collaboration in the physical internet

82
Collaboration in the Physical Internet: An exploration of third party data sharing enabled by Enterprise Information Systems M.J. Kreijkes MSc Thesis presented for the degree: DDM Technology & Operations Management (2018-2020) 9 December 2019 Lead supervisor: Dr. N.B. Szirbik Second supervisor: Dr. A. Small University of Groningen - Newcastle University – Deloitte NL S2754061 - 180626986

Upload: others

Post on 14-Jan-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Collaboration in the Physical Internet:

An exploration of third party data sharing enabled by

Enterprise Information Systems

M.J. Kreijkes

MSc Thesis presented for the degree:

DDM Technology & Operations Management (2018-2020)

9 December 2019

Lead supervisor: Dr. N.B. Szirbik

Second supervisor: Dr. A. Small

University of Groningen - Newcastle University – Deloitte NL

S2754061 - 180626986

1

2

Acknowledgements

This research was conducted to finish the MSc degrees of Technology & Operations

Management at the University of Groningen, and Operations & Supply Chain

Management at Newcastle University Business School. First, I would like to

acknowledge my two university supervisors, Dr. Nick Szirbik and Dr. Adrian Small.

Their guidance, support and feedback helped me a lot to improve the quality of

the research and keep me motivated. Furthermore, I would like to thank Marcel

Bakker for his excellent supervision and help to get me settled at the company,

arranging interviews and improving the research, also from a practical

perspective. Lastly, many thanks to all that were involved in another way in this

research: academics, interviewees, validation participants, colleagues, fellow

students, family and friends; without your input, finalizing this research would not

have been possible.

3

Abstract

Purpose: The logistics industry is too inefficient and inherently unsustainable due

to its polluting nature. A proposed solution is the Physical Internet, but there are

major challenges on how the envisaged increase in collaboration and data sharing

can be ensured. To find a solution, data sharing systems that are currently in place

have been examined and reverse engineered, revealing the critical requirements

for data sharing and future Enterprise Information Systems. Based on these

requirements, preliminary functional architectures of the Third Party Model are

designed.

Methodology: Design Science Research is carried out to design a solution to the

problem of collaboration and data sharing. Data is collected by conducting multiple

case studies including observations and semi-structured interviews with industry

experts. A validation workshop is conducted to evaluate the critical requirements.

Findings: The findings indicate that data sharing could potentially be enhanced

by using a third party mediator. In such a system, stakeholders require

transparency, while power and outputs are evenly distributed and not centrally

located. In addition, the system should be open to access and easy to implement,

but restricted by specific protocols that determine data and technology standards.

Originality/contribution: This is one of the first studies in PI that establishes

critical requirements and develops a Third Party Model for collaboration and data

sharing. The findings can be used in practice to develop new data sharing systems,

and by academics for future research towards data sharing in a PI context.

Keywords: Collaboration, Data Sharing, Design Science Research, Digital Supply

Chain, Enterprise Information Systems (EIS), Information Sharing, Information

Technology (IT), Logistics, Physical Internet, Third Party Model.

Word count: 14900 (excl. references, appendices)

4

Table of Contents

1 Introduction..................................................................................... 8

2 Theoretical background.................................................................. 10

2.1 Logistics......................................................................................... 10

2.2 Physical Internet ............................................................................. 13

2.3 Enterprise Information Systems ........................................................ 22

3 Research questions ........................................................................ 25

4 Methodology .................................................................................. 26

4.1 Research method ............................................................................ 26

4.2 Data collection ................................................................................ 29

4.3 Validation method ........................................................................... 30

4.4 Ethics and Risks .............................................................................. 30

5 Analysis of case studies ................................................................. 31

5.1 Methods of collaboration and data sharing .......................................... 31

5.2 Types of data shared ....................................................................... 33

5.3 Reasons for data sharing .................................................................. 34

5.4 Challenges in data sharing ................................................................ 36

5.5 Critical requirements ....................................................................... 37

6 Design ........................................................................................... 42

6.1 Third party model ............................................................................ 42

6.2 Operational concept ......................................................................... 44

6.3 Functional architectures ................................................................... 46

7 Validation ...................................................................................... 53

7.1 Validation of critical requirements ...................................................... 53

5

8 Discussion...................................................................................... 57

8.1 Discussion of findings ...................................................................... 57

8.2 Implications for theory ..................................................................... 59

8.3 Implications for practice ................................................................... 60

8.4 Limitations and future research directions ........................................... 60

9 Conclusion ..................................................................................... 62

10 References .................................................................................. 63

11 Appendices .................................................................................. 70

Appendix A – PESTLE analysis logistics industry ........................................ 70

Appendix B – Data collection .................................................................. 71

Appendix C - Code trees ........................................................................ 80

6

List of tables and figures

Table 1 - Strategic research directions in logistics (Speranza, 2018) ............... 11

Table 2 - Unsustainability symptoms and their impact (Montreuil, 2011) ......... 12

Table 3 - Four challenge areas for future EIS (El Kadiri et al., 2016) ............... 24

Table 4 - DSR artifact levels (Gregor & Hevner, 2013) .................................. 27

Table 5 - Strategies for enhancing research rigor (Devers, 1999) ................... 30

Table 6 - Methods of data sharing used by case companies ........................... 32

Table 7 - Types of sensitive data ............................................................... 33

Table 8 - Types of non-sensitive data ......................................................... 34

Table 9 - Characteristics of sound requirements (Buede & Miller, 2016) .......... 37

Figure 1 - Overview of information flows in the envisaged PI system ............... 9

Figure 2 - Interconnected supply network (Ballot et al., 2012) ....................... 14

Figure 3 - Container modularity (Montreuil, 2011)........................................ 15

Figure 4 – Example of efficient transport planning with collaboration .............. 21

Figure 5 - DSR cycle (based on Wieringa, 2009) .......................................... 28

Figure 6 - International Data Space architecture (Otto et al., 2016) ............... 42

Figure 7 – Potential design of a Third Party Model (TPM) ............................... 44

Figure 8 - Functional Architecture A-2 ........................................................ 46

Figure 9 - Interaction diagram A-2 ............................................................. 47

Figure 10 - Functional Architecture A-1....................................................... 48

Figure 11 - Interaction diagram A-1 ........................................................... 48

Figure 12 - Functional Architecture A.0 (alternative 1) .................................. 49

Figure 13 - Interaction diagram A.0 (alternative 1) ...................................... 50

Figure 14 - Functional Architecture A.0 (alternative 2) .................................. 51

Figure 15 - Interaction diagram A.0 (alternative 2) ...................................... 51

Figure 16 - Functional Architecture A.0 (alternative 3) .................................. 52

Figure 17 - Interaction diagram A.0 (alternative 3) ...................................... 52

7

List of abbreviations

ADOM Automation, Decentralization, Openness, Modularity

AI Artificial Intelligence

ALICE Alliance for Logistics Innovation through Collaboration in Europe

API Application Programming Interface

ASN Advanced Shipping Notification

CRM Customer Relationships Management

CSCMP Council of Supply Chain Management Professionals

EDI Electronic Data Interchange

EIS Enterprise Information System

ERP Enterprise Resource Planning

IoT Internet of Things

IS Information System

KPI Key Performance Indicator

LSP Logistics Service Provider

MAS Multi-Agent System

OLSCM Operations, Logistics and Supply Chain Management

PI Physical Internet

RFID Radio-Frequency Identification

SWOT Strengths, Weaknesses, Opportunities, Threats

TBL Triple Bottom Line (people, planet, profit)

TPM Third Party Model

8

1 Introduction

Every year in Europe, around €160 billion is lost due to low capacity utilization of

trucks and containers only, with tremendous unnecessary amounts of CO2

emissions as a result (CSCMP, 2015). As sustainability plays an increasingly

important role in the world, it is essential to enhance logistics processes. The

Physical Internet (hereafter PI) is a relatively new but promising concept, aiming

to improve efficiency and sustainability in logistics. It provides organizations with

the potential to radically decrease triple bottom line (TBL) issues e.g. transport

costs, CO2 emissions and truckdriver turnover. This can be achieved by combining

logistics networks, using smart modular containers, and an increased sharing of

information. Building on the four PI pillars of Automation, Decentralization,

Openness and Modularity (Montreuil et al., 2013), PI could be the missing link in

transforming towards a sustainable supply chain (Montreuil, 2011). The founding

father of the PI concept is Benoit Montreuil, who first described the concept in

2009 in his so-called Physical Internet Manifesto. In one of his seminal papers, PI

is defined as “an open global logistics system founded on physical, digital, and

operational interconnectivity, through encapsulation, interfaces and protocols”

(Montreuil et al., 2013). In combination with more recent research by several

academics (Ballot et al., 2014; Crainic & Montreuil, 2016; Treiblmaier, 2019), a

group of papers can be identified to be of paramount importance in this field.

These will be discussed thoroughly in the theoretical background section.

Due to the recency of this concept there are many gaps in several research areas

that need to be filled. One of the research roadmaps identified by European

Technology Platform ALICE is collaboration through Information Systems. In the

Physical Internet, every container acts autonomously through a digital twin, which

is connected to the internet. The Enterprise Information Systems (EIS) of the

expected stakeholders in the PI, also act as agents or digital twins. In the future

PI network, the digital twins of the millions of PI containers automatically have to

communicate all necessary information with the EIS of all agents (visualized in

figure 1). As each agent needs particular information and uses multiple,

distinctive, often monolithic EIS, the interplay can become very complex. With the

expected exponential increase in data sharing, issues of collaboration and trust

between stakeholders become apparent.

9

For the concept to become fully operational, which is envisioned to take place

between 2030-2040, developments in Enterprise Information Systems (EIS)

based on the four PI pillars will play a paramount role. What these developments

and challenges are, remains undetermined in literature. It is sure that the

tremendous increase in data/information creates additional challenges. This thesis

therefore addresses the question: how can data be shared effectively in the

Physical Internet, enabled by Enterprise Information Systems? A set of critical

requirements will be created to assist researchers and practitioners. Based on

these findings, a preliminary functional architecture to improve data sharing with

the use of a third party mediator will be designed and evaluated. Concluding, this

thesis will 1) provide exploratory research in the field of Enterprise Information

Systems and data sharing; 2) attempt to contribute to PI research by identifying

critical requirements and challenges for data sharing and future EIS and 3) provide

openings for future research in PI and EIS.

The remainder of this paper will contain a review of current (non-)academic

literature on logistics, PI and EIS, an explanation of the methodology used, the

findings that were obtained, and a thorough evaluation and discussion of these

results. Finally, the conclusion will summarize the main findings of this research.

Figure 1 - Overview of information flows in the envisaged PI system

10

2 Theoretical background

To describe the setting of the research, this chapter first examines recent

developments and challenges in logistics through a review of (academic) literature

and interviews with industry experts for practical insights. Subsequently, although

PI is a rather new concept, several papers provide great value in this field and will

be reviewed to build a greater understanding of what PI entails. After this, the

focus will be on the area of Enterprise Information Systems and data sharing,

which are vastly grounded in literature but will also be complemented with expert

interviews. Following the review of these fields, gaps in literature are identified,

based on which the research question and sub-questions are constructed.

