=Paper=
{{Paper
|id=Vol-3921/phd-paper3
|storemode=property
|title=A Reference Model to Strengthen Digital Sovereignty in Companies
|pdfUrl=https://ceur-ws.org/Vol-3921/phd-paper3.pdf
|volume=Vol-3921
|authors=Martha Klare,Ulrike Lechner
|dblpUrl=https://dblp.org/rec/conf/icsob/KlareL24
}}
==A Reference Model to Strengthen Digital Sovereignty in Companies==
A Reference Model to Strengthen Digital Sovereignty in
Companies
Martha Klare1,*, and Ulrike Lechner1
1
Universität der Bundeswehr München, Werner-Heisenberg-Weg 39, 85577 Neubiberg, Germany
Abstract
While the European Union is calling for more Digital Sovereignty (DS) in their 2030 agenda, there is no
common understanding on what DS actually means or how best to achieve it. Researchers are currently
discussing on political, individual and economical levels about DS. The main objective of our research is to
contribute to the economic level of the discussion. We offer an understanding based on three case studies,
through the lens of IT consultants and professors in Computer Science, Information Systems and Business
Administration. Furthermore, we develop recommendations for companies based on two successfully
published papers. Three further publications will follow (one have already been submitted). Our key
findings are: (1) our definition include many points from publications between 2013 and 2023 in the context
of DS but it also provides new insights, (2) key technologies (such as AI, especially federated learning, and
blockchain) and the orientation towards affordances can help companies to successfully deal with DS The
findings suggest that there is a need for a reference model with regard to DS for companies. Our next
research step include the development of such a reference model.
Keywords
Digital Sovereignty, Reference Model, Affordance Theory, Key Technologies, Software Introduction 1
1. Problem Definition
The CrowdStrike incident demonstrates how a software update can affect 8.5 million Windows
computers globally, particularly impacting airports, banks, and emergency services in Germany [7].
A dependency is becoming clear. If we look specifically at Germany's imports, we can see that chips,
software and hardware are among the top digital imports to Germany and that over 65% of the 604
companies surveyed are concerned about the growing partner China [3]. Another dependency lies in
the use of foreign software products. The digital workday for many Germans relies on foreign
software products such as Skype, Zoom, and Microsoft Teams, originating in particular from the US
[9]. Germany’s dependence on digital products is growing [18]. As a result, German and European
politicians are calling for more DS in their 2030 agenda [21]. More and more researchers are now
questioning how Germany can become more sovereign, which potential innovation fields should be
promoted, and how the European Union can contribute to strengthening sovereignty [11, 1, 4].
But what does it actually mean to be "digitally sovereign“? In its most extreme sense, DScould mean
self-developed software and domestically produced hardware, thus achieving more autarky [11, 14].
This perspective would lead to disadvantages, as it would limit innovation, quality, and international
procurement [8]. A political view of DS, according to Pohle and Thiel [22] could mean collaborating
with other nations while having alternatives if, for instance, a politician like Donald Trump imposes
tariffs on German goods or blocks deliveries to Germany. A balance act between more autonomy and
collaboration. From a technical-economic standpoint, the idea of developing open-source software is
increasing discussed [2, 19, 6]. Diversified structures could enable a fast adaptation. However, a major
challenge of open source is that security measures must be handled by companies alone, skilled
human resources are needed, whereas software companies with proprietary software offer operation,
scaling and security updates for companies [4].
1
The 15th International Conference on Software Business (ICSOB 2024), November 18-20, 2024, Utrecht, the Netherlands
∗
Corresponding author.
martha.klare@unibw.de (M. Klare); ulrike.lechner@unibw.de (U. Lechner)
0000−0001−6098−7917 (M. Klare); 0000−0002−4286−3184 (U. Lechner)
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
ceur-ws.org
Workshop ISSN 1613-0073
Proceedings
These varying interpretations of DS indicate that we still do not have a clear understanding of what
DS actually means or how best to achieve it. Pohle and Thiel [22] is the most cited paper in this field,
describing that DS is understood differently depending on whether it is required by government
institutions, companies, or citizens.
2. Knowledge Gaps
We aim to contribute to the economic dimension.
