Abstract
A significant challenge in bootstrapping a jointly used infrastructure such as Data Spaces is to incentivize the participants to invest in setting up the infrastructure. In this chapter, we investigate this challenge and possible solutions, focusing on an approach called “Tokenomics.”
The incentivization scheme should be utilized by governance frameworks, in which the participants of Data Spaces remain capable of action and independent through automated, effective, and fair decision-making processes. Also, potential participants should be motivated to participate in the establishment and further development of the system, while on the other hand, undesirable behavior should be penalized. In combination with distributed ledger technology (DLT) and machine-readable, legally compliant smart contracts, participant behavior can be affected in such a way that both data quality and quantity are improved for the whole Data Space.
To derive possible design options for Tokenomics approaches, we examine different token frameworks and their impact on participants. The investigation of the frameworks is carried out taking into account five significant domains: technical, behavior, inherent value, coordination, and pseudo-archetypes. Furthermore, we investigate which token designs provide smaller or larger incentives in order to join or maintain a DLT-based ecosystem.
Download chapter PDF
1 Tokenomics in the Context of Data Spaces
The last years have been characterized by data to become a significant value driver. In this context, the creation of secure data sharing ecosystems that ensure both data governance and traceability is of particular importance. By providing such ecosystems, potentials for new applications and services are unleashed [1]. Industry 4.0 and the related business process automation require ever-increasing amounts of data. Organizations can therefore no longer rely solely on internal and publicly available data sources to remain competitive. Instead, they also need information from external individuals and organizations. So far, most ecosystems are controlled and driven by central actors [2]. Trust is one of the most important prerequisites for successful cooperation in networks, since the extensive exchange of data between partners also means that sensitive internal information is passed on. In practice, there is a lack of trust between the actors. This lack of trust can lead to information being withheld [3, 4]. Network effects also cause them to evolve into monopolistic or at least oligopolistic structures. This dilemma has triggered a debate on data sovereignty, especially in Europe. The concept of data sovereignty is intended to give rise to alliance-driven data ecosystems with associated platforms. For this reason, the global alliance, International Data Spaces Association, which has been driven by companies and research institutions such as Fraunhofer since 2015, set its goal to develop standardized architectures for such platforms and test them in practice [5, 6].
A significant challenge in bootstrapping a jointly used infrastructure such as Data Spaces is to incentivize the future participants of this infrastructure to invest funds or effort in setting up the infrastructure in the first place. This challenge is closely related to the well-known “tragedy of the commons” [7] and its historic remedy to create cooperatives [8]. It is also closely related to the topic of open-source economics [9].
In this chapter, we investigate this challenge and possible solutions, focusing on an approach called “Tokenomics” which has the goal to address this challenge using a token-based incentivization scheme [10, 11].
Distributed ledger technology (DLT) in general and blockchain technology (BCT) in particular can be utilized and are highly relevant to consider in situations where data sharing is pursued in a decentralized manner. BCT received attention in 2008 when an individual or group under the pseudonym Satoshi Nakamoto introduced the technology in a white paper that also introduced the decentralized cryptocurrency Bitcoin [12, 13]. An important feature of BCT is the possibility of using tokens that can act as incentives in a decentralized network. Incentive systems can thus be created for actors to join the network and act in the interests of the ecosystem [14].
Therefore, in the following two sections, we present two use cases where the use of blockchain-empowered tokens makes it possible to address the described challenges. For this purpose, we investigate different token classifications depending on the use cases. In the second section, we turn to supply chain management and describe two projects that use token deployment to create incentive systems. The two projects are then compared in terms of similarities and differences. In the third section, we use a similar approach to examine the Personal Data Market (PDM) use case. For this reason, we present five different Tokenomics approaches and derive a suggestion for token archetypes of PDM token systems.
2 Token-Based Supply Chain Management
The use of distributed ledger technologies (DLTs) promises improvements of supply chain processes, especially with regard to the traceability of products along the entire value chain. DLT offers an ideal solution to reliably connect and manage IoT devices. In this context, supply chain management and logistics are two of the main application domains for linking blockchain technology (BCT) with new technologies such as Internet of Things (IoT) or artificial intelligence (AI) [15, 16]. DLT-based tokens play a key role in this context as they can be used to incentivize various actors in participating in such a value chain and establish a truly decentralized network. Consequently, we address the topics of DLT-based tokens for supply chain management in this chapter and present various token classifications. We then compare two blockchain projects in terms of token incentivization.
