{"id":"https://openalex.org/W6888075876","doi":"https://doi.org/10.18420/oid2025_01","title":"What are your intentions with my data? A tool to enhance consumer data sovereignty in digital ecosystems","display_name":"What are your intentions with my data? A tool to enhance consumer data sovereignty in digital ecosystems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W6888075876","doi":"https://doi.org/10.18420/oid2025_01"},"language":"en","primary_location":{"id":"doi:10.18420/oid2025_01","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2025_01","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/oid2025_01","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Witzki, Aaron","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Witzki, Aaron","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Carl, K. Valeria","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Carl, K. Valeria","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Dankert, L\u00e9on","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dankert, L\u00e9on","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Thomas, Oliver","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas, Oliver","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Hinz, Oliver","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hinz, Oliver","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46792952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.6359000205993652,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.6359000205993652,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.025499999523162842,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.02070000022649765,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6136000156402588},{"id":"https://openalex.org/keywords/informed-consent","display_name":"Informed consent","score":0.5182999968528748},{"id":"https://openalex.org/keywords/sovereignty","display_name":"Sovereignty","score":0.5034999847412109},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.4740999937057495},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.4684000015258789},{"id":"https://openalex.org/keywords/institution","display_name":"Institution","score":0.46070000529289246},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.4293999969959259},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.420199990272522},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.3944000005722046}],"concepts":[{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6136000156402588},{"id":"https://openalex.org/C68122502","wikidata":"https://www.wikidata.org/wiki/Q764527","display_name":"Informed consent","level":3,"score":0.5182999968528748},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5169000029563904},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5102999806404114},{"id":"https://openalex.org/C186229450","wikidata":"https://www.wikidata.org/wiki/Q42008","display_name":"Sovereignty","level":3,"score":0.5034999847412109},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.4740999937057495},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.4684000015258789},{"id":"https://openalex.org/C2780510313","wikidata":"https://www.wikidata.org/wiki/Q178706","display_name":"Institution","level":2,"score":0.46070000529289246},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.4293999969959259},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.420199990272522},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3944000005722046},{"id":"https://openalex.org/C2778656907","wikidata":"https://www.wikidata.org/wiki/Q5164712","display_name":"Consumer privacy","level":3,"score":0.36910000443458557},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3506999909877777},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32989999651908875},{"id":"https://openalex.org/C2777527080","wikidata":"https://www.wikidata.org/wiki/Q3557311","display_name":"Digital ecosystem","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C2989499966","wikidata":"https://www.wikidata.org/wiki/Q664183","display_name":"Consumer protection","level":2,"score":0.32600000500679016},{"id":"https://openalex.org/C203043789","wikidata":"https://www.wikidata.org/wiki/Q138461","display_name":"Digital economy","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.3068999946117401},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.2937000095844269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.29170000553131104},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.2881999909877777},{"id":"https://openalex.org/C126082660","wikidata":"https://www.wikidata.org/wiki/Q4252370","display_name":"Digital transformation","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C78597825","wikidata":"https://www.wikidata.org/wiki/Q484847","display_name":"E-commerce","level":2,"score":0.28349998593330383},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.2831000089645386},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.2615000009536743},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.25690001249313354}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/oid2025_01","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2025_01","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/oid2025_01","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2025_01","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"data":[1,5,34,56,133,139],"collection":[2,134],"enhances,":[3],"consumer":[4,55,93],"sovereignty":[6,57],"becomes":[7],"increasingly":[8],"important.":[9],"Despite":[10],"initiatives":[11],"like":[12],"the":[13,80,82,86,92],"GDPR,":[14],"information":[15],"asymmetries":[16],"persist,":[17],"and":[18,53,69,85,101,135],"privacy":[19],"policies":[20],"remain":[21],"complex":[22],"or":[23],"lengthy,":[24],"often":[25,90],"preventing":[26],"consumers":[27,127],"from":[28],"giving":[29],"truly":[30],"informed":[31,42,51,130],"consent":[32,48,52,117],"for":[33,40,121],"sharing.":[35],"Building":[36],"on":[37,104],"established":[38],"concepts":[39],"more":[41],"consent,":[43,114],"we":[44],"propose":[45],"a":[46,64,122],"tool\u2014the":[47],"registry\u2014to":[49],"enable":[50],"strengthen":[54],"while":[58,137],"being":[59],"easy":[60],"to":[61,98,128],"implement":[62],"in":[63,107,144],"variety":[65],"of":[66],"digital":[67,108,145],"ecosystems":[68],"applications.":[70],"Our":[71,110],"concept":[72],"takes":[73],"three":[74],"different":[75],"stakeholder":[76],"groups":[77],"into":[78],"consideration,":[79],"consumer,":[81],"inquiring":[83,99],"institution":[84],"application":[87],"provider,":[88],"since":[89],"times":[91],"is":[94,118],"not":[95],"directly":[96],"connected":[97],"institutions":[100],"instead":[102],"relies":[103],"third-party":[105],"applications":[106],"ecosystems.":[109,146],"tool":[111],"employs":[112],"case-to-case":[113],"describing":[115],"that":[116],"valid":[119],"only":[120],"singular":[123],"request.":[124],"This":[125],"empowers":[126],"exercise":[129],"control":[131],"over":[132],"usage":[136],"enhancing":[138],"availability":[140],"across":[141],"institutional":[142],"borders":[143]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