Thus, we want to answer the following research questions (see figure 1).
RQ1: What does ‘digital sovereignty’ mean from our perspective?
RQ2: How can German companies achieve digital sovereignty?
RQ3: How can a reference model for strengthening digital sovereignty in companies look like?
RQ1. WHAT DOES 'DIGITAL SOVEREIGNTY' MEAN FROM OUR PERSPECTIVE?
Case study 1: Digital Sovereignty from the Perspective of IT Consultancy in Germany: A Model
RQ1 RQ2
PART I
How does a concrete model with
Based on best practices from IT consultants, what
weighted factors for Digital Sovereignty
factors should companies consider when
look like that represents the best
strengthening their Digital Sovereignty?
practices from IT consultants?
Case study 2: Digital Sovereignty: Success Factors in a National Defense Scenario from the Standpoint of IT Consultancy
PART II
RQ1
How does the model change in the case of national
defense?
Case study 3: Digital Sovereignty: Factors from the Standpoint of Professors (Computer Science, Information Systems
and Business Administration)
RQ1
Part III
How does the model change if we look at the topic of
Digital Sovereignty from the perspective of
researchers from the fields of Computer Science,
Information Systems and Business Administration?
RQ2. HOW CAN GERMAN COMPANIES ACHIEVE DIGITAL SOVEREIGNTY?
Deep Dive 1: How Blockchain and Artificial Intelligence influence Digital Sovereignty
PART IV
RQ1 RQ2 RQ3
What is the gap between two successfully What are affordances to strengthen How should affordances be
implemented open source projects (Kubernetes, Digital Sovereignty in open-source designed to strengthen Digital
Matrix) and strategic goals of Digital Sovereignty? projects? Sovereignty?
Deep Dive 2:Digital Sovereignty: Affordances in Open Source Projects
RQ1 RQ2 RQ3
PART V
How do AI and Blockchain support
companies' sense of Digital How to strengthen Digital
What is the companies' state of Digital Sovereignty? Sovereignty? Sovereignty?
Deep Dive 3: Digital Sovereignty and Digital Transformation Extension for the Software Life Cycle Process in
ISO/IEC/IEEE 12207:2017
RQ1 RQ2
PART VI
How does an architectural perspective
for integrating the requirements of
What are the requirements in the context of Digital Digital Sovereignty and Digital
Transformation and Digital Sovereignty when Transformation into an existing software
introducing software? introduction framework look?
RQ3. HOW CAN A REFERENCE MODEL FOR STRENGTHENING DIGITAL SOVEREIGNTY IN COMPANIES LOOK LIKE?
in progress
Figure 1: Overview of all research questions that will be answered in the thesis
As already described in the introduction, we note that the understanding of the term 'digital
sovereignty' differs widely [6, 10, 11]. While we cannot fully solve this problem, we can provide a
definition from our perspective, as well as vocabulary and factors that are important for German
companies to address DS.
Thus, we will first answer research question RQ1 by presenting an understanding of the term 'digital
sovereignty', which is based on the perspectives of IT consultants and professors (in Computer
Science, Information Systems, and Business Administration) in Germany. We will answer research
question RQ2 by conducting various studies (see section 5.4 To 6.1). We want to show what
opportunities exist for German companies to achieve DS. To this end, we will analyze key factors that
emerged from RQ1. It should be emphasized that although the European Union hopes to increase the
competitiveness of European companies through economic and industrial policy, researchers are
arguing that DS is something software companies lead [22, 12, 16]. How companies successfully
master this change is the subject of intense debate [23, 5, 20].
3. Research Method
Methodologically, we initially rely on Yin [25], who provides analytic techniques and discussions on
case study designs in his work. The case study, as an empirical research method, helps us achieve
progress in knowledge by allowing us to test theories, such as the one on DS. Using three case studies,
we offer a definition of DS (see Figure 1).
The second part of the thesis, as shown in Table 1, focuses on so-called deep dives. Here, we analyze
several factors of the previously provided definition. Various publications are presented.
For every paper, the publication, the research method is outlined separately.