2.1 Supply Chain Traceability
Due to advancing globalization, traceability of goods in supply chains has gained importance. Also, consumers have a greater interest in consuming goods that meet certain sustainable and ethical standards [17, 18]. In this context, supply chains have become increasingly complex, complicating manufacturers’ sourcing efforts [19]. In addition, regulations and international standardization are placing new demands on the supply chain management functions of companies. The European Parliament calls for food traceability and requires food suppliers as well as market participants to provide information on the origin of goods [20]. In order to trace the origin of a product, supply chain management ideally needs to be operated by multiple interconnected actors in the supply chain. However, traditional systems often miss cross-company interconnections and are operated in isolation—so-called data silos. Therefore, supply chain actors often are not able to trace relevant goods and receive information on their location or origin [21, 22]. In recent years, various methods have been developed to monitor processes and activities in the networked industry. The Industry 4.0 emerged and led to the digitization of processes, where supply chains provide real-time access to relevant products and production information for all stakeholders involved [23, 24]. The fourth industrial revolution is characterized by the emergence of various technologies, such as IoT and BCT, which conquer the boundaries between the physical and digital world and have a big potential in their combination. Such technologies can transform modern supply chain networks into complete digital ecosystems. The digitization of supply chains offers outstanding business speed, agility, and the development of traceability mechanisms that enable near-complete identification and recording of products and processes. It is worth noting that blockchain-enabled supply chain approaches coupled with IoT applications could improve communication and traceability data delivery, enabling additional data management and analytics benefits for the logistics industry [25]. In supply chain management, payment processes can also be automated using smart contracts and, in combination with cyber-physical systems, increasingly autonomized. By eliminating manual activities, the processes involved are accelerated considerably [16, 26].
2.2 Distributed Ledger Technology and Tokenomics
Before blockchain technology was developed, many attempts were made to fulfill the desire of passing an asset digitally from one party to another via a secure, peer-to-peer Internet connection [27]. To address this need, the Bitcoin white paper “A Peer-to-Peer Electronic Cash System,” published by Satoshi Nakamoto in 2008, proposed a new way for transferring money within a digital peer-to-peer network [13]. Until then, peer-to-peer currencies faced the problem that it was impossible to avoid a single unit being spent twice without a central intermediary [28]. When executing a transaction digitally without a central intermediary, one party could use a digital asset that has already been used in another transaction and, hence, spend it twice [29, 30]. If a central intermediary should be avoided in a decentralized network, the goal is to overcome those risks with individuals not relying on only one central authority but several ones. BCT is a specific approach for storing and ordering information of transactions without a central intermediary [31]. It serves as a decentralized data backup system that enables all members of a transaction to manage the uncovered information carefully and, at the same time, ensure its validity. Based on BCT, several peer-to-peer transfer technologies were developed and later combined under the term distributed ledger technology. Although DLT and BCT are often used interchangeably, BCT represents a specific type of DLT [27].
Apart from the public ledger envisioned by Nakamoto, blockchain solutions today can generally be classified into one of three categories: public, private, and consortium blockchains [32]. One feature within blockchain technology is of particular importance: tokens. Tokens can provide incentive design optimization to induce honest behavior among actors in a competitive environment [14]. For each type of goods managed in the supply chain, a smart contract with tokens is set up. As a type of blockchain recordkeeping, these tokens digitally replicate physical assets in distributed ledgers [33]. The process of tokenization transforms tangible and intangible assets into digitally encoded tokens [34]. The owner’s digital record can be transferred between parties through the DLT network without a central authority [35]. There are two significant types of blockchain recordkeeping mechanisms: currencies and tokens. A currency is usually native to a blockchain. Since BCT builds upon cryptography, such a currency is also called a cryptocurrency. The primary example is Bitcoin, which is the native currency of the Bitcoin blockchain [13]. A token is not native to a blockchain but is created on top of a blockchain and governed by a smart contract. Smart contracts govern most tokens following the common standard [36].
According to Weingärtner, the categorization of tokens into fixed classes is more difficult because any variation or functional enhancements can be programmed using smart contracts [37]. Freni et al. [38] have analyzed eight different token classification approaches from the literature to derive a morphological token classification framework. A useful distinction of tokens can be made by using the following five domains: The technical domain includes all technical properties of the token. All native functional properties are gathered in the behavior domain. The inherent value domain describes the economic value of the token. Furthermore, the inherent value domain investigates how the value of the token is created and influenced. The coordination of stakeholders depends on certain characteristics of the token, which are summarized in the coordination domain. The last domain, pseudo-archetypes, gathers all combined token frameworks. The derived 16 dimensions of the morphological token framework are summarized in dependence of the domains in Table 6.1.
