{"id":93763,"date":"2020-02-15T12:00:00","date_gmt":"2020-02-15T11:00:00","guid":{"rendered":"https:\/\/industry-science.com\/?post_type=article&#038;p=93763"},"modified":"2025-08-02T11:44:08","modified_gmt":"2025-08-02T09:44:08","slug":"thomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university","status":"publish","type":"article","link":"https:\/\/industry-science.com\/en\/articles\/thomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university\/","title":{"rendered":"Das HANSEBLOC-Projekt"},"content":{"rendered":"<hr>\n<div class=\"gito-pub-content-bibliography\">\n<h2>Bibliography <\/h2>\n[1] Petersen, M.; Hackius, N.; von See, B.: Mapping the Sea of Opportunities: Blockchain in Supply Chain and Logistics. In: it \u2013 Information Technology 60 (2018) 5-6, S. 263-271.<br \/>\n[2] Hackius, N.; Reimers, S.; Ker- sten, W.: The Privacy Barrier for Blockchain in Logistics. In: Bierwirth, C., u. a. (Hrsg): Logistics Management. Berlin 2019.<br \/>\n[3] Mougayar, W.: The Business Blockchain, 1. Auflage. Hobo- ken 2016.<br \/>\n[4] Henry, R.; Herzberg, A.; Kate, A.: Blockchain Access Privacy: Challenges and Directions. In: IEEE Security Privacy 16 (2018) 4, S. 38-45.<br \/>\n[5] Wood, D. G.: Ethereum: A Secure Decentralized Generalized Transaction Ledger. Ethereum Foundation 2014.<br \/>\n[6] Buterin, V.: Zk-SNARKs: Under the Hood. URL: https:\/\/medium.com\/@VitalikButerin\/zk-snarks-under-the-hood- b33151a013f6, Abrufdatum 03.09.2019.<br \/>\n[7] Eberhardt, J.; Tai, S.: On or Off the Blockchain? Insights on Off-Chaining Computation and Data. In: De Paoli, F.; Schulte, S.; Johnsen, E. Broch: Service-Oriented and Cloud Computing. Berlin 2017.<\/div>\n<div id=\"download-section\" class=\"gito-pub-download-section\" style=\"text-align:center;margin:20px;\">\n<h2>Your downloads<\/h2>\n<p><button style=\"font-size:14px;margin-right:15px;\" class=\"button gito-pub-cpt-download-button\" data-postid=\"93763\" data-userid =\"0\" data-filename=\"twenhoeven-Blockchain-und-Privacy-IM2020-1.pdf\"><span style=\"margin-top:5px !important;\" class=\"dashicons dashicons-download\"><\/span>&nbsp;&nbsp;PDF<\/button><\/div>\n<br>Potentials: <span class=\"gito-pub-tag-element\"><a href=\"\/potentials\/management-en\/\">Management<\/a><\/span> <div class=\"gito-pub-tags-social-share\" style=\"display:flex;justify-content:space-between;\"><div>Tags: <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/blockchain-en\/\">Blockchain<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/confidentiality-en\/\">confidentiality<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/datenschutz-en\/\">Datenschutz<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/gdpr-en\/\">GDPR<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/logistics-en\/\">logistics<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/logistik-en\/\">Logistik<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/privacy-en\/\">privacy<\/a><\/span> <\/div><div><div class=\"social-icons share-icons share-row relative\" ><a href=\"whatsapp:\/\/send?text=Das%20HANSEBLOC-Projekt - https:\/\/industry-science.com\/en\/articles\/thomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university\/\" data-action=\"share\/whatsapp\/share\" class=\"icon button circle is-outline tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\"><i class=\"icon-whatsapp\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/industry-science.com\/en\/articles\/thomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" rel=\"noopener nofollow\"><i class=\"icon-facebook\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/x.com\/share?url=https:\/\/industry-science.com\/en\/articles\/thomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip x\" title=\"Share on X\" aria-label=\"Share on X\" rel=\"noopener nofollow\"><i class=\"icon-x\" aria-hidden=\"true\"><\/i><\/a><a href=\"mailto:?subject=Das%20HANSEBLOC-Projekt&body=Check%20this%20out%3A%20https%3A%2F%2Findustry-science.com%2Fen%2Farticles%2Fthomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university%2F\" class=\"icon button circle is-outline tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" rel=\"nofollow\"><i class=\"icon-envelop\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/industry-science.com\/en\/articles\/thomas-twenhoeven-kuehne-logistics-university-bjoern-engelmann-itemis-ag-julian-kakarott-haw-hamburg-kevin-westphal-consider-it-gmbh-und-moritz-petersen-kuehne-logistics-university\/&title=Das%20HANSEBLOC-Projekt\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" rel=\"noopener nofollow\"><i class=\"icon-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><hr style=\"margin-top:0px;\">\n<h2 class=\"gito-pub-frontend-post-headline\">You might also be interested in<\/h2>\n<!