Table 1: research methods for deep dives 1 to 3
Name of the paper Research Method Source
Deep How Blockchain and Artificial survey Lehmann et al. (1998)
Dive 1 Intelligence Influence Digital
Sovereignty
Deep Digital Sovereignty: Affordances in gap analysis Kim and Ji (2018)
Dive 2 Open Source Projects
Deep Digital Sovereignty and Digital Soft Design Science Venable et al. (2018)
Dive 3 Transformation Extension for the Methodology (SDSM)
Software Life Cycle Process in
ISO/IEC/IEEE 12207:2017
We first decided to conduct a survey to find out what the status of DS is in German companies. We
then established that the main driver of DS is open source. Using an affordance analysis, we believe
we can show how companies can close gaps in open source projects and drive sovereign software
development. Finally, we realize that the purchasing department in companies procures software and
hardware in particular. We decided to use the Soft Design Science Methodology (SDSM) to design an
artifact that provides companies with procedural guidelines for the purchasing process.
In our research, we ensure a high level of reliability by using similar measurement instruments
(interview studies) across the case studies. Additionally, we aim to ensure interpretative objectivity
by forming research groups with two or more persons for all papers, in order to achieve similar or
identical interpretations of measurement results. Finally, we uncover new factors of DS that had not
been previously revealed in this context. With our model, we ensure that all content elements we
consider as important for DS are discussed.
4. Timeline
The timeline for the thesis is visualized in Figure 2.
Figure 2: Expected timeline until the thesis is completed (Martha Klare)
5. Preliminary Results
5.1. Digital Sovereignty from the Perspective of IT Consultancy in Germany: A
Model (2023)
This work contributes to the resolution of proposing a new model for DS from the perspective of IT
consultancy (see Figure 3).
Figure 3: DSMIC (Digital Sovereignty Model from the perspective of IT-Consultancy)
We present the results of expert interviews of IT consultants who have already dealt with the topic of
DS. Furthermore, we analyze the current state of the literature regarding DS models. Our key finding
is that DS from the perspective of IT consulting is not only a technological problem, but also a
strategic one that goes hand in hand with vocabularies like IT security, digital capabilities in
Germany and the EU, and suitable key technologies for companies. New factors compared to the
literature are (1) communication in companies, (2) adapt service portfolios in companies, (3) usability
of IT systems. Companies that want to strengthen their DS can use the advanced model with
weighted factors as a strategic instrument [16].
5.2. Digital Sovereignty: Success Factors in a National Defense Scenario from the
Standpoint of IT Consultancy (2023)
We compare the findings of case study 1 with findings of case study 2. We analyzed success factors
for more DS in a national defense scenario and compared these with the findings from the peace
scenario. By doing this, we take the perspective of IT consultancy. Based on our findings, the
following three factors are the most important: (1) develop a strategy, (2) consider IT security, (3) rely
on European skills, when preparing for DS in a defense scenario in Germany. When comparing
success factors for DS in a peace scenario with a national defense scenario in Germany, we see that
the adaption of IT infrastructures, the development of IT systems, and the strengthening of data
sovereignty gain significant weight. We transferred these findings into a model as an extension of
case study 1 as shown in Figure 4 [15].
Figure 4: DSMIC in the case of national defense in Germany
5.3. Digital Sovereignty: Factors from the Standpoint of Professors (Computer
Science, Information Systems and Business Administration) (2023)
In the third case study, we encounter the issue that the current model focuses exclusively on the
perspective of IT consulting. This approach can be problematic, as the factors and their importance
may vary depending on the surveyed group. In addition, the opinions of professors from Computer
Science, Information Systems and Business Administration can contribute a definition of DS,
considering economic and technical considerations.
We find that the professors, in contrast to the IT consultants, consider the following factors to be
important to strengthen DS: (1) make investments (in the automotive sector, AI research, 5G, and Big
Data), (2) leverage start-ups, (3) promote digitization projects within the EU (validate GAIA-X and
CATENA-X), (4) establish alternative production locations (e.g., for chip manufacturing), (5) define
open standards, (6) advance open source, and others. We compare the results with those from case
studies 1 and 2 and then develop a model that visualizes a common core of all case studies (see Figure
5).
