<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Implications of trust in digital business ecosystem design: A systematic analysis of roles</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Irina Rychkova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jelena Zdravkovic</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Janis Stirna</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Stockholm University</institution>
          ,
          <addr-line>Kista, SE-16407</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University Paris 1 - Panthéon-Sorbonne</institution>
          ,
          <addr-line>Paris, 75005</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>1</volume>
      <issue>2023</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Digital technologies enable novel models of social and business interactions, where trust becomes a critical design consideration. A thorough analysis of trust issues and their implications at different enterprise levels, including strategies, processes and technological solutions, becomes an imperative part of socio-technical systems design. In this study we examine trust issues that emerge among the actors of a Digital Business Ecosystems (DBE) which, if not properly addressed, can jeopardize DBE functioning and resilience. An explicit mapping between the generic DBE roles and the social factors of trustworthiness is the main contribution of this work. We demonstrate how this mapping is used in the analysis of trust issues in the context of a Higher Education Alliance DBE. This analysis leads to the identification of explicit trustworthiness requirements that can guide (re)design of DBE strategies, processes and technical platforms.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Enterprise Design</kwd>
        <kwd>Trust</kwd>
        <kwd>Trustworthiness requirements</kwd>
        <kwd>Business Network Modeling</kwd>
        <kwd>Digital Business Ecosystem</kwd>
        <kwd>DBE Roles 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Business ecosystem refers to the interconnected business network of organizations and individuals
that interact with and influence each other within a particular industry or market. It encompasses the
complex web of relationships, resources, and interactions among various entities that collectively
contribute to the functioning and success of the overall business environment. With the digital
transformation and the increasing role of digital technologies in social interactions, the concept of
digital business ecosystem (DBE) has emerged. In a DBE, entities interact and collaborate using digital
technologies, and leverage data and information as key assets [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>
        DBEs are characterized by their dynamic and rapidly evolving nature. They require effective
governance mechanisms to ensure fairness, trust, and accountability among the participants.
Governance involves setting common rules, standards, and protocols for data exchange, resource
sharing, and collaboration, as well as resolving conflicts, ensuring compliance, and managing risks
within the DBE. A key aspect of DBEs is the diversity of actors and the roles they fulfill: in addition
to the roles acting in traditional business networks, such as supplier, customer, and end user, DBEs
rely in addition on some specific ones, such as for example - the driver role, for managing the tools
that support the DBE; a governor, for providing and/or defining the standards and policies; a
reputation guardian - for assessing all DBE actors' trustworthiness, reliability, solvency, and
worthiness; as well as several other roles [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In DBE digital technology (“D”) acts as a mediator in interactions between the ecosystem
participants, with the expectation of increasing trust between them and for providing them with a
positive experience [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Trust plays a crucial role in the functioning of a DBE, for its resilience. It
provides the foundation upon which participants collaborate and share resources and as such it is a
critical design consideration for the DBE supporting digital platforms. Identifying, modeling and
analyzing trust relations among social and technical DBE entities is a vital design step, which requires
adequate Enterprise Modeling methods and practices. Explicit analysis of trust issues in a DBE has an
impact on the DBE strategy, as it can be used to identify partners and their needs in terms of trust; on
the DBE operations as it can affect the processes between DBE partners; and on the DBE technology,
as it can help to design relevant components and to make technological choices.
      </p>
      <p>
        In social science, trust is described as a situation in which an individual or an organization (trustor)
is willing to rely on the chosen actions of another individual or organization (trustee) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. According
to Mayer et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], ability, benevolence, and integrity are the factors of (perceived) trustworthiness
that characterize a trustee. In the technical domain, trust defines relationships between an individual
and a technological component (trust in technology) and describes the interactions between the
entities in the digital world (digital trust). Here the (perceived) trustworthiness is often connotated
with security, reliability, and authenticity of digital systems, platforms, or transactions.
      </p>
      <p>The gap between the social and technical definitions of trust arises due to the challenges of
translating a subjective, context-dependent nature of social trust into objective, measurable terms
that can be addressed by technical mechanisms. While technical (or digital) trust can provide a
foundation for secure and reliable digital interactions, it may not fully capture the complexities of
social trust that arise from human relationships, emotions, and cultural factors.</p>
      <p>DBEs are inherently socio-technical systems, and addressing trust in DBE requires a holistic
approach that integrates both social and technical dimensions of trust. Bridging the gap between
these dimensions involves recognizing the interplay between different types of trust, understanding
the subjective and contextual nature of trust issues, and leveraging both social and technical
mechanisms to foster trust in DBEs. The goal of this work is to explicitly address trust and its
implications in DBE design.</p>
      <p>In this paper, we examine the roles of DBE and discuss their trust relationships. First, we associate
the DBE roles with social trustworthiness factors. To bridge the gap between the social and technical
dimensions of trust, we propose a mapping of (social) trust issues into trustworthiness requirements
(TwR) that can guide DBE design. We define trustworthiness requirements as the expectations of one
actor (trustor) about trustworthiness of another actor (trustee) in a DBE. We demonstrate our findings
with a case study of European universities forming a higher-education (HE) alliance, which fulfills
the main criteria for being considered a DBE. We examine the trust building process among the actors
of this DBE, focusing on the implications on the supporting information systems. We formulate the
following research questions:
•
•</p>
      <p>RQ1: What are the social factors of trust defining relationships among DBE actors?