2.1 Logistics

As PI is expected to exist within a logistics context, the present situation in

logistics should be examined first through an industry analysis. Based on this

analysis, challenges are identified, followed by the proposed solution to tackle

these challenges.

‘Logistics’ as a concept has countless definitions. The Council of Supply Chain

Management Professionals best describes it in context of this research as “The

process of planning, implementing, and controlling procedures for the efficient and

effective transportation and storage of goods including services, and related

information from the point of origin to the point of consumption for the purpose

of conforming to customer requirements. This definition includes inbound,

outbound, internal, and external movements” (CSCMP, 2013). Logistics does not

only relate to the actual transportation of goods as often assumed, but also

incorporates all other activities needed to ensure an optimal movement of goods

for the company or entire supply chain. It evolved from simply transporting goods

towards a strategy to generate value for the entire supply chain to end customers.

11

2.1.1. Industry analysis

Nowadays, logistics (sometimes called ‘transportation & logistics) is one of the

largest global industries, with a total worth over 4730 Billion USD (€4251 Billion)

(IMARC Group, 2018). It comprises almost all types of industries and is often

subdivided into segments such as land, water and air. With the increase in

globalization, the market became increasingly dominated by global logistics

corporations like FedEx, DHL, UPS, DSV and Maersk. More recently, large

technology companies like Amazon, Google and Alibaba are increasingly investing

in this industry, making it exceptionally competitive. Due to societal and

technological developments, the logistics industry is rapidly changing (Zijm et al.,

2019). Under the term ‘Industry 4.0’, developments in multiple industries are

made to increase efficiency, sustainability and customer satisfaction. New

technologies like Internet of Things (IoT) and Artificial Intelligence (AI) are

adopted by more and more companies (EFT & JDA, 2019). Furthermore, different

modes of transport like ships, planes, rail and road are combined to a greater

extent for intermodality advantages. Next to these technological developments,

there are also strategic developments. Speranza (2018) discusses three strategic

research directions: systemic, collaborative and dynamic directions (see table 1

below). Academics are increasingly focusing on integrating technological and

strategic developments. The Physical Internet addresses all three directions.

Systemic “Better solutions to problems can be identified when broader

parts of the supply chain are jointly modeled and optimized”.

Collaborative “A tool that enables integration and global optimization of a

supply chain”.

Dynamic “Systems should be more reactive to changes and provide more

effective responses”.

Table 1 - Strategic research directions in logistics (based on Speranza, 2018)

There is also a negative side to the large size of the industry. The logistics industry

extremely pollutes air, water and land, impacting the climate and biodiversity,

while creating road congestion and noise. Because of this, the logistics industry is

inherently unsustainable, so the term ‘sustainability’ should be used with caution.

Appendix A summarizes the industry assessment by means of a PESTLE analysis,

which fits best to this industry compared to SWOT or Porter’s Five Forces.

12

2.1.2. Challenges

Despite the increasing focus on achieving higher efficiency and sustainability,

there remains a huge potential to further develop this industry. In 2008, the

efficacy rate was estimated to be less than 10% (Ballot & Fontane, 2008). There

are many other wastes in the current logistics industry, as summarized by

Montreuil in table 2. This table also indicates what type of waste it entails, in

relation to the Triple Bottom Line (TBL) of people, planet and profit. These wastes

are strengthened by the amount of uncertainty in the current logistics industry,

caused by many factors e.g. new regulations, technologies, public pressure

regarding climate change, depletion of natural resources, and as mentioned by

several interviewees, the rise of e-commerce.

Symptoms People Planet Profit

1. We are shipping air and packaging X X

2. Empty travel is the norm rather than the exception X X

3. Truckers have become the modern cowboys X X

4. Products mostly sit idle, stored where unneeded, still

often unavailable

X X

5. Production and storage facilities are poorly used X X

6. So many products are never sold, never used X X X

7. Products do not reach those who need them the

most

X X

8. Products unnecessarily move X X

9. Fast & reliable intermodal transport is still a dream X X X

10. Getting products in/out of cities is a nightmare X X X

11. Networks are neither secure nor robust X X

12. Smart automation & technology are hard to justify X X

13. Innovation is strangled X X X

Table 2 - Unsustainability symptoms and their impact (Montreuil, 2011)

Over the past decades, an increasing focus was on integrating the global supply

chain, coupled with developments in the digital supply chain. Most of these,

however, only address one or a couple of symptoms. As a possible, long-term

solution to all the increasingly demanding challenges described above, Montreuil

proposed the Physical Internet.

13

2.2 Physical Internet

Apart from a description of the concept in the Physical Internet Manifesto in 2009,

PI first occurred in academic literature in 2010 (Montreuil et al., 2010). Therefore,

no exhaustive body of papers is available to consult yet compared to other

research areas in logistics, supply chain and operations management. Resultingly,

most of the research in this field (44%) is conceptual/theoretical (Treiblmaier et

al., 2016).

The Physical Internet is an analogy from the Digital Internet, which had similar

goals, challenges and requirements several decades ago. PI is described as “an

open global logistics system founded on physical, digital, and operational

interconnectivity, through encapsulation, interfaces and protocols” (Montreuil et

al., 2013) and is primarily focusing on shipments larger than standard parcel sizes

(UPS, DHL etc) till standard container sizes (20/40 FT). It is expected to bring

radical (digital) innovations to the current logistics network which improve

efficiency and sustainability. This can be achieved by "transforming the way

physical objects are handled, moved, stored, realized, supplied and used"

(Montreuil, 2013). In other words, with the use of digital innovations, new

technologies, as well as smart modular containers (PI-containers) and an

increased sharing of information, PI can come into existence. This requires

warehouse sharing, intermodal transport and increasing collaboration between

stakeholders to create an open supply web (sharing of supply networks).

To achieve collaboration, trust should be established between stakeholders to

facilitate the increasing need in data sharing. Figure 2 below visualizes a simplified

version of the way PI can transform logistics. If the supply networks of company

1 and company 2 in the current logistics system would operate independently, the

result would be the closed, complex and tangled supply web at the bottom left.

This can be transformed to the open, integrated supply network in the bottom

right, based on the PI principles. The advantages are clearly visible, e.g. routing

can be optimized, to increase efficiency. A simulation study in France with

Carrefour and Casino confirmed the expected advantages, where 50% of goods

transport shifts from road to rail, cutting costs by around 32% and reducing

greenhouse gas emissions by 60% (Ballot et al., 2014).

14

Figure 2 - Interconnected supply network (Ballot et al., 2012)

2.2.1 Physical Internet pillars

It is evident that PI is a global, overarching and integrating framework, which

consists of many elements that should interconnect with each other. Most

importantly, the PI is expected to be built on four foundational pillars that have

shortly been mentioned in the introduction: Automation, Decentralization,

Openness and Modularity, often abbreviated as ADOM. Combining these primary

requirements is what makes PI different from current best practices in logistics.

Based on these pillars, the requirements of future EIS and data sharing will have

to be constructed.

Automation concerns performing a task with minimal human support. In the ideal

scenario, the container will automatically determine its most efficient route, truck

(un)loading will be done automatically as much as technically possible, as well as

information flows between agents via the container. This pillar is perceived to have

the least challenges for implementation, as automation is a well-known concept

that has been invested in since decades. However, automation can create

resistance among lower skilled workforce, as it tends to take over their jobs. This

is somewhat true, although a recent study found out that automation is estimated

to create more jobs than they replace in the next four years (58 million), only in

different fields (McKinsey Global Institute, 2017; World Economic Forum, 2018).

15

Decentralization indicates that there should not be a central authority governing

the system. This is of paramount importance to provide autonomy to the

containers and protect data in the PI network. Despite the advantages, complete

decentralization could also create challenges when all stakeholders pursue their

own goals, potentially leading to congestion at specific important hubs or areas.

Recent papers discuss whether a certain degree of centralization might be more

beneficial to the envisaged PI system (Ambra et al., 2019). Having multiple third

parties with an advisory role could help mitigating this risk.

The PI network is transparent and open for everyone to join: from suppliers,

container owners, transportation companies, hubs to customers, independent of

their sizes and without any limits. Openness requires transparency and sharing

of information. With more data available, supply chains can plan more efficiently,

creating advantages to all stakeholders. Developments have to be made to ensure

only required stakeholders have access to the information/data they need.

Another efficiency related advantage of PI is modularity: shipping and combining

multiple (smaller) containers that are able to interlock with each other and the

mode of transport by latching and the use of intelligent technology. This has the

potential to radically improve the container space utilization rate, which is

currently too low as described by Montreuil, caused by high weight, volume or

value. Figure 3 below provides a visual representation of how multiple containers

of varying sizes can be combined into one shipping unit. A challenge in this area

can be to determine the right size of the required container for a specific shipment.

Figure 3 - Container modularity (Montreuil, 2011)

16

2.2.2 Main elements in the Physical Internet

The Physical Internet consists of several important elements, which will all be

described below. All elements have physical (actors) as well as virtual entities

(agents), which communicate with each other through software (EIS). In terms of

software, the Physical Internet can be described as a decentralized multi-agent

system (MAS). In the field of Computer Science, MAS is defined as “a system

composed of multiple interacting computing elements, known as agents. Agents

are computer systems that have two important capabilities: autonomous actions

and interacting with others.” (Wooldridge, 2009). These agents act towards

specific objectives, while observing their environment using sensors and

intelligence (AI) (Weiss, 2013). In the PI, these agents communicate with each

other and with the EIS of the main actors. However, data sharing issues like

privacy, confidentiality and security become even more apparent in a

decentralized multi-agent system, as there is a lack of control. Companies prefer

to have a certain degree of sovereignty over their data: the ability to keep control

over who has access to their data and when. This creates a trade-off: while the

advantages of data sharing are evident, many companies still decide not to share

because of the uncertainties regarding security.

PI Container

In the current logistics systems, shipping containers are mostly very static and do

not perform any functions other than encapsulating and protecting the shipped

goods. Contrastingly, the future PI container is regarded to become the most

important agent in the envisaged system as it will have autonomy to make its own

decisions for the container owner. Each container will have an agent, a digital twin

existing in the cloud, that will make decisions on routes, transportation modes and

costs easier. Data flows between other elements are expected to go through the

PI container. The most considerable challenge is that the agent of the container

has to communicate with agents of the EIS of all other stakeholders automatically,

to ensure efficiency. As there are countless different agents and EIS,

interoperability and integration issues become apparent.

17

Suppliers

Nowadays, suppliers mostly have a responsible role in making sure all goods of

required quality are made ready for shipment correctly. An important task is to

provide the LSPs and customers with a large amount of information about units,

dimensions, type of goods shipped and more, possibly by providing an Advanced

Shipping Notification (ASN) to the LSP and customer. In the PI system, it is

important that the supplier still provides this information, which is expected to be

communicated through the smart PI container to the other agents that require it.

