<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Consent Withdrawal Processes in Information Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>l Hog</string-name>
          <email>gabriel.hogan8@mail.dcu.ie</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ADAPT Centre, Dublin City University</institution>
          ,
          <addr-line>Dublin D9</addr-line>
          ,
          <country country="IE">Ireland</country>
        </aff>
      </contrib-group>
      <fpage>153</fpage>
      <lpage>164</lpage>
      <abstract>
        <p>In May 2018 'consent' to the processing of Personal Identifiable Information (PII) was enshrined in legislation in Europe through the enactment of the General Data Protection Regulation (GDPR) [15] placing new demands on Information Systems (IS) for the management of consent withdrawal. This research proposes to identify the relationships between the underlying technology, organization and environment variables for Consent Withdrawal Management (CWM) in IS. This will be achieved through several case studies with consent management practitioners, using qualitative methods, process model analyses, and evaluation. The resulting research output will be a reference process model artefact and methodology that can be utilized in approaches to designing, deploying or improving information systems for the consent withdrawal requirements of GDPR.</p>
      </abstract>
      <kwd-group>
        <kwd>Consent Withdrawal</kwd>
        <kwd>Event Driven Process Chain</kwd>
        <kwd>Technology-Organization-Environment</kwd>
        <kwd>GDPR</kwd>
        <kwd>Design Science</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        GDPR places significant compliance requirements on IS’s to ensure that the data
provenance of PII and associated user decisions on consent are recorded, acted on
appropriately, and audited correctly [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. For organizations collecting and using personal data,
the ability to organize, audit, and verify compliance with legislation are key
requirements in business today [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This is not confined to GDPR in Europe. California was
the first of a number of US states to legislate on the privacy of personal data [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Data privacy and protection is an integral part of organizational governance, and an
essential part of organizations’ IS [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Provenance is a well-established and well
understood concept which seeks to establish the origin, lineage, history, transactions on, and
ownership of, an artefact. Data Provenance applies the concept in the digital data
domain [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]. PII in GDPR, requires that individuals, ‘Data Subjects’, have the right to
decide if their PII can be used in specific circumstances. This ‘consent’ can be
‘granted’, ‘withdrawn’, or in some cases required to be ‘forgotten’ [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], i.e. both the
organization and the Data Subject should have the ability to see, and control, how PII
is transacted, used or misused.
      </p>
      <p>
        Organizations must manage the data provenance of PII, and a Data Subjects’
decisions on the use of their PII in their Information Systems. Both academic and
nonacademic literature highlight the difficulties that private and public organizations are
encountering in dealing with these GDPR requirements [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], including the significant
absence of deployments in IS for CWM [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
      </p>
      <p>
        A wide variety of technical solutions which go some way to addressing the standards
and the requirements of GDPR are proposed in the literature [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. While these address
different aspects of seeking and granting consent, technical solutions alone that do not
also address business, environment or customer perspectives are unlikely to be adopted
by organizations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This requires a holistic approach, relying on a combination of
technical implementation, user interaction, together with business and organizational
management disciplines to enable usable, efficient consent provenance in their IS.
1.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Motivation</title>
      <p>This research is intended to assist organizations in assessing the fitness for purpose of
CWM in their IS by investigating the relationships between the technical,
organizational, and environmental aspects of consent withdrawal. In addition, the research
outcomes will provide an indicator to data subjects of an organizations’ IS capability to
handle a data subjects consent withdrawal.</p>
      <p>The development of a reference process model and a methodology for its use, will
enable the evaluation of consent withdrawal in an organizations’ IS. These are proposed
to be used by consent management practitioners and have the potential to allow the
identification of corrections that could lead to improvement in CWM in IS.
2</p>
      <sec id="sec-2-1">
        <title>Theoretical Background</title>
        <p>
          A literature review methodology [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ] was chosen as being most apt for the analysis of
consent management. The current state of the art in GDPR consent management is an
active area of research [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ], and CWM is predominantly technology led, however there
is a low level of cross perspective research [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] encompassing all three technology,
organization and environment IS perspectives.