With the use of tokens that represent the ownership of scarce digital resources, actors can be coordinated in a network. A proper design of a token is achieved by aligning the different types of incentives within a token-built ecosystem. The token can then be used to orchestrate the creation and control the development of these protocols. The use of tokens can accelerate and improve the development of an incentive-based decentralized network. These incentives bring different stakeholders’ interests to a common denominator. Thus, token-based networks can strengthen competitive collaboration in the long run in a digital age [11, 39, 40].
Hülsemann and Tumasjan [12] simulated the effects of different designs. The designs of cryptocurrencies, network tokens, and investment tokens were examined in the context of prediction markets. The research concluded that network tokens provide the largest incentives for actors to join and remain in the network ecosystem over the long term. For example, network tokens can provide services within a system. In addition, the authors found that investment tokens provide the smallest incentives [12].
2.3 DLT-Based Supply Chain Traceability
To strengthen supply chain management, various blockchain projects have been initiated that also aim to create incentives through the use of tokens. In this chapter, we briefly summarize two well-known projects and present the differences and similarities in the token design.
VeChainThor was developed as a public blockchain to simplify supply chain management. Originally, it was developed to determine whether a real product is a fake or not, so that fraud and counterfeiting can be eliminated. In the meantime, the blockchain is used by large companies for supply chain traceability. VeChainThor designed a bi-token system that includes VeChain Token (VET) and VeThor Token (VTHO). The function of VET is to serve as a value-transfer medium to enable rapid value circulation within the VeChainThor network. VTHO represents the underlying cost of using VeChainThor and is consumed, or in other words, burned by performing on-chain operations. Furthermore, VTHO is generated from holding VET, which is established to allow any user with VET to make transactions at no extra cost if the user holds the VET tokens for long enough. The goal of this token design is to prevent transaction fees from being directly exposed to the volatility of VET’s price, making the VeChainThor blockchain more suitable for conducting business or financial activities for both individuals and companies. The demand for VTHO arises from the execution of smart contracts and payment transactions. To stabilize transaction costs and maintain the balance of supply and demand for VTHO, the Foundation closely monitors the market and estimates the demand for VTHO based on the activity of applications running on the VeChainThor blockchain and token transfers [41]. The token classification of VET and VTHO is summarized in Table 6.2.
Waltonchain is a supply chain solutions platform built on the blockchain. It offers decentralized product tracking that tracks QR and RFID codes on the blockchain. Waltonchain (WTC) is a cross-chain ecosystem where the parent chain and child chains serve as the framework. In this cross-chain ecosystem, data circulation and value transfer can be realized between child chains. Using the cross-chain mechanism, child chain tokens are exchanged for the WTC token and can be further exchanged for other child chain tokens; thus, value circulates on the blockchain [42]. The Waltonchain ecosystem is currently under steady development and in order to make WTC more stable in the cross-chain IoT ecosystem, Waltonchain Foundation issues the Waltonchain Autonomy token (WTA) on the Waltonchain mainnet. To incentivize the community members, the Foundation launches tasks which can be completed by the community. By completing tasks the community members can earn points, which can be converted to WTA at a certain ratio. Furthermore, the WTA token can be used to deduct service fees during the token exchange between WTC and child-chain tokens [43]. The token classification of WTC and WTA is summarized in Table 6.3.
The two blockchain projects investigated, VeChainThor and Waltonchain, show similar patterns in token design. Both projects use two different tokens each in an attempt to get actors to join the ecosystem and act in the interests of the network. Both projects use a second token (VTHO and WTA) to maintain stability in the system and avoid the volatility of market behavior. However, the difference between the designs lies in the incentivization. While the VTHO token is designed to eliminate the cost of transactions within the blockchain, the WTA token aims to ensure that actors act in the spirit of the ecosystem. Moreover, the introduction of these two tokens induces actors to hold VET and WTC tokens in order to receive VTHO or WTA. In this context, the VET and WTC tokens constitute the role of value exchange, while WTC can be used for cross-chain transactions. These exemplary findings should be enriched by empirical data in future studies so that further token designs can be evaluated in terms of incentivization.
As the value creation process more and more often takes place in enterprise networks—rather than in individual enterprises—also the combination and enrichment of data takes place by various actors in data spaces. For this reason, we investigate the use of Tokenomics in the context of Data Spaces in the next section.
3 Tokenomics in the Context of Personal Data Markets
Tokenomics is commonly applied in the framework of Personal Data Markets. In order to shed light on the interplay of these related concepts, we investigate the motivational factors of market operators for using a Tokenomics approach when building Personal Data Markets (PDMs). Furthermore, we classify token design patterns with regard to PDMs and examine whether there are “specific token designs” commonly applied for Personal Data Market infrastructures.
