2 research outputs found

    Accept Me as I Am or See Me Go: A Qualitative Analysis of User Acceptance of Self-Sovereign Identity Applications

    Get PDF
    Self-sovereign identity represents a novel phenomenon aiming to innovate how entities interact with, manage, and prove identity-related information. As with any emerging phenomenon, user acceptance represents a major challenge for the adoption of Self-sovereign identity. Since previous initiatives for digital identity management solutions have not been successfully adopted while at the same time their benefits are largely driven by network effects, user acceptance research is of particular importance for Self-sovereign identity. Therefore, we investigate the user acceptance of Self-sovereign identity by conducting a qualitative interview study. We contribute novel variables to existing theory and offer guidelines for building Self-sovereign identity systems

    Overcoming the Data Transparency Trade-Off: Designing a Blockchain-Based Delivery Invoice System for the Construction Industry

    Get PDF
    Blockchain’s inherent characteristics render it a promising solution in collaborative supply chain networks. However, the technology still faces chal- lenges in coopetition, as sharing business data on blockchains requires balancing the benefits of data transparency for process automation with concerns about exposing business information to competitors. This paper draws on design science research to iteratively design and develop a decentralized infrastructure that can address the coopetition aspects of digital delivery invoices in construction supply chains. As a result, design objectives and design principles are derived while experts thoroughly evaluate the prototype. Practical guidance for implementing digital delivery invoices is provided to enable coopetitive while secure data ex- change. Our findings suggest that if construction companies want to prioritize network effects despite the growing complexity, they should establish channels and private data collections along with additional privacy-enhancing technologies to ensure secure data exchange across the entire supply chain
    corecore