2.1
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Regulatory requirements of GDPR</title>
      <p>
        GDPR [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] article 4(11) defines Consent as: “’consent’ of the data subject means any
freely given, specific, informed and unambiguous indication of the data subject's wishes
by which he or she, by a statement or by a clear affirmative action, signifies agreement
to the processing of personal data relating to him or her”, with the specific conditions
for consent laid out in article 7 of the GDPR. This requires a data controller to
‘demonstrate’ the receipt of consent from a data subject, and the right of a data subject to
withdraw consent. It also provides that “It shall be as easy to withdraw as to give consent.”
These articles of GDPR place requirements on organizations for the provenance of
consent, including the granting of a consent and the withdrawal of that consent.
2.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Current State of the Art</title>
      <p>
        In general consent management research takes a technical IS approach to the problem
and does not address the affect the relationships between the data stakeholders has on
the overall consent management capability in the IS, particularly with regard to consent
withdrawal. A number of approaches for consent management have been proposed
including ISO/IEC standards [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], capability based approaches [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], and a number of
blockchain (technical) solutions, i.e. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
2.3
      </p>
    </sec>
    <sec id="sec-5">
      <title>Related Work</title>
      <p>
        This research is agnostic to the philosophical view of privacy management in IS as
technological or social determinism [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. It is aligned with the view of Orlikowski, and
Barley [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] on the role the relationship between IS and social science in achieving
holistic IS. Two specific theories in IS research examining human – IS relationships
relevant to this research are:
• Design Science Research (DSR) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ];
• the Technology-Organization-Environment framework (TOE) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
Each of these has a bearing on consent withdrawal, particularly when viewed from the
perspective of the Data Subject, in particular the Technology Acceptance Model (TAM)
and its concept of Perceived Ease of Use (PEOU) “the degree to which a person
believes that using a particular technology would be free from efforts” [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>Design Science</title>
      <p>
        DSR [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], focuses on the human – IS relationship through artefact creation and
their application and evaluation in the IS environment. DSR has been frequently used
as a methodology applied to address privacy in IS [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        The cross-discipline characteristic of DSR makes it an appropriate approach for this
research [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. An adapted DSR methodology based on Design Science Process in Data
Quality research [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] as applied to this project is shown in Fig. 1 and is used as the
overall approach in conjunction with TOE frameworks as the theoretical lens.
      </p>
    </sec>
    <sec id="sec-7">
      <title>Theoretical Lens</title>
      <p>
        The TOE Framework [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], is proposed as the theoretical lens [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], through which to
view the Environment paradigm of the IS Research Framework [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. TOE provides a
lens for viewing and describing the relationships between these individual aspects of
the problem, and the combined influence of these relationships on the decision making
for improvements to CWM. In this project the TOE lens will be applied to specifically
address the relationships between the:
• Technology: Availability; and characteristics;
• Organization: Formal and informal linking structures; Defined responsibility and
authority; and Resources;
• External Task Environment: Government Regulation; Customer/End User (ease of
consent withdrawal under GDPR Article 7);
• Innovation decision making: Usefulness in decision making to improve the ‘fitness
for purpose’ of the organizations CWM.
The lack of coordination and interaction between the business view, the technical view,
and the customer view is a gap in the research in consent management that is
highlighted in the types of calls for further IS research [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ].
      </p>
      <p>
        In many instances organizations can demonstrate the receipt of consent grant.
However, these often lack the parallel capabilities demonstrating the full provenance of that
consent [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] including their management of the withdrawal of consent and
demonstrating that the ‘ease’ of the withdrawal matches the ease with which the consent was
granted. These problems are summarised as follows:
• The withdrawal of consent by data subjects and the provenance of their withdrawal
is a specific challenge within the overall consent management in IS.
• A methodology and reference process model is needed to indicate the 'fitness for
purpose' of an organizations IS CWM that encompasses their business need, their
technical capability and their customer relationships.
• Full compliance with article 7 of the GDPR requires the inclusion of the perception
of the ease of withdrawal by the data subject.