RQ2: What are the trustworthiness requirements that guide the design and development of a
DBE and its supporting systems for the case of a HE alliance?</p>
      <p>
        In order to formulate the TwR for a particular role in the HE alliance DBE, first, we analyze the
trust issues expressed by a corresponding DBE participant and their (social) trust factors, then we use
a reference list of TwR derived from the literature [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and identify relevant generic requirements.
Finally, we illustrate how these generic requirements can be contextualized for the HE alliance. The
proposed approach bridges the gap between the social and technical dimensions of trust and supports
business and technology experts in guiding their design decisions and technological choices.
      </p>
      <p>The remainder of this article is organized as follows: in section 2, we discuss the background of
this study and its related works; in section 3, we provide a mapping of the generic DBE roles on the
trustworthiness factors defined in social science. We also describe our approach for trustworthiness
requirements elicitation. In section 4 we present our findings on the case study of higher-education
alliance. In section 5 we discuss our results and provide our conclusions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background and related work</title>
      <p>
        2.1. Trust
In the research literature on trust, the act of trust is represented as a relationship between a subject
(the trustor) and an object of trust (the trustee) [
        <xref ref-type="bibr" rid="ref5 ref6 ref8">5, 6, 8</xref>
        ]. Outcome of trust is defined as an interaction
between trustor and trustee and is characterized by the resulting experience (negative or positive).
Antecedents of trust refer to the factors that influence trustor’s willingness to trust and include factors
related to the subject (trustor’s propensity to trust), to the object (trustworthiness of the trustee) and
to the environment where interaction between the subject and the object takes place (e.g.,
institutional trust) [
        <xref ref-type="bibr" rid="ref6 ref8 ref9">6, 8, 9</xref>
        ]. In this study, we consider trustor’s propensity to trust and institutional
trust as invariant for a given interaction. Our primary focus is on trustworthiness of the trustee as a
design variable.
      </p>
      <p>Whereas researchers in social sciences focus on trust between social entities (individuals, groups
or organizations), in IS research, trust is considered as a socio-technical concept, i.e., it is defined as
a relationship between social entities and technological components (information systems,
applications, infrastructure, etc.), in which a technological component can be either an object (trustee)
or a subject (trustor).</p>
      <p>
        In modern organizations, social trust remains an important determinant of collaboration and
decision making. With a constant digital transformation, trust issues that occur among social actors
on the strategic and operational levels of the organizations are often addressed by socio-technical
solutions developed by the IT, creating a gap between the social and technology-centric perspectives
of trust. To bridge this gap, it is important to recognize the multidimensional nature of trust and
consider the social and cultural contexts in which technological systems are developed and used [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Three forms of trust are widely recognized in the literature: social trust, digital trust, and trust in
technology. Social (or interpersonal) trust is defined as the subjective probability that a trustee has
the required capacity and willingness to perform an action that is beneficial or at least not detrimental
to another entity - a trustor - in a specific context [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Digital trust defines relationships between
entities in the digital world. It is the measure of confidence that a trustor has in the trustee's ability
to protect data and privacy of individuals [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Trust in technology reflects the trustor’s beliefs that a
specific technology has the attributes necessary to perform as expected in a given situation where
negative consequences are possible [
        <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
        ]. Table 1 presents a summary of these three types of trust,
their associated trustworthiness factors and outcomes.
TTreuchstnologiyn IOnrdgi.vidual/ IT object
      </p>
      <sec id="sec-2-1">
        <title>Functionality, helpfulness, usefulness, reliability Org. /</title>
      </sec>
      <sec id="sec-2-2">
        <title>Individual</title>
      </sec>
      <sec id="sec-2-3">
        <title>IT object Org.</title>
      </sec>
      <sec id="sec-2-4">
        <title>Individual</title>
      </sec>
      <sec id="sec-2-5">
        <title>Privacy, security,</title>
        <p>transparency, traceability,
/ control</p>
      </sec>
      <sec id="sec-2-6">
        <title>Interaction /</title>
        <p>transaction in digital
environnement</p>
        <sec id="sec-2-6-1">
          <title>2.1.1. Trust: Social perspective</title>
          <p>
            It addresses the (social) context where the trust issues among the actors arise. [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ] defines trust
antecedents and outcomes in their integrative model of organizational trust. The authors define the
trust for a trustee as “a function of the trustee's perceived ability, benevolence, and integrity and of
the trustor's propensity to trust.” Propensity to trust is an intrinsic characteristic of a trustor, which
can be considered as invariant. Ability, integrity and benevolence are the factors of trustworthiness
that characterize a trustee; they depend on the context and the nature of a given trustor-trustee
interaction. According to [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], ability defines a group of skills, competencies, and characteristics that
enable a trustee to have influence within some specific domain; benevolence defines the extent to
which a trustee is believed to want to do good to the trustor, aside from an egocentric profit motive;
integrity refers to trustee’s moral quality of being sincere and his/her willingness to adhere to some
rules and principles. Social trust is used as the basis for decision-making in diverse contexts, including
enterprise strategy, governance of operations, and technology [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-6-2">
          <title>2.1.2. Trust: Technical perspective</title>
          <p>
            Digital trust and trust in technology define trust in the technological domain. The trustworthiness
factors of technology include usability, functionality, helpfulness, reliability and credibility of
information [