3.1 Personal Data Markets
Nowadays, individuals create tremendous amounts of valuable data [44] while interacting in their lives using devices equipped with sensors such as mobile phones, tablets, smart home systems, or computers. Even though this personal data belongs to the individuals, data producers commonly give up all rights concerning their data by agreeing to terms and conditions, which are required of them before using certain services [45]. Thus, service providers can easily get access to such valuable personal data. Subsequently, they might use this personal data for further product and service development or even sell it to various third parties making substantial profits [46, 47]. The individuals from whom data were collected are left without any control or profit. Against this background, the concept of Personal Data Markets (PDM) has been raised in numerous discussions during the past years as an appropriate solution medium. PDMs are believed to lead to a fair(er) data economy and, hence, foster innovation in all areas of application through efficient and large-scale data sharing between private data owners and organizations of all kinds [48]. Consequently, the expectation is that they can contribute to societal benefit. Despite the potential benefit PDMs promise for the entire society, many marketplace providers are frequently forced to their knees as a variety of challenges for PDMs exist [49]. These challenges originate mainly from technological, legal, economic, or ethical domains [49], resulting in short life cycles of many marketplace providers, e.g., Data Fairplay, Datareum, Datatrade, Synapse AI, and MYBS. However, there are PDMs which seem to operate successfully as they have existed for some years now. When analyzing a sample of such “resistant” PDMs, it becomes clear that token systems play a major role in order to master the economic challenge of incentivizing market participants, especially the owners of personal data, for sharing their data.
3.2 Motivational Factors for Tokenomics Approach in Personal Data Markets
In the context of PDMs, tokens can be defined as units of value the market operator creates and emits in order to self-govern its business model, and to empower all participants of the marketplace to interact with each other, while facilitating the distribution of rewards and the sharing of benefits to all stakeholders. Thereby, the concept of Tokenomics has arisen from game theory, mechanism design, and monetary economics [50]. It is vital for a general understanding about the interplay between the concepts of Tokenomics and PDMs to examine the motivational factors convincing market operators for the application of token systems in the framework of their technical marketplace architectures. For this purpose, existing PDMs were analyzed giving special attention to technical architecture whitepapers of marketplace operators. The results of the sample examined are summarized below.
Airbloc relies on two kinds of tokens with distinct purposes. Firstly, this market operator offers the token ABL which is a tradable ERC20 token used as a means of participating in the network in order to settle payments for data exchange as well as staking register and maintaining certain services on nodes. Thus, ABL serves for payment, settlement, and participation. Secondly, Airbloc runs the virtual and non-tradable AIR token, primarily used for providing rewards to network participants. AIR tokens are one-way convertible into ABL only. Hence, AIR supports productive behavior within the network by assessing participant’s reputation and contribution.
The Datum Network is built upon the DAT token as utility token in order to facilitate transactions, especially data sharing, among data owners and buyers by providing the medium for payment settlements. It is a smart token enabling users to buy and sell stored data while enforcing data usage policies set by the data owner. The latter is controlled by underlying smart contracts running on blockchain. Furthermore, the token grants access to certain privileges in the network such as data storage and participation in the data market.
Madana uses tokens based on the Lisk Blockchain in order to support consistency, transparency, and co-determination as the PAX token holder has the opportunity to vote for a global data model ensuring consistency across the entire ecosystem. In doing so, the token holder determines the way data must be offered in order to participate. Furthermore, the token system serves to handle rewards for contributions of participants to the Madana platform in terms of data or services functioning as a payment vehicle. Thus, Tokenomics incentivizes provision of analytical services and data sharing on the platform.
In the OSA DC network, participants receive tokens for offering services such as collecting, cleaning, and enriching data and offering data storage or analytical services. Furthermore, the OSA tokens function as a payment medium, buying and selling transactions among participants. Additionally, the token system is applied to provide a reward system where data providers receive token rewards for each action in the ecosystem and data consumers may also be rewarded for purchasing specific products and services. Thus, OSA assigns three main purposes to its OSA token system: facilitation of service offerings, payment medium in the ecosystem, and incentivization to contribute to the network.
VLD tokens are functional utility smart contracts within the VETRI platform where users are remunerated in VLD tokens based on the desirability of their data shared perceived by data consumers. Thereby, the tokens enable to buy and sell transactions on the marketplace. Furthermore, the tokens function as payment and settlement medium for secure data storage and services platform participants can purchase. Above all, Vetri’s token system aims to provide an incentivization mechanism for all stakeholders and to support price stability.
Based on our findings summarized in Table 6.4, we derive the following main motivational factors for the application of token systems within Personal Data Market infrastructures: payment medium, incentivization mechanism, access and usage control, and facilitation of transactions on the marketplace (including services).