Suppliers are seen as the driving force behind PI developments, as they can

indirectly force their clients (LSPs) to change (Meyer & Hartmann, 2019). The

main advantage to suppliers is that the PI opens additional markets, as they can

offer their products to a whole new range of customers.

Customers

On the receiving end of the shipments are the customers. Currently, customers

activate the shipment process by placing an order. Next to that, there are not

many tasks other than checking whether the container arrives on time and

planning delivery with transporters. This is not expected to be different in a PI

system. The main advantages that PI can offer are more automation and a larger

market, as customers should be able to order everything, from everywhere, at

every moment.

Logistics Service Providers (LSPs)

LSPs have one of the most important roles in the current system, being in contact

with almost every other agent. Information about shipments has to be provided

to both supplier and customer, containers should be arranged, hubs and carriers

should be contacted for connecting transport, but most of all, goods have to be

moved. Most of these activities are expected to be performed by the PI container

automatically in the future PI network, such that the transporter can purely focus

and specialize on the physical transport of the modular containers. The largest

expected challenge for LSPs is the disruption from their traditional business model

towards the envisaged shared network of the Physical Internet.

18

Intermodal hubs

Hubs are the places where goods are changed from one transportation unit to the

other. This can be done at seaports, airports, railway stations or warehouses.

When a shipment uses more than one type of transport, it is called intermodal.

For example, if goods arrive in a seaport and are transported to the hinterland by

train or truck. Intermodal transport is expected to increase customer service,

while decreasing lead times and shipment costs (Cambra-Fierro & Ruiz-Benitez,

2009). Currently, these hubs play a large role already and in the future PI network,

their role will be even more important due to the expected increase in containers

and use of intermodality. The main difference is that several hubs such as

warehouses should become shared hubs with other stakeholders, instead of being

privately used. In this way, the benefits of a shared PI network as described in

figure 2 can become operational. This requires a radical change in the business

model for warehouse owners.

Container owners

Container owners play a fairly passive role in the current logistics system. Shipping

containers can be owned by LSPs, but also by other companies that lease or rent

out these containers to make a profit, but are not involved in any transport related

activities. In the PI, the primary objective will not be different (making profit), but

it is expected that the amount of container owners will increase. This is caused by

the increase in smaller containers of various sizes, which are easier to purchase

and own, as they operate themselves guided by basic instructions from the

owners. Furthermore, owners will be able to specify certain tasks to their

containers. Thus, one of the main functions of the PI container is to maximize

profit (or any other target) for its owner by operating as efficiently as possible.

Third party mediator

A potential new stakeholder to ensure collaboration and effective data sharing can

be a third party mediator. This mediator (or multiple mediators) should be able to

improve trust and collaboration between stakeholders, to achieve a higher degree

of openness. Data providers can provide their data to these mediators, who then

19

distribute the required information to customers that need it, but only with

approval of the supplier. In this way, suppliers keep sovereignty over their data.

Furthermore, the mediator can perform an optimization of the acquired data and

provides this optimized advice to the stakeholders. Chapter 6 describes the

functions of the mediator in more detail.

2.2.3 Research avenues for the Physical Internet

The previous sections indicated several challenges to logistics and PI, as well as

the most important elements. To speed up research and developments, the EU

set up a European Technology Platform (ETP) for PI: ALICE (Alliance for Logistics

Innovation through Collaboration in Europe), as part of the Innovation Union

initiative (ETP-ALICE, 2019). The ALICE ETP identified five roadmaps for future PI

research: information systems; sustainable, safe and secure supply chains;

corridors, hubs and synchromodality; global supply network coordination and

collaboration; and urban logistics. All roadmaps were first envisaged to be

completed around 2050, however more recently the target for PI was set to 2030-

2040, while aiming for entirely carbon neutral, zero emission supply chains around

2050 (Ballot, 2018). As supply chain development in recent years is mainly driven

by innovations in information systems (Treiblmaier, 2019), there is an increasing

need to advance research in this area.

Comparable to most traditional supply chains, a PI network contains three types

of flows: physical, information, and financial. The largest share of PI research

concentrates primarily on the first type: the flow of physical goods/containers and

design of systems for specific areas (e.g. last mile) or industries (e.g. fresh food).

Less focus is on the flow of financials or information, preferably through Enterprise

Information Systems, which are prerequisites to actually perform the physical

flows. The main challenge in EIS is that researchers regard current EIS as being

too rigid for interoperability (Zacharewicz et al., 2017) needed in PI to share

information. However, no research directly addresses the issue on how the

decentralized multi-agent system of PI interacts with the often monolithic

regarded EIS systems currently in use, so interoperability will remain a huge

barrier to overcome.

20

Collaboration

Next to interoperability of EIS, collaboration between stakeholders is regarded as

an essential requirement to establish a shared network. There is extensive

research on current collaboration networks, and several examples might clarify

what the advantages are. In general, the main reason for collaboration is to

improve performance in an increasingly dynamic market (Cao & Zhang, 2011).

An example could be a retailer that collaborates with his suppliers, where the

retailer provides his demand forecast to the suppliers. With this forecast, suppliers

can more effectively plan their production and deployment of staff, in order to

provide better service to the retailer. They can offer shorter delivery times which

provides an opportunity to decrease warehouse costs, as both parties need to

keep less items in stock. Another potential improvement is the quality of products.

In many industries, stakeholders collaborate by combining R&D resources to

create innovative solutions, becoming more competitive in their market. Large

global logistics service providers also often collaborate with smaller local

companies to improve their coverage and increase flexibility. They can use more

of the capacity of their local partner during periods when demand is higher, and

use their own capacity when demand is lower.

The general benefits of collaboration in and across current supply chains, often

expressed in KPIs, are evident and well researched. But why is collaboration

expected to be even more advantageous in the future PI system? It remains

difficult to validate as the system is not in place yet, but there are several future

visions that describe the importance of collaboration.

Theoretically, in a shared PI network, transport planning and routing can be done

more efficiently. When actors collaborate and share their data with the network,

it is more clear to the PI containers who has capacity on which route or not. Based

on that information, containers can make better decisions on which type of

transportation to take, which route fits best, or which alternative route can be

chosen. Take three containers that should go from location A to B for example.

Figure 4 below represents the situation. The most optimal route seems to go via

barge to location B directly. However, the two barges that go to this destination

are fully booked. There is another barge which has spare capacity, but goes to

destination C. This is not far from destination B, but needs additional truck

21

transport to get there. By using the available information, the PI can see whether

a truck will be able to take the containers from C to B. In this way, one of the

goals of PI can be achieved: optimizing capacity utilization. This can only be done

when collaboration between different actors is in place.

Figure 4 – Example of efficient transport planning with collaboration

Next to capacity optimization, collaboration is also required to effectively share

resources. Sharing resources is expected to make the PI a thriving system

(Montreuil et al., 2013), and radically improves flexibility. Furtado & Frayret

(2014) identify that infrastructures such as transportation hubs, warehouses,

hauling capacity and trailers should be shared to accommodate the flow of goods

in the future PI system. This has several advantages. Distances between hubs

become smaller, goods can be stored in warehouses closer to where they are

needed, or orders for the same customer can be bundled more effectively, all

reducing lead times.

A significant challenge in collaboration is how the expected increase in

data/information sharing between stakeholders can be designed properly, while

complying to competition laws. Currently, most information is shared from point-

to-point, e.g. supplier to customer or LSP. In a PI network, data should be shared

with all stakeholders to gain interconnectivity benefits described above, creating

a complex situation where data privacy and security can become a large issue. A

novel business model architecture that uses a third party company as mediator

was proposed by several academics (Dalmolen et al., 2018; 2019a) to improve

data security and therefore collaboration, but this was not examined in a specific

PI context. The lack of academic knowledge and paramount importance for further

developments to handle the expected ‘data explosion’ in the PI indicates that a

gap exists, and research in the area of EIS and data sharing should be conducted.

22

2.3 Enterprise Information Systems

Before exploring the third party data sharing model, it is evident to define the

concept of EIS, and why these are preferred for sharing information. Enterprise

Information Systems can be defined as “software systems for business

management, encompassing modules supporting organizational functional areas

such as planning, manufacturing, sales, marketing, distribution, accounting,

financial, human resources management, project management, inventory

management, service and maintenance, transportation and e-business” (Rashid

et al., 2002). These help to control the performance of business processes

(O’Brien, 2003). EIS generally comprise six particular types of systems: Enterprise

Resource Planning (ERP), Supply Chain Management (SCM), Manufacturing

Execution Systems (MES), Customer Relationship Management (CRM), Product

Lifecycle Management (PLM) and Business Intelligence (BI) (Romero & Vernadat,

2016). These commonly used modules can help organizations to achieve high

operational efficiency, significant cost savings, and thus maximization of profit

(Olson & Kesharwani, 2009). Furthermore, these can help to increase the product

value by offering a better client service (Zacharewicz et al., 2017). ERP systems

are often seen as the backbone system, bringing many crucial improvements to

the company (El Kadiri et al., 2016) and is therefore one of the fastest growing,

most profitable areas in the software industry (Da Xu, 2011). The €75 billion

industry is largely dominated by large software companies that offer complete

packages, such as SAP, Microsoft and Oracle (Statista, 2019).

2.3.1 Data sharing

One of the main assets of EIS is the ability to share data with others. It is often

interrelated with the concept of collaboration, as one often causes the other and

vice versa. The types of logistics related data that are often shared ranges from

updates about lead times and arrival times to expected demand and planning data.

Methods of data sharing range from only face-to-face (F2F) communication

towards fully integrated Enterprise Information Systems. Data sharing can be

done vertically, so within the company (between departments) or supply chain

(with suppliers/customers), but also horizontally, which means between supply

chains (with potential competitors). Horizontal data sharing is often more

23

challenging due to potential misuse of company sensitive data. This creates a

dichotomy for many businesses: sharing sensitive information securely can prove

to be very profitable, but data leakage might cause disastrous consequences.

Next to data sharing, the concept of Big Data has gained a lot of attention in

research and practice over the past decade. Through data mining and analysis,

companies can radically improve their performance, often measured in KPIs

(McAfee et al., 2012). Because of these advantages, data is nowadays often

regarded as the most valuable resource to possess. Despite this shift towards a

data economy, many improvements can be made to improve effectiveness of data

sharing. Due to the lack of international data standards, many systems exist that

are not interoperable with each other. Ultimately, the goal for EIS is to provide an

open and interoperable system, that can be used easily by all stakeholders,

accessed anywhere and is able to communicate with other types of EIS (Panetto

et al., 2016), while companies maintain sovereignty over their data. This would

align with the general requirements of a system for the Physical Internet.

