12295nam 22006613 450 99648315700331620220921215145.03-030-93975-8(CKB)5720000000019171(MiAaPQ)EBC6978268(Au-PeEL)EBL6978268(OCoLC)1338201220(oapen)https://directory.doabooks.org/handle/20.500.12854/91314(PPN)263901424(EXLCZ)99572000000001917120220919d2022 fy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierDesigning data spaces the ecosystem approach to competitive advantage /editors, Boris Otto, Michael Ten Hompel, Stefan WrobelChamSpringer Nature2022Cham :Springer International Publishing AG,2022.©2022.1 online resource (xv, 580 pages) illustrations (chiefly color)3-030-93974-X Intro -- Foreword -- Preface -- Contents -- Abbreviation -- Part I: Foundations and Context -- Chapter 1: The Evolution of Data Spaces -- 1.1 Data Sharing in Data Ecosystems -- 1.1.1 The Role of Data for Enterprises -- 1.1.2 Data Sharing and Data Sovereignty -- 1.1.3 Example Mobility Data Space -- 1.1.4 Need for Action and Research Goal -- 1.2 Conceptual and Technological Foundations -- 1.2.1 Data Spaces Defined -- 1.2.2 Roles and Responsibilities in Data Spaces -- 1.2.3 GAIA-X and IDS -- 1.3 Evolutionary Stages of Data Space Ecosystems -- 1.4 Designing Data Spaces -- 1.4.1 Ecosystem Perspective -- 1.4.2 Federator Perspective -- 1.5 Summary and Outlook -- References -- Chapter 2: How to Build, Run, and Govern Data Spaces -- 2.1 Data Space Design Principles -- 2.1.1 Entirely New Services for Users Based on Enhanced Transparency and Data Sovereignty -- 2.1.2 Level Playing Field for Data Sharing and Exchange -- 2.1.3 Need for Data Space Interoperability: The Soft Infrastructure -- 2.1.4 Public-Private Governance: Europe Taking the Lead in Establishing the Soft Infrastructure in a Coordinated and Collabora... -- 2.2 Building Blocks for Data Spaces -- 2.2.1 Technical Building Blocks -- 2.2.2 Governance Building Blocks -- 2.3 Synthesis of Building Blocks to Data Spaces -- 2.4 Harmonized Approach to Data Space Governance -- 2.5 The Way Forward and Convergence: Actions to Take in the Coming Digital Decade -- References -- Chapter 3: International Data Spaces in a Nutshell -- 3.1 International Data Spaces -- 3.1.1 Goals of the International Data Spaces -- 3.1.2 Reference Architecture Model -- 3.1.2.1 The International Data Spaces Components -- 3.1.2.2 The International Data Spaces Roles -- 3.1.2.3 Usage Control -- 3.1.3 Certification -- 3.1.3.1 Security Profiles -- 3.1.3.2 Participant Certification -- 3.1.3.3 Component Certification -- 3.1.4 Open Source.References -- Chapter 4: Role of Gaia-X in the European Data Space Ecosystem -- 4.1 A Quick Introduction to Gaia-X -- 4.2 The Business World with Gaia-X -- 4.2.1 Economy of Data -- 4.2.2 Compliance -- 4.2.3 Measuring Success -- 4.3 The Gaia-X Principles -- 4.3.1 Objectives -- 4.3.2 Policy Rules and Specifications for Infrastructure Application and Data -- 4.3.3 Federated Services in Business Ecosystems -- 4.4 The Gaia-X Data Spaces -- 4.4.1 Finance and Insurance -- 4.4.2 Energy -- 4.4.3 Automotive -- 4.4.4 Health -- 4.4.5 Aeronautics -- 4.4.6 Travel -- 4.5 The National Hub Organization and the Launching of Additional Data Spaces -- 4.6 Conclusion: Data Spaces-The Enabler of Digital in Business -- References -- Chapter 5: Legal Aspects of IDS: Data Sovereignty-What Does It Imply? -- 5.1 Data Sovereignty: Freedom of Contract and Regulation -- 5.1.1 No Ownership or Exclusivity Rights in Data -- 5.1.2 Usage Control: Legally and Technically -- 5.1.3 Database Rights -- 5.1.4 Trade Secrets -- 5.1.5 Competition Law -- 5.1.6 EU Strategy on Data: The Relevance of Data Spaces -- 5.1.7 Data Governance Act: First Comments -- 5.1.8 Personal and Non-personal Data -- 5.1.8.1 GDPR -- 5.1.8.2 Free Flow of Non-Personal Data Regulation -- 5.1.9 Cybersecurity -- 5.1.9.1 NIS Directive -- 5.1.9.2 Cybersecurity Act -- 5.2 Preparing Contractual Ecosystems -- 5.2.1 Platform Contracts -- 5.2.1.1 Key Principles -- 5.2.1.2 Legal TestBed: A Lead Example -- 5.2.2 Data Licensing Agreements -- 5.2.2.1 The Contract Matrix -- 5.2.2.2 The