3.3 Token Design Principles for Personal Data Markets
With the insights gained from the analysis of motivational factors for applying Tokenomics in PDMs, the following section introduces common design patterns of tokens in literature [36]. Subsequently, we try to highlight overarching token design principles chosen by PDMs while relying on the taxonomy of token classification of Oliveira et al. [36]. In this taxonomy we suggest common token design principles, typically applied in Personal Data Markets based on our previously analyzed PDM sample.
The first token attribute is the Class of tokens which is commonly used for the distinction of tokens as it differentiates cryptocurrencies (digital money), digital shares including entitlements for profit sharing (tokenized security), and remaining crypto-assets based on tokens with attached utility (utility tokens) [36]. According to our sample, utility tokens are the dominant design of Class in PDMs. The Purpose of tokens distinguishes between tokens represented uniquely as an asset (asset-backed), tokens combined with an access permission (usage token), and tokens storing value to reward or incentivize behavior (work token) [51, 52]. In our sample, most PDMs rely on the design characteristics of usage token and work token as they are applied, for instance, as a right to access the marketplace or the entire platform as well as for incentivization of a certain behavior. Mougayar [53] classified tokens into Roles, representing a right for the owner (right), a unit of value exchange within a system (value exchange), a fee for access (toll), a tool to enrich user experience (function), a de facto payment method (currency), or a right for the data owner to receive a share of the profit (earnings). In our sample, the main Roles appeared to be rights, mediums for value exchange, access, and currency. Glatz [54] classified tokens according to their Representation. According to the author, they can be designed as pure digital assets (digital), bound to physical objects (physical), tied to objects from virtual reality (virtual), or state legal permissions and rights granted by law or the network (legal). The major Representations of token designs in PDMs we examined were digital assets. Furthermore, they were commonly combined with rights granted by the network. Chen [35] divided tokens into their Supply which can either be fixed and distributed once (fixed) or accorded to a certain schedule (schedule-based). Most tokens in PDMs are offered once and subsequently burned over time, meaning that supply is fixed. Another attribute refers to the behavior tokens aim to incentivize. Lena and Oxana [55] called this attribute Incentive System where the token design can incentivize to enter, to use, or to stay long term in a system or on a platform. Incentivization of behavior plays a key role in PDMs when designing tokens. However, according to the whitepapers we analyzed, the incentivization of usage is the most dominant design principle in terms of Incentive System applied by market operators. Lena and Oxana [55] also suggested the attribute Transactions distinguishing spendable and non-spendable tokens. In PDMs, tokens are usually spendable on a platform, e.g., when reception or execution of payment transactions is concerned. Yadav [56] considered Ownership as an attribute since a token can either be tradable or non-tradable. In PDMs, the former design principle is usually the case. Similar to Supply, Oliveira et al. [36] defined the attribute Burnability reflecting the possibility for purposely burning tokens in order to create artificial scarcity or to express the extinction of access rights bound to the token. According to the sample analyzed, burning tokens over time is a commonly applied technique in PDMs. Just like Ownership, Glatz [54] defined Fungibility of tokens which addresses either purely equal (fungible) tokens or non-fungible ones due to their distinct characteristics ensuring their uniqueness. The dominant design principle of PDMs in this regard are fungible tokens. Furthermore, the attribute Layer refers to the distinction based on the location of tokens. Thereby, Little [51] differentiates between tokens native to blockchain, issued on top of a protocol or placed on the application layer [51]. The PDMs of our sample under study mainly run on a blockchain as the first layer carrying a token system as a second layer. Finally, token design is also affected by the Chain the system relies on. Srinivasan [57] differentiated the design pattern of new chains on new code, new chains on forked code, forked chains on forked code, or issued on top of a protocol. We state that the latter appears as the dominant design principle for PDMs relying on the information from our whitepapers.
3.4 Derivation of Token Archetypes for PDMs
Oliveira et al. [36] defined eight token archetypes depending on their specific purposes where several tokens exhibit a multipurpose ability, that is to say they serve more than one purpose simultaneously (see Table 6.5). The archetypes are cryptocurrency token, equity token, funding token, consensus token, work token, voting token, asset token, and payment token. According to our previously defined motivational factors for the application of tokens in PDMs and some frequent PDM token designs analyzed, we suggest the following main corresponding archetypes for token design in PDMs.
