<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Implications of trust in digital business ecosystem design: A systematic analysis of roles</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Irina</forename><surname>Rychkova</surname></persName>
							<email>irina.rychkova@univ-paris1.fr</email>
							<affiliation key="aff0">
								<orgName type="institution">University Paris</orgName>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">-Panthéon-Sorbonne</orgName>
								<address>
									<postCode>75005</postCode>
									<settlement>Paris</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jelena</forename><surname>Zdravkovic</surname></persName>
							<email>jelenaz@dsv.su.se</email>
							<affiliation key="aff2">
								<orgName type="institution">Stockholm University</orgName>
								<address>
									<postCode>SE-16407</postCode>
									<settlement>Kista</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Janis</forename><surname>Stirna</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Stockholm University</orgName>
								<address>
									<postCode>SE-16407</postCode>
									<settlement>Kista</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Implications of trust in digital business ecosystem design: A systematic analysis of roles</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">861B2519CFE1AF0C01BD2EBECC2563DB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Enterprise Design</term>
					<term>Trust</term>
					<term>Trustworthiness requirements</term>
					<term>Business Network Modeling</term>
					<term>Digital Business Ecosystem</term>
					<term>DBE Roles 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Digital technologies enable novel models of social and business interactions, where trust becomes a critical design consideration. A thorough analysis of trust issues and their implications at different enterprise levels, including strategies, processes and technological solutions, becomes an imperative part of socio-technical systems design. In this study we examine trust issues that emerge among the actors of a Digital Business Ecosystems (DBE) which, if not properly addressed, can jeopardize DBE functioning and resilience. An explicit mapping between the generic DBE roles and the social factors of trustworthiness is the main contribution of this work. We demonstrate how this mapping is used in the analysis of trust issues in the context of a Higher Education Alliance DBE. This analysis leads to the identification of explicit trustworthiness requirements that can guide (re)design of DBE strategies, processes and technical platforms.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Business ecosystem refers to the interconnected business network of organizations and individuals that interact with and influence each other within a particular industry or market. It encompasses the complex web of relationships, resources, and interactions among various entities that collectively contribute to the functioning and success of the overall business environment. With the digital transformation and the increasing role of digital technologies in social interactions, the concept of digital business ecosystem (DBE) has emerged. In a DBE, entities interact and collaborate using digital technologies, and leverage data and information as key assets <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>DBEs are characterized by their dynamic and rapidly evolving nature. They require effective governance mechanisms to ensure fairness, trust, and accountability among the participants. Governance involves setting common rules, standards, and protocols for data exchange, resource sharing, and collaboration, as well as resolving conflicts, ensuring compliance, and managing risks within the DBE. A key aspect of DBEs is the diversity of actors and the roles they fulfill: in addition to the roles acting in traditional business networks, such as supplier, customer, and end user, DBEs rely in addition on some specific ones, such as for example -the driver role, for managing the tools that support the DBE; a governor, for providing and/or defining the standards and policies; a reputation guardian -for assessing all DBE actors' trustworthiness, reliability, solvency, and worthiness; as well as several other roles <ref type="bibr" target="#b2">[3]</ref>.</p><p>In DBE digital technology ("D") acts as a mediator in interactions between the ecosystem participants, with the expectation of increasing trust between them and for providing them with a positive experience <ref type="bibr" target="#b3">[4]</ref>. Trust plays a crucial role in the functioning of a DBE, for its resilience. It provides the foundation upon which participants collaborate and share resources and as such it is a critical design consideration for the DBE supporting digital platforms. Identifying, modeling and analyzing trust relations among social and technical DBE entities is a vital design step, which requires adequate Enterprise Modeling methods and practices. Explicit analysis of trust issues in a DBE has an impact on the DBE strategy, as it can be used to identify partners and their needs in terms of trust; on the DBE operations as it can affect the processes between DBE partners; and on the DBE technology, as it can help to design relevant components and to make technological choices.</p><p>In social science, trust is described as a situation in which an individual or an organization (trustor) is willing to rely on the chosen actions of another individual or organization (trustee) <ref type="bibr" target="#b4">[5]</ref>. According to Mayer et al. <ref type="bibr" target="#b5">[6]</ref>, ability, benevolence, and integrity are the factors of (perceived) trustworthiness that characterize a trustee. In the technical domain, trust defines relationships between an individual and a technological component (trust in technology) and describes the interactions between the entities in the digital world (digital trust). Here the (perceived) trustworthiness is often connotated with security, reliability, and authenticity of digital systems, platforms, or transactions.</p><p>The gap between the social and technical definitions of trust arises due to the challenges of translating a subjective, context-dependent nature of social trust into objective, measurable terms that can be addressed by technical mechanisms. While technical (or digital) trust can provide a foundation for secure and reliable digital interactions, it may not fully capture the complexities of social trust that arise from human relationships, emotions, and cultural factors.</p><p>DBEs are inherently socio-technical systems, and addressing trust in DBE requires a holistic approach that integrates both social and technical dimensions of trust. Bridging the gap between these dimensions involves recognizing the interplay between different types of trust, understanding the subjective and contextual nature of trust issues, and leveraging both social and technical mechanisms to foster trust in DBEs. The goal of this work is to explicitly address trust and its implications in DBE design.