IDS Sample Contracts -- 5.3 Implementing Compliance -- 5.3.1 GDPR -- 5.3.1.1 Controllers, Joint Controllers, and Processors -- 5.3.1.2 Documentation -- 5.3.1.3 Breach Notifications -- 5.3.1.4 Enforcement and Sanctions -- 5.3.2 Competition Law -- 5.4 Certifications from a Legal Perspective -- 5.4.1 Role of Procedural Rules -- 5.4.2 Additional Aspects.Chapter 6: Tokenomics: Decentralized Incentivization in the Context of Data Spaces -- 6.1 Tokenomics in the Context of Data Spaces -- 6.2 Token-Based Supply Chain Management -- 6.2.1 Supply Chain Traceability -- 6.2.2 Distributed Ledger Technology and Tokenomics -- 6.2.3 DLT-Based Supply Chain Traceability -- 6.3 Tokenomics in the Context of Personal Data Markets -- 6.3.1 Personal Data Markets -- 6.3.2 Motivational Factors for Tokenomics Approach in Personal Data Markets -- 6.3.3 Token Design Principles for Personal Data Markets -- 6.3.4 Derivation of Token Archetypes for PDMs -- 6.4 Conclusions -- References -- Part II: Data Space Technologies -- Chapter 7: The IDS Information Model: A Semantic Vocabulary for Sovereign Data Exchange -- 7.1 Introduction -- 7.2 Evolving Trust in the IDS Toward Self-Sovereign Identity -- 7.3 Definition of Contract Clauses: The IDS Usage Contract Language and Its Core Concepts -- 7.3.1 The Solid Access Control Model vs. IDS Usage Contract Language -- 7.3.2 Usage Control Dimensions -- 7.3.3 Operators for Usage Control Rules -- 7.4 The Policy Information Point -- 7.5 The Participant Information Service (ParIS) -- 7.6 Conclusion: The IDS-IM as the Bridge Between Expressions, Infrastructure, and Enforcement -- References -- Chapter 8: Data Usage Control -- 8.1 Introduction -- 8.2 Usage Control -- 8.2.1 Access Control -- 8.2.2 Usage Control -- 8.2.3 Usage Control Components and Communication Flow -- 8.2.4 Specification, Management, and Negotiation -- 8.2.5 Related Concepts -- 8.2.5.1 Data Leak/Loss Prevention -- 8.2.5.2 Digital Rights Management -- 8.2.5.3 User Managed Access -- 8.2.5.4 Windows Information Protection -- 8.3 Usage Control in the IDS -- 8.3.1 Usage Control Policies -- 8.3.1.1 Policy Classes -- 8.3.1.2 Policy Negotiation -- 8.3.2 Usage Control Technologies -- 8.3.2.1 Integration Concept.8.3.2.2 MY DATA Control Technologies -- 8.3.3 Logic-Based Usage Control (LUCON) -- 8.3.3.1 Degree (D) -- 8.3.3.2 Data Provenance Tracking -- 8.4 Conclusion -- References -- Chapter 9: Building Trust in Data Spaces -- 9.1 Introduction -- 9.2 Data Sovereignty and Usage Control -- 9.2.1 Data Provider and Data Consumer -- 9.2.2 Protection Goals and Attacker Model -- 9.2.3 Building Blocks -- 9.3 Certification Process -- 9.3.1 Multiple Eye Principle -- 9.3.2 Component Certification -- 9.3.3 Operational Environment Certification -- 9.4 Connector Identities and Software Signing -- 9.4.1 Technical Implementation of the Certification Process -- 9.4.2 Connector Identities and Company Descriptions -- 9.4.3 Software Signing and Manifests -- 9.5 Connector System Security -- 9.5.1 Trusted Computing Base -- 9.5.2 Remote Attestation -- 9.6 Conclusion -- References -- Chapter 10: Blockchain Technology and International Data Spaces -- 10.1 Introduction -- 10.2 Blockchain Technology -- 10.2.1 Basic Concept -- 10.2.2 Design Parameters -- 10.2.3 Smart Contracts -- 10.2.4 Opportunities of Blockchain Systems -- 10.3 Blockchain in International Data Spaces -- 10.4 Application Examples: Industrial Use Cases -- 10.4.1 TrackChain -- 10.4.2 Silke -- 10.4.3 Sinlog -- 10.4.4 BC for Production -- 10.5 Conclusion -- References -- Chapter 11: Federated Data Integration in Data Spaces -- 11.1 Introduction -- 11.2 Federated Data Integration Workflows in Data Spaces -- 11.2.1 A Simple Demonstrator Scenario -- 11.2.2 A Data Integration Workflow Solution for Data Spaces -- 11.3 Toward Formalisms for Virtual Data Space Integration -- 11.3.1 Logical Foundations for Data Integration -- 11.3.2 Data Integration Tool Extensions for Data Spaces -- References -- Chapter 12: Semantic Integration and