Trusted data spaces taking digital self-determination into account
The BFH study complements preliminary work of the "Digital Self-Determination"-network with the modeling and description of trustworthy data spaces. The study findings will flow into the OFCOM report on the topic, which will be adopted by t
Factsheet
- Schools involved Business School
- Institute(s) Institute for Public Sector Transformation
- Research unit(s) Digital Democracy
- Funding organisation Others
- Duration 15.03.2021 - 31.07.2021
- Head of project Dr. Daniel Schwarz Badertscher
-
Project staff
Michael Dominik Marti
Flurina Wäspi
Nicolai Wenger - Partner Bundesamt für Kommunikation BAKOM
- Keywords Digital self-determination, Trusted data spaces
Situation
In 2020, the Federal Council commissioned OFCOM (in collaboration with the FDFA, FDHA and FCO) as part of the Digital Switzerland Strategy to draw up a report on the conditions for creating trustworthy data spaces, taking into account digital self-determination. This report is to be submitted to the Federal Council by the end of 2021 and identify national and international needs for action. The results of this study will serve as the scientific basis for the report to the Federal Council.
Course of action
The study outlines the modeling of one (or more) ideal types of a trusted data space and identifies the prerequisites and challenges that are crucial for the design of trusted data spaces. The modeling is based on existing research results and on insights from the international literature. The results are summarized in a final report.
Result
Based on a literature review, the study seeks to answer the following research questions: 1) What are the key challenges facing the data value chain in terms of increased secondary use of data and increased participation by individuals? 2) What should be the basic principles and requirements for trusted data spaces? 3) What examples of trusted data spaces already exist and what are their characteristics?
Looking ahead
A model of a trusted data space is proposed. Only the broad discussion and application of the model in real cases will show whether it adequately represents the reality of trusted data spaces