      </p>
      <p>
        This is not a trivial problem. Technology to indicate compliance relies on input from
domain experts in different organizational stakeholders, i.e. strategic management,
legal counsel, customer relations &amp; marketing, executive management, and shareholders,
all of which impact on the organization and its business. However, the relationships
between the organizational (business), the technological, and the environmental
(legislative, &amp; end user) perspectives &amp; characteristics are not easily understood or obvious
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. In this context a design science perspective approach is applicable [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
3.1
      </p>
    </sec>
    <sec id="sec-8">
      <title>Design Hypothesis</title>
      <p>The design hypothesis to address the identified problem in consent withdrawal is: The
‘fitness for purpose’ of CWM in IS can be represented by a model of the relationships
and interactions between a) Technology capability; b) Organizational commitment;
and c) the ease of Data Subject consent withdrawal.</p>
      <p>The following research question and sub questions are formulated to address the
hypothesis and to achieve the research objectives described above: How can the
relationships and interactions between technology, organization and data subject be
modelled to indicate the ‘fitness for purpose’ of CWM?</p>
      <p>The hypothesis will be tested through the examination of the three sub research
questions outlined below.
• (SRQ1) What are the characteristics of the relationships between the TOE actors in
the consent management process?
• (SRQ2) What are the commonalities between the technology, organization, and
environment views that influence the innovation decision making for CWM?
• (SRQ3) Can the developed process model and methodology be considered reliable
to support the design, implementation and deployment of Consent Management
features in Information Systems?</p>
      <p>SRQ1 will identify and record consent management processes from several case
studies. It will analyse these to establish the characteristics of, and the relationships
between the TOE actors.</p>
      <p>SRQ2 will analyse, compare and model the case study consent management
processes and build a reference model for the key influencing factors between each TOE
actor and an associated methodology for its use.</p>
      <p>SRQ3 will evaluate with practitioners if the process model and methodology reliably
indicate how changes in each dimension effect the others and the overall perception of
the ‘fitness for purpose’ of CWM in IS.
3.2</p>
    </sec>
    <sec id="sec-9">
      <title>Challenges and Objectives</title>
      <p>The research will require access to organizations at both a technical and management
level for data gathering on Organization and Technology in addition to independent
responses and feedback from anonymous data subjects on the Environment thread. The
organization type and size will have to be carefully selected to help reduce the number
of independent variables. Research Ethics approval may be required.</p>
    </sec>
    <sec id="sec-10">
      <title>The main challenges of this research are:</title>
      <p>• How to identify the relationships between each of the specific TOE perspectives for
consent withdrawal.
• How to develop the reference process model to show the relationships between the</p>
      <p>TOE perspectives.
• How to evaluate the TOE framework to indicate the ‘fitness for purpose’ of an
organizations’ CWM.</p>
    </sec>
    <sec id="sec-11">
      <title>The main objectives of this research are to:</title>
      <p>• identify the relationships between each of the TOE actors for consent withdrawal.
• develop a reference process model and associated methodology to indicate the
‘fitness for purpose’ of an organizations’ CWM.
• demonstrate and evaluate the process model and the associated methodology in a
real-world environment.</p>
      <p>The outputs of this research will:
• Identify the relationships between the underlying technology, organization and
environment variables for CWM in IS.
• Be reference process model and methodology artefacts that can be utilised by
practitioners in designing, deploying or improving IS with respect to their ‘fitness for
purpose’ with the consent withdrawal requirements of GDPR.
• Include an evaluation of the process model and methodology with consent
management practitioners.</p>
      <p>The process model will indicate how the characteristics of each of the aspects of
consent withdrawal relate to each other and to the ‘fitness for purpose’ of the system.
The methodology will instruct the use of the model.</p>
      <sec id="sec-11-1">
        <title>Research Methodology</title>
        <p>
          Data will be gathered from information sources each of which will require different
data acquisition activities, with different research methodologies. Each methodology
has been selected for its appropriateness to the specific aspects of the research for which
it has been chosen. A mixed methods approach of convergent design will be used as
outlined by Creswell and Plano Clark [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Several case studies will be used to identify
both dependent and independent variables in the consent management processes.