Interoperability -- 12.1 Introduction -- 12.2 The Neglected Variety Dimension.12.2.1 From Big Data to Cognitive Data -- 12.3 Representing Knowledge in Semantic Graphs -- 12.3.1 Representing Data Semantically -- 12.4 RDF a Holistic Data Representation for Schema, Data, and Metadata -- 12.5 Establishing Interoperability by Linking and Mapping between Different Data and Knowledge Representations -- 12.6 Exemplary Data Integration in Supply Chains with ScorVoc -- 12.7 Conclusions -- References -- Chapter 13: Data Ecosystems: A New Dimension of Value Creation Using AI and Machine Learning -- 13.1 Introduction -- 13.2 Big Data, Machine Learning, and Artificial Intelligence -- 13.3 An Open Platform for Developing AI Applications -- 13.4 Machine Learning at the Edge -- 13.5 Machine Learning in Digital Ecosystems -- 13.6 Trustworthy AI Solutions -- 13.7 Summary -- References -- Chapter 14: IDS as a Foundation for Open Data Ecosystems -- 14.1 Introduction -- 14.2 Barriers of Open Data -- 14.3 Related Work -- 14.4 International Data Spaces and Open Data -- 14.4.1 IDS as an Open Data Technology -- 14.4.2 IDS Components in an Open Data Environment -- 14.4.3 Benefits -- 14.5 The Public Data Space -- 14.5.1 The Open Data Connector -- 14.5.2 The Open Data Broker -- 14.5.3 Use Case: Publishing Open Government Data -- 14.6 Discussion and Conclusion -- References -- Chapter 15: Defining Platform Research Infrastructure as a Service (PRIaaS) for Future Scientific Data Infrastructure -- 15.1 Introduction -- 15.2 European Research Area -- 15.2.1 European Research Infrastructures and ESFRI Roadmap -- 15.2.2 European Open Science Cloud (EOSC) -- 15.3 Technology-Driven Science Transformation -- 15.3.1 Science Digitalization and Industry 4.0 -- 15.3.2 Transformational Role of Artificial Intelligence -- 15.3.3 Promises of 5G Technologies -- 15.3.4 Adopting Platform and Ecosystems Business Model for Future SDI.15.3.5 Other Infrastructure Technologies and Trends.This open access book provides a comprehensive view on data ecosystems and platform economics from methodical and technological foundations up to reports from practical implementations and applications in various industries. To this end, the book is structured in four parts: Part I "Foundations and Contexts" provides a general overview about building, running, and governing data spaces and an introduction to the IDS and GAIA-X projects. Part II "Data Space Technologies" subsequently details various implementation aspects of IDS and GAIA-X, including eg data usage control, the usage of blockchain technologies, or semantic data integration and interoperability. Next, Part III describes various "Use Cases and Data Ecosystems" from various application areas such as agriculture, healthcare, industry, energy, and mobility. Part IV eventually offers an overview of several "Solutions and Applications" including products and experiences from companies like Google, SAP, Huawei, T-Systems, Innopay and many more.Database managementInformation technologyData SpacesGAIA-XData LakesBig DataInformation RetrievalInformation Systems ApplicationsData EcosystemsData IntegrationData SecurityDatabase management.Information technology.Otto Borisedt1244458Otto Boris1244458ten Hompel Michael473014Wrobel Stefan1255129MiAaPQMiAaPQMiAaPQBOOK996483157003316Designing data spaces2910229UNISA08523nam 22006133 450 991082958640332120240228214915.099960-76-08-3(MiAaPQ)EBC30565699(Au-PeEL)EBL30565699(OCoLC)1381711526(OCoLC)1381295926(MdBmJHUP)musev2_112390(EXLCZ)992682165980004120230606d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierBeyond Impunity New Directions for Governance in MalawiFirst edition.Oxford :MZUNI Press,2022.