            <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
            ], as well as customizability and adaptability [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ]. Digital trust reflects the trustor's
beliefs that a trustee (a social entity or an IT object) has the attributes necessary to support secured
digital interactions [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]. Trustworthiness factors in digital trust include privacy, security,
transparency, traceability, control [
            <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-6-3">
          <title>2.1.3. Bridging the gap between the social and technical views on trust</title>
          <p>While trustworthiness factors of digital trust and trust in technology can be formalized, measured
and used to provide a foundation for technological solutions, they may not fully capture the
complexities of social trust that arise from human relationships, emotions, and cultural factors. Thus,
an explicit mapping between technological and social perspectives of trust is of great importance.</p>
          <p>
            Requirements engineering (RE) discipline plays a crucial role in design and development of
sociotechnical systems. The RE process involves understanding the stakeholders' needs and expectations,
as well as the social and organizational context in which the system will operate [
            <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
            ]. We address
trustworthiness of the trustee in socio-technical systems from the RE perspective. Here, trustor's
expectations regarding the trustee's trustworthiness can be expressed as trustworthiness requirements
(TwR). We define TwR as a statement made by a trustor about the expected trustworthiness of a
trustee. A TwR has to clearly express an operational, functional, design or other characteristic, which,
according to trustor’s beliefs, positively impacts trustworthiness of this trustee and interaction
between the two. TwR can be met by incorporating certain attributes, features, or properties by the
trustee, whether a social entity or a technological solution. TwR can be eventually refined into
conventional FR, NFR, process requirements or contracts. The interest in requirements related to trust
is not new: in [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ], trust is considered as a part of soft requirements (SR) and is associated with the
aspects of the social system where a technological system is used – its context; in [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ], trustworthiness
requirements are defined as a special class of quality requirements and relate trust with other
concepts such as capability, vulnerability and risk; in [22], the role of trustworthiness in the software
development lifecycle is examined and a process for elicitation and analysis of TwR is proposed. The
work presented in [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ] explicitly addresses TwR in supply chain management.
          </p>
          <p>In this study, we examine the social trustworthiness factors that define interactions among DBE
actors. First, we provide a mapping between these factors and generic DBE roles. Then, using the case
study, we illustrate how the trustworthiness factors of the trustee in a DBE can be addressed by the
TwRs. As a result, we identify requirements that need to be met by the DBE roles and their supporting
digital solutions, providing guidance for DBE design and evolution.</p>
        </sec>
        <sec id="sec-2-6-4">
          <title>2.2. Digital business ecosystems (DBE) and roles in DBE</title>
          <p>
            Actors, roles, capabilities, relationships, and digital components are essential elements of DBE [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ].
The actors are individuals and organizations that take part in a DBE by fulfilling specific roles
according to their capabilities. The interactions between the DBE actors are supported and mediated
by different digital components such as the ecosystem digital platform and its services, smart devices,
cloud storage, and other.
          </p>
          <p>
            Roles of archetypal kind are of a high significance for the ecosystem’s design as they define the
DBE-specific responsibilities of the actors involved and provide underlying knowledge for the
capabilities relevant to a DBE. In [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ], the authors surveyed the relevant literature to identify the DBE
roles and their responsibilities, leading to the following ones (Table 2).
sets up a common vision for all actors in a DBE;
provides and manages a digital platform;
optimizes entry barriers for joining a DBE;
acquires and retain actors within a DBE;
provides end-products and services to customers and end-users;
collects and raise end users’ events and feedback;
ensures an integrated end user experience.
collects and combines capabilities and resources within a DBE into end-products or
services, created by Modular Producer and Complementor, for offering to
Customers and End-Users.
provides resources within a DBE; resources can be products, services, or
knowledge, created by the producer’s capabilities.
using its capabilities, provides resources that complement the core resources within
a DBE, with some added-value features.
buys end-products and services offered in a DBE.
consumes end-products and services offered in a DBE;
provides information about its events and feedback to other DBE roles.
oversees all the actors within a DBE by defining normative artifacts, such as
decisions, policies, guidelines, and ethics, related to the business concern of the
DBE.
          </p>
          <p>Reputation
Guardian
surveys and assesses all DBE actors' trustworthiness, reliability, solvency, and
worthiness.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Analysis of trust issues and identification of trustworthiness requirements in DBE</title>
      <sec id="sec-3-1">
        <title>3.1. Research approach</title>
        <p>
          This study follows the Design Science Research [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and aims at developing a framework for the trust
management in DBE types of business networks – the targeted design artifact. The need for managing
trust and hence for this design artefact is expressed in [
          <xref ref-type="bibr" rid="ref19 ref3">3, 19</xref>
          ], where trust is identified as one of the
important aspects of DBE design. This study paves the ground for developing the trust management
framework for DBE. In this article, we report on the initial cycle of artifact design, which includes
the problem identification and the framework components design and development. The theoretical
view on the problem was presented in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]; this paper is grounded on the case study and focuses on
the empirical view of the problem.