As we assigned the archetype with the best thematically fit to the derived motivational factors, further adjustments to our work are possible and recommended. Furthermore, we emphasize that both Tables 6.2 and 6.6 present suggestions we give based on findings and assumptions derived from our analysis of PDMs in practice. We encourage future research to empirically examine design patterns of token systems in PDMs and to define more justified archetypes in order to extend the still limited (design) knowledge in research about the mutual relation of the domains Tokenomics and Personal Data Markets.
4 Conclusions
A significant challenge in bootstrapping a jointly used infrastructure such as Data Spaces is to incentivize the future participants of this infrastructure to invest funds or effort in setting up the infrastructure in the first place. In this chapter, we investigated this challenge and possible solutions, focusing on an approach called “Tokenomics” which has the goal to address this challenge using a token-based incentivization scheme.
To derive possible design options for Tokenomics approaches, we examined different token frameworks and their impact on participants. Furthermore, we investigated which token designs provide smaller or larger incentives in order to join or maintain a DLT-based ecosystem. This investigation was done in the context of two use cases where the use of blockchain-empowered tokens makes it possible to address the described challenges: As part of supply chain management we discussed two projects that use token deployment to create incentive systems. The two projects were then compared in terms of similarities and differences. In the last part of this chapter, we used a similar approach to examine the Personal Data Market (PDM) use case. Toward this, we presented five different Tokenomics approaches and derive a suggestion for token archetypes of PDM token systems.
Based on these investigations we can conclude that the Tokenomics approach appears suitable for use in addressing the challenge of incentivizing the future participants of this infrastructure to invest funds or effort in setting up the infrastructure. We therefore recommend that this approach be further elaborated at a technical level to be used for this purpose.
References
Munoz-Arcentales, A., López-Pernas, S., Pozo, A., Alonso, Á., Salvachúa, J., & Huecas, G. (2020). Data usage and access control in industrial data spaces: Implementation using FIWARE. Sustainability, 12(9), 3885. https://doi.org/10.3390/su12093885
Jarke, M., Otto, B., & Ram, S. (2019). Data sovereignty and data space ecosystems. Business & Information Systems Engineering, 61(5), 549–550. https://doi.org/10.1007/s12599-019-00614-2
Eberl, P., & Kabst, R. (2006). Vertrauen, Opportunismus und Kontrolle-Eine empirische Analyse von Joint Venture-Beziehungen vor dem Hintergrund der Transaktionskostentheorie. In J. Sydow (Ed.), Management von Netzwerkorganisationen. Beiträge aus der “Managementforschung”. 4., aktualisierte und erw. Aufl (pp. 107–142). Gabler; VS-Verl.
Milberg, J. (Ed.). (2002). Erfolg in Netzwerken (1st ed.). Springer.
Auer, S., Jürjens, J., Otto, B., Brost, G., Lange, C., Quix, C., Cirullies, J., Lohmann, S., Schon, J., Eitel, A., Mader, C., Schulz, D., Ernst, T., Menz, N., Schütte, J., Haas, C., Nagel, R., Spiekermann, M., Huber, M., … Pullmann, J. (2017). Reference architecture model for the industrial data space. White Paper. Fraunhofer.
Otto, B., Jürjens, J., Schon, J., Auer, S., Menz, N., Wenzel, S., & Cirullies, J. (2016). Industrial data space: Digital sovereignty over data. White Paper, Fraunhofer.
Hardin, G. (1968). The tragedy of the commons. Science, 162(3859), 1243–1248.
Moulin, H. (1995). Cooperative microeconomics: A game-theoretic introduction. Princeton University Press.
Lerner, J., & Tirole, J. (2005). The economics of technology sharing: Open source and beyond. Journal of Economic Perspectives, 19(2), 99–120.
Heise, C., Poddey, A., & Jürjens, J. (2020). Strong long-term incentive design in GAIA-X based on tokenomics. Position Paper—GAIA-X TaskForce Tokenomics.
Lamberty, R., de Waard, D., & Poddey, A. (2020). Leading digital socio-economy to efficiency—A primer on tokenomics. https://arxiv.org/abs/2008.02538
Hülsemann, P., & Tumasjan, A. (2019). Walk this way! Incentive structures of different token designs for blockchain-based applications. Available online at https://core.ac.uk/download/pdf/301384295.pdf.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. In Manubot. Available online at https://bitcoin.org/bitcoin.pdf. Checked on 26 Jan 2021.
Sussan, F., & Acs, Z. J. (2017). The digital entrepreneurial ecosystem. Small Business Economics, 49(1), 55–73. https://doi.org/10.1007/s11187-017-9867-5
Atlam, H. F., Azad, M. A., Alzahrani, A. G., & Wills, G. (2020). A review of blockchain in internet of things and AI. BDCC, 4(4), 28. https://doi.org/10.3390/bdcc4040028
Bitkom. (2019). Online-Konsultation zur Erarbeitung der Blockchain-Strategie der Bundesregierung. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.V. Available online at https://www.bitkom.org/sites/default/files/2019-04/190408_stellungnahme_blockchain-strategie-konsultation_online.pdf. Checked on 2/5/2021.