©2022.1 online resource (398 pages)Print version: Ross, R. Beyond Impunity Oxford : MZUNI Press,c2022 9789996076077 Cover -- Copyright page -- Title page -- Acknowledgements -- Contents -- Notes on Contributors -- Abbreviations -- Foreword -- Introduction: A Pivotal Moment for Governance in Malawi? -- International Significance of Malawi's Constitutional Court Ruling -- Enduring Issues of Concern -- Genesis of the Book -- Organisation of the Book -- Significance of the Book -- Conclusion -- Chapter 1 - A Decade of Governance as "Roving Banditry" The Political Economy of Public Finance Mismanagement in Malawi, 2010 -2020 -- Introduction: Setting the Context -- Analytical and Methodological Framework -- Institutional Political Economy Analysis -- State of Public Finance Mismanagement and its Developmental Cost -- Illustrating the Development Cost of Public Finance Mismanagement -- Public Finance Management Chain and Attendant Accountability Mechanisms -- Revenue Collection -- Allocation of Public Finances -- Oversight for Expenditure of Public Funds -- A PEA Explanation of Persistent Public Finance Mismanagement -- Interests, Capture and Repurposing of the State -- Appointive Bureaucracies and their Roles in Public Finance Mismanagement -- Weak Social Accountability Mechanisms for Public Finance Management -- Conclusion and Recommendations -- Chapter 2 - Two Decades of Governance in Malawi: Examining Citizen Trust in Malawi from 1999-2019 -- Introduction -- The Concept and Governance Consequences of Political Trust -- Good Governance in Africa -- A Brief Background to Governance in Malawi -- General Trends of Trust in Presidents, Parliament, Police and Courts from 1999 to 2019 -- Possible Explanatory Factors -- Consequences of (Loss of) Citizenry Trust: Implications on State Legitimacy and Prospects for Democracy -- Conclusion -- Chapter 3 - Trust in Election Management Bodies, Participation in Demonstrations and Willingness to Pay Taxes: Evidence from Malawi.Introduction -- Related Literature -- Demonstrations during Malawi's Democratic Dispensation -- Data and Variable Definitions -- Estimation strategy -- Empirical Findings -- Discussion -- Conclusion -- Chapter 4 - Impunity versus Constitutional Legality in Malawi's 2019-20 Presidential Election Case -- Introduction -- The Stand against Impunity and Mediocrity -- The Conceptual Stand for Constitutional Legality -- The Stand for Transformational Constitutional Legality -- The Approach in the Proceedings -- Expedition versus Attempts to End or Delay the Case -- Conventional Burden and Standard of Proof versus Accountability -- Self Interest v Duty-based Civic and Ethical Professionalism -- Conclusion -- Chapter 5 - Legal Responses to Electoral Violence and Democratic Governance in Malawi: The Case of the 2019 and 2020 Elections -- Introduction -- Electoral Violence and Democratic Governance -- Violence in the 2019 and 2020 Elections -- Legal Responses to Election Violence 2019-2020 -- Legal Responses and Democratic Governance -- Conclusion -- Chapter 6 - Violence against Women in Elections in Malawi: The Role of Women Leaders as Game Changers -- Introduction -- Violence against Women in Elections (VAWE) -- Game-Changers -- Survey of Incidents of Violence against Women in the 2019 Elections -- Analysis of Responses of Women Leaders to VAWE in the 2019 Elections -- Pre-election and During Election Violence Response -- Women Leaders' Post-election Violence Response Analysis -- Game-Changers -- Conclusion -- Chapter 7 - Malawi's Choice of Electoral System and Reform Agenda Quandary -- Introduction -- Literature Survey -- Rationale for Electoral Choice in Malawi -- Effects of Plurality Electoral System on Regime Legitimacy in Malawi -- The Rationale for Electoral Reforms in Malawi -- Drivers of Electoral Reforms in Malawi -- Prospects for Electoral Reforms.Conclusion -- Chapter 8 - Awona Nyekhwe: The Fate of Opposition in Multiparty Malawi (1994-2020) -- Introduction -- The Concept of Nyekhwe -- Collective Political Memory -- The Concept of "Opposition" -- Opposition Parties and Politicians 1994-2020 -- Non-Party Actors -- The Academic Freedom Debate -- The DPP System, State Capture, and its Dislodgement -- A Promising Nyekhwe-Free Future? -- Conclusion -- Chapter 9 - Guarding the Guardians: Auditing Security Sector Governance in Malawi -- Introduction -- Overview of the National Security Policy -- Auditing the Security Sector in Malawi -- The Challenge of Policing Protests -- Whither Professionalism of the Police -- Loopholes in Migration Management Laws -- Politicisation of the National Intelligence Services -- The Question of Upholding Constitutional Order -- The Challenges of Democratic Control of the Security Sector -- Towards a Holistic Implementation of the NSP -- Chapter 10 - Executive Supremacy and the Armed Forces: A Case Study of Public Finance Management in Malawi -- Introduction -- Good Governance and Public Finance Management -- Institutional Framework for Security Governance and Financial Oversight in the Armed Forces -- The Historical Context of Public Finance Management in the Armed Forces -- Conclusion -- Chapter 11 - 50-50 Campaigns: Lessons from 10 Years of Promoting Gender Equality and Women's Representation in Parliament -- Introduction -- The Theory of Women's Political Representation -- The Legal and Policy Framework Guiding Women Representation in Malawi -- Trends in Women's Political Representation and the Genesis of the 50-50 Campaign -- Main Actors in the 50-50 Campaigns and their Strategies -- Impact of Parity Funding Campaigns on Descriptive Representation of Women in Parliament in Malawi -- Conclusion.Chapter 12 - Ethnicity, Regionalism, and Nation-Building Challenges in Post-1994 Malawi: Whither a Federal State System? -- Introduction -- Nation-building in Multi-Ethnic Societies -- The Call for Federalism -- The False Prospects of Federalism -- Conclusion -- Chapter 13 - Rights Without Responsibility: Governance Crisis in the Management of Natural Resources in Malawi -- Introduction -- The Environmental Crisis as a Governance Issue -- Governance Crisis in a Democratic Era -- The Relevance of Historical Experience -- Suggestions for Addressing the Crisis -- Conclusion -- Chapter 14 - Pandemics, Politics and Governance: Contestations over State Management of Covid-19 in Malawi -- Introduction -- Pandemics and Governance in History -- Covid-19 and Earlier Government Responses -- Contesting Covid-19 Preventive Measures -- Conclusion -- Chapter 15 - Malawi's Governance Crisis in Theological Perspective: A Tale of Two Cultures -- A 25-Year Retrospect -- A Question of Political Culture -- The Biblical Text -- Global Theological Thinking -- Local Contextual Theology -- Malawi in Crisis 2019-20: Theological Perspectives -- A Tale of Two Cultures -- Bibliography -- Index -- Back cover.DemocracyMalawiElectionsMalawiDemocracyfast(OCoLC)fst00890077Electionsfast(OCoLC)fst00904324Politics and governmentfast(OCoLC)fst01919741MalawiPolitics and government1994-MalawiPolitics and governmentHistoryMalawifastHistory.fastDemocracyElectionsDemocracy.Elections.Politics and government.320.96897Ross R415129Chiweza Lorraine1699358MiAaPQMiAaPQMiAaPQBOOK9910829586403321Beyond Impunity4081557UNINA01714nas 2200469-c 450 99646044730331620231214213021.02790-3109(OCoLC)1313132049(CKB)4100000012714471(CONSER)--2022237489(EXLCZ)99410000001271447120220412a20019999 --- -freurcn|||||||||txtrdacontentcrdamediacrrdacarrierMouvements et enjeux sociauxKinshasaFaculté des sciences sociales, administratives et politiques, Université de Kinshasa1 online resourceillustrationsRefereed/Peer-reviewed"Revue de la chaire de dynamique sociale"Subtitle varies2790-3095 MESM.E.S.Mouv. enjeux socManners and customsfast(OCoLC)fst01007815Congo (Democratic Republic)PeriodicalsCongo (Democratic Republic)Social life and customsPeriodicalsCongo (República Democrática)Publicaciones periódicasembneCongo (República Democrática)Usos y costumbresPublicaciones periódicasembneCongo (Democratic Republic)fasthttps://id.oclc.org/worldcat/entity/E39PBJbGQjgd4GrJ9wgw379FKdPeriodicalsfastManners and customs308Université de Kinshasa.Faculté des sciences sociales, administratives et politiques.JOURNAL996460447303316Mouvements et Enjeux Sociaux2803006UNISA