</p><p>In this paper, we examine the roles of DBE and discuss their trust relationships. First, we associate the DBE roles with social trustworthiness factors. To bridge the gap between the social and technical dimensions of trust, we propose a mapping of (social) trust issues into trustworthiness requirements (TwR) that can guide DBE design. We define trustworthiness requirements as the expectations of one actor (trustor) about trustworthiness of another actor (trustee) in a DBE. We demonstrate our findings with a case study of European universities forming a higher-education (HE) alliance, which fulfills the main criteria for being considered a DBE. We examine the trust building process among the actors of this DBE, focusing on the implications on the supporting information systems. We formulate the following research questions:</p><p>• RQ1: What are the social factors of trust defining relationships among DBE actors? • RQ2: What are the trustworthiness requirements that guide the design and development of a DBE and its supporting systems for the case of a HE alliance?</p><p>In order to formulate the TwR for a particular role in the HE alliance DBE, first, we analyze the trust issues expressed by a corresponding DBE participant and their (social) trust factors, then we use a reference list of TwR derived from the literature <ref type="bibr" target="#b6">[7]</ref> and identify relevant generic requirements. Finally, we illustrate how these generic requirements can be contextualized for the HE alliance. The proposed approach bridges the gap between the social and technical dimensions of trust and supports business and technology experts in guiding their design decisions and technological choices.</p><p>The remainder of this article is organized as follows: in section 2, we discuss the background of this study and its related works; in section 3, we provide a mapping of the generic DBE roles on the trustworthiness factors defined in social science. We also describe our approach for trustworthiness requirements elicitation. In section 4 we present our findings on the case study of higher-education alliance. In section 5 we discuss our results and provide our conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background and related work</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Trust</head><p>In the research literature on trust, the act of trust is represented as a relationship between a subject (the trustor) and an object of trust (the trustee) <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b7">8]</ref>. Outcome of trust is defined as an interaction between trustor and trustee and is characterized by the resulting experience (negative or positive). Antecedents of trust refer to the factors that influence trustor's willingness to trust and include factors related to the subject (trustor's propensity to trust), to the object (trustworthiness of the trustee) and to the environment where interaction between the subject and the object takes place (e.g., institutional trust) <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9]</ref>. In this study, we consider trustor's propensity to trust and institutional trust as invariant for a given interaction. Our primary focus is on trustworthiness of the trustee as a design variable.</p><p>Whereas researchers in social sciences focus on trust between social entities (individuals, groups or organizations), in IS research, trust is considered as a socio-technical concept, i.e., it is defined as a relationship between social entities and technological components (information systems, applications, infrastructure, etc.), in which a technological component can be either an object (trustee) or a subject (trustor).</p><p>In modern organizations, social trust remains an important determinant of collaboration and decision making. With a constant digital transformation, trust issues that occur among social actors on the strategic and operational levels of the organizations are often addressed by socio-technical solutions developed by the IT, creating a gap between the social and technology-centric perspectives of trust. To bridge this gap, it is important to recognize the multidimensional nature of trust and consider the social and cultural contexts in which technological systems are developed and used <ref type="bibr" target="#b3">[4]</ref>. Three forms of trust are widely recognized in the literature: social trust, digital trust, and trust in technology. Social (or interpersonal) trust is defined as the subjective probability that a trustee has the required capacity and willingness to perform an action that is beneficial or at least not detrimental to another entity -a trustor -in a specific context <ref type="bibr" target="#b4">[5]</ref>. Digital trust defines relationships between entities in the digital world. It is the measure of confidence that a trustor has in the trustee's ability to protect data and privacy of individuals <ref type="bibr" target="#b9">[10]</ref>. Trust in technology reflects the trustor's beliefs that a specific technology has the attributes necessary to perform as expected in a given situation where negative consequences are possible <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>. Table <ref type="table" target="#tab_0">1</ref> presents a summary of these three types of trust, their associated trustworthiness factors and outcomes. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.1.">Trust: Social perspective</head><p>It addresses the (social) context where the trust issues among the actors arise. <ref type="bibr" target="#b5">[6]</ref> defines trust antecedents and outcomes in their integrative model of organizational trust. The authors define the trust for a trustee as "a function of the trustee's perceived ability, benevolence, and integrity and of the trustor's propensity to trust." Propensity to trust is an intrinsic characteristic of a trustor, which can be considered as invariant. Ability, integrity and benevolence are the factors of trustworthiness that characterize a trustee; they depend on the context and the nature of a given trustor-trustee interaction. According to <ref type="bibr" target="#b5">[6]</ref>, ability defines a group of skills, competencies, and characteristics that enable a trustee to have influence within some specific domain; benevolence defines the extent to which a trustee is believed to want to do good to the trustor, aside from an egocentric profit motive; integrity refers to trustee's moral quality of being sincere and his/her willingness to adhere to some rules and principles. Social trust is used as the basis for decision-making in diverse contexts, including enterprise strategy, governance of operations, and technology <ref type="bibr" target="#b11">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.2.">Trust: Technical perspective</head><p>Digital trust and trust in technology define trust in the technological domain. The trustworthiness factors of technology include usability, functionality, helpfulness, reliability and credibility of information <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>, as well as customizability and adaptability <ref type="bibr" target="#b3">[4]</ref>. Digital trust reflects the trustor's beliefs that a trustee (a social entity or an IT object) has the attributes necessary to support secured digital interactions <ref type="bibr" target="#b9">[10]</ref>. Trustworthiness factors in digital trust include privacy, security, transparency, traceability, control <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.3.">Bridging the gap between the social and technical views on trust</head><p>While trustworthiness factors of digital trust and trust in technology can be formalized, measured and used to provide a foundation for technological solutions, they may not fully capture the complexities of social trust that arise from human relationships, emotions, and cultural factors. Thus, an explicit mapping between technological and social perspectives of trust is of great importance.