Processes which may be formally described in text or using modelling notation will be
captured using quantitative methods. Interviews with practitioners will provide key
insights through their perception, practice, and experience of the consent management
process(es) in the participating organizations. The targeted organizations for data
gathering are Universities, with municipalities and commercial companies used for
comparison and evaluation.
        </p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>4.1 Research Methodology Overview</title>
      <p>
        The Design Science Process in Data Quality research [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] is adapted in Fig. 1 and is
used as the overarching research methodology. The reference process model and
methodology will be artefacts as defined by Peffers et al [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. Data gathered using the
methodologies below will be used to design, develop, construct and evaluate the artefacts.
      </p>
      <p>
        The process model will encompass and describe the components, characteristics and
relationships observed from the case studies through the theoretical lens of the TOE
framework [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] as adapted in Fig. 2.
      </p>
      <p>The associated methodology will enable practitioners to use the model. A high level
perspective of the research methodology each TOE element will use is outlined below.</p>
      <p>
        Qualitative methodologies through interviews will be used to capture data.
Interviews will be designed using quantitative and qualitative social research methods [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] to
establish the characteristics, relationships and linkages of the CWM process in the
organization by talking to the relevant practitioners.
      </p>
    </sec>
    <sec id="sec-13">
      <title>Measuring the “Technology”.</title>
      <p>
        Technology is not necessarily confined to ‘High Tech’ hardware and software
employed in IS, but also encompasses documentation, processes, procedures and other
‘technologies’ as outlined by Baker [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Quantitative methodologies will be used to
capture formal data relating to the hardware, software, documentation, processes,
procedures or other ‘systems’ in place and being utilised or available to be utilised
external to the organization for CWM. Analyses that indicate distance between the
current technology deployment and the available state of the art imply a capacity for
innovation in CWM.
      </p>
    </sec>
    <sec id="sec-14">
      <title>Measuring the “Organizational Commitment to Consent Withdrawal”.</title>
      <p>The commitment of the organization to CWM can be linked to resources (both budget
and people), roles with responsibility and authority, and cross unit, cross functional, or
matrixed teams with organization wide mandate. Quantitative indicators such as a chief
information officer (CIO), a dedicated data protection officer or department and other
resources may be observed in the formal consent management process. However, the
relationships between these and the wider organization, including the IS organization,
and the organizations relationships with its external data subjects will be measured
using qualitative methods.</p>
      <p>Differences in the commitment to CWM between organizations of different size
(SME v Large) or type (Public v Private) may be observed. This may be an opportunity
to provide a comparative analysis between different size and types of organizations.</p>
    </sec>
    <sec id="sec-15">
      <title>Measuring the ‘External Task Environment’.</title>
      <p>This research will address the ‘environment’ in the context of CWM under
‘Government Regulation’, specifically related to GDPR and its obligations on organizations
operating in the EU and in particular the assertion laid out in article 7 that “It shall be
as easy to withdraw as to give consent.”. This requires an engagement with data
subjects independent of, and external to, the organization to ascertain their perception of
the ease of the withdrawal of their consent.</p>
      <p>
        The PEOU methodology, [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], will be used to gather data from data subjects on their
experience and perception of consent withdrawal. Data Subjects will be employed,
using Amazon Mechanical Turk, to interact with the participating organizations.
Quantitative methods will be used to design research questionnaires and associated Likert
scales to provide measurements [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], to establish the Data Subjects POEU of the
organizations CWM process.
4.2
      </p>
    </sec>
    <sec id="sec-16">
      <title>Identifying the Problem,</title>
      <p>
        In keeping with the DSR Methodology, the problem was defined as an observed feature
of current consent management and its interaction with end users of digital offerings.
A systematic literature review established the current state of the art in privacy, consent,
and consent withdrawal research using the methodology outlined by Webster and
Watson [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]. The literature review showed a gap between the current research state of the
art approaches to the problem and their implementation and adoption by organizations.
