Data Sovereignty in Information Systems

Data Sovereignty in Information Systems

27 February 2024 | Franziska von Scherenberg, Malte Hellmeier, Boris Otto
The paper "Data Sovereignty in Information Systems" by Franziska von Scherenberg, Malte Hellmeier, and Boris Otto explores the concept of data sovereignty in the context of Information Systems (IS). It highlights the importance of data as a strategic asset for societal prosperity and economic competitiveness, emphasizing the need for stakeholders to have control over their data use, known as data sovereignty. The authors conduct a literature review to conceptualize data sovereignty, introducing a core conceptual model consisting of seven interacting aspects: data asset, data provider and consumer, contractual agreement, data value chain and lifecycle activities, data infrastructure, trust, and examples from the field. The model is grounded in agency theory to ensure a consistent understanding of data sovereignty within IS research. The paper evaluates the model through real-world examples and discusses its theoretical and practical implications, while also addressing limitations and future research opportunities. The study aims to provide a comprehensive framework for researchers and practitioners to navigate the complex field of data sovereignty and enhance the control and security of data assets.The paper "Data Sovereignty in Information Systems" by Franziska von Scherenberg, Malte Hellmeier, and Boris Otto explores the concept of data sovereignty in the context of Information Systems (IS). It highlights the importance of data as a strategic asset for societal prosperity and economic competitiveness, emphasizing the need for stakeholders to have control over their data use, known as data sovereignty. The authors conduct a literature review to conceptualize data sovereignty, introducing a core conceptual model consisting of seven interacting aspects: data asset, data provider and consumer, contractual agreement, data value chain and lifecycle activities, data infrastructure, trust, and examples from the field. The model is grounded in agency theory to ensure a consistent understanding of data sovereignty within IS research. The paper evaluates the model through real-world examples and discusses its theoretical and practical implications, while also addressing limitations and future research opportunities. The study aims to provide a comprehensive framework for researchers and practitioners to navigate the complex field of data sovereignty and enhance the control and security of data assets.
Reach us at info@study.space