{"id":"https://openalex.org/W6944301371","doi":"https://doi.org/10.18420/oid2024_01","title":"Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry","display_name":"Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W6944301371","doi":"https://doi.org/10.18420/oid2024_01"},"language":"en","primary_location":{"id":"doi:10.18420/oid2024_01","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2024_01","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/oid2024_01","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Badirova, Aytaj","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Badirova, Aytaj","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Alangot, Bithin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alangot, Bithin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Dimitrakos, Theo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dimitrakos, Theo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Yahyapour, Ramin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yahyapour, Ramin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87242356,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.6164000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.6164000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.05900000035762787,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.03269999846816063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multidisciplinary-approach","display_name":"Multidisciplinary approach","score":0.6459000110626221},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5317999720573425},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4334000051021576},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.40950000286102295},{"id":"https://openalex.org/keywords/data-governance","display_name":"Data governance","score":0.32269999384880066},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.2944999933242798}],"concepts":[{"id":"https://openalex.org/C22467394","wikidata":"https://www.wikidata.org/wiki/Q849359","display_name":"Multidisciplinary approach","level":2,"score":0.6459000110626221},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5317999720573425},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.5246999859809875},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4334000051021576},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4255000054836273},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.41659998893737793},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.3935999870300293},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.34459999203681946},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33379998803138733},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.32269999384880066},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.27959999442100525},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.26809999346733093},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C2780535194","wikidata":"https://www.wikidata.org/wiki/Q309901","display_name":"Open data","level":2,"score":0.2554999887943268}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/oid2024_01","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2024_01","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/oid2024_01","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2024_01","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"score":0.569419264793396,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Data":[0],"exchange":[1],"is":[2,35],"essential":[3,36],"in":[4,58,81,114],"the":[5,13,23,46,50,98],"fast-changing":[6],"field":[7],"of":[8,15,25,49,97],"data-driven":[9],"innovations.":[10],"In":[11],"exploring":[12],"importance":[14],"data":[16,18,29,76],"and":[17,41,54,61,74,93],"exchange,":[19],"this":[20,82,115],"paper":[21],"highlights":[22],"necessity":[24],"building":[26],"trust.":[27],"For":[28],"sharing":[30],"to":[31,69],"be":[32],"successful,":[33],"trust":[34,64,107],"for":[37],"assuring":[38],"reliability,":[39],"security,":[40],"ethical":[42],"behaviour.":[43],"We":[44],"review":[45],"current":[47],"state":[48],"art":[51],"where":[52],"research":[53],"real-world":[55],"applications":[56],"converge":[57],"both":[59],"academia":[60],"industry.":[62],"Notably,":[63],"framework-based":[65],"projects":[66],"are":[67,79,102],"starting":[68],"take":[70],"shape,":[71],"promoting":[72],"safe":[73],"open":[75],"markets":[77],"that":[78,101],"included":[80],"work.":[83],"Nonetheless,":[84],"challenges":[85,100],"still":[86],"exist,":[87],"such":[88],"as":[89],"complex":[90],"legal,":[91],"technological,":[92],"business":[94],"issues.":[95],"Some":[96],"main":[99],"faced":[103],"while":[104],"establishing":[105],"a":[106],"framework":[108],"have":[109],"also":[110],"been":[111],"briefly":[112],"mentioned":[113],"paper.":[116]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