-- GITO_PUB_POST start flex-container -->\n<div class=\"gito-pub-flex-container\">\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/tachaid-ethical-ai\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2026\/02\/Rath_AdobeStock_629687249_everythingpossible-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2026\/02\/Rath_AdobeStock_629687249_everythingpossible-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2026\/02\/Rath_AdobeStock_629687249_everythingpossible-196x180.jpg\" alt=\"Operationalizing Ethical AI with tachAId\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Operationalizing Ethical AI with tachAId\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Operationalizing Ethical AI with tachAId<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Validating an interactive advisory tool in two manufacturing use cases<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/pavlos-rath-manakidis\/\">Pavlos Rath-Manakidis<\/a>, <a href=\"\/authors\/henry-huick\/\">Henry Huick<\/a>, <a href=\"\/authors\/bjoern-kraemer\/\">Bj\u00f6rn Kr\u00e4mer<\/a> <a href=\"https:\/\/orcid.org\/0009-0004-4659-012X\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a>, <a href=\"\/authors\/laurenz-wiskott\/\">Laurenz Wiskott<\/a> <a href=\"https:\/\/orcid.org\/0000-0001-6237-740X\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     Integrating artificial intelligence (AI) into workplace processes promises significant efficiency gains, yet organizations face numerous ethical challenges that stakeholders are often initially unaware of\u2014from opacity in decision-making to algorithmic bias and premature automation risks. This paper presents the design and validation of tachAId, an interactive advisory tool aimed at embedding human-centered ethical considerations into the development of AI solutions. It reports on a validation study conducted across two distinct industrial AI applications with varying AI maturity. tachAId successfully directs attention to critical ethical considerations across the AI solution lifecycle that might be overlooked in technically-focused development. However, the findings also reveal a central tension: while effective in raising awareness, the tool\u2019s non-linear design creates significant usability challenges, indicating a user preference for more structured, linear guidance, especially ...                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 42 | 2026 | Edition 1 | Pages 50-59 | DOI <a style=\"font-weight:bold !important;\" href=\"https:\/\/doi.org\/10.30844\/I4SE.26.1.48\" target=\"_blank\" rel=\"noopener\">10.30844\/I4SE.26.1.48<\/a><\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/intelligent-load-carrier\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_741519158-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_741519158-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_741519158-196x180.jpeg\" alt=\"Intelligent Load Carrier Management\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Intelligent Load Carrier Management\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Intelligent Load Carrier Management<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">AI-supported monitoring and reduction of losses in logistics<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/dominik-augenstein\/\">Dominik Augenstein<\/a>, <a href=\"\/authors\/lea-basler\/\">Lea Basler<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/intelligent-load-carrier\/\" title=\"please login or register - content can only be read in its entirety with a subscription  professional\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Load carriers are essential for transporting manufactured parts in manufacturing companies. Despite their \u2018simplicity\u2019, they are usually expensive to purchase as they are manufactured expressly to fit purpose. While tracking methods such as GPS tracking can be used to prevent the loss of load carriers, this is associated with monitoring costs and presents challenges with regard to data protection as soon as the work performance of intralogistics employees is monitored. Assigning load carriers to designated clusters and monitoring these clusters provides an effective solution\u2014without drawing conclusions about employee performance. Furthermore, artificial intelligence can optimize this approach whilst also deterring the theft of load carriers.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 2 | Pages 78-84<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/safety-cyber-security-industry\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-196x180.jpeg\" alt=\"Functional Safety and Cyber Security in the Process Industry\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Functional Safety and Cyber Security in the Process Industry\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Functional Safety and Cyber Security in the Process Industry<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">A tension between stability and agility<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/thimmo-kugele\/\">Thimmo Kugele<\/a>, <a href=\"\/authors\/claudia-nowak\/\">Claudia Nowak<\/a>, <a href=\"\/authors\/arno-goetz\/\">Arno G\u00f6tz<\/a>, <a href=\"\/authors\/alexander-lawall\/\">Alexander Lawall<\/a> <a href=\"https:\/\/orcid.org\/0000-0003-4703-6310\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/safety-cyber-security-industry\/\" title=\"please login or register - content can only be read in its entirety with a subscription  professional\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Functional safety (safety) and cyber security (security) are key aspects of modern industry and technology. Safety aims to minimize risks posed by system malfunctions. This includes measures to protect people and the environment from failures and errors within systems. Security focuses on protecting systems and networks from digital attacks. The primary security objectives include ensuring confidentiality, integrity, and availability. A joint consideration of safety and security is essential for the future of the process industry, as both the physical safety and digital integrity of modern systems must be ensured. In industrial practice, this creates a field of tension: measures to enhance security can negatively impact safety and vice versa. This article analyzes relevant standards and regulations, presents key approaches for the integrated consideration of safety and security, and highlights areas of further research.