</p><p>Requirements engineering (RE) discipline plays a crucial role in design and development of sociotechnical systems. The RE process involves understanding the stakeholders' needs and expectations, as well as the social and organizational context in which the system will operate <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>. We address trustworthiness of the trustee in socio-technical systems from the RE perspective. Here, trustor's expectations regarding the trustee's trustworthiness can be expressed as trustworthiness requirements (TwR). We define TwR as a statement made by a trustor about the expected trustworthiness of a trustee. A TwR has to clearly express an operational, functional, design or other characteristic, which, according to trustor's beliefs, positively impacts trustworthiness of this trustee and interaction between the two. TwR can be met by incorporating certain attributes, features, or properties by the trustee, whether a social entity or a technological solution. TwR can be eventually refined into conventional FR, NFR, process requirements or contracts. The interest in requirements related to trust is not new: in <ref type="bibr" target="#b15">[16]</ref>, trust is considered as a part of soft requirements (SR) and is associated with the aspects of the social system where a technological system is used -its context; in <ref type="bibr" target="#b16">[17]</ref>, trustworthiness requirements are defined as a special class of quality requirements and relate trust with other concepts such as capability, vulnerability and risk; in <ref type="bibr" target="#b21">[22]</ref>, the role of trustworthiness in the software development lifecycle is examined and a process for elicitation and analysis of TwR is proposed. The work presented in <ref type="bibr" target="#b20">[21]</ref> explicitly addresses TwR in supply chain management.</p><p>In this study, we examine the social trustworthiness factors that define interactions among DBE actors. First, we provide a mapping between these factors and generic DBE roles. Then, using the case</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IT object</head><p>IT object study, we illustrate how the trustworthiness factors of the trustee in a DBE can be addressed by the TwRs. As a result, we identify requirements that need to be met by the DBE roles and their supporting digital solutions, providing guidance for DBE design and evolution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Digital business ecosystems (DBE) and roles in DBE</head><p>Actors, roles, capabilities, relationships, and digital components are essential elements of DBE <ref type="bibr" target="#b2">[3]</ref>.</p><p>The actors are individuals and organizations that take part in a DBE by fulfilling specific roles according to their capabilities. The interactions between the DBE actors are supported and mediated by different digital components such as the ecosystem digital platform and its services, smart devices, cloud storage, and other. Roles of archetypal kind are of a high significance for the ecosystem's design as they define the DBE-specific responsibilities of the actors involved and provide underlying knowledge for the capabilities relevant to a DBE. In <ref type="bibr" target="#b2">[3]</ref>, the authors surveyed the relevant literature to identify the DBE roles and their responsibilities, leading to the following ones (Table <ref type="table">2</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2 DBE roles and their responsibilities [3]</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>DBE role Responsibility</head><p>Driver sets up a common vision for all actors in a DBE; provides and manages a digital platform; optimizes entry barriers for joining a DBE; acquires and retain actors within a DBE; provides end-products and services to customers and end-users; collects and raise end users' events and feedback; ensures an integrated end user experience.</p><p>Aggregator collects and combines capabilities and resources within a DBE into end-products or services, created by Modular Producer and Complementor, for offering to Customers and End-Users.</p><p>Modular Producer provides resources within a DBE; resources can be products, services, or knowledge, created by the producer's capabilities.</p><p>Complementor using its capabilities, provides resources that complement the core resources within a DBE, with some added-value features.</p><p>Customer buys end-products and services offered in a DBE.</p><p>End-User consumes end-products and services offered in a DBE; provides information about its events and feedback to other DBE roles.</p><p>Governor oversees all the actors within a DBE by defining normative artifacts, such as decisions, policies, guidelines, and ethics, related to the business concern of the DBE.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reputation Guardian</head><p>surveys and assesses all DBE actors' trustworthiness, reliability, solvency, and worthiness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Analysis of trust issues and identification of trustworthiness requirements in DBE</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Research approach</head><p>This study follows the Design Science Research <ref type="bibr" target="#b17">[18]</ref> and aims at developing a framework for the trust management in DBE types of business networks -the targeted design artifact. The need for managing trust and hence for this design artefact is expressed in <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b18">19]</ref>, where trust is identified as one of the important aspects of DBE design. This study paves the ground for developing the trust management framework for DBE. In this article, we report on the initial cycle of artifact design, which includes the problem identification and the framework components design and development. The theoretical view on the problem was presented in <ref type="bibr" target="#b6">[7]</ref>; this paper is grounded on the case study and focuses on the empirical view of the problem. We conduct a structured analysis of the archetype DBE roles and identify the trustworthiness factors that determine the interactions between these roles. The resulting mapping (Table <ref type="table" target="#tab_1">3</ref>) is one of the framework components developed in this study. Following the identified trustworthiness factors, we proceed with identification of trustworthiness requirements (TwR) that can be further operationalized (i.e., implemented as a part of an interactive process or a supporting information system between the corresponding DBE roles). To this end, we propose and follow a process for trust analysis (Section 3.3). This process takes trust issues expressed by the specific DBE actors as an input and leads to identification of their corresponding TwR. To support the trust analysis, we use a set of generic TwR from <ref type="bibr" target="#b6">[7]</ref>.