2.3.2 Best practices

To achieve this ultimate goal, companies, practitioners and academics are

continuously trying to develop and refine new functionalities. Some recent trends

are for instance cloud-based systems, advanced analytics, and Internet of All

Things (IoAT), which is an extension to the better-known Internet of Things (IoT)

(Bughin et al., 2013). Most of the developments are driven by the increasing

requirements for more data, collaboration and flexibility, to create so-called Next

Generation EIS. These next-gen EIS are expected to have several innovative

characteristics that differ from monolithic legacy systems (Panetto et al., 2016):

- Use of IoT technology

- Software-as-a-Service (SaaS)

- Use of blockchain (Distributed Ledger Technology) (Badzar, 2016)

- Interoperable with other EIS

- Able to process larger amounts of data (via 5G e.g.)

Despite the advantages of using (next-gen) EIS, companies currently share data

via many different technologies, ranging from simple e-mail and excel sheets to

more integrated Electronic Data Interchange (EDI) connections, Application

24

programming interfaces (API) or data hubs. Especially data hubs are an important

development, as data from multiple sources can be collected and analyzed

collectively. This could be from multiple departments, but also from multiple

companies, which is regarded as important requirement for PI. Recent

technological developments make it possible to consolidate data from different

types of EIS.

2.3.3 Challenges for EIS

Despite the rapid developments in the past decades, academics still identify

substantial challenges for the next-gen EIS, indicating four areas described in

table 3: (1) data value chain management; (2) context awareness; (3) interaction

and visualization; and (4) human learning (El Kadiri et al., 2016). This thesis

mainly addresses the first area, which is about allowing integration, sharing and

security of data through interoperability of systems.

Area Description

Data value chain

management

How to allow data/information analysis, mining, integration,

sharing, security through interoperability?

Context

awareness

How to offer scalability and integration capabilities between

business processes within EIS?

Interaction and

visualization

How to deliver new and intuitive ways for interacting with

EIS?

Human learning How to support development of professional competences

triggered by new scientific/technological advances?

Table 3 - Four challenge areas for future EIS (El Kadiri et al., 2016)

The next chapter will highlight the research question and sub-questions for this

research, based on the gaps found during the literature analysis.

25

3 Research questions

The review of the theoretical background above indicated several research gaps.

One of the most apparent gaps is related to Enterprise Information Systems in a

PI context. It is clear that EIS will play a paramount role, but in what way remains

ambiguous. Resulting from this, a second gap can be identified: bridging the

difference between current best practice EIS and future EIS that are able to align

with the PI requirements. It is evident that developments in EIS should be made

before PI can work properly. But most importantly, due to the expected data

explosion in a time where privacy and security become more prevalent, issues of

collaboration and data sharing are fundamental and have to be addressed first.

Based on these gaps, this thesis aims to answer the following research question:

How can data be shared effectively in the Physical Internet, enabled by

Enterprise Information Systems?

To answer this question, several sub-questions will be investigated first, through

multiple case studies and interviews. These will be examined and discussed in the

following chapters.

1. What are the current systems used for sharing data?

2. What types of data are considered to be sensitive?

3. What are the critical requirements for sharing data (or not)?

4. How can a preliminary functional architecture of the Third Party Model

(TPM) for data sharing be designed?

26

4 Methodology

This chapter describes the research method used that fits best to find an answer

to the research question(s). Subsequently, the methods of data collection and

validation will be described. For these sections, advantages and limitations will be

discussed. The final section explains about potential ethics and risk issues involved

in this research, and how these are addressed.

4.1 Research method

A first step after reviewing the existing literature is to determine what type of

research is most capable of producing knowledge to answer the research question,

based on its distinct characteristics. The characteristics of this research topic are

qualitative and exploratory, which indicates a direction towards conducting case

studies or Design Science Research (DSR). As the goal is to solve a practical

problem (data sharing and collaboration issues in/across supply chains), PI is an

envisaged concept and the research is strongly interconnected with the field of

(Enterprise) Information Systems, the choice for DSR was made. This is conducted

following the guidelines of Hevner et al. (2004) Van Aken et al. (2016) and

multiple articles by Wieringa & Heerkens (2007; 2009). Several other academics

(Holmstrom et al., 2009; Gregor & Hevner, 2013) discuss additional ways to

conduct DSR and how to produce valuable knowledge.

DSR as a research method originates from the field of Engineering and Information

Systems and only recently gained attention in the area of Supply Chain and

Operations Management. It can be described as “the creation of new knowledge

through design of novel or innovative artifacts (things or processes that have or

can have material existence) and analysis of the use and/or performance of such

artifacts along with reflection and abstraction” (Hevner & Chatterjee, 2010). This

implies that research of this type not only aims to create academic knowledge,

but also aims to solve practical, real life problems in emerging or envisaged

systems. The created knowledge is called an artifact, which can have three levels

based on their abstractness (Purao, 2002). Gregor and Hevner (2013) also add a

level of maturity to the characteristics, where maturity spurs with the development

of general theory. See table 4 below for an overview.

27

Artifact characteristic Type of contribution Artifact examples

Abstract / mature Level 3: well-

developed design

theory

General design theories

(mid-range and grand

theories)

Level 2: nascent

design theory /

knowledge as

operational principles

Constructs, methods,

models, design principles,

technological rules

Specific / less mature

Level 1: situated

implementing artifact

Instantiations (products or

implemented processes)

Table 4 - DSR artifact levels (Gregor & Hevner, 2013)

This research aims to create a level 2 artifact: design principles (also called critical

requirements, to be used in this research) to create a novel business model. It is

not uncommon for DSR research to develop design principles. Several reputable

papers that create these as an artifact are Markus et al. (2002) and Lindgren et

al. (2004) but also more recent work (Seidel et al., 2018) can be viewed as an

example. In these papers, design principles like transparency and flexibility are

often discussed among others.

In DSR, the system under analysis can be either emergent (developing from

existing systems), or envisaged (as a future vision). However, in practice

envisaged systems are often constructed in an emerging sense. As a research

guideline, Hevner created a three cycle view on how to conduct DSR (Hevner,

2007). The relevance cycle comes first and addresses context variables in the

research environment, where a problem is occurring. This is followed by the design

cycle, which builds and evaluates artifacts. Finally, the rigor cycle addresses the

issue whether the created knowledge contributes to scientific theories and

methods. Wieringa (2009) later adjusted the three cycle view into one cycle and

named it the ‘Regulative Cycle’ (or Engineering Cycle). In general, this research

cycle contains four phases: first: problem investigation; second: solution design;

third: design validation and fourth: solution implementation. However, for an

envisaged concept like PI, the cycle has to be slightly adjusted as the proposed

solution cannot be implemented yet (phase four). This adjusted cycle is visualized

in figure 5, which will be used as a guideline in this research.

28

Figure 5 - DSR cycle (based on Wieringa, 2009)

The first phase analyzes the systems that are currently in place, which might be

replaced by the PI. Here, often the challenge or problem can be identified. This

was done in section 2.1, where the state of the art in logistics was discussed and

challenges are identified. Phase two examines literature about the envisaged

system, in this case the PI, which was done in section 2.2. In the next phase, the

artifact will be designed. For this research, novel critical requirements will be

created. The final phase is about evaluating and validating the designed artifact

to ensure that the created knowledge is valuable, and the problem is relevant.

The primary advantages in conducting DSR are that generating academic

knowledge can be combined with practical, relevant problem solving, while

allowing for exploratory research. Furthermore, there are no strict guidelines in

how to conduct the research or analyze it, which improves flexibility. However,

taking such an approach also has several limitations: DSR is not as accepted yet

in some areas as a valid research method, results can be abstract and therefore

it might be difficult to test the validity and generalizability. Furthermore, not

following certain guidelines might cause researchers to lose their focus on the real

problem and the system under analysis (Kotzé et al., 2015).

2. Study envisaged system

1. Analyze existing systems

4. Design validation 3. Solution

design

29

4.2 Data collection

In DSR, there are multiple ways to collect data for the research. For qualitative

studies, common methods are case studies, literature reviews, questionnaires,

interviews, action research (observation) or focus groups. Combining several

methods is possible and can enhance the validity of the study by means of data

triangulation (Denzin & Lincoln, 2011; Carter et al., 2014).

For this research, both primary and secondary data will be used. Information is

generated by a literature review complemented with multiple semi-structured

interviews and observations during 7 case studies. It is often agreed to that the

optimal amount of case studies lies between four and ten, depending on the

information quality (Eisenhardt, 1989). Mason (2010) argues that information

becomes saturated after six case studies in qualitative studies due to the concept

of diminishing returns. This implies that more data does not necessarily mean

more information. Interviewees consist out of logistics, PI, EIS experts and other

relevant stakeholders to create a holistic overview. Cases will be selected based

on several criteria, summarized in Appendix B, table 1. An overview of

interviewees/cases can also be found in Appendix B, table 2.

To perform the research effectively, the interviews will be recorded, then

transcribed and analyzed (using analytical software, Atlas.ti), following the

guidelines from Zhang and Wildemuth (2009). This implies converting the

recording to text, based on which coding trees can be created. These indicate the

keywords per question discussed, to establish critical requirements. Participants

will receive an interview guide and have the option to fill in a consent form before

the interview, while security and anonymity of data is provided by the researcher.

Based on the critical requirements, the design will be created. Both the

requirements and design will be evaluated. An overview of the interview guide can

be found in Appendix B.

30

4.3 Validation method

To enhance the rigor of this research, several strategies of Devers (1999) will be

used in the collection of data. These strategies in table 5 improve the main

research criteria of validity (internal and external), reliability and objectivity.

Criteria Strategies

Internal validity Triangulation; search for disconfirming evidence;

subject review

External validity Have a detailed description of the study context

Reliability Data archiving; skeptical peer reviews

Objectivity Journal keeping; or a combination of strategies

above

Table 5 - Strategies for enhancing research rigor (based on Devers, 1999)

To further assure the rigor and validity of the research, the created artifact in DSR

should be evaluated (Venable et al., 2016). The artifacts to be validated are the

critical requirements. This validation stage can be conducted in multiple ways. The

preferred option is to implement the design, which is impossible as PI is yet to

come into existence. For envisioned systems, expert panels, focus groups,

workshops or additional interviews can be used to evaluate the design principles.

In this research, experts in data sharing and/or PI are consulted to assess the

relevance of the problem and quality of the findings. If the validation stage

provides additional important insights, adjustments can be made to the critical

requirements and functional architecture.

4.4 Ethics and Risks

An often overlooked part in the research process is the ethics and risks involved

in conducting research. It is important to discuss and address to ensure a safe

and harmless process. As human subjects are involved in the data collection stage

for interviews, several actions should be taken. To address the potential issues,

forms on how to prevent and handle with possible ethical problems and

risks/hazards have been completed before the data collection took place. Table 3

in appendix B shortly summarizes the actions that were taken.

31

5 Analysis of case studies

To validate the literature, create critical requirements and preliminary functional

architectures, current systems have to be analyzed first. This can be done by

observing systems that stakeholders have in place and reverse engineer these,

revealing the critical requirements that make these systems work (Szirbik, 2019).

The current systems were analyzed by conducting interviews and observations.

All case studies examined general logistics processes (related to PI), and at least

four aspects of data sharing: methods, types of data, reasons, and challenges.

These are introduced below and provide a base for developing critical

requirements (coding trees can be found in appendix B). Concludingly, this chapter

answers sub-question 1 and 2.