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 2 | Pages 87-93<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/the-advantages-of-microservices\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/02\/AdobeStock_933903742-min-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/02\/AdobeStock_933903742-min-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/02\/AdobeStock_933903742-min-196x180.jpeg\" alt=\"The Advantages of Microservices\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"The Advantages of Microservices\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">The Advantages of Microservices<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">An examination of current literature on its application in companies<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/korvin-lemke\/\">Korvin Lemke<\/a> <a href=\"https:\/\/orcid.org\/0009-0000-4208-8053\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a>, <a href=\"\/authors\/ralph-riedel-en\/\">Ralph Riedel<\/a> <a href=\"https:\/\/orcid.org\/0000-0002-3704-8230\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     The intensive use of the term microservice calls for a theoretical analysis of the technology. Since service-oriented architecture approaches have produced rather disappointing results, the focus should be on the advantages of microservices. This article questions which principles justify the use of microservices as a system architecture. So far, some of the advantages mentioned in the examined literature have not been further explained or defined. There is also a lack of key figures for measuring success.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 1 | Pages 50-59<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/gaia-x-maturity-model_en\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/06\/Weiden-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/06\/Weiden-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/06\/Weiden-196x180.jpg\" alt=\"GAIA-X Maturity Model\u00a0\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"GAIA-X Maturity Model\u00a0\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">GAIA-X Maturity Model\u00a0<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Assessing the future viability of cross-company \u2028data exchange<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/maximilian-weiden\/\">Maximilian Weiden<\/a>, <a href=\"\/authors\/jokim-janssen\/\">Jokim Jan\u00dfen<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     In order to cope with growing customer requirements and the associated increase in complexity, companies are opening up their value chains, reducing their vertical integration and increasingly entering into collaborations. Cross-company data exchange along the supply chain is thus becoming a key component for competitiveness and the realization of customer-specific solutions. For this reason, the European Union has launched the GAIA-X project, which aims to create the next generation of data infrastructure for Europe and its companies. The GAIA-X maturity model offers an approach for classifying companies into different development stages and provides concrete requirements for further development along a predefined development path towards becoming a fully-fledged participant in the federated GAIA-X data infrastructure.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 40 | 2024 | Edition 3 | Pages 14-20<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/european-cybersecurity-certified\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/04\/AdobeStock_565594360-min-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/04\/AdobeStock_565594360-min-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/04\/AdobeStock_565594360-min-196x180.jpeg\" alt=\"The Utopia of European Cybersecurity Certifications\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"The Utopia of European Cybersecurity Certifications\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">The Utopia of European Cybersecurity Certifications<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/alexander-lawall-en\/\">Alexander Lawall<\/a> <a href=\"https:\/\/orcid.org\/0000-0003-4703-6310\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a>, <a href=\"\/authors\/jesus-luna-garcia-en\/\">Jesus Luna Garcia<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/european-cybersecurity-certified\/\" title=\"please login or register - content can only be read in its entirety with a subscription  professional\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Interoperable automation can benefit cybersecurity certification processes that result from the EU Cybersecurity Act (e.g. EUCS) so that they represent less overhead for the stakeholders involved. The development of key standardization efforts involving relevant stakeholders (e.g. regulators) is needed to fully realize these benefits. EU projects like H2020 MEDINA, HEU COBALT and communities such as EUROSCAL are well on the way to achieving this goal. However, more practical experience is needed to make continuous certification with automation a reality.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 40 | 2024 | Edition 2 | Pages 48-55<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n<\/div>\n<!