Searched for: subject:"Usage%5C+policies"
(1 - 3 of 3)
document
Bastiaansen, H.J.M. (author), Dalmolen, S. (author), Kollenstart, M. (author), van Engers, T.M. (author)
Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a ‘hub-model’ approach. This...
conference paper 2020
document
Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Dalmolen, S. (author), van Engers, T.M. (author)
Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a 'hub-model' approach. This...
conference paper 2020
document
Dalmolen, S. (author), Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Punter, M. (author)
Organizations are becoming ever more aware that their data is a valuable asset requiring protection against mis-use. Therefore, being in control over the usage conditions (i.e. data sovereignty) is a prerequisite for sharing sensitive data in (increasingly complex) supply chains. Maintaining sovereignty applies to both the primary shared data...
conference paper 2020