<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Klare); ulrike.lechner@unibw.de (U. Lechner)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Digital Sovereignty from the Perspective of IT Consultancy in Germany: A Model⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martha Klare</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ulrike Lechner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universität der Bundeswehr München</institution>
          ,
          <addr-line>85579 Neubiberg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Cyber incidents and geopolitical conflicts underpin how strongly companies are afected by risks to the IT ecosystem. This work contributes to the resolution of proposing a new model for Digital Sovereignty (DS)* from the perspective of IT consultancy. We present the results of expert interviews of IT consultants who have already dealt with the topic of DS. Furthermore, we analyze the current state of the literature regarding DS models. The three most important and new factors are (1) communication within an organization, (2) adapting the service portfolio, and (3) considering usability. The advanced model with weighted factors can be used as a strategic instrument by companies that want to strengthen their DS.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Digital Sovereignty</kwd>
        <kwd>Digital Independence</kwd>
        <kwd>Business Models</kwd>
        <kwd>IT-Consulting</kwd>
        <kwd>Interview study</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>an IT-consultancy perspective that guides companies to increase their level of DS. Two research
questions guided our approach:
RQ1: Based on best practices from IT consultants, what factors should companies consider
when strengthening their Digital Sovereignty?
RQ2: What is their respective significance?</p>
    </sec>
    <sec id="sec-2">
      <title>2. Research Design</title>
      <p>
        This work relates to a qualitative interview study [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. First, four expert interviews with IT
consultants were conducted from 05/2022 to 06/2022 with expertise in Digital Strategy, Digital
Battle Management, Cyber Security, and Digital Intelligence. The transcripts were analyzed
using a qualitative content analysis according to Mayring [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. We used MAXQDA as software
for coding. Then, in the period from 10/2022 to 12/2022, semi-structured interviews with 18 IT
consultants followed. The interview partners were asked to review the first draft of a model,
rank the factors using a scale from 0=not at all important to 4=very important, suggest further
refinement, and add additional factors. From this, mean values could be determined, and and the
model could be developed iterative. The shortest interview was 00:34:58h and the most extended
was 01:35:09h long. The first author recruited the interviewees. In total, 22 IT consultants from
six companies were interviewed. The data was analyzed. Afterwards, the result was compared
to other DS models from the literature. In section 3, the final model can be found.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>Figure 2 depicts the model of Digital Sovereignty with the three dimensions of Cross-Cutting
Topics, Internal Company Topics, and External Company Topics as result of iteration 1 and 2.</p>
      <p>Results of the data generation and data analysis [iteration 1]: The contents of the interviews
with the IT consultants were extracted and assigned to topic areas (consider sustainability,...).
Results of semi-conducted interviews and data analysis [iteration 2]: 18 IT consultants were asked
to evaluate the factors. The mean value for each topic was determined from the results, added
behind the topic area, and included in the model as pie charts.</p>
      <p>
        Results of the literature review and theory reference: The topic areas from the interviews
were compared with models of DS: Herlo et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Kar and Thapa [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], Friedewald et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
Kagermann et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], Joecks-Laß and Hadwick in Hartmann [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and Pohle [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Those factors
that have not yet received attention in other models were marked with a star.
      </p>
      <p>Results from the clustering: Three diferent clusters were identified: External Company Topics,
Internal Company Topics, Cross-Cutting Topics. These were assigned to one axis in the model.
The topics generated from the interviews with the IT-consultants (see point 1) were mapped
onto one of the clusters and plotted on the respective axes.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion, Limitations, and Outlook</title>
      <p>This work enriches the current state of research by an extensive model that weighs factors of
DS from the perspective of IT consultancy, empirically supporting already mentioned layers in
models for DS and showing new factors. The presented model gives companies an orientation
on what to consider if they want to become digitally more sovereign. Other consulting papers
have primarily based their research on EU or customer perspective. This paper ofers a wider
view by describing and visualizing best practices and assessments of IT consultants. The model
was developed in 2023, during the war between Russia and Ukraine. These circumstances
may influence the data. It is deliberately limited to the economic debate of DS. Moreover, it
takes the perspective of Germany. Other countries have completely diferent regulations and
industrial structures. China and the US have diferent understandings of DS. Other limitations
are method inherent: we can not exclude bias, and a diferent set of interview partners might
lead to diferent results. The trend is increasing towards measuring trusted partners and relying
on consulting expertise to fulfill the regulatory requirements of new guidelines such as the EU
NIS 2016/1148. This trend is currently not expected to shift. Our next steps include refinement
by looking at the interdependence between the factors and validation in consulting projects.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>We thank our partners, fellow researchers, all study participants, and the project LIONS. LIONS
is funded by dtec.bw of the Digitalization and Technology Research Center of the Bundeswehr
ifnanced by the European Union, NextGenerationEU.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pohle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Digitale</given-names>
            <surname>Souveränität</surname>
          </string-name>
          .
