Biehs, Steffen and Stilling, Jonas, "Identification of Key Requirements for the Application of Data Sovereignty in the Context of Data Exchange" (2024). Hawaii International Conference on System Sciences 2024 (HICSS-57). 3.
https://aisel.aisnet.org/hicss-57/in/data_ecosystems/3
Identification of Key Requirements for the Application of Data Sovereignty in the Context of Data Exchange
Hilton Hawaiian Village, Honolulu, Hawaii
With the growing digitization in our modern world, data is becoming an increasingly valuable business asset. Therefore, it is crucial that individuals and organizations are aware of their data sovereignty when it comes to selling and sharing data assets. This research paper aims to identify the essential requirements for the application of data sovereignty in the context of data exchange. Currently, the literature falls short of providing a comprehensive overview of this subject. The study conducts a literature review and expert interviews to identify key requirements for applying data sovereignty in the context of data exchange. The result identifies eight key requirements including access control, usage control, location, technical aspects, legal considerations, organizational compliance, monetization, and data quality. Understanding and considering these requirements can enable organizations to achieve data sovereignty and facilitate secure and trusted data exchange.
https://aisel.aisnet.org/hicss-57/in/data_ecosystems/3