Figure 5: DSMIC expended by the additional perspective of professors (Computer Science, Information Systems
and Business Administration)
5.4. How Blockchain and Artificial Intelligence influence Digital Sovereignty
(2022)
As Information Systems researchers, we are interested in the state of DS in companies. We want to
take a technical perspective on the debate. This paper contains insights on the relationship between
DS and the technologies Artificial Intelligence and Blockchain. We look at Artificial Intelligence as it
is an emerging, disruptive technology. We hypothesize that Blockchain can contribute to more DS
through its cryptographic nature. Our survey consists of 163 respondents. Finally, we note that
Artificial Intelligence can contribute to more data sovereignty in connection with the concept of
federated learning. Blockchain can also contribute here. With a catalog of measures consisting of
seven actions, we share ways in which companies can address issues to strengthen their DS [17].
5.5. Digital Sovereignty: Affordances in Open Source Projects (2024)
To appear
DS is an enabler for more sustainable actions in the digital space. We analyze affordances of DS by
presenting two previously conducted open-source projects in Germany. Open source is a central
element of DS because, in contrast to proprietary software, it can reduce vendor lock-in effects. Our
primary data sources consist of online interviews with German project teams and literature on DS. By
evaluating the project outputs based on affordance theory, we reveal structurally digital offerings.
The analysis of the impact of these digital offerings showed that among other things the affordance
`AI models' should be elevated to a strategic level. We suggest that companies consider basic,
standardizing, controlling, organizational sensemaking, and integrating affordances when
introducing DS to open source projects.
5.6. Digital Sovereignty and Digital Transformation Extension for the Software
Life Cycle Process in ISO/IEC/IEEE 12207:2017 (2024)
Submitted
The goal of this paper was to generate guidance for public and private organizations along their
Software Life Cycle. We investigated challenges and measures regarding Digital Transformation and
DS to gain industry practice among the Software Life Cycle Process of organizations. We identified
that the choice of options in the procurement of IT systems is limited. This is one of the biggest
challenges to consider DS in the Software Life Cycle Process of organizations. To master the collected
challenges, we develop recommendation blocks. Finally, we map these recommendation blocks to
process groups by following ISO/IEC/IEEE 12207:2017 and thus create an extension for industrial
practice-based Software Life Cycle process.
6. Expected Contributions
6.1. Paper: Sovereign Cloud and Digital Sovereignty (working title)
Currently in progress
In this paper, we plan to present the awareness/ attitude towards technologies like sovereign clouds.
We address the following research question: Can we achieve more DS through sovereign clouds?
Based on our data, we can present three perspectives: 1) an architecture perspective, 2) a
management perspective, and 3) a user perspective. Based on our interview study, we can offer these
perspectives to describe how they can help to achieve more DS. In addition, we find constraints. Both,
opportunities and constraints, can provide an interesting angle to enrich the ongoing debate on this
topic.
6.2. Thesis: Suggesting a reference model with assessment guidelines of use at
strategic and technological dimensions to strengthen Digital Sovereignty
in companies
Still to be completed
As already described in RQ3, my aim is to create a reference model for DS. For this paradigm, I use
Design Science Research according to Hevner [13]. The Design Science Research method starts from
a problem, which is application-oriented. Just like DS. Based on this problem, an artifact for a
problem solution is created. This is then unleashed on the world in order to understand what this
solution does. Hevner [13] speaks of design when an artifact is created. And finally 'design science
research': the creation of an artifact to solve a problem and the subsequent analysis of this artifact.
References
[1] Bellanova, R., Carrapico, H., & Duez, D. (2022). Digital sovereignty and European security
integration: an introduction. European security, 31(3), 337-355.
[2] Biström, D., Adolfsson, K. K., & Stocchetti, M. (2024). Open-Source Software and Digital Sovereignty:
A Technical Case Study on Alternatives to Mainstream Tools. In International Conference on Science
and Technology Education, 106-113.
[3] Bitkom, Deutschlands Abhängigkeit von Digitalimporten wächst, 2023, URL:
https://www.bitkom.org/Presse/Presseinformation/Souveraenitaet-Abhaengigkeit-Digitalimporten-
waechst (Accessed on 24-12-02)
[4] Butler, S., Gamalielsson, J., Lundell, B., Brax, C., Mattsson, A., Gustavsson, T., ... & Lönroth, E. (2022).