5.1 Methods of collaboration and data sharing

This section describes the contemporary methods that are used for sharing data

and information by case study companies. Table 6 provides an overview of the

methods that were discovered per case company. Interviewees from the

consultancy firm described contemporary methods in general based on their

thorough experience.

Nr Company Category Methods used

A Global B2B distributor

luxury goods

Other stakeholders Custom built EIS

EDI

Data warehouse

B Leading consultancy

firm

Logistics + EIS + other EIS

EDI/API

Platforms

Cloud

C Leading global port Logistics + PI Legacy

EIS

API

Platforms

32

D Global LSP Logistics Integrated EIS

EDI/API

E Regional port Logistics + PI Legacy

EIS

Data hub

Platforms

F Leading consultancy

firm

Logistics + EIS + other EIS

Platforms / cloud

I Global producer in

nutrition and health

Other stakeholders EIS

Data lakes

Table 6 - Methods of data sharing used by case companies

What is most apparent is that many similar methods are used, but only the hubs

still identify using legacy systems. This is due to the fact that they are more of a

facilitator, so they have to cater to the wishes of their customers. Their customers

range from small enterprises that only use legacy systems like telephone/email to

large multinationals that integrate their systems via EDI/API connections or

platforms. Furthermore, the terms data warehouse, data hub and data lake were

used. While they seem similar, there are several differences. As it was not possible

to investigate these concepts in detail, it is decided to combine these into the term

‘platforms’. It is expected that more of these platforms will be used in the future.

This was confirmed by interviewee B:

“A general trend you see in EIS is that platforms are becoming increasingly

important, providing an opportunity to make collaboration easier. Compared to

the past, when many point-to-point integrations had to be made, you only need

to integrate once with a platform, which saves a lot of time and costs. From a PI

or logistics perspective, I think platform is the keyword.”

33

5.2 Types of data shared

Next to understand the methods that are used for data sharing, it is essential to

know what types of data stakeholders currently share, and might share in the

future PI. The first aspect that became apparent is that companies often classify

their data. Many used a distinction between strategic and tactical data, or

potentially sensitive vs. non-sensitive data. Non-sensitive data is considered to be

widely or publicly available, whereas sensitive data is better secured and more

private. As discussed, sharing of sensitive data can bring the largest benefits, but

can be commercially sensitive caused by data leakage. However, sometimes

companies are not sure about what is potentially sensitive data or not, so they

play safe and do not share much. This is one of the challenges that will be

discussed more in depth in section 5.4.

Sensitive data

Findings from case studies indicate that most data that is shared, is potentially

sensitive. Therefore, this data is often shared only with trusted suppliers,

customers or other supply chain partners. To create a more concise overview,

sensitive data types were grouped into five categories: transport information,

customer/supplier information, sales data, planning data and financial data. Table

7 below indicates what types of data belong to which category.

Category Data types

Transport info Name of LSP / carrier; container number; truck

number plate; delivery destination; delivery times

(ETA/ETD); contents of shipment

Customer/supplier info Customer names; supplier names; preferred supplier;

quality; origin; payment terms

Sales data Order info (confirmation; picking list); customer

orders; historical demand; quantities sold

Planning data Strategy; capacity; stock; demand forecast; Research

& Developments (R&D); marketing plans

Financial data Production costs; profit margins; values; purchase

costs at suppliers; specific overhead costs

Table 7 - Types of sensitive data

34

Non-sensitive data

This type of data includes data that everybody can have access to. For instance,

the dimensions and weights of a product can be found easily, for instance on the

internet or when the product is purchased. Therefore, it makes less sense to keep

this data private. Without the addition of sensitive types of data, non-sensitive

data are not valuable to others.

Category Data types

Administrative data Public records; data required by governments;

amount of employees; vessel/container GPS

Product info Dimensions; weights; goods classification (customs);

Annual report data Income statements; cash flows; sustainable practices;

balance sheets; dividends

Table 8 - Types of non-sensitive data

5.3 Reasons for data sharing

Several reasons why companies should collaborate and share data were already

discussed in the theoretical background. However, case studies provided

additional insights about the reasons for data sharing.

Reasons for sharing data

Case companies described many reasons why they share their data with suppliers,

customers, LSPs or others. It increases their market share, they can optimize their

planning, offer a better service by for instance improving quality or delivery speed,

and there are other financial benefits. These advantages all relate to the concept

of efficiency: increasing output while decreasing inputs. Interviewee A gave the

following example:

“We could share more data with for instance LSPs, to align our demand with

their capacity. Currently, LSPs always come at a specific time with a specific

capacity that was agreed upon beforehand. If we would give them real-time

insight in our data, they could keep track of the amount of packages ready for

shipment and adjust their capacity to this, improving efficiency.”

35

Another scenario was explained by interviewee E from the regional port:

“This year, we did an analysis of arrival times of ships in our port. The research

concluded that almost a third of the ships arrived more than 2 hours too early,

or more than 2 hours too late. This has a huge impact on all stakeholders

involved. Currently, we are building a data platform to share this arrival data

more effectively through the chain.”

However, data is not only shared on their own initiative to improve efficiency.

Some case companies discussed that there are many laws and regulations from

governments that require companies to share certain types of data. This is

mostly related to customs, who need information on the value and type of

products that are shipped in/out of a country, but also passenger data that is

required for crew and others that are located on a vessel, to prevent stowaways

and other illegal activities.

Reasons for not sharing data

The main reasons for not sharing (sensitive) data are related to technological

inabilities and trust. Specifically when it comes down to horizontal data sharing,

case companies do not trust their (potential) competitors to handle their data in

a way that creates benefit for both. They are afraid of a misuse of their data, so

potential benefits are lost. Furthermore, companies fear losing control over their

data. Once their data becomes available to others or via a platform, they have

concerns about security over their data and not being able to decide who has

access to their data and when. This concept is called data sovereignty. This relates

to the next reason identified for not sharing data: most companies are resistant

to change. They feel that changing the way they conduct business can be harmful

to future profitability, so are not willing to change. This can be caused by the

culture of a company, something that can prove very difficult to change.

Interviewee E identified resistance as one of the most challenging barriers towards

PI adoption:

“I agree that we should go into the direction of PI, but the main hurdles lie in

the change process, the willingness to change. We should create tangible

examples of advantages to show what is possible.”

36

5.4 Challenges in data sharing

Next to the methods, types of data and reasons, it is paramount to discuss the

challenges that companies currently experience. These are often closely related

to the reasons for not sharing data, and should be applied when designing critical

requirements and a functional architecture. Challenges are categorized in two

groups: business and technology.

Business related challenges

These type of challenges relate to the challenges experienced by people in a

company, specifically the people responsible for decision-making. As mentioned

above, there is a lot of uncertainty regarding trust, data security and control, but

also about ownership. Once data is shared (with a platform e.g.), who owns it,

and makes sure everybody benefits? Additionally, effective data sharing requires

substantial investments in IT, costing a considerable amount of time for testing,

but also money, as often expert knowledge from outside has to be brought in. This

creates a lack of visibility of short term benefits. For several companies, it was

sometimes unclear what types of data they could share or not. Interviewee A

mentioned the following:

“It remains unclear what additional types of data we should share compared to

what we do now. We do not see the short term benefits of sharing more data.”

Technology related challenges

Challenges related to technology are less related to people but more to technical

restrictions. Although the technology to share data is developing rapidly, there are

still several challenging barriers to overcome. The main challenges identified by

case companies were interoperability and complexity, where interoperability

issues are often caused by complexity. This complexity is created by the fact that

there are many different stakeholders, which all have their own information

infrastructure as there are no regulations about data standards. Several large

multinationals try to tackle this issue by requiring specific data standards from

their suppliers and customers, but these still differ between those multinationals.

37

5.5 Critical requirements

Based on the input from literature and case study interviews, critical requirements

can be established. These critical requirements, sometimes called stakeholder

requirements, determine what is required for the unit of analysis to function. The

unit of analysis in this study is a system of effective data sharing. Critical

requirements can be categorized in four segments: input/output requirements;

technology requirements; trade-off requirements and system qualification

requirements. This partitioning provides a coherent structure and helps with

establishing more rigorous and sound critical requirements (Buede & Miller, 2016).

The critical requirements will be designed using the guidelines from Buede & Miller

(2016). Table 9 describes their characteristics of sound requirements. These

characteristics will be tested on the critical requirements during the validation

phase.

Characteristics Description

Unambiguous Each requirement has only one interpretation

Understandable Each requirement is clear to those who review them

Correct The requirement states something required of the system

Concise No unnecessary information is included

Traced Each requirement can be traced to a document/statement

Traceable Derived requirements must be traceable to a higher level

Design independent Each requirement does not specify a particular solution

Verifiable Each requirement can be verified cost-effectively

Table 9 - Characteristics of sound requirements (Buede & Miller, 2016)

38

5.5.1 Input/output/control requirements

The input, output and control requirements are created from analyzing inputs,

outputs and controls from the external environment that should make the system

work. Control requirements are a special type of input, while these do not really

provide data but information that is related to policies and guidelines, bringing

certain restrictions. Based on literature and findings in case study interviews, the

following high-level requirements could be established:

- Input: The system shall be open to receive data from all sources, according

to specific data standards and data quality requirements.

As the PI is expected to be an open system, everybody should be able to contribute

their data. Many stakeholders expressed their concerns about the quality of data

from other stakeholders, which is currently often one of the main difficulties.

- Output: The system shall produce a transparent, fair and equal output

based on the relative input from each stakeholder.

Most of the interviewees mentioned their concerns about a fair output from the

system. If this can not be promised, stakeholders would be reluctant to using the

system.

- Output: The system shall produce visible, short term benefits for all

stakeholders.

Next to a fair output, interviewees required that outputs should create visible short

term benefits, otherwise the investment plan will likely be rejected.

- Control: The system shall be restricted by specific protocols and business

rules that were agreed upon by all stakeholders.

To determine what is required for stakeholders to participate, some interviewees

mentioned creating specific protocols or business rules. Dalmolen et al. (2019b)

also discuss that rules over usage conditions should be established. These should

describe how identification, authentication and authorization are addressed in the

data sharing system. Especially authorization is considered to be difficult in

technical and legal terms. It becomes paramount for the protocols to establish the

distinction between access only or user policies.

39

5.5.2 System-wide technology requirements

These requirements relate to the technical capabilities of the system as a whole,

not to the inputs, outputs or controls separately. These are closely related to the

technological challenges in current data sharing systems. A system to share data

effectively requires the following:

- The system shall provide interoperability.

Interoperability indicates that different stakeholders with different EIS should be

able to make use of the system. Interviewees expressed that it would be

impossible that one EIS would be used by all stakeholders. Therefore, there should

be no restriction to what type of EIS is used by stakeholders, although they should

have certain ISO certified functionalities, which can be included in the protocols

or business rules described above. How this could be provided is not within the

scope of this research.

- The system shall be easy and inexpensive to test, implement and use.