        </p>
        <p>
          We conduct a structured analysis of the archetype DBE roles and identify the trustworthiness
factors that determine the interactions between these roles. The resulting mapping (Table 3) is one of
the framework components developed in this study. Following the identified trustworthiness factors,
we proceed with identification of trustworthiness requirements (TwR) that can be further
operationalized (i.e., implemented as a part of an interactive process or a supporting information
system between the corresponding DBE roles). To this end, we propose and follow a process for trust
analysis (Section 3.3). This process takes trust issues expressed by the specific DBE actors as an input
and leads to identification of their corresponding TwR. To support the trust analysis, we use a set of
generic TwR from [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>
          We demonstrate the designed artifact by examining trust in the Higher-Education Alliance DBE
– our case study (Section 4). In this article, we provide the results of trust analysis for the Modular
Producer role in this DBE. In particular, we show the trust issues (collected from the case),
trustworthiness factors (application of our mapping), generic TwR (from [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]) and specific
(contextualized) TwR defined for this role. Completeness of the elaborated set of requirements as
well as their prioritization are not discussed in this study. This will be addressed during the following
(validation) cycle of DSR.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Trustworthiness factors in DBE</title>
        <p>In DBE, trust relationships are formed among their participants (social entities) and can be
characterized by the following: (i) several entities can share the same DBE role and each entity can
fulfill several DBE roles; (ii) within different interactions, each DBE role can be considered as a trustor
(one who trusts) or as a trustee (one to be trusted).</p>
        <p>
          Following [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], ability, integrity, and benevolence are the factors of trustworthiness that influence
a decision of one DBE role (trustor) to engage into an interaction with another DBE role (trustee).
The impact of ability, integrity, and benevolence on building trust can vary depending on the context
of this interaction. More specifically, consider a situation 1, where the two individuals X and Y are
respectively a patient (trustor) and a physician (trustee), and a situation 2, where the same X and Y
are playing cards together: in situation 1, the Y’s ability (i.e., medical proficiency and qualification)
can be a major trustworthiness factor for X, whereas in situation 2, it will be rather Y’s integrity
(honesty, compliance with the rules). Based on that, the third characteristic of trust relationships in
DBE is: (iii) Trustworthiness factors defined by a trustor for a trustee within an interaction in DBE
depend on the context of this interaction and on the DBE roles they play within this interaction (as
defined in Table 2).
        </p>
        <p>
          Based on our previous studies on DBEs [
          <xref ref-type="bibr" rid="ref19 ref20 ref3">3, 19, 20</xref>
          ], we analyze trustor-trustee relationships
between different DBE roles and identify the major social trustworthiness factors in trust building
between these roles. The results are illustrated in Table 3. Each cell {i,j} defines a trustworthiness
factor (or factors) for an interaction between the two DBE roles: role i (as a trustor) and role j (as a
trustee). For example, the third column of the table defines the trustworthiness factors for a DBE
Modular producer (MP) role towards the other roles in the DBE with which the MP interacts as a
trustor.
        </p>
        <p>The MP (trustor) - Driver (trustee) interaction in DBE is important to ensure consistent
development and evolution of a service or product provided by the DBE. A, B, I in the cell {3,1} indicate
that all the three factors – ability, benevolence and integrity - need to be considered when designing
processes and digital platforms supporting and mediating their interactions.</p>
        <p>Trustworthiness factors in MP – Aggregator and MP - Complementor interactions (cells {3,2}{3,4}
in Table 3) include ability (A) (e.g., skills/competences of an aggregator to collect and combine
capabilities and resources within a DBE) and integrity (I) (e.g., aggregator’s honesty, capacity to
adhere to the rules defined by DBE).</p>
        <p>Integrity (I) is the major factor in MP – MP and MP - Customer interactions (cells {3,3}{3,5} in Table
3). Here, integrity of MP refers to their perceived honesty in delivering a high-quality service/product.
Customers’ integrity refers to their perceived honesty and compliance with the rules.</p>
        <p>Trustworthiness factors in MP - Governor interactions include benevolence (B) and integrity (I).
This is related to the responsibility of the governor as a trustee, which is to oversee all the actors
within a DBE (Table 2).</p>
        <p>Benevolence (B) is the major factor in MP - Reputation guardian interactions. The responsibility
of the reputation guardian as a trustee is to survey and assess all DBE actors (see Table 2) and
benevolence (e.g., a belief that this evaluation will be fair) provides a major contribution in building
trust in these interactions.</p>
        <p>Trustworthiness factors are not applicable to MP (trustor) - End user (trustee) interactions
(indicated n/a in the cell {3,6}) since, by definition, MP role in DBE does not “rely on” or “become
vulnerable from” the End user. Note that the opposite is not true: End user as a trustee has to trust
the MP's ability to produce a competitive, relevant service or product. This is reflected by the ability
(A) trustworthiness factor in Table 3 (cell {6,3}). The rest of the table can be interpreted the similar
way.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Analysis of trust in DBE</title>
        <p>1. Identify trust issue(s) of a trustor actor. This step is context-specific and can vary for different
partners in the DBE. The working approach can be: empirical analysis of DBE design and
operations or interviews with stakeholders.