Dabbene, F., Gay, P., & Tortia, C. (2014). Traceability issues in food supply chain management: A review. Biosystems Engineering, 120, 65–80. https://doi.org/10.1016/j.biosystemseng.2013.09.006
Westerkamp, M., Victor, F., & Kupper, A. (2018). Blockchain-based supply chain traceability: Token recipes model manufacturing processes. In: 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). IEEE.
Gualandris, J., Klassen, R. D., Vachon, S., & Kalchschmidt, M. (2015). Sustainable evaluation and verification in supply chains: Aligning and leveraging accountability to stakeholders. Journal of Operations Management, 38(1), 1–13. https://doi.org/10.1016/j.jom.2015.06.002
European Parliament. (2002). EU, 2002. Regulation (EC) No. 178/2002 of the European Parliament and of the Council of 28 January 2002 laying down the general principles and requirements of food law, establishing the European Food Safety Authority and laying down procedures in matters of food safety. Official Journal of the European Communities, L31, 1–24.
Appelhanz, S., Osburg, V.-S., Toporowski, W., & Schumann, M. (2016). Traceability system for capturing, processing and providing consumer-relevant information about wood products: system solution and its economic feasibility. Journal of Cleaner Production, 110, 132–148. https://doi.org/10.1016/j.jclepro.2015.02.034
Pal, K., & Yasar, A.-U.-H. (2020). Internet of things and blockchain technology in apparel manufacturing supply chain data management. Procedia Computer Science, 170, 450–457. https://doi.org/10.1016/j.procs.2020.03.088
Brettel, M., Friederichsen, N., Keller, M., & Rosenberg, M. (2014). How Virtualization, decentralization and network building change the manufacturing landscape: An industry 4.0 perspective. https://doi.org/10.5281/ZENODO.1336426.
Onufrey, K., & Bergek, A. (2020). Second wind for exploitation: Pursuing high degrees of product and process innovativeness in mature industries. Technovation, 89, 102068. https://doi.org/10.1016/j.technovation.2019.02.004
Banafa, A. (2017). IoT and blockchain convergence: benefits and challenges. Available online at http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.html.
Jakob, S., Schulte, A. T., Sparer, D., Koller, R., & Henke, M. (2018). Blockchain und Smart Contracts: Effiziente und sichere Wertschoepfungsnetzwerke. With assistance of Michael ten Hompel, Michael Henke, Uwe Clausen.
Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59(3), 183–187. https://doi.org/10.1007/s12599-017-0467-3
Pilkington, M. (2016). Blockchain technology: principles and applications. In Research handbook on digital transformations. Edward Elgar.
Kuo, T.-T., Kim, H.-E., & Ohno-Machado, L. (2017). Blockchain distributed ledger technologies for biomedical and health care applications. Journal of the American Medical Informatics Association : JAMIA, 24(6), 1211–1220. https://doi.org/10.1093/jamia/ocx068
Mazonka, O., Tsoutsos, N. G., & Maniatakos, M. (2016). Cryptoleq: A heterogeneous abstract machine for encrypted and unencrypted computation. IEEE Transactions on Information Forensics and Security, 11(9), 2123–2138. https://doi.org/10.1109/tifs.2016.2569062
Lumineau, F., Wang, W., & Schilke, O. (2020). Blockchain governance—A new way of organizing collaborations? Organization Science. https://doi.org/10.1287/orsc.2020.1379
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: architecture, consensus, and future trends. In 2017 IEEE international congress on big data (bigdata congress). IEEE.
Lemieux, V., Hofman, D., Batista, D., & Joo, A. (2019). Blockchain technology & recordkeeping. Available online at http://armaedfoundation.org/wp-content/uploads/2019/06/aief-research-paper-blockchain-technology-recordkeeping.pdf.
Francisco, K., & Swanson, D. (2018). The supply chain has no clothes: Technology adoption of blockchain for supply chain transparency. Logistics, 2(1), 2. https://doi.org/10.3390/logistics2010002
Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and innovation. Business Horizons, 61(4), 567–575. https://doi.org/10.1016/j.bushor.2018.03.006
Oliveira, L., Zavolokina, L., Bauer, I., & Schwabe, G. (2018, December 12–16). To token or not to token: Tools for understanding blockchain tokens. In. International conference of information systems (ICIS 2018). San Francisco, USA. University of Zurich. Available online at https://www.zora.uzh.ch/id/eprint/157908/.