As the Physical Internet should be open to everybody this is an important

requirement, especially for smaller stakeholders. Systems that are very complex

and expensive to test, implement and use often run out of time and budget,

causing entire projects to fail. A well-known example from the UK is the failed NHS

Connecting for Health IT system, which was abandoned after almost ten years of

investments at an estimate cost of more than £10 (€12) billion (Syal, 2013). As

the terms ‘easy’ and ‘inexpensive’ are subject to interpretation, these are hard to

define specifically. Therefore, it is critical for each stakeholder to assess their own

situation and capabilities.

- The system shall provide a secure and fast connection with stakeholders

EIS. Data should be available in securely and in real-time to provide the

most optimal advice.

- The system shall always be accessible. The technology used could provide

cloud-access, which should be available without any disruptions.

The last two technology requirements are recommended by interviewees for any

new system that should provide real-time analysis, not just for data sharing in a

PI context. Both are developing rapidly and were not identified as potentially large

issues for the new system.

40

5.5.3 Trade-off requirements

While designing a system, there are typically trade-offs to be considered.

Traditionally, the trade-off is often between performance and costs. This is not

different to the system under analysis. However, another trade-off was also

identified, which discusses the level of centralization versus decentralization that

the system applies. Most case companies discussed that not one party should have

control over the system, indicating their preference towards a certain level of

decentralization. However, as Ambra et al. (2019) discussed, a certain degree of

centralization could bring more benefits to all stakeholders. Therefore, the right

balance should be found. Concludingly, the trade-offs are summarized below:

- The system shall not have too much power and control, but everybody

wants that all stakeholders use the advice provided by the system, as this

will bring the largest benefits. Here, the trade-off is the level of

decentralization vs. centralization.

The issue that was mentioned most by interviewees was the power structure of

the system. As it would contain a lot of sensitive data from many stakeholders,

the controlling party potentially has too much power when the system is

centralized. Therefore, decentralization might be preferred, but then trust should

be established to make sure everybody uses the advice provided by the system.

- The system shall not be too expensive to implement, but it should have

several functionalities. If the system is easy and cheap to implement,

quality and functionalities are often less.

Again, interviewees described that this is a trade-off that comprises every system

design and not just for data sharing in a PI context. Nevertheless, it is an

important trade-off to consider, as sensitive data is included. As discussed above,

the system should have several functionalities to provide security, which should

be described clearly in the PI protocols. This decreases the degree of discussion

that is possible on this trade-off.

41

5.5.4 System qualification requirements

System qualification requirements are needed for testing and validating the

system, and should be used before and during integration. Several requirements

that should be established and tested in advance:

- Companies shall first assess their own readiness for sharing data with the

system, as input data is needed for the system to function.

Readiness relates to the willingness to share data, as well as being able to adhere

to the data requirements required by the protocols and business rules (data

standards and quality). Several interviewees mentioned that they expect most

stakeholders in their supply chains to have issues regarding the willingness to

share data, as well as their technical capacities to actually share this data. Many

still use outdated systems or EIS and are reluctant to IT investments that would

make this system possible. Regarding willingness, the following was expressed:

“Even though most stakeholders know it would be beneficial to the entire

economy to share more data, they are just not willing to share as it helps their

competitors as well. This is something deeply embedded in some companies

cultures and could prove very difficult to change.”

- Trust shall be established with the system or with the controlling party of

the system (mediator).

All interviewees explained that trust is one of the most important but also difficult

requirements to build. If trust is not established, stakeholders might not share

their data, ignore the advice offered by the system or even try to misuse the

system for their own benefits. There are many options on how trust can be

established, ranging from formal contracts to more informal meetings. As this

research area is very broad, how this trust is to be established is not included in

the scope of this research, but provides an opportunity for future research.

42

6 Design

This section examines the use of a third party company in the PI network

(hereafter named ‘mediator’), where data sharing is driven by Enterprise

Information Systems. First, a general description of this proposed third party

model is provided. Second, building upon literature and the critical requirements

established in the previous chapter, a preliminary functional architecture will be

designed, using CORE, a systems engineering software tool. This architecture

describes the functions and interactions between functions of the proposed model.

6.1 Third party model

A novel business model architecture using a third party company, sometimes also

called ‘trustee’, ‘mediator’ (to be used hereafter) or ‘orchestrator’ for logistics

systems was proposed by several academics such as Dalmolen et al. (2018;

2019a) and Lee and Whang (2000). Dalmolen et al. identify the International Data

Space (IDS) architecture as one with potential for improving collaboration and

data sharing. The International Data Space (previously called Industrial Data

Space) is “a virtual data space using standards and common governance models

to facilitate the secure exchange and easy linkage of data in business ecosystems”

(Otto et al., 2016). It utilizes so-called broker service providers, clearing houses

and identity providers for data exchange and is best described by figure 6 below:

Figure 6 - International Data Space architecture (Otto et al., 2016)

43

Furthermore, the EU also recommends the use of a neutral trustee to enhance

horizontal collaboration in logistics, “to whom different stakeholders give data to

be held and analyzed, preventing the transfer of potentially sensitive commercial

data such as volumes, delivery addresses, costs, product characteristics etc.”

(Bogens and Verstrepen, 2013). However, these proposed architectures were not

addressed to align with the specific PI context, but aimed at data sharing in

traditional supply chains. Furthermore, they only address one-to-one collaboration

between one data provider and one data consumer, whereas the PI system needs

many more stakeholders to collaborate. Additionally, it remains unclear who

should share their data, when, and what data. Therefore, academics encourage

additional research on this type of model.

In the next section, a new architecture will be examined and a preliminary design

will be made in a PI context, assuring no central point of authority, as well as

opportunities for multi-lateral collaboration. To achieve this, it should consist of

multiple third party mediators that only have an advisory role. These mediators

could be focusing on a specific region (Benelux, South-East Asia e.g.) or industry

(FMCG, metal e.g.), and are able to offer recommendations on profitable/reliable

business partners, efficient routes, transportation modes or data sharing methods.

In this way, data sharing is expected to be more transparent, while companies will

be able to consult a third party when they want to establish a certain degree of

collaboration but think sensitive data might be compromised. The PI containers

can also consult these third party mediators, but in the end the final decisions

remain with the PI containers. Through formal contracts and learning, the

companies and containers can start trusting mediators they use more often. It is

yet to be established in future research whether these mediators would be physical

companies or digital entities using software solutions such as data hubs.

44

6.2 Operational concept

The model under discussion could look like figure 7 below. In short, the system

should work as following on a day-to-day basis: multiple data providers (in this

model only two are displayed for visibility, but it can be an infinite amount) share

their standard, non-sensitive data through the PI. These data providers can be the

stakeholders in the future envisaged PI as discussed in section 2.2.2. However,

the PI is unable to operate effectively with only this data. It requires additional,

potentially company sensitive data to reap the benefits from a shared network.

Therefore, companies could provide their potentially sensitive data to a trusted

mediator. This mediator then anonimizes, analyzes and optimizes all the data

combined, and provides its optimal advice to all stakeholders that provided their

data. Furthermore, it would provide this data to the PI so it can take this into

consideration while optimizing shipment decisions. The other way around, the PI

provides their data to the mediator if it needs additional data to optimize its advice

towards stakeholders. Concludingly, the functioning of the system depends on the

stakeholders, whether they use the optimal advice that is provided to them or not.

Figure 7 – Potential design of a Third Party Model (TPM)

The mediator can use a ‘recommender system’, which enables to provide

recommendations on for instance to suppliers for potential customers, and vice

versa, based on each stakeholders preferences. This helps with “resolving the

cognitive overload and the overabundance of data and information” (Kembellec et

al., 2014), as is expected in the PI. Netflix uses a recommenders system to provide

45

recommendations on what to watch next based on ones previous views, whereas

Facebook uses this system to recommend potential connections based on current

connections and/or interests. To ensure an adequate degree of decentralization,

the mediator is expected to only have an advisory role, keeping the final decision

for the stakeholders to be made. There are several exceptions to consider in

designing such a system. This is due to the fact that there are many different

stakeholders, with different strategies, objectives and requirements.

One-off shipments

For shipments that are expected to only happen once, there is no need for

supplier, customer, LSP or other stakeholders to share sensitive data with each

other. They can share standard shipment data simply through PI, which should be

sufficient. Only with repeated shipments, collaboration can become beneficial due

to collaborative planning and other reasons discussed earlier.

Logistics Service Providers

For LSPs the situation is slightly different, as they have to share data and

collaborate no matter the frequency or type of shipment, in order to establish and

operate a shared PI network. They also need to share assets (such as

warehouses). Therefore, sharing company sensitive data is often required. LSPs

are expected to become the main users of the mediator services.

Antitrust / competition laws

Direct collaboration and data sharing between competitors might be legally

restricted due to antitrust or competition laws. Competitors comply to this law if

every other stakeholder (especially end consumers) benefits from the

collaboration. As this is very dynamic, difficult to measure and establish, another

option is to share data indirectly (via a mediator), as is opted for in this paper. In

this way, no direct collaboration or data sharing is established and compliance

with antitrust and competition laws is achieved (Vargas et al., 2018).

46

6.3 Functional architectures

To describe the operational concept using a more systematic method, functional

architectures should be developed. Next to the functional architectures,

interaction diagrams will also be provided to highlight the interactions between

the functions, connecting their inputs, outputs and controls. The design of these

architectures is guided by literature, as well as the critical requirements and other

findings that resulted from case study interviews and observations. Most

importantly, the function under analysis is A.0 ‘perform mediator functions’. To

start, the wider context of function A.0 will be described first, after which three

alternatives will be provided for the first level decomposition of function A.0.

6.3.1 Function A-2: Perform PI context functions

This first functional architecture describes the widest external context of function

A.0 in the PI. As discussed before, PI can be segregated into three types of flows,

which here provide the first decomposition of the PI. Function A.0 is included under

the A-1 function: perform information flows.

Figure 8 - Functional Architecture A-2

47

Figure 9 - Interaction diagram A-2

6.3.2 Function A-1: Perform information flows

The functional architecture of A-1 describes the external context of function A.0

in more detail. Next to performing mediator functions, identifying a need for data

and processing the mediator advice are also included for performing information

flows in a Physical Internet network.

48

Figure 10 - Functional Architecture A-1

Figure 11 - Interaction diagram A-1

49

6.3.3 Function A.0: Perform mediator functions

As the mediator functions can be performed in many different ways, three

alternative options will be presented below. Each alternative has different

characteristics based on which the mediator operates.

Alternative 1

The first alternative is characterized by a more reactive approach by the mediator,

after trust is already established. To perform its functions, it expects that

stakeholders will provide the data to the mediator without need to ‘ask’ for it.

Furthermore, this alternative takes into account a decentralized approach of PI,

as the mediator is only allowed to provide optimized advice without actually

implementing it. Most of the system is controlled by PI protocols.