4.3
      </p>
    </sec>
    <sec id="sec-17">
      <title>Artefact Design, Development and Instantiation</title>
      <p>An artefact that can be evaluated as to its utility is required in DSR. Using the case
study data, two DSR artefacts will be developed - a reference process model of the key
influencing factors of CWM and an accompanying methodology to enable practitioners
to use the model. Iterative conversations with practitioners will allow for the continuous
refinement of the artefacts.
4.4</p>
    </sec>
    <sec id="sec-18">
      <title>Demonstration, Evaluation and Communication</title>
      <p>
        The artefacts will be demonstrated to participating organizations and evaluated by
measuring their influence on decision making for innovations to the management of
consent withdrawal in the organizations’ IS. The Perceived Usefulness (PU)
methodology [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] will be applied to gather data from technology innovation gatekeepers on
the usefulness of the ‘fitness for purpose’ artefacts [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ], in assisting with innovation
decisions on their CWM system.
      </p>
      <p>As the results of the research emerge these will be communicated to the wider
research community particularly those with interest in privacy, consent withdrawal and
design science, through peer reviewed publications in conferences and journals.
5</p>
      <sec id="sec-18-1">
        <title>Future Work</title>
        <p>
          Initial work in this project focused on data provenance and the PROV model [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ] and
its representation in blockchain, identifying self-referencing instances in the PROV
model that cannot be replicated in blockchains which are directed acyclic graphs [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
Additional work based on this developed a GDPR consent flow conceptual model,
which was elaborated as a blockchain of blockchains. Using autonomous connected
transport as a use case, a user data flow was developed [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and further refined in a
consent and consent withdrawal data flow model for data sharing organizations.
        </p>
        <p>This work has evolved to focus on the key factors in organizations’ CWM systems,
and how this can be modelled by examining their processes and workflows as outlined
by the work to date in this document.</p>
      </sec>
      <sec id="sec-18-2">
        <title>Contributions, Limitations and Conclusion</title>
        <p>This research proposes to identify the underlying technology, organization and
environment variables, and their relationships which underpin the effectiveness of CWM in
IS. Using this knowledge this research will provide a reference process model and
associated methodology to provide a ‘fitness for purpose’ indicator of the provenance of
consent withdrawal in an organizations IS. These will be demonstrated and evaluated
in a real-world environment.</p>
        <p>
          This research addresses a gap in the current state of the art providing a multi
perspective approach to CWM in organizations IS. It will contribute to practice by
providing a reference process model and associated methodology for practitioners to
use as an indicator of the fitness for purpose of their organizations CWM balanced with
a contribution to DSR theory [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] by illustrating the use of the TOE framework as a
theoretical lens in the DSR methodology. While the projectability of the research will
become evident as it evolves, some limitations are expected in the research:
• It is specific to the level of the engagement by organizations.
• It is specific to the type of organizations.
• The final outputs would be enhanced with further engaged iterative assessment and
evaluation such as outlined by Sonnenberg and Vom Brocke [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ].
        </p>
        <p>However these serve to maintain the scope of the research within the time allotted.
It is planned that future research will address these limitations.
7</p>
      </sec>
      <sec id="sec-18-3">
        <title>Acknowledgement</title>
        <p>This work was supported by Dublin City University and also by the ADAPT Centre
under Science Foundation Ireland grant “13/RC/2106_P2”.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ieromonachou</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>User resistance in IT: A literature review</article-title>
          .
          <source>International Journal of Information Management</source>
          <volume>36</volume>
          (
          <issue>1</issue>
          ),
          <fpage>35</fpage>
          -
          <lpage>43</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baker</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The technology-organization-environment framework</article-title>
          . In Dwivedi,
          <string-name>
            <given-names>Y. K.</given-names>
            ,
            <surname>Wade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            ,
            <surname>Schneberger</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. L</surname>
          </string-name>
          . (eds.).
          <source>Information Systems Theory</source>
          vol.
          <volume>1</volume>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>245</lpage>
          . Springer, New York (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bansal</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zahedi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gefen</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern</article-title>
          .