-- GITO_PUB_POST end flex-container -->\n","protected":false},"excerpt":{"rendered":"<p>Blockchain holds high potential for various applications. In the business context, one of its key features &#8211; the availability of data to various parties &#8211; is a liability as business secrets shouldn\u2019t be exposed and GDPR compliance has to be ensured. In this paper, we discuss solutions for these privacy problems. Also, we present the HANSEBLOC project, a blockchain-powered platform for data exchange in logistics, and the chosen privacy solutions.<\/p>\n","protected":false},"featured_media":96155,"menu_order":0,"template":"","categories":[79167,79168,79298],"tags":[80156,84288,79447,84289,80272,79365,84290],"product_cat":[],"topic":[79352],"technology":[76354],"knowhow":[],"industry":[],"writer":[83096,83097,83098,82332,83095],"content-type":[],"potential":[68057],"solution":[],"glossary":[],"class_list":{"0":"post-93763","1":"article","2":"type-article","3":"status-publish","4":"has-post-thumbnail","6":"category-design-en","7":"category-translate-en","8":"category-typeset","9":"tag-blockchain-en","10":"tag-confidentiality-en","11":"tag-datenschutz-en","12":"tag-gdpr-en","13":"tag-logistics-en","14":"tag-logistik-en","15":"tag-privacy-en","16":"topic-data-privacy","17":"technology-blockchain-en","18":"writer-bjoern-engelmann-en","19":"writer-julian-kakarott-en","20":"writer-kevin-westphal-en","21":"writer-moritz-petersen-en","22":"writer-thomas-twenhoeven-en","23":"potential-management-en","24":"product","25":"first","26":"instock","27":"downloadable","28":"virtual","29":"sold-individually","30":"taxable","31":"purchasable","32":"product-type-article"},"uagb_featured_image_src":{"full":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788.jpg",1400,788,false],"thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-150x150.jpg",150,150,true],"medium":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-666x375.jpg",666,375,true],"medium_large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-768x432.jpg",768,432,true],"large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-1024x576.jpg",1020,574,true],"front-page-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-1032x320.jpg",1032,320,true],"post-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-764x376.jpg",764,376,true],"post-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-392x320.jpg",392,320,true],"post-teaser-mobile":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-608x496.jpg",608,496,true],"post-custom-size":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-640x325.jpg",640,325,true],"whitepaper-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-274x376.jpg",274,376,true],"card-big":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-514x292.jpg",514,292,true],"card-portrait":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-320x440.jpg",320,440,true],"card-big-company":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-514x289.jpg",514,289,true],"gp-listing":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-196x180.jpg",196,180,true],"1536x1536":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788.jpg",1400,788,false],"2048x2048":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788.jpg",1400,788,false],"woocommerce_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-510x510.jpg",510,510,true],"woocommerce_single":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-510x287.jpg",510,287,true],"woocommerce_gallery_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-100x100.jpg",100,100,true],"dgwt-wcas-product-suggestion":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/twenhoeven-Blockchain-und-Privacy-IM2020-1-1400x788-64x36.jpg",64,36,true]},"uagb_author_info":{"display_name":"Christoph Brocks","author_link":"https:\/\/industry-science.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Blockchain holds high potential for various applications. In the business context, one of its key features - the availability of data to various parties - is a liability as business secrets shouldn\u2019t be exposed and GDPR compliance has to be ensured. In this paper, we discuss solutions for these privacy problems. Also, we present the&hellip;","_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/93763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media\/96155"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=93763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/categories?post=93763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/tags?post=93763"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/product_cat?post=93763"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/topic?post=93763"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/technology?post=93763"},{"taxonomy":"knowhow","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/knowhow?post=93763"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/industry?post=93763"},{"taxonomy":"writer","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/writer?post=93763"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/content-type?post=93763"},{"taxonomy":"potential","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/potential?post=93763"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/solution?post=93763"},{"taxonomy":"glossary","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/glossary?post=93763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}