2. Identify the trustworthiness factors of the trustee role related to this issue. This step is
context-independent and defined for generic roles in DBE, c.f. Table 3.
3. Formulate TwR that express trustor’s expectations about trustee’s (social) trustworthiness
factors from step 2 by using (technical) trustworthiness properties (i.e., system or process
qualities). This step can be considered as a context design. Here we are working with
engineers of the DBE to analyze the existing DBE design. The requirements can be extracted
from this context or identified using a more generic reference list, derived from the previous
experiences or from the literature.
4. Contextualize the TwRs by associating them with the trust issues identified in step 1. In this
step, we are focusing on specific requirements of actors and the DBE as a whole. Here, the
TwRs from step 3 are refined following the interviews with the actors’ representatives and
analysis of the usage data.</p>
        <p>The expected outcome of this process is a set of explicit, contextualized TwRs that provide a
reference to the social context and identify an operational, functional, design or other characteristic,
which, according to trustor’s beliefs, positively impacts the trustworthiness of this trustee and
interaction between the two. In the following section we illustrate this process with the case study of
Higher-Education Alliance DBE.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Case study: Higher-Education Alliance</title>
      <sec id="sec-4-1">
        <title>4.1. About alliances in Europe</title>
        <p>During the past decade a plethora of university alliances in the domain of higher education have
emerged, with more than 40 of such alliances in Europe. Some alliances focus mainly on student
mobility (e.g., Erasmus+), while others are aiming at a united Europe university both in terms of
teaching and research (e.g., CIVIS, 4EU+, Una Europa). The latter type is featured in our case study
(by the active participation of the authors in one of the outlined alliances). Through their activities
and collaboration, these alliances strive to actively promote fundamental rights, solidarity,
democracy, social cohesion, cultural diversity, and active citizenship. Therefore, the business
foundation of the HE alliances could be condensed into the following knowledge square: Education,
Research, Innovation and Civic Engagement. The alliances are typically co-funded by the EU
Commission and the member universities.</p>
        <p>HE alliances perform and coordinate an extensive number and variety of activities including
development of educational programs and modules at Bachelor’s, Master’s and PhD levels; student,
teacher, and researcher mobility; educational and scientific calls and events; thematic working nodes,
theme-labs, promotion-related activities, governance, management of the digital infrastructure.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. The roles and responsibilities of the DBE participants</title>
        <p>HE alliances conform to the concept of DBE, because they consist of a large number of independent
and self-organizing actors collaborating on various business objectives on a DBE level as well as
individually. A key aspect of DBEs is actors acting in complementary roles, which is essential to
maintain DBE’s long-term resilience. Table 4 shows the mapping of the common actors of an HE
alliance to their corresponding DBE roles and responsibilities.</p>
        <p>To propose course curriculum, assign
tasks to modular producers and
monitor development.</p>
        <p>To organize events (conferences,
seminars), present curriculum, etc.</p>
        <p>To make decisions on operative levels,
to coordinate communications and
tasks of the universities.</p>
        <p>To make cooperation decisions that
would be applied across the
participating regions
To collect and disseminate student
voices for the best interests of
students: it listens, exchanges and
proposes ideas on how the alliance
should develop.</p>
        <p>To attend campus and online courses,
take examinations, to do course
evaluation
Business
member
Citizen</p>
        <p>First-contact
student(s) at every
member university.
Regional organizations Customer
and companies
Regional citizens</p>
        <p>Customer
Communication
Office</p>
        <p>The alliance
representative office
in EC</p>
        <p>To provide information about the
alliance to potentially interested
students.</p>
        <p>To sponsor and attend some events of
the alliance, provide guest lectures,
etc.</p>
        <p>To support co-creation of knowledge
related to the curriculum content,
collaboration with business, and other.</p>
        <p>To encourage the participation of all
stakeholders in building the
envisioned university model.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Trust analysis for the Educational Alliance</title>
        <p>In this section, we provide the trust analysis for the Modular Producer role (a faculty teacher or
researcher) in a HE Alliance DBE. For the sake of brevity, we do not provide the analysis for the other
roles in this paper.</p>
        <p>
          Following the process of trust analysis (Section 3.3), we illustrate (1) the trust issues identified in
the interactions between Modular producer (as trustor) and other roles in the HE alliance DBE
(trustees) and (2) provide their mapping to the trustworthiness factors of DBE roles from Table 3.
Next, in (3), we use the taxonomy proposed in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] as a reference to formulate our TwR about the
trustworthiness factors identified in (2). This taxonomy associates ability, integrity and benevolence
with 21 TwRs derived from the literature. Finally, in (4), we contextualize the identified TwRs for the
MP in the HE alliance. The summary of this analysis is presented in Table 5.
        </p>
        <p>Modular producers (MP) in the HE alliance are members of teaching and research staff responsible
for creating content for educational programs (course materials, practical works, projects etc.) and
delivering the program to the end users. When creating common courses, one of the challenges is to
ensure alignment, consistency, and uniform quality of the course modules among different MPs.