          <article-title>Ein neues digitalpolitisches Schlüsselkonzept in Deutschland und Europa?</article-title>
          ,
          <string-name>
            <surname>Konrad-Adenauer-Stiftung</surname>
            <given-names>e.V.</given-names>
          </string-name>
          , (
          <year>2020</year>
          ) , pp.
          <fpage>5</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Klare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Verlande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Greiner</surname>
          </string-name>
          , U. Lechner,
          <source>How Blockchain and Artificial Intelligence inlfuence Digital Sovereignty</source>
          , in: European, Mediterranean, and
          <source>Middle Eastern Conference on Information Systems</source>
          , Springer, (
          <year>2022</year>
          ), pp.
          <fpage>3</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Friedewald</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kreutzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hansen</surname>
          </string-name>
          , Selbstbestimmung, Privatheit und Datenschutz: Gestaltungsoptionen Für Einen Europäischen Weg, (
          <year>2022</year>
          ) , pp.
          <fpage>5</fpage>
          -
          <lpage>508</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Kagermann</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-H. Streibich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Suder</surname>
          </string-name>
          ,
          <article-title>Digitale souveränität - status quo und handlungsfelder</article-title>
          , (
          <year>2021</year>
          ) , pp.
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E.</given-names>
            <surname>Celeste</surname>
          </string-name>
          ,
          <article-title>Digital sovereignty in the EU: challenges and future perspectives, Data protection beyond borders: Transatlantic perspectives on extraterritoriality and sovereignty</article-title>
          , (
          <year>2021</year>
          ) , pp.
          <fpage>211</fpage>
          -
          <lpage>228</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Deelmann</surname>
          </string-name>
          ,
          <article-title>Rahmenbedingungen und Geschäftsmodell der IT-Beratung, Beratung in der Softwareentwicklung Modelle-Methoden-</article-title>
          <string-name>
            <surname>Best</surname>
            <given-names>Practices</given-names>
          </string-name>
          , (
          <year>2006</year>
          ) , pp.
          <fpage>34</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Herlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ullrich</surname>
          </string-name>
          , G. Vladova,
          <article-title>Verantwortungsvolle demokratisch nachhaltige digitale Souveränität, Digitalisierung nachhaltig und souverän gestalten</article-title>
          , (
          <year>2022</year>
          ) , p.
          <fpage>66</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Kar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. E.</given-names>
            <surname>Thapa</surname>
          </string-name>
          ,
          <source>Digitale Souveränität als strategische Autonomie</source>
          , Berlin: Kompetenzzentrum Öfentliche IT/
          <string-name>
            <surname>Fraunhofer</surname>
            <given-names>FOKUS</given-names>
          </string-name>
          , (
          <year>2020</year>
          ) , pp.
          <fpage>5</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Hartmann</surname>
          </string-name>
          , Digitale Souveränität in der Wirtschaft-Gegenstandsbereiche,
          <article-title>Konzepte und Merkmale</article-title>
          , in: Digitalisierung souverän gestalten:
          <source>Innovative Impulse im Maschinenbau</source>
          , Springer Berlin Heidelberg, (
          <year>2021</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>K. DeMarrais</surname>
          </string-name>
          ,
          <article-title>Qualitative interview studies: Learning through experience, Foundations for research: Methods of inquiry in education and the social sciences, 1</article-title>
          , (
          <year>2004</year>
          ) , pp.
          <fpage>51</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mayring</surname>
          </string-name>
          , et al.,
          <article-title>Qualitative content analysis, A companion to qualitative research, 1</article-title>
          , (
          <year>2004</year>
          ) , pp.
          <fpage>159</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>