</p><p>We demonstrate the designed artifact by examining trust in the Higher-Education Alliance DBE -our case study (Section 4). In this article, we provide the results of trust analysis for the Modular Producer role in this DBE. In particular, we show the trust issues (collected from the case), trustworthiness factors (application of our mapping), generic TwR (from <ref type="bibr" target="#b6">[7]</ref>) and specific (contextualized) TwR defined for this role. Completeness of the elaborated set of requirements as well as their prioritization are not discussed in this study. This will be addressed during the following (validation) cycle of DSR.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Trustworthiness factors in DBE</head><p>In DBE, trust relationships are formed among their participants (social entities) and can be characterized by the following: (i) several entities can share the same DBE role and each entity can fulfill several DBE roles; (ii) within different interactions, each DBE role can be considered as a trustor (one who trusts) or as a trustee (one to be trusted).</p><p>Following <ref type="bibr" target="#b5">[6]</ref>, ability, integrity, and benevolence are the factors of trustworthiness that influence a decision of one DBE role (trustor) to engage into an interaction with another DBE role (trustee). The impact of ability, integrity, and benevolence on building trust can vary depending on the context of this interaction. More specifically, consider a situation 1, where the two individuals X and Y are respectively a patient (trustor) and a physician (trustee), and a situation 2, where the same X and Y are playing cards together: in situation 1, the Y's ability (i.e., medical proficiency and qualification) can be a major trustworthiness factor for X, whereas in situation 2, it will be rather Y's integrity (honesty, compliance with the rules). Based on that, the third characteristic of trust relationships in DBE is: (iii) Trustworthiness factors defined by a trustor for a trustee within an interaction in DBE depend on the context of this interaction and on the DBE roles they play within this interaction (as defined in Table <ref type="table">2</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 3 Social trustworthiness factors in the relationships to the DBE roles</head><p>Based on our previous studies on DBEs <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b19">20]</ref>, we analyze trustor-trustee relationships between different DBE roles and identify the major social trustworthiness factors in trust building between these roles. The results are illustrated in Table <ref type="table" target="#tab_1">3</ref>. Each cell {i,j} defines a trustworthiness factor (or factors) for an interaction between the two DBE roles: role i (as a trustor) and role j (as a trustee). For example, the third column of the table defines the trustworthiness factors for a DBE Modular producer (MP) role towards the other roles in the DBE with which the MP interacts as a trustor.</p><p>The MP (trustor) -Driver (trustee) interaction in DBE is important to ensure consistent development and evolution of a service or product provided by the DBE. A, B, I in the cell {3,1} indicate that all the three factors -ability, benevolence and integrity -need to be considered when designing processes and digital platforms supporting and mediating their interactions.</p><p>Trustworthiness factors in MP -Aggregator and MP -Complementor interactions (cells {3,2}{3,4} in Table <ref type="table" target="#tab_1">3</ref>) include ability (A) (e.g., skills/competences of an aggregator to collect and combine capabilities and resources within a DBE) and integrity (I) (e.g., aggregator's honesty, capacity to adhere to the rules defined by DBE).</p><p>Integrity (I) is the major factor in MP -MP and MP -Customer interactions (cells {3,3}{3,5} in Table <ref type="table" target="#tab_1">3</ref>). Here, integrity of MP refers to their perceived honesty in delivering a high-quality service/product. Customers' integrity refers to their perceived honesty and compliance with the rules.</p><p>Trustworthiness factors in MP -Governor interactions include benevolence (B) and integrity (I). This is related to the responsibility of the governor as a trustee, which is to oversee all the actors within a DBE (Table <ref type="table">2</ref>).</p><p>Benevolence (B) is the major factor in MP -Reputation guardian interactions. The responsibility of the reputation guardian as a trustee is to survey and assess all DBE actors (see Table <ref type="table">2</ref>) and benevolence (e.g., a belief that this evaluation will be fair) provides a major contribution in building trust in these interactions.</p><p>Trustworthiness factors are not applicable to MP (trustor) -End user (trustee) interactions (indicated n/a in the cell {3,6}) since, by definition, MP role in DBE does not "rely on" or "become vulnerable from" the End user. Note that the opposite is not true: End user as a trustee has to trust the MP's ability to produce a competitive, relevant service or product. This is reflected by the ability </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Analysis of trust in DBE</head><p>Table <ref type="table" target="#tab_1">3</ref> maps the trustworthiness factors on DBE roles and identifies the major social factors of trust in the interactions among DBE partners. To support digital interactions between DBE partners, these factors need to be contextualized and refined into specific TwRs. We propose the following process for trust analysis in DBEs. Consider an interaction between two specific DBE actors and the roles they play in this interaction:</p><p>1. Identify trust issue(s) of a trustor actor. This step is context-specific and can vary for different partners in the DBE. The working approach can be: empirical analysis of DBE design and operations or interviews with stakeholders. 2. Identify the trustworthiness factors of the trustee role related to this issue. This step is context-independent and defined for generic roles in DBE, c.f. Table <ref type="table" target="#tab_1">3</ref>. 3. Formulate TwR that express trustor's expectations about trustee's (social) trustworthiness factors from step 2 by using (technical) trustworthiness properties (i.e., system or process qualities). This step can be considered as a context design. Here we are working with engineers of the DBE to analyze the existing DBE design. The requirements can be extracted from this context or identified using a more generic reference list, derived from the previous experiences or from the literature. 4. Contextualize the TwRs by associating them with the trust issues identified in step 1. In this step, we are focusing on specific requirements of actors and the DBE as a whole. Here, the TwRs from step 3 are refined following the interviews with the actors' representatives and analysis of the usage data.</p><p>The expected outcome of this process is a set of explicit, contextualized TwRs that provide a reference to the social context and identify an operational, functional, design or other characteristic, which, according to trustor's beliefs, positively impacts the trustworthiness of this trustee and interaction between the two. In the following section we illustrate process with the case study of Higher-Education Alliance DBE.