          <source>European Journal of Information Systems</source>
          <volume>24</volume>
          (
          <issue>6</issue>
          ),
          <fpage>624</fpage>
          -
          <lpage>644</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baskerville</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baiyere</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gregor</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hevner</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <year>2018</year>
          .
          <article-title>Design science research contributions: Finding a balance between artifact and theory</article-title>
          .
          <source>Journal of the Association for Information Systems</source>
          ,
          <volume>19</volume>
          (
          <issue>5</issue>
          ), p.
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Bloomberg</given-names>
            <surname>Businessweek</surname>
          </string-name>
          , https://www.bloomberg.com/news/articles/2019-02-08/wheretech-giants
          <article-title>-are-getting-slapped-over-privacy-quicktake</article-title>
          ,
          <source>last accessed</source>
          <year>2019</year>
          /12/03.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bouslama</surname>
            <given-names>S.</given-names>
          </string-name>
          , Bhar Layeb S.,
          <string-name>
            <surname>Chaouachi</surname>
            <given-names>J</given-names>
          </string-name>
          .:
          <article-title>Framework for Managing the New General Data Protection Regulation Related Claims</article-title>
          . In: Bouglel,
          <string-name>
            <given-names>M.S.</given-names>
            ,
            <surname>Rovetta</surname>
          </string-name>
          , S. (eds.)
          <source>Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT'18)</source>
          vol
          <volume>1</volume>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>23</lpage>
          . Springer, Cham (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bryman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Social research methods. 5th edn</source>
          . Oxford University Press, Oxford (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. California State Legislature.
          <source>California Consumer Privacy Act of 2018, California Civil Code</source>
          <volume>1798</volume>
          .
          <fpage>100</fpage>
          -
          <lpage>1798</lpage>
          .199 (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cha</surname>
            ,
            <given-names>S.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hsu</surname>
          </string-name>
          , T.Y.,
          <string-name>
            <surname>Xiang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeh</surname>
            ,
            <given-names>K.H.</given-names>
          </string-name>
          :
          <article-title>Privacy enhancing technologies in the internet of things: perspectives and challenges</article-title>
          .
          <source>IEEE Internet of Things Journal</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ),
          <fpage>2159</fpage>
          -
          <lpage>2187</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Creswell</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          , and
          <string-name>
            <given-names>Plano</given-names>
            <surname>Clark</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.L.</surname>
          </string-name>
          :
          <source>Designing and Conducting Mixed Methods Research. 3rd edn. Sage Publications</source>
          , Thousand Oaks, CA (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Cross</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <year>2001</year>
          .
          <article-title>Designerly Ways of Knowing: Design Discipline versus Design Science</article-title>
          .
          <source>Design Issues</source>
          ,
          <volume>17</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>49</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>F.D.</given-names>
          </string-name>
          :
          <article-title>Perceived usefulness, perceived ease of use, and user acceptance of information technology</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>13</volume>
          (
          <issue>3</issue>
          ),
          <fpage>319</fpage>
          -
          <lpage>339</lpage>
          (
          <year>1989</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Deng</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Ji</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <year>2018</year>
          . A Review of Design Science Research in Information Systems: Concept, Process, Outcome, and
          <string-name>
            <surname>Evaluation</surname>
          </string-name>
          .
          <source>Pacific Asia Journal of the Association for Information Systems</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>DePietro</surname>
          </string-name>
          , R.,
          <string-name>
            <surname>Wiarda</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fleischer</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The context for change: Organization, Technology and Environment</article-title>
          . In Tornatzky, L. G.,
          <string-name>
            <surname>Fleischer</surname>
          </string-name>
          , M. (eds.).
          <source>The Processes of Technological Innovation</source>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>175</lpage>
          . Lexington Books, Lexington, MA. (
          <year>1990</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. European Commission:
          <article-title>General Data Protection Regulation. Office for Official Publications of the European Communities</article-title>
          ,
          <string-name>
            <surname>Luxembourg</surname>
          </string-name>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hevner</surname>
            ,
            <given-names>A.R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>March</surname>
          </string-name>
          , S.T.,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Design science in information systems research</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hogan</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Helfert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Transparent Cloud Privacy: Data Provenance Expression in Blockchain</article-title>
          . In Ferguson, D.,
          <string-name>
            <surname>Muñoz</surname>
            ,
            <given-names>V.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pahl</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Helfert</surname>
          </string-name>
          , M. (eds.) 9th
          <source>International Conference on Cloud Computing and Services Science</source>
          <year>2019</year>
          , CCIS, vol.