Figure 12 - Functional Architecture A.0 (alternative 1)

50

Figure 13 - Interaction diagram A.0 (alternative 1)

Alternative 2

The second alternative is characterized by a more proactive approach by mediator,

while still taking into account the decentralized nature of PI. The difference with

the first alternative is that the mediator actively looks for stakeholders that could

benefit from providing their data. The mediator then tries to establish trust with

these stakeholders, possibly through formal contracts. Once this is established, it

can provide their optimized advice, just like in the first alternative. Again, PI

protocols largely control the system.

51

Figure 14 - Functional Architecture A.0 (alternative 2)

Figure 15 - Interaction diagram A.0 (alternative 2)

Alternative 3

The final alternative discussed is characterized by a more centralized nature of PI,

where the mediator actually has power to implement its optimized strategy. It is

not decided whether the mediator in this alternative should take a proactive or

52

reactive approach. However, as this mediator has more power, it might be possible

that it is able to require certain types of data from all stakeholders, so trust is less

important to be established compared to the first two alternatives.

Figure 16 - Functional Architecture A.0 (alternative 3)

Figure 17 - Interaction diagram A.0 (alternative 3)

53

7 Validation

The critical requirements are evaluated with two expert workshops. One from an

academic (PI) perspective (S. Dalmolen) and the other from a business

perspective (at a leading consultancy firm), where both participants are

experienced in the area of data sharing. This validation was conducted to examine

the relevance of the problem, the characteristics of the critical requirements (using

table 9 on p.37), the feasibility of the proposed solution (model) to the problem,

and to gain additional expert insights. The functional architectures were not

discussed, as these are only designed preliminarily and need to be developed

further in future research. In the workshops, the research context and problem

statement were presented and shortly explained first. When these were clear, the

critical requirements were presented per category, on which an open discussion

started. This discussion was advanced by several questions if needed, and

provided valuable feedback about the requirements in both workshops.

7.1 Validation of critical requirements

Most importantly, both participants found the critical requirements to be

understandable and correct for a data sharing system. No extra clarifications were

needed to explain the critical requirements, but several of the requirements could

be made slightly more specific. However, according to both participants this also

depended on the scope of the research. Furthermore, the problem statement was

regarded clear and very relevant, and the requirements follow a coherent

partitioning. Nevertheless, both participants had concerns on the practical

applicability of a third party data sharing system and how it would align with

currently used networks, that are mostly closed. The first participant summarized

it as following:

“What you propose is an open infrastructure, where everybody can share data

securely and in controlled manner. The problem is relevant and the requirements

understandable and usable. However, even though the system would provide

clear benefits to all stakeholders, I am not sure whether it would take off.”

54

The reasons for this was discussed by both participants, and mainly revolve around

the issue of trust. Even though it might be technically possible to securely share

sensitive data, many stakeholders do not trust these systems yet. To achieve a

higher level of trust, more real life examples of successful data sharing systems

should be available. This also relates to the output requirement, that indicates

that short-term benefits should be visible. In addition to the issue of trust, the

participants claimed that many companies are technically not ready to share data

effectively, and IT investments will be needed. These will only be made when

again trust is established, so this is seen as a fundamental requirement.

Input/output/control requirements

These requirements were confirmed to be correct and could be used in designing

a data sharing system. However, as discussed above, some might need to be

complemented with a more detailed description. This is mainly for the control

requirement. For example, the second participant mentioned the following about

the control requirement:

“The control requirement states that specific protocols and business rules should

be used, but providing some additional information or examples on these

concepts would be recommended.”

The first participant provided remarks about including the concepts of

identification, authentication and authorization, which are now added to section

5.5.1. Furthermore, participants stressed the importance and challenge of data

standards and quality in the input requirements. Nevertheless, they remained

sceptic whether all stakeholders could deliver this. This also relates to the

technological challenges discussed in section 5.4 and the technology requirements

discussed in the next section.

55

System-wide technology requirements

In the second category, participants again confirmed the requirements, but

discussed that the concept of interoperability could use some additional

explanation and demarcation. However, it would be out of the scope of this

research to fully discuss how interoperability could be achieved. The first

participant indicated that it would be a potential future research direction for

multiple research papers, as it is a very broad research area. Regarding the second

requirement, the terms ‘easy’ and ‘inexpensive’ are used, but participants

discussed that these should be defined clearly. A discussion could be included on

compared to what the system should be easy and inexpensive, and in what stage.

The first participant provided the following comment:

“It is quite a bold statement now, which you could make more reasonable by

giving an example of an actual system implementation that was not easy and

inexpensive and therefore failed.”

Following from this comment, a real life example was added to section 5.5.2. The

advice from the first participant would be to design the system using a practice

called Continuous Integration & Continuous Delivery (often abbreviated as CICD

or CI/CD). This method provides a faster, more transparent and flexible

implementation, which would align with the terms of ‘easy’ and ‘inexpensive’.

Trade-off requirements

The critical requirements in this third category are regarded as applicable and

generally relevant to most IT systems by the participants. The first participant

clearly argued why he prefers a decentralized system over a centralized one, which

aligns with the general opinion of the interviewees:

“A centralized platform might seem great, but there are often issues about who

creates the platform, who is responsible for the costs, or who owns it. Next to

that, you have the potential danger of vendor or community lock-ins.”

Vendor or community lock-ins create dependency on a system, limiting the ability

to flexibly move to a different system without substantial effort and investments.

56

The second participant also expressed a preference towards a more decentralized

system:

“If the system would be owned by, lets say a company like to Google or

Amazon, I am sure most companies will not even consider sharing their data

with this system.”

The second trade-off, between functionalities and costs, also links back to the

previous category. In the technology requirements, it should be defined which

functionalities a system should at least have, so there is less opportunity for

discussion around this trade-off. Here, a reference could be made to ISO

qualifications of system/software quality, and these could be included in the PI

protocols and business rules. Nevertheless, this is regarded as a very relevant

requirement for the system, and often a difficult dilemma in business cases.

System qualification requirements

For the final category, the participants confirmed that without these requirements

the system would not work at all, and therefore these would be correct. There

were again some remarks on the level of detail of these requirements and how

these relate to the system directly. Like interoperability, trust is also regarded as

a very broad research area. To fully incorporate this would also be out of the scope

of the research. It is definitely an important requirement to consider, but the

participants did not see the need to go into too much detail. Advice from the first

participant was to take the IDS as an example for building trust:

“In IDS (International Data Spaces) there are different roles, which need

different certifications. Next to that, there are also software certifications

considered. This could help building trust, and maybe the government could play

an essential role in this process.”

57

8 Discussion

This study examined the process of effective data sharing in a Physical Internet

context. A proposed solution is a data sharing system using a mediator, for which

multiple critical requirements were developed. Furthermore, a preliminary design

of this system was created. The findings have implications for both theory and

practice. This chapter discusses the findings, implications, limitations of this study

and recommendations for future research.

8.1 Discussion of findings

The findings of this study can be divided into several segments. First, the findings

of case studies will be discussed, after which the critical requirements are

examined. Next, the third party data sharing model and preliminary functional

architectures are discussed, and last, the validation phase.

Case studies

Most of the findings from case studies confirmed what was found in literature,

meaning that it helps building the literature related to PI and data sharing by

confirming existing theories. No new methods of data sharing or data types were

discovered, but one finding was that mostly ports/hubs use a very wide range of

methods, as they have to adapt to their high amount of stakeholders who use a

large range of data sharing systems. Therefore, interoperability of EIS might also

depend on the amount of stakeholders, and the distribution of power. Having more

power, companies could require their less powerful stakeholders to adapt to their

system or platform. Next to these, the reasons for (not) sharing data were also

examined. This section was very important for the creation of critical

requirements, as it described the stakeholders needs. The need to share data for

regulatory purposes was discovered as additional reason during case studies.

Other reasons were similar as those discussed in the literature review. Most

challenges for data sharing were also similar to the ones identified in the literature

review, relating to either a business or technology perspective.

58

Critical requirements

The main contribution of this study are the critical requirements, which have been

discussed in section 5.5 and the validation chapter. The key findings are that a

data sharing system should be transparent, open, interoperable, easy to

implement and have a certain level of decentralization. These build on existing

evidence from literature, complemented by several novel findings of the case

studies, and can be used independent of future design decisions.

Third party data sharing model

Another contribution of this study is the exploration of a novel data sharing model

and its proposed operational concept. The proposed design is described in a

functional context, while offering several alternatives based on different design

decisions. All alternatives have specific benefits and disadvantages. Depending on

the design decisions, one alternative might be preferred over the others. However,

at this stage it is impossible to confirm which alternative is best. The first

alternative could be preferred when the system is virtual, based on a software

architecture, which makes it harder to be proactive. When the system is not just

virtual but provided by a real company, as in alternative 2, proactiveness becomes

more interesting. The third alternative depends on the PI protocols, which

establish the degree of centralization in the system. Clearly, alternative 3 would

not function in a decentralized system, whereas alternatives 1 and 2 would operate

less effectively in a centralized system. Concluding, it depends on the design

decisions which alternative fits best, or whether a different alternative should be

designed.

Validation

The validation workshop proved to be a very valuable method, as it confirmed the

relevance of the problem and the usability of the novel critical requirements. Both

participants expressed the importance of collaboration and their preference

towards a decentralized system. This contradicts the claims of Stein et al. (2019)

who argue for internalization (in-sourcing) as an alternative strategy. The paper

takes Amazon as an example that exhibits basic concepts of the PI by internalizing

59

its crucial logistics activities. A disadvantage is the possible creation of a huge

monopoly. Furthermore, as internalization only applies to the logistics parts of the

supply chain and not to the suppliers and customers, processes cannot be

optimized for the entire chain. While the paper does not make evident claims, it

does have an interesting alternative viewpoint which calls for more research in

this direction.

Based on the feedback of the validation, there is a preference for first two

alternatives of the functional architectures as these imply a decentralized system.

Furthermore, trust was seen as a fundamental requirement to establish, so it

cannot simply be assumed to exist. Therefore, the validation indicates a

preference for the second alternative to be used in further research.

8.2 Implications for theory

The findings of case studies mostly fit with theories found in literature. For

example, PI literature discusses that decentralization is needed, which was

confirmed as a requirement during case studies. Therefore, it contributes to a

clearer understanding of the topic of data sharing and builds the theoretical

support for this concept. The novel findings are the critical requirements and third

party data sharing model. These show what stakeholders require from a data

sharing system, while indicating a first step towards a system design. Therefore,

it provides additional insights for literature about data sharing and collaboration,

but also for PI. Furthermore, it examines the use of ‘mediators’, a research area

that still remains underdeveloped and therefore needs additional research. Next

to this, future research could assess which of the three alternatives should be

implemented and further develop these. Lastly, the collected data of case studies

can be used by other academics for research purposes in a similar context.

To summarize, the case studies provide many synergies with the literature

discussed first. The critical requirements fill in a research gap, as these have not

been established before for a data sharing system in a PI context.