Therefore, an issue expressed by a trustor-MP towards the other MPs (trustees) is:
1. I am concerned with the quality of modules provided by other modular producers. This issue is
associated with integrity (I) of the MP role as a trustee in Table 3.</p>
        <p>Another challenge is related to aggregation, dissemination and reuse of developed materials
within common space, which are ensured by Aggregator (a node) as a trustee:
2. I am worried that the development of a common course will not follow the established milestones
and deadlines. This issue is associated with integrity (I) and ability (A) of the Aggregator role
in Table 3;
3. I want to make sure the aggregator will not put me in competition with another modular
producers - associated with integrity (I);
4. I am concerned that, within a common course, my content can be used or modified without my
knowledge - associated with integrity (I);
5. I am concerned about the integration efforts and evolution of my content: upload, update,
formatting should be ensured by the aggregator - associated with ability.</p>
        <p>Once the program is developed, MPs are also concerned with its running. The following example
illustrates the trust concerns towards Driver (a university) as a trustee:
6. I am concerned that the digital platform for course provisioning and communication with
students will work without errors - associated with the trustee’s ability (A).</p>
        <p>Towards Complementor (a lab, a third-party technology provider for) as a trustee:
7. I am concerned with the quality of supporting services and their price (e.g., Virtual classrooms,
examination tools) delivered by the complementor - associated with the trustee's ability (A).
Towards Reputation Guardian (communication office in HE alliance):
8. I am concerned that a fair number of students, with adequate background and academic records
will be attending the course - associated with benevolence (B) of a Reputation guardian.</p>
        <p>
          Once the issues are identified (column 1 in Table 5) and associated with the trustworthiness factors
(column 2 in Table 5), we formulate the TwR of the MP (as a trustor) towards the DBE (column 3 in
Table 5). In [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], a taxonomy of TwR is proposed. This taxonomy associates the (social) trustworthiness
factors with technical features of solutions. We use the TwR from this source as a reference. For
example, issue 1 can be associated with Auditability TwR. Once relevant TwR are identified, they
need to be contextualized (column 4, in Table 5). For issue 1, we propose the following
contextualization of the Auditability TwR: Any faculty teacher in the node must be able to validate the
quality of the class materials produced by their peers. Every faculty teacher has to demonstrate the quality
of the produced course materials.
        </p>
        <p>Note that the issues can vary among the actors playing the same DBE role (e.g., different teachers
in HE alliance); they can also be shared between the roles in the DBE (e.g., issue 2 is shared by the
MP and the driver role).</p>
        <p>The process above needs to be conducted for all DBE participants to collect the list of issues and
requirements for each relevant trustor-trustee interaction in the DBE.</p>
        <p>Auditability: Trustor must be able to
validate the trustee’s compliance with the
rules (e.g., by executing the audit,
supervising the examining the execution
traces, supervising the trustee's process at
run time).</p>
        <p>Performance: Trustee must ensure an
efficient distribution of resources, with
respect of defined timeframe and budget.</p>
        <p>Compliance: Trustee has to adhere to rules,
agreements or regulations.</p>
        <p>(4) Contextualized TwR of reference
Any faculty teacher (Modular Producer)
in the node must be able to validate the
quality of the class materials produced by
their peers: fit to the program, alignment
between the modules, etc. Every faculty
teacher should be able to demonstrate the
quality of the produced course materials.</p>
        <p>A node (Aggregator) creates the
educational programs, with respect to the
program calendar and budget set by the
steering committee (Governor).</p>
        <p>A node acts according to the rules defined
by the steering committee (Governor) and
uses the standard solutions (e.g., digital</p>
        <p>Integrity: Trustee must ensure correct and
timely execution of activities, with respect
to contract or process specifications.</p>
        <p>Traceability: Trustor has to access all
information related to provenance of a
physical or information object accurately
and trace it to its source.</p>
        <p>Transparency: Trustee’s workflow must be
transparent and documented. Trustee must
provide an accessible and non-repudiable
audit trail showing use, change and
viewing of the data.</p>
        <p>Integrity (data): Trustee must ensure the
accuracy, completeness, and consistency of
data over its entire life-cycle.</p>
        <p>Automation of data processing: Trustee
must minimize physical and maximize
digital processing of data.</p>
        <p>Interoperability: Trustee must show a
capability to work with trustor.</p>
        <p>Availability: All resources and software
components needed for process/activity
execution have to be available to the
trustor, by the trustee.</p>
        <p>Availability: All resources and software
components needed for process/activity
execution have to be available to the
trustor.</p>
        <p>Performance: Trustee must ensure an
efficient distribution of resources, with
respect of defined timeframe and budget.</p>
        <p>Accountability: Trustee is held responsible
for her actions and cannot deny them.</p>
        <p>Authentication (data): Trustor must be able
to determine the correctness and reliability
of reported data (e.g., messages, events).</p>
        <p>portal) delivered by a leading university
(Driver).</p>
        <p>A node demonstrates the program
evolution to the steering committee and
informs the students and faculty teachers
about problems.</p>
        <p>Faculty teacher and faculty researcher has
to be able to access all the information
related to other modular producers and to
trace the produced content.</p>
        <p>A node’s course development plan (e.g.,
workflow) must be transparent to the