          <volume>1218</volume>
          , pp.
          <fpage>430</fpage>
          -
          <lpage>436</lpage>
          . Springer, Heraklion (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Hogan</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dolins</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senturk</surname>
            ,
            <given-names>I. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fyrogenis</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murati</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Costantini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thomopoulos</surname>
          </string-name>
          , N.:
          <article-title>Can a Blockchain-Based Maas Create Business Value?</article-title>
          . In Christodoulou,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Iosif</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
          , Giaglis. (eds.) 3rd
          <source>Annual Decentralized Conference on Blockchain and Cryptocurrency</source>
          <year>2019</year>
          , Proceedings, vol
          <volume>28</volume>
          (
          <issue>1</issue>
          )
          <fpage>8001</fpage>
          . MDPI, Athens (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. ISO/IEC JTC 1/SC 27. ISO/IEC 27701:
          <year>2019</year>
          <article-title>Information technology - Security techniques - Extension to ISO/IEC 27002 for privacy information management - requirements and guidelines</article-title>
          . International Organization for Standardization,
          <source>Geneva</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Jamieson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Likert scales: how to (ab) use them</article-title>
          .
          <source>Medical Education</source>
          <volume>38</volume>
          (
          <issue>12</issue>
          ),
          <fpage>1217</fpage>
          -
          <lpage>1218</lpage>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Labadie</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Legner</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Understanding Data Protection Regulations from a Data Management Perspective: A Capability-Based Approach to EU-GDPR</article-title>
          . In: Ludwig,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Pipek</surname>
          </string-name>
          , V. (eds.)
          <source>Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik</source>
          , pp.
          <fpage>1292</fpage>
          -
          <lpage>1306</lpage>
          . University of Siegen, Germany (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Lokuge</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sedera</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grover</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dongming</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Organizational readiness for digital innovation: Development and empirical calibration of a construct</article-title>
          .
          <source>Information &amp; Management</source>
          <volume>56</volume>
          (
          <issue>3</issue>
          ),
          <fpage>445</fpage>
          -
          <lpage>461</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Mackie</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taramonli</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bird</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Digital Forensics and the GDPR: Examining Corporate Readiness</article-title>
          . In Scanlon,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Neihn-An</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.K.</surname>
          </string-name>
          <source>(eds) 16th European Conference on Cyber Warfare and Security</source>
          , pp.
          <fpage>683</fpage>
          -
          <lpage>691</lpage>
          . ACPIL, Reading, UK (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>March</surname>
          </string-name>
          , S. T.,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>G. F.</given-names>
          </string-name>
          :
          <article-title>Design and natural science research on information technology</article-title>
          ,
          <source>Decision Support Systems</source>
          <volume>15</volume>
          (
          <issue>4</issue>
          ),
          <fpage>251</fpage>
          -
          <lpage>266</lpage>
          (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Niederman</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>March</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The “Theoretical Lens” Concept: We All Know What it Means, but do We All Know the Same Thing?</article-title>
          .
          <source>Communications of the Association for Information Systems</source>
          <volume>44</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Oetzel</surname>
            ,
            <given-names>M.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spiekermann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Privacy-by-design through systematic privacy impact assessment-a design science approach</article-title>
          .