Weingärtner, T. (2019). Tokenization of physical assets and the impact of IoT and AI. Available online at https://blockchain.pwias.ubc.ca/sites/blockchain.pwias.ubc.ca/files/report-files/weingaertner_tokenization_iot_ai%20(1).pdf.
Freni, P., Ferro, E., & Moncada, R. (2020). Tokenization and blockchain tokens classification: A morphological framework. In: 2020 IEEE symposium on computers and communications (ISCC). IEEE.
Henke, M. (2002). Strategische Kooperationen im Mittelstand. Potentiale des Coopetition-Konzeptes \NLN\. Zugl.: München, Techn. Univ., Diss., u.d.T.
Henke, M. (2003). Strategische Kooperationen kleinerer und mittlerer Unternehmen (KMU) unter besonderer Berücksichtigung des Coopetitions-Ansatzes. Wissenschaft & Praxis (Schriftenreihe managementorientierte Betriebswirtschaft, 4).
VeChain Foundation. (2019). VeChain Whitepaper 2.0. Available online at http://www.vechain.org/qfy-content/uploads/2020/01/VeChainWhitepaper_2.0_en.pdf. Checked on 26 Jan 2021.
Waltonchain. (2018). White Paper V2.0. Available online at http://www.waltonchain.org/en/Uploads/2020-06-11/5ee1c6b5b10cf.pdf. Updated on 26 Jan 2021.
Waltonchain. (2019). Waltonchain Global Community Autonomy Blue Paper. Available online at http://www.waltonchain.org/en/sys/list/52.html. Updated on 26 Jan 2021.
Lupton, D. (2018). How do data come to matter? Living and be coming with personal data. Big Data & Society, 5(2), 2053951718786314.
Metzger, A. (2020). A market model for personal data: State of play under the new directive on digital content and digital services. Data as Counter-Performance–Contract Law 2.0.
Conger, S., Pratt, J. H., & Loch, K. D. (2013). Personal information privacy and emerging technologies. Information Systems Journal, 23(5), 401–417.
Malgieri, G., & Custers, B. (2018). Pricing privacy–the right to know the value of your personal data. Computer Law & Security Review, 34(2), 289–303.
Spiekermann, S., & Korunovska, J. (2017). Towards a value theory for personal data. Journal of Information Technology, 32(1), 62–84.
Spiekermann, S., Acquisti, A., Böhme, R., & Hui, K. L. (2015). The challenges of personal data markets and privacy. Electronic Markets, 25(2), 161–167.
Au, S., & Power, T. (2018). Tokenomics: The crypto shift of blockchains, ICOs, and tokens. Packt.
Little, W. (2017). A primer on blockchains, protocols, and token sales. Hackernoon (blog). Available at: https://hackernoon.com/a-primer-on-blockchains-protocols-and-token-sales-9ebe117b5759. Accessed 22 Dec 2020.
Tomaino, N. (2017). Tokens, tokens and more tokens. Available at: https://thecontrol.co/tokens-tokens-and-moretokens-d4b177fbb443. Accessed 21 Dec 2020.
Mougayar, W. (2017). Tokenomics—A business guide to token usage, utility and value. Available at: https://medium.com/@wmougayar/tokenomics-a-business-guide-to-token-usage-utility-and-value-b19242053416. Accessed 22 Dec 2020.
Glatz, F. (2016). A blockchain token taxonomy. Available at: https://medium.com/@heckerhut/a-blockchain-token-taxonomy-fadf5c56139a. Accessed 21 Dec 2020.
Lena and Oxana. (2017). What are you token about? Blockchain token economics and rights. Available at: https://hackernoon.com/token-economy-4a38ad02a239. Accessed 23 Dec 2020.
Yadav, M. (2017). Exploring signals for investing in an initial coin offering (ICO). Available at SSRN 3037106. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3037106.
Srinivasan, B. (2017). Thoughts on tokens. news. 21. co, 27. Available at: https://news.earn.com/thoughts-on-tokens-436109aabcbe. Accessed 21 Dec 2020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2022 The Author(s)
About this chapter
Cite this chapter
Jürjens, J., Scheider, S., Yildirim, F., Henke, M. (2022). Tokenomics: Decentralized Incentivization in the Context of Data Spaces. In: Otto, B., ten Hompel, M., Wrobel, S. (eds) Designing Data Spaces . Springer, Cham. https://doi.org/10.1007/978-3-030-93975-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-93975-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93974-8
Online ISBN: 978-3-030-93975-5
eBook Packages: Computer ScienceComputer Science (R0)