faculty teachers and explicitly
documented.</p>
        <p>A node must ensure the overall accuracy,
completeness, and consistency of
produced content over its entire
lifecycle.</p>
        <p>A node must minimize physical and
maximize digital processing of course
materials and to enable students
(EndUser) to access it remotely.</p>
        <p>A node must be able to process, store and
correctly integrate any numeric content
from the faculty teachers.</p>
        <p>Digital platform for student and course
management has to be available to
students and faculty teachers. The content
must be accessible which is ensured by
the designated university (Driver).</p>
        <p>All resources and software components
needed for the course have to be available
by the digital platform through a
university, to faculty teachers.</p>
        <p>Lab (Complementor) must ensure an
efficient distribution of resources, with
respect to defined timeframe and budget.</p>
        <p>Steering committee is responsible for her
actions in marketing, dissemination of
the calls and student inscription to the
program.</p>
        <p>Faculty teachers must be able to
determine the correctness and reliability
of reported data (e.g.,
application/admission ratio, information
on the students).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion and conclusions</title>
      <p>Trust is a critical enabler of business interactions facilitating effective collaboration, efficient resource
utilization, adaptive behaviors, and collective effort towards common goals. Business networks, as
inherently socio-technical systems, require a holistic approach for trust analysis that integrates its
social and technical dimensions. This study attempts to bridge the gap between these dimensions by
incorporating the subjective and contextual nature of trust in DBE designs and management
principles. Identification and analysis of trust issues among the participants of a DBE is a crucial task
with a great impact on the DBE sustainability and resilience; it must be conducted upfront and it
requires adequate enterprise modeling methods and practices.</p>
      <p>In this work, we proposed a framework for structured analysis of trust among the actors of DBE.
We focused on the implications on the supporting digital platforms pervading any business
interaction in a DBE setting. We consider that the proposed framework can be used to support
(re)design of DBE and its supporting digital platforms as follows:
•
•
•
•
•</p>
      <p>A list of requirements aggregated per Trustee-role provides a vision of what the DBE expects
from this given role.</p>
      <p>A list of requirements aggregated per Trustor-role provides a vision of what this particular
role expects from the DBE.</p>
      <p>Prioritization of the TwRs by identifying the TwRs most frequently expressed.</p>
      <p>Negotiation of the TwRs and identification of the minimal set of TwRs that will be satisfactory
for a particular DBE.</p>
      <p>Identification and assessment of alternative organizational and technical solutions to cover
the set of TwRs.</p>
      <p>The study is a part of an overall Design Science Research project aiming to develop and implement
the models and methods for resilient DBE. Within this project, we are defining the artifacts needed
for incorporating the trust aspect into the DBE design: the identification and mapping of the social
trustworthiness factors on the DBE roles, and a process for trust analysis serving for deriving TwRs
specific to the ecosystem in design. The proposed artifacts were demonstrated to validate their
usability on the case of HE alliance - a typical example of a DBE, with its high autonomy,
selforganization, and cost balance principles. Concerning limitations to this study, we have performed
only the initial cycle of development – the problem has been analyzed in sufficient detail to establish
requirements for the artifact and its initial version has been developed and validated in an artificial
setting with real life case. While this gives input to assess the validity of the artefact in broad terms,
systematic evaluation in naturalistic setting is also needed.</p>
      <p>The immediate next work will comprise further refinement of the framework and
experimentation, for example., on other DBEs, to assess possible improvements for the purpose of
evaluation of the framework in artificial setting which is to be followed by improvements to the
framework and the guidelines for use in order to integrate the framework with a method for DBE
design [23].
Conference, RCIS 2023, Corfu, Greece, May 23–26, 2023, Proceedings (pp. 275-290). Cham:
Springer Nature Switzerland. (2023)
[22] Mohammadi, N., G.: Trustworthy Cyber-Physical Systems: A Systematic Framework towards</p>
      <p>Design and Evaluation of Trust and Trustworthiness. Springer (2019)
[23] Tsai, C.H., Zdravkovic, J., Stirna, J. (2023). A Meta-model for Digital Business Ecosystem Design.</p>
      <p>In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds) Research Challenges in Information
Science: Information Science and the Connected World. RCIS 2023. LNBIP, vol 476. Springer,
Cham.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Nachira</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicolai</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A network of digital business ecosystems for Europe: roots, processes and perspectives</article-title>
          . In: Nachira,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Nicolai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Dini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Le Louarn</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Rivera</given-names>
            <surname>Leon</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.): Digital Business Ecosystems (pp.
          <fpage>1</fpage>
          ‚
          <issue>Äí20</issue>
          ).
          <source>European Commission</source>
          ,
          <string-name>
            <surname>Bruxelles</surname>
          </string-name>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Senyo</surname>
            ,
            <given-names>P.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Effah</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Digital business ecosystem: Literature review and a framework for future research</article-title>
          .
          <source>International Journal of Information Management</source>
          ,
          <volume>47</volume>
          , 52‚
          <issue>Äí64</issue>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Tsai</surname>
            ,
            <given-names>C.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zdravkovic</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A Survey of Roles and Responsibilities in Digital Business Ecosystems</article-title>
          . In: Serral,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Stirna</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.) PoEM-Forum
          <source>2020: Proceedings of the Forum at Practice of Enterprise Modeling</source>
          <year>2020</year>
          , CEUR -WS.org (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Sutcliffe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Trust: From cognition to conceptual models and design</article-title>
          ,
          <string-name>
            <surname>in</surname>
            <given-names>LNCS</given-names>
          </string-name>
          , Springer, pp.
          <fpage>3</fpage>
          -
          <lpage>17</lpage>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Gambetta</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Trust: Making and Breaking Cooperative Relations</article-title>
          .
          <source>The British Journal of Sociology. 13. 10</source>
          .2307/591021. (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Mayer</surname>
            ,
            <given-names>R.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Schoorman</surname>
            ,
            <given-names>F.D.:</given-names>
          </string-name>
          <article-title>An Integrative Model of Organizational Trust</article-title>
          ,
          <source>Academy of Management Review</source>
          ,
          <volume>20</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>709</fpage>
          -
          <lpage>734</lpage>
          . (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Rychkova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghriba</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Trustworthiness Requirements in Information Systems Design: Lessons Learned from the Blockchain Community</article-title>
          .
          <source>Complex Systems Informatics and Modeling Quarterly</source>
          , (
          <volume>35</volume>
          ),
          <fpage>67</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Mcknight</surname>
            ,
            <given-names>D.H.</given-names>
          </string-name>
          et al.:
          <article-title>Trust in a specific technology: An investigation of its components and measures</article-title>
          ,
          <source>ACM Transactions on Management Information Systems</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          ). (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Rousseau</surname>
            ,
            <given-names>D.M.</given-names>
          </string-name>
          et al.
          <article-title>Not so different after all: A cross-discipline view of trust</article-title>
          ,
          <source>Academy of Management Review</source>
          ,
          <volume>23</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>393</fpage>
          -
          <lpage>404</lpage>
          . (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Pietrzak</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Takala</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Digital trust-a systematic literature review</article-title>
          ,
          <source>In Forum Scientiae OeconomiaSep</source>
          ,
          <volume>9</volume>
          (
          <issue>3</issue>
          ), p.
          <fpage>30</fpage>
          . (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Meeßen</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thielsch</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hertel</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Trust in Management Information Systems (MIS): A Theoretical Model</article-title>
          , Zeitschrift fur Arbeits- und
          <string-name>
            <surname>Organisationspsychologie</surname>
          </string-name>
          ,
          <volume>64</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>6</fpage>
          -
          <lpage>16</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Adali</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <article-title>A Survey on Trust Modeling</article-title>
          , ACM Computing Surveys,
          <volume>48</volume>
          (
          <issue>2</issue>
          ), p.
          <fpage>2</fpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Mattila</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Seppälä</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          : Digital Trust, Platforms, and Policy,
          <source>ETLA Brief</source>
          ,
          <volume>7</volume>
          , p.
          <fpage>42</fpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Belotti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et al.
          <source>A Vademecum on Blockchain Technologies: When</source>
          , Which, and How,
          <source>IEEE Communications Surveys and Tutorials</source>
          ,
          <volume>21</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>3796</fpage>
          -
          <lpage>3838</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] ISO/IEC: ISO/IEC 25010:
          <fpage>2011</fpage>
          -
          <article-title>Systems and software engineering - Systems and software Quality Requirements and Evaluation- System and software quality models</article-title>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Sutcliffe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sawyer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Bencomo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <article-title>The Implications of “Soft'' Requirements”</article-title>
          , in the 30th International Requirements Engineering Conference (RE). IEEE, (
          <year>2022</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Amaral</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          et al.
          <source>Ontology-Based Modeling and Analysis of Trustworthiness Requirements: Preliminary Results</source>
          ,
          <volume>12400</volume>
          LNCS, pp.
          <fpage>342</fpage>
          -
          <lpage>352</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Hevner</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>March</surname>
          </string-name>
          , S.T.,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <source>Design Science in Information Systems Research. Management Information Systems Quarterly</source>
          ,
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Tsai</surname>
            ,
            <given-names>C.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zdravkovic</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stirna</surname>
          </string-name>
          , J.:
          <article-title>Requirements for a Digital Business Ecosystem Modelling Method: An Interview Study with Experts and Practitioners</article-title>
          .
          <source>In: proc. of BIR'</source>
          <year>2021</year>
          , LNBIP, vol.
          <volume>430</volume>
          , pp.
          <volume>236</volume>
          ‚
          <fpage>252</fpage>
          . Springer (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Tsai</surname>
            ,
            <given-names>C. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zdravkovic</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Söder</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A method for digital business ecosystem design: situational method engineering in an action research project</article-title>
          .
          <source>Software and Systems Modeling</source>
          , doi:10.1007/s10270-022-01068-z (
          <year>2022</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Kambilo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rychkova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herbaut</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Souveyet</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Addressing Trust Issues in Supply-Chain Management Systems Through Blockchain Software Patterns</article-title>
          .
          <source>In Research Challenges in Information Science: Information Science and the Connected World: 17th International</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>