60

8.3 Implications for practice

Although PI is still a very abstract concept to most companies, collaboration and

data sharing is actually one of the topics that companies are increasingly

investigating in. The research identifies several reasons why companies do not

share data, and tries to find a solution to this. Therefore, the practical relevance

leans towards the side of data sharing via a third party model. In practice,

companies that are interested in participating in an increased data sharing

environment could see how case companies address this issue, what best practices

are, as well as the main challenges that are currently experienced. Furthermore,

companies that successfully shared data to improve a certain process can use the

critical requirements developed in this research, to extend data sharing to improve

additional processes. Using these requirements, a specific system can be designed

for this. Next to this, practitioners can gain inspiration on how to start designing

functional architectures by analyzing the presented alternatives. Incrementally

improving more processes through more data sharing using a third party mediator

has the potential to create a stronger competitive position. The entire supply chain

benefits from increased information availability, while complying to competition

and antitrust laws.

8.4 Limitations and future research directions

As with any research, this study has several limitations, and most are linked to

future research directions. First, using a DSR methodology has the limitation that

it is mostly exploratory, creating only theoretical solutions, and not an exhaustive

list of critical requirements. Future research should therefore focus on following

the DSR cycle, so more case studies should be conducted, more critical

requirements could be discovered and validated, and more detailed designs could

be proposed and tested. Next to that, this research collected data from several

case companies in the Netherlands only. Although most of these are multinationals

and different but relevant industries were chosen, the geographic location of the

cases might limit generalizability of the research.

61

Furthermore, future research could explore and develop the research areas of

interoperability and trust in a third party data sharing context. For example, the

trade-off between centralization and decentralization provides interesting

research opportunities, as well as different technological solutions for secure data

sharing (e.g. blockchain). To help building more supporting literature, future

research should try to find additional scenarios where data sharing provided to be

helpful. These success stories can potentially convince more stakeholders to

consider sharing more data. Additionally, potential exceptions should be identified

based on which solutions can be proposed. Currently, it is not evident what would

happen when data is not accurate, available, or in the worst case, when data

leakage happens. Who can be held responsible and what are the consequences?

Lastly, a novel business model for the mediator should be explored. For example,

there should be established whether the mediator would be an actual company or

only exists as information infrastructure, and how it would generate enough

revenue to cover their costs.

To summarize, it is advised for future research to follow the DSR cycle and collect

more data, conduct more validations and design additional functional architectures

in order to further develop effective data sharing systems for the Physical Internet.

62

9 Conclusion

This thesis addresses the issue of collaboration and data sharing in a future PI

network. The main research question, how can data be shared effectively in the

PI, enabled by Enterprise Information Systems, was examined using four sub-

questions. By analyzing current data sharing systems of real case companies,

methods of data sharing and types of sensitive data were identified, answering

sub-question 1 and 2. The majority of data is shared via EIS, using EDI or API

connections. Companies consider most of their data to be potentially sensitive,

except for publicly available data such as product dimensions. Based on the

findings of the cases, the critical requirements of sub-question 3 could be created

and validated. These critical requirements are the main artifacts of this study and

contribute to both literature and practice, as these can be considered by academics

or practitioners in future research or developments. The analysis of sub-question

4 provides several examples of how such a system could be designed, depending

on the level of proactiveness and decentralization of the system. This is also novel

knowledge, but more data is needed to design this system more in depth.

To conclude, the main research question can be answered in theory only, due to

the exploratory nature of this research. In theory, data can be shared more

effectively through a platform (EIS) provided by a third party mediator, if the

system adheres to the critical requirements that were created. The theoretical

potential of a third party model was confirmed during interviews and validation,

but concerns were raised for the practical applicability. Therefore, this thesis

provides an innovative starting point towards additional research in third party

data sharing systems. Future research should be conducted to collect more data,

develop more requirements and designs, and validate these more. Once a

grounded base of literature is established, the research question could be tested

more practically, and actual implementations could be introduced.

63

10 References

van Aken, J., Chandrasekaran, A. and Halman, J. (2016) ‘Conducting and

publishing design science research: Inaugural essay of the design science

department of the Journal of Operations Management’, Journal of Operations

Management, 47, pp. 1-8.

Ambra, T., Caris, A. and Macharis, C. (2019) ‘Towards freight transport system

unification: reviewing and combining the advancements in the physical internet

and synchromodal transport research’, International Journal of Production

Research, 57(6), pp. 1606-1623.

Badzar, A. (2016) ‘Blockchain for securing sustainable transport contracts and

supply chain transparency - an explorative study of blockchain technology in

logistics’, Lund University, Service Management and Service Studies. Lund

University Libraries.

Ballot (2018) ‘Introduction in Physical Internet’ [pdf]. Available at:

https://www.pi.events/content/presentations-pdf-download (last accessed: 5

August 2019)

Ballot, E. and Fontane, F. (2008) ‘Rendement et efficience du transport: un

nouvel indicateur de performance’ [Rendement and efficiency in transport : a new

performance indicator], (No. hal-00878313).

Ballot, E., Gobet, O. and Montreuil, B. (2012) ‘Physical internet enabled open

hub network design for distributed networked operations’. In Borangiu, T.,

Thomas, A. and Trentesaux, D. (ed.) Service orientation in holonic and multi-agent

manufacturing control. Berlin, Heidelberg: Springer, pp. 279-292.

Ballot, E., Montreuil, B. and Meller, R. (2014) The physical internet. La

Documentation Française.

Bogens, M. and Verstrepen, S. (2013) CO3 position paper: added value of ICT

on logistics horizontal collaboration: identifying the need for an integrated

approach. Available at: http://www.co3-project.eu/wo3/wp-

content/uploads/2011/12/CO3-D-4-4-Added-value-of-ICT-in-Logistics.pdf (last

accessed: 5 September 2019).

64

Buede, D. M. and Miller, W. D. (2016) The engineering design of systems:

models and methods. John Wiley & Sons.

Cambra-Fierro, J. and Ruiz-Benitez, R. (2009) ‘Advantages of intermodal

logistics platforms: insights from a Spanish platform’ Supply Chain Management:

An International Journal, 14(6), pp. 418-421.

Cao, M. and Zhang, Q. (2011) ‘Supply chain collaboration: Impact on

collaborative advantage and firm performance’, Journal of Operations

Management, 29(3), pp. 163-180.

Carter, N., Bryant-Lukosius, D., DiCenso, A. and Neville, A. J. (2014), ‘The use

of triangulation in qualitative research’, Oncology nursing forum, 41(5).

Council of Supply Chain Management Professionals (CSCMP, 2013) Supply

Chain Management Terms and Glossary. Available at:

https://cscmp.org/CSCMP/Academia/SCM_Definitions_and_Glossary_of_Terms/C

CSCM/Educate/SCM_Definitions_and_Glossary_of_Terms.aspx?hkey=60879588-

f65f-4ab5-8c4b-6878815ef921 (last accessed: 2 August 2019).

Council of Supply Chain Management Professionals (CSCMP, 2015) Conference

on improving transport capacity utilization in the supply chain. Available at:

http://cscmpbenelux.org/event-report-improving-transport-capacity-utilization/

(last accessed: 15 July 2019).

Crainic, T.G. and Montreuil, B. (2016) ‘Physical internet enabled

hyperconnected city logistics’, Transportation Research Procedia, 12, pp. 383-398.

Da Xu, L. (2011) ‘Enterprise systems: state-of-the-art and future trends’, IEEE

Transactions on Industrial Informatics, 7(4), pp. 630-640.

Dalmolen, S., Bastiaansen, H., Moonen, H., Hofman, W., Punter, M. and

Cornelisse, E. (2018) ‘Trust in a multi-tenant, logistics, data sharing

infrastructure: Opportunities for blockchain technology’, In 5th International

Physical Internet Conference (IPIC 2018), pp. 299-309.

Dalmolen, S., Bastiaansen, H., Somers, E., Djafari, S., Kollenstart, M., and

Punter, M. (2019a) ‘Maintaining control over sensitive data in the Physical

Internet: Towards an open, service-oriented, network-model for infrastructural

65

data sovereignty’, In 6th International Physical Internet Conference (IPIC 2019),

pp. 296-311.

Dalmolen, S., Bastiaansen, H., Kollenstart, M. and Punter, M. (2019b)

‘Infrastructural sovereignty over agreement and transaction data (‘metadata’) in

an open network-model for multilateral sharing of sensitive data, In 40th

International Conference on Information Systems, Munich, 2019.

Denzin, N. K. and Lincoln, Y. S. (Eds.). (2011) The Sage handbook of

qualitative research. Sage.

Devers, K. J. (1999) ‘How will we know" good" qualitative research when we

see it? Beginning the dialogue in health services research’, Health services

research, 34(5.2), pp. 1153.

EFT Supply Chain & Logistics Business Intelligence and JDA Software (2019)

‘Global Logistics Report 2019’. Statista. Available at:

www.statista.com/study/63732/global-logistics-report-2019 (last accessed: 5

August 2019)

Eisenhardt, K. M. (1989) ‘Building theories from case study research’, Academy

of management review, 14(4), pp. 532-550.

El Kadiri, S., Grabot, B., Thoben, K. D., Hribernik, K., Emmanouilidis, C., Von

Cieminski, G. and Kiritsis, D. (2016) ‘Current trends on ICT technologies for

enterprise information systems’, Computers in Industry, 79, pp. 14-33.

European Union. (2013) ETP ALICE. Available at: https://www.etp-logistics.eu/

(last accessed: 10 June 2019)

Furtado, P. and Frayret, J. M. (2014) ‘Impact of resource sharing of freight

transportation’. In 1st International Physical Internet Conference, Québec City,

Canada, May.

Gregor, S. and Hevner, A. R. (2013) ‘Positioning and presenting design science

research for maximum impact’, MIS quarterly, pp. 337-355.

Hevner, A.R., March, S. T., Park, J. and Ram, S. (2004) ‘Design science in

information systems research’, MIS quarterly, 28(1), pp. 75-105.

Hevner, A. and Chatterjee, S. (2010) ‘Design science research in information

systems’, Design research in information systems, pp. 9-22.

66

Holmström, J., Ketokivi, M. and Hameri, A.P. (2009) ‘Bridging practice and

theory: a design science approach’, Decision Sciences, 40(1), pp. 65-87.

IMARC Group (2018) ‘Logistics Market: Global Industry Trends, Share, Size,

Growth, Opportunity and Forecast 2019-2024’. Available at:

https://www.imarcgroup.com/logistics-market (last accessed: 2 August 2019)

Kembellec, G., Chartron, G. and Saleh, I. (ed) (2014) Recommender systems.

London: ISTE.

Kotzé, P., van der Merwe, A. and Gerber, A. (2015) ‘Design science research

as research approach in doctoral studies’, AMCIS 2015 Proceedings.

Lindgren, R., Henfridsson, O. and Schultze, U. (2004) ‘Design principles for

competence management systems: a synthesis of an action research study’, MIS

quarterly, pp. 435-472.

Markus, M. L., Majchrzak, A. and Gasser, L. (2002) ‘A design theory for

systems that support emergent knowledge processes’, MIS quarterly, pp. 179-

212.

Mason, M. (2010) ‘Sample size and saturation in