Considerations and challenges for the adoption of open source components in software-intensive
businesses. Journal of Systems and Software, 186(111152), 1-12.
[5] Calderao, A., Blumfelde, S. (2022). Artificial intelligence and EU security: the false promise of digital
sovereignty? European Security, 31(3), pp. 415-434.
[6] Couture, S., & Toupin, S. (2019). What does the notion of “sovereignty” mean when referring to the
digital?. New media & society, 21(10), 2305-2322.
[7] Delaney, B. (2024). Cybersecurity and all that: reflections on the Crowdstrike outage. British Journal
of General Practice, 74(746), 418.
[8] Edler, J., Blind, K., Kroll, H., & Schubert, T. (2023). Technology sovereignty as an emerging frame for
innovation policy. Defining rationales, ends and means. Research Policy, 52(6), 1-13.
[9] Engels, B., Mertens, A., & Scheufen, M. (2020). Corona: Neuerungen in der beruflichen
Kommunikation (No. 35/2020). IW-Kurzbericht.
[10] Floridi, L. (2020). The Fight for Digital Sovereignty: What It Is, and Why It Matters, Especially for the
EU. Philosophy and Technology, 33(3), pp. 369-378.
[11] Glasze, G., Cattaruzza, A., Douzet, F., Dammann, F., Bertran, M. G., Bômont, C., ... & Zanin, C. (2023).
Contested spatialities of digital sovereignty. Geopolitics, 28(2), 919-958.
[12] Goldacker, G. (2017). Digitale Souveränität. Kompetenzzentrum Öffentliche IT, Fraunhofer-Institut
für Offene kommunikationssysteme FOKUS.
[13] Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research.
MIS quarterly, 75-105.
[14] Kaloudis, M. (2022). Sovereignty in the Digital Age–How Can We Measure Digital Sovereignty and
Support the EU’s Action Plan?. New Global Studies, 16(3), 275-299.
[15] Klare, M. & Lechner, U. (2024): German Digital Sovereignty Success Factors in a National Defense
Scenario from the Standpoint of IT Consultancy. In: I.. Fries, M. Grabatin, M. Hofmeier (Hrsg.),
Sovereign by Design. The LIONS Approach to Digital Sovereignty (pp.41-55). Logos Verlag Berlin.
[16] Klare, M., & Lechner, U. (2023). Digital Sovereignty from the Perspective of IT Consultancy in
Germany: A Model. In ICSOB Companion.
[17] Klare, M., Verlande, L., Greiner, M., & Lechner, U. (2022, December). How Blockchain and Artificial
Intelligence influence Digital Sovereignty. In European, Mediterranean, and Middle Eastern
Conference on Information Systems (pp. 3-16). Cham: Springer Nature Switzerland.
[18] Lambach, D., & Oppermann, K. (2023). Narratives of digital sovereignty in German political
discourse. Governance, 36(3), 693-709.
[19] March, C., & Schieferdecker, I. (2023). Technological sovereignty as ability, not autarky. International
Studies Review, 25(2), 1-12.
[20] Monsees, L., Lambach, D. (2022). Digital sovereignty, geopolitical imaginaries, and the reproduction
of European identity. European Security, 31(3), pp. 377-394.
[21] Petit, A., Wala, Z., Ciucci, M., Martinello, B., Digital agenda for Europe, 2024, URL:
https://www.europarl.europa.eu/factsheets/en/sheet/64/digital-agenda-for-europ
[22] Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4), 2-9 (Accessed on 24-12-
02)
[23] Roberts, H., Cowls, J., Casolari, F., Morley, J., Taddeo, M., Floridi, L. (2021). Safeguarding european
values with digital sovereignty: An analysis of statements and policies. Internet Policy Review, 10(3).
[24] Wirnsperger, Peter J.; Dinnessen, Felix und Hilberg, Soentje Julia (2021): Mit digitaler Souveränität
ins europäische digitale Jahrzehnt, In: Deloitte., 1-7
[25] Yin, R. K. (2009). Case study research: Design and methods, 4th Edition, 1-219.