          <source>European Journal of Information Systems</source>
          <volume>23</volume>
          (
          <issue>2</issue>
          ),
          <fpage>126</fpage>
          -
          <lpage>150</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Orlikowski</surname>
            ,
            <given-names>W.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barley</surname>
            ,
            <given-names>S.R.</given-names>
          </string-name>
          :
          <article-title>Technology and institutions: What can research on information technology and research on organizations learn from each other?</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>25</volume>
          (
          <issue>2</issue>
          ),
          <fpage>145</fpage>
          -
          <lpage>165</lpage>
          (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Peffers</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothenberger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tuunanen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vaezi</surname>
            , R.: Design Science Research Evaluation. In Peffers,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothenberger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuechler</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <source>(eds.) 7th International Conference on Design Science Research in Information Systems, LNCS</source>
          , vol
          <volume>7286</volume>
          , pp.
          <fpage>398</fpage>
          -
          <lpage>410</lpage>
          . Springer, Las Vegas (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Petkov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Helfert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Data Quality in Ubiquitous Computing - Suitability of Design Science Research?</article-title>
          .
          <source>In: Proceedings of the 3rd International workshop on IT Artefact Design &amp; Workpractice Improvement. Forskningsgruppen VITS</source>
          ,
          <string-name>
            <surname>Linköping</surname>
          </string-name>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Pleasants</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clough</surname>
            ,
            <given-names>M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olson</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Fundamental issues regarding the nature of technology</article-title>
          .
          <source>Science &amp; Education</source>
          <volume>28</volume>
          (
          <issue>3-5</issue>
          ),
          <fpage>561</fpage>
          -
          <lpage>597</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Poikola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuikkaniemi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Honko</surname>
          </string-name>
          , H.:
          <article-title>Mydata - A Nordic Model for human-centered personal data management and processing</article-title>
          .
          <source>Finnish Ministry of Transport and Communications</source>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Politou</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alepis</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patsakis</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions</article-title>
          .
          <source>Journal of Cybersecurity</source>
          <volume>4</volume>
          (
          <issue>1</issue>
          ), p.
          <source>tyy001</source>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Sanchez-Rola</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dell'Amico</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotzias</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balzarotti</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilge</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vervier</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santos</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control</article-title>
          .
          <source>In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security</source>
          , pp.
          <fpage>340</fpage>
          -
          <lpage>351</lpage>
          . ACM, New York (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Sheng</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nah</surname>
            ,
            <given-names>F.F.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siau</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns</article-title>
          .
          <source>Journal of the Association for Information Systems</source>
          <volume>9</volume>
          (
          <issue>6</issue>
          ),
          <fpage>80</fpage>
          -
          <lpage>84</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Sonnenberg</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vom</surname>
            <given-names>Brocke</given-names>
          </string-name>
          ,
          <string-name>
            <surname>J.:</surname>
          </string-name>
          <article-title>Evaluations in the Science of the Artificial - Reconsidering the Build-Evaluate Pattern in Design Science Research</article-title>
          . In Peffers,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Rothenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kuechler</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          <source>(eds.) 7th International Conference on Design Science Research in Information Systems, LNCS</source>
          , vol
          <volume>7286</volume>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>397</lpage>
          . Springer, Las Vegas (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Vial</surname>
          </string-name>
          , G.:
          <article-title>Understanding digital transformation: A review and a research agenda</article-title>
          .
          <source>The Journal of Strategic Information Systems</source>
          <volume>28</volume>
          (
          <issue>2</issue>
          ),
          <fpage>118</fpage>
          -
          <lpage>144</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <given-names>Vom</given-names>
            <surname>Brocke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Winter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Hevner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            &amp;
            <surname>Maedche</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          ,
          <year>2020</year>
          .
          <article-title>Accumulation and Evolution of Design Knowledge in Design Science Research - A Journey Through Time and Space</article-title>
          .
          <source>In Journals of the Association for Information Systems (JAIS).</source>
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Webster</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watson</surname>
          </string-name>
          , R.T.:
          <article-title>Analyzing the Past to Prepare for the Future: Writing a Literature Review</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>26</volume>
          (
          <issue>2</issue>
          ), xiii-xxiii (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39. World Wide Web Consortium:
          <article-title>PROV-DM: The PROV Data Model, W3C Recommendation</article-title>
          , https://www.w3.org/TR/prov-dm/,
          <source>last accessed</source>
          <year>2018</year>
          /04/16.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>