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Case study: Higher-Education Alliance</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">About alliances in Europe</head><p>During the past decade a plethora of university alliances in the domain of higher education have emerged, with more than 40 of such alliances in Europe. Some alliances focus mainly on student mobility (e.g., Erasmus+), while others are aiming at a united Europe university both in terms of teaching and research (e.g., CIVIS, 4EU+, Una Europa). The latter type is featured in our case study (by the active participation of the authors in one of the outlined alliances). Through their activities and collaboration, these alliances strive to actively promote fundamental rights, solidarity, democracy, social cohesion, cultural diversity, and active citizenship. Therefore, the business foundation of the HE alliances could be condensed into the following knowledge square: Education, Research, Innovation and Civic Engagement. The alliances are typically co-funded by the EU Commission and the member universities.</p><p>HE alliances perform and coordinate an extensive number and variety of activities including development of educational programs and modules at Bachelor's, Master's and PhD levels; student, teacher, and researcher mobility; educational and scientific calls and events; thematic working nodes, theme-labs, promotion-related activities, governance, management of the digital infrastructure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">The roles and responsibilities of the DBE participants</head><p>HE alliances conform to the concept of DBE, because they consist of a large number of independent and self-organizing actors collaborating on various business objectives on a DBE level as well as individually. A key aspect of DBEs is actors acting in complementary roles, which is essential to maintain DBE's long-term resilience. Table <ref type="table" target="#tab_2">4</ref> shows the mapping of the common actors of an HE alliance to their corresponding DBE roles and responsibilities. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Trust analysis for the Educational Alliance</head><p>In this section, we provide the trust analysis for the Modular Producer role (a faculty teacher or researcher) in a HE Alliance DBE. For the sake of brevity, we do not provide the analysis for the other roles in this paper. Following the process of trust analysis (Section 3.3), we illustrate (1) the trust issues identified in the interactions between Modular producer (as trustor) and other roles in the HE alliance DBE (trustees) and ( <ref type="formula">2</ref>) provide their mapping to the trustworthiness factors of DBE roles from Table <ref type="table" target="#tab_1">3</ref>. Next, in (3), we use the taxonomy proposed in <ref type="bibr" target="#b6">[7]</ref> as a reference to formulate our TwR about the trustworthiness factors identified in (2). This taxonomy associates ability, integrity and benevolence with 21 TwRs derived from the literature. Finally, in (4), we contextualize the identified TwRs for the MP in the HE alliance. The summary of this analysis is presented in Table <ref type="table">5</ref>.</p><p>Modular producers (MP) in the HE alliance are members of teaching and research staff responsible for creating content for educational programs (course materials, practical works, projects etc.) and delivering the program to the end users. When creating common courses, one of the challenges is to ensure alignment, consistency, and uniform quality of the course modules among different MPs. Therefore, an issue expressed by a trustor-MP towards the other MPs (trustees) is:</p><p>1. I am concerned with the quality of modules provided by other modular producers. This issue is associated with integrity (I) of the MP role as a trustee in Table <ref type="table" target="#tab_1">3</ref>.</p><p>Another challenge is related to aggregation, dissemination and reuse of developed materials within common space, which are ensured by Aggregator (a node) as a trustee:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">I am worried that the development of a common course will not follow the established milestones</head><p>and deadlines. This issue is associated with integrity (I) and ability (A) of the Aggregator role in Table <ref type="table" target="#tab_1">3</ref>; 3. I want to make sure the aggregator will not put me in competition with another modular producers -associated with integrity (I); 4. I am concerned that, within a common course, my content can be used or modified without my knowledge -associated with integrity (I); 5. I am concerned about the integration efforts and evolution of my content: upload, update, formatting should be ensured by the aggregator -associated with ability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Student Ambassador</head><p>First-contact student(s) at every member university.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reputation Guardian</head><p>To provide information about the alliance to potentially interested students.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Business member</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Regional organizations and companies</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Customer</head><p>To sponsor and attend some events of the alliance, provide guest lectures, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Citizen</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Regional citizens Customer</head><p>To support co-creation of knowledge related to the curriculum content, collaboration with business, and other.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Communication Office</head><p>The alliance representative office in EC Reputation Guardian</p><p>To encourage the participation of all stakeholders in building the envisioned university model.</p><p>Once the program is developed, MPs are also concerned with its running. The following example illustrates the trust concerns towards Driver (a university) as a trustee: 6. I am concerned that the digital platform for course provisioning and communication with students will work without errors -associated with the trustee's ability (A).</p><p>Towards Complementor (a lab, a third-party technology provider for) as a trustee:</p><p>7. I am concerned with the quality of supporting services and their price (e.g., Virtual classrooms, examination tools) delivered by the complementor -associated with the trustee's ability (A).</p><p>Towards Reputation Guardian (communication office in HE alliance):</p><p>8. I am concerned that a fair number of students, with adequate background and academic records will be attending the course -associated with benevolence (B) of a Reputation guardian.</p><p>Once the issues are identified (column 1 in Table <ref type="table">5</ref>) and associated with the trustworthiness factors (column 2 in Table <ref type="table">5</ref>), we formulate the TwR of the MP (as a trustor) towards the DBE (column 3 in Table <ref type="table">5</ref>). In <ref type="bibr" target="#b6">[7]</ref>, a taxonomy of TwR is proposed. This taxonomy associates the (social) trustworthiness factors with technical features of solutions. We use the TwR from this source as a reference. For example, issue 1 can be associated with Auditability TwR. Once relevant TwR are identified, they need to be contextualized (column 4, in Table <ref type="table">5</ref>). For issue 1, we propose the following contextualization of the Auditability TwR: Any faculty teacher in the node must be able to validate the quality of the class materials produced by their peers. Every faculty teacher has to demonstrate the quality of the produced course materials.</p><p>Note that the issues can vary among the actors playing the same DBE role (e.g., different teachers in HE alliance); they can also be shared between the roles in the DBE (e.g., issue 2 is shared by the MP and the driver role).</p><p>The process above needs to be conducted for all DBE participants to collect the list of issues and requirements for each relevant trustor-trustee interaction in the DBE.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 5</head><p>Trust analysis for HE Alliance Modular producers.</p><p>(2) (3) TwR of reference (4) Contextualized TwR of reference 1 I Auditability: Trustor must be able to validate the trustee's compliance with the rules (e.g., by executing the audit, supervising the examining the execution traces, supervising the trustee's process at run time).</p><p>Any faculty teacher (Modular Producer) in the node must be able to validate the quality of the class materials produced by their peers: fit to the program, alignment between the modules, etc. Every faculty teacher should be able to demonstrate the quality of the produced course materials.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">A, I</head><p>Performance: Trustee must ensure an efficient distribution of resources, with respect of defined timeframe and budget.</p><p>Compliance: Trustee has to adhere to rules, agreements or regulations.</p><p>A node (Aggregator) creates the educational programs, with respect to the program calendar and budget set by the steering committee (Governor).</p><p>A node acts according to the rules defined by the steering committee (Governor) and uses the standard solutions (e.g., digital</p><p>Integrity: Trustee must ensure correct and timely execution of activities, with respect to contract or process specifications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>portal) delivered by a leading university (Driver).</head><p>A node demonstrates the program evolution to the steering committee and informs the students and faculty teachers about problems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">I Traceability:</head><p>Trustor has to access all information related to provenance of a physical or information object accurately and trace it to its source.</p><p>Faculty teacher and faculty researcher has to be able to access all the information related to other modular producers and to trace the produced content. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Authentication (data):</head><p>Trustor must be able to determine the correctness and reliability of reported data (e.g., messages, events).</p><p>Steering committee is responsible for her actions in marketing, dissemination of the calls and student inscription to the program.</p><p>Faculty teachers must be able to determine the correctness and reliability of reported data (e.g.,</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion and conclusions</head><p>Trust is a critical enabler of business interactions facilitating effective collaboration, efficient resource utilization, adaptive behaviors, and collective effort towards common goals. Business networks, as inherently socio-technical systems, require a holistic approach for trust analysis that integrates its social and technical dimensions. This study attempts to bridge the gap between these dimensions by incorporating the subjective and contextual nature of trust in DBE designs and management principles. Identification and analysis of trust issues among the participants of a DBE is a crucial task with a great impact on the DBE sustainability and resilience; it must be conducted upfront and it requires adequate enterprise modeling methods and practices.</p><p>In this work, we proposed a framework for structured analysis of trust among the actors of DBE. We focused on the implications on the supporting digital platforms pervading any business interaction in a DBE setting. We consider that the proposed framework can be used to support (re)design of DBE and its supporting digital platforms as follows: The study is a part of an overall Design Science Research project aiming to develop and implement the models and methods for resilient DBE. Within this project, we are defining the artifacts needed for incorporating the trust aspect into the DBE design: the identification and mapping of the social trustworthiness factors on the DBE roles, and a process for trust analysis serving for deriving TwRs specific to the ecosystem in design. The proposed artifacts were demonstrated to validate their usability on the case of HE alliance -a typical example of a DBE, with its high autonomy, selforganization, and cost balance principles. Concerning limitations to this study, we have performed only the initial cycle of development -the problem has been analyzed in sufficient detail to establish requirements for the artifact and its initial version has been developed and validated in an artificial setting with real life case. While this gives input to assess the validity of the artefact in broad terms, systematic evaluation in naturalistic setting is also needed.</p><p>The immediate next work will comprise further refinement of the framework and experimentation, for example., on other DBEs, to assess possible improvements for the purpose of evaluation of the framework in artificial setting which is to be followed by improvements to the framework and the guidelines for use in order to integrate the framework with a method for DBE design <ref type="bibr" target="#b22">[23]</ref>.</p><p>application/admission ratio, information on the students).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>•</head><label></label><figDesc>A list of requirements aggregated per Trustee-role provides a vision of what the DBE expects from this given role. • A list of requirements aggregated per Trustor-role provides a vision of what this particular role expects from the DBE. • Prioritization of the TwRs by identifying the TwRs most frequently expressed.• Negotiation of the TwRs and identification of the minimal set of TwRs that will be satisfactory for a particular DBE. • Identification and assessment of alternative organizational and technical solutions to cover the set of TwRs.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Overview of trust perspectives and types</figDesc><table><row><cell>View:</cell><cell>Type of Trust</cell><cell>Trustor (subject)</cell><cell>Trustee (object)</cell><cell>Trustworthiness factors</cell><cell>Outcome</cell></row><row><cell>Social</cell><cell>Social Trust</cell><cell>Org. Individual /</cell><cell>Org. Individual /</cell><cell>Ability, benevolence, integrity</cell><cell>Interaction / collaboration</cell></row><row><cell></cell><cell>Trust Technology in</cell><cell>Org. Individual /</cell><cell>IT object</cell><cell>Functionality, helpfulness, usefulness, reliability</cell><cell>Acceptance, use</cell></row><row><cell>Technical</cell><cell>Digital Trust</cell><cell>Org. Individual / IT object</cell><cell>IT object Org. Individual /</cell><cell>Privacy, security, transparency, traceability, control</cell><cell>Interaction / transaction in digital environnement</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 3 (</head><label>3</label><figDesc>cell {6,3}). The rest of the table can be interpreted the similar way.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="4">Trustors (subject)</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Driver</cell><cell>Aggregator</cell><cell>Modular</cell><cell>Producer</cell><cell>Complementor</cell><cell>Customer</cell><cell>End User</cell><cell>Governor</cell><cell>Reputation</cell><cell>Guardian</cell></row><row><cell></cell><cell>Driver</cell><cell>A B, I</cell><cell cols="4">A A, B, I A</cell><cell>A</cell><cell>A, I</cell><cell cols="2">A, I A, B, I</cell></row><row><cell></cell><cell>Aggregator</cell><cell>A, I</cell><cell>I</cell><cell cols="2">A, I</cell><cell cols="2">A, I A, I</cell><cell>A</cell><cell cols="2">A, I A, B, I</cell></row><row><cell>Trustee (object)</cell><cell>Modular Producer Complementor Customer End User Governor</cell><cell>A, I A, I I n/a I, B</cell><cell>A A I n/a I, B</cell><cell cols="2">I A, I I n/a I, B</cell><cell cols="5">A, I n/a I A, I n/a A A A, I, B A, I A, B, I A A, I A, B, I I I I I n/a A, I I I, B I, B I, B A, B, I A, B, I</cell></row><row><cell></cell><cell>Reputation</cell><cell>B</cell><cell>B</cell><cell cols="2">B</cell><cell>B</cell><cell>I, B</cell><cell>B</cell><cell>A, I</cell><cell>n/a</cell></row><row><cell></cell><cell>Guardian</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 4</head><label>4</label><figDesc>Actors and roles in the DBE of HE alliance</figDesc><table><row><cell>Actor</cell><cell>Description</cell><cell>Role in</cell><cell>Responsibility in DBE</cell></row><row><cell></cell><cell></cell><cell>DBE</cell><cell></cell></row><row><cell>European</cell><cell>The financier of an</cell><cell>Governor,</cell><cell>To control the use of fundings,</cell></row><row><cell>Commission</cell><cell>alliance.</cell><cell>Reputation</cell><cell>monitoring of the progress, alliance</cell></row><row><cell></cell><cell></cell><cell>Guardian</cell><cell>promoter in EU forum</cell></row><row><cell>University</cell><cell>Alliance member,</cell><cell>Driver</cell><cell>Each university member leads one</cell></row><row><cell></cell><cell>from a European</cell><cell></cell><cell>responsibility (Table 2, Driver), or all</cell></row><row><cell></cell><cell>university</cell><cell></cell><cell>are responsible for some</cell></row><row><cell>Faculty teacher,</cell><cell>Academic staff of the</cell><cell>Modular</cell><cell>To develop and teach course</cell></row><row><cell>researcher</cell><cell>participating</cell><cell>Producer</cell><cell>curriculum</cell></row><row><cell></cell><cell>universities</cell><cell></cell><cell></cell></row><row><cell>Node</cell><cell>Thematic entity</cell><cell cols="2">Aggregator To propose course curriculum, assign</cell></row><row><cell></cell><cell></cell><cell></cell><cell>tasks to modular producers and</cell></row><row><cell></cell><cell></cell><cell></cell><cell>monitor development.</cell></row><row><cell>Lab</cell><cell>Forum for universities,</cell><cell>Compleme</cell><cell>To organize events (conferences,</cell></row><row><cell></cell><cell>businesses, citizens to</cell><cell>ntor</cell><cell>seminars), present curriculum, etc.</cell></row><row><cell></cell><cell>meet</cell><cell></cell><cell></cell></row><row><cell>Steering</cell><cell>Administrative staff of</cell><cell>Governor</cell><cell>To make decisions on operative levels,</cell></row><row><cell>Committee</cell><cell>participating</cell><cell></cell><cell>to coordinate communications and</cell></row><row><cell></cell><cell>universities.</cell><cell></cell><cell>tasks of the universities.</cell></row><row><cell>Consultative</cell><cell>City and regional</cell><cell>Governor</cell><cell>To make cooperation decisions that</cell></row><row><cell>Council</cell><cell>representatives,</cell><cell></cell><cell>would be applied across the</cell></row><row><cell></cell><cell>citizens, and the</cell><cell></cell><cell>participating regions</cell></row><row><cell></cell><cell>presidents of the</cell><cell></cell><cell></cell></row><row><cell></cell><cell>member universities</cell><cell></cell><cell></cell></row><row><cell cols="2">Student Council A group of student</cell><cell>Governor</cell><cell>To collect and disseminate student</cell></row><row><cell></cell><cell>representatives from</cell><cell></cell><cell>voices for the best interests of</cell></row><row><cell></cell><cell>different university</cell><cell></cell><cell>students: it listens, exchanges and</cell></row><row><cell></cell><cell>members</cell><cell></cell><cell>proposes ideas on how the alliance</cell></row><row><cell></cell><cell></cell><cell></cell><cell>should develop.</cell></row><row><cell>Student</cell><cell>A person registered</cell><cell>End-User</cell><cell>To attend campus and online courses,</cell></row><row><cell></cell><cell>for studying at a</cell><cell></cell><cell>take examinations, to do course</cell></row><row><cell></cell><cell>member university</cell><cell></cell><cell>evaluation</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A network of digital business ecosystems for Europe: roots, processes and perspectives</title>
		<author>
			<persName><forename type="first">F</forename><surname>Nachira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicolai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Digital Business Ecosystems</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Nachira</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Nicolai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Dini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Le Louarn</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Rivera Leon</surname></persName>
		</editor>
		<meeting><address><addrLine>Bruxelles</addrLine></address></meeting>
		<imprint>
			<publisher>European Commission</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="1" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Digital business ecosystem: Literature review and a framework for future research</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Senyo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Effah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Information Management</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="52" to="64" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Survey of Roles and Responsibilities in Digital Business Ecosystems</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zdravkovic</surname></persName>
		</author>
		<ptr target="CEUR-WS.org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Forum at Practice of Enterprise Modeling 2020</title>
				<editor>
			<persName><forename type="first">E</forename><surname>Serral</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Stirna</surname></persName>
		</editor>
		<meeting>the Forum at Practice of Enterprise Modeling 2020</meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
	<note>PoEM-Forum</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Trust: From cognition to conceptual models and design</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sutcliffe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="page" from="3" to="17" />
			<date type="published" when="2006">2006</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Trust: Making and Breaking Cooperative Relations</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gambetta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The British Journal of Sociology</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="2307" to="591021" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">An Integrative Model of Organizational Trust</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Mayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Davis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">D</forename><surname>Schoorman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academy of Management Review</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="709" to="734" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Trustworthiness Requirements in Information Systems Design: Lessons Learned from the Blockchain Community</title>
		<author>
			<persName><forename type="first">I</forename><surname>Rychkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ghriba</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Complex Systems Informatics and Modeling Quarterly</title>
		<imprint>
			<biblScope unit="issue">35</biblScope>
			<biblScope unit="page" from="67" to="91" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Trust in a specific technology: An investigation of its components and measures</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">H</forename><surname>Mcknight</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Management Information Systems</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Not so different after all: A cross-discipline view of trust</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Rousseau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academy of Management Review</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="393" to="404" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Digital trust-a systematic literature review</title>
		<author>
			<persName><forename type="first">P</forename><surname>Pietrzak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Takala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Forum Scientiae OeconomiaSep</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">30</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Trust in Management Information Systems (MIS): A Theoretical Model</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Meeßen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Thielsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Hertel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Zeitschrift fur Arbeits-und Organisationspsychologie</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="6" to="16" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Survey on Trust Modeling</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Cho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Adali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Digital Trust, Platforms, and Policy</title>
		<author>
			<persName><forename type="first">J</forename><surname>Mattila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Seppälä</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ETLA Brief</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page">42</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A Vademecum on Blockchain Technologies: When, Which, and How</title>
		<author>
			<persName><forename type="first">M</forename><surname>Belotti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys and Tutorials</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="3796" to="3838" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<idno>ISO/IEC: ISO/IEC 25010:2011</idno>
		<title level="m">-Systems and software engineering -Systems and software Quality Requirements and Evaluation-System and software quality models</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The Implications of &quot;Soft&apos;&apos; Requirements</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sutcliffe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sawyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bencomo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the 30th International Requirements Engineering Conference (RE)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Ontology-Based Modeling and Analysis of Trustworthiness Requirements: Preliminary Results</title>
		<author>
			<persName><forename type="first">G</forename><surname>Amaral</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="page" from="342" to="352" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Design Science in Information Systems Research</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hevner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">T</forename><surname>March</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ram</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management Information Systems Quarterly</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="75" to="105" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Requirements for a Digital Business Ecosystem Modelling Method: An Interview Study with Experts and Practitioners</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zdravkovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Stirna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proc. of BIR&apos;2021, LNBIP</title>
				<meeting>of BIR&apos;2021, LNBIP</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">430</biblScope>
			<biblScope unit="page" from="236" to="252" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A method for digital business ecosystem design: situational method engineering in an action research project</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zdravkovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Söder</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10270-022-01068-z</idno>
	</analytic>
	<monogr>
		<title level="m">Software and Systems Modeling</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Addressing Trust Issues in Supply-Chain Management Systems Through Blockchain Software Patterns</title>
		<author>
			<persName><forename type="first">E</forename><surname>Kambilo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rychkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Herbaut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Souveyet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023</title>
				<meeting><address><addrLine>Corfu, Greece; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature Switzerland</publisher>
			<date type="published" when="2023">May 23-26, 2023. 2023</date>
			<biblScope unit="page" from="275" to="290" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Trustworthy Cyber-Physical Systems: A Systematic Framework towards Design and Evaluation of Trust and Trustworthiness</title>
		<author>
			<persName><forename type="first">N</forename><surname>Mohammadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A Meta-model for Digital Business Ecosystem Design</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zdravkovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Stirna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Research Challenges in Information Science: Information Science and the Connected World. RCIS 2023</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Nurcan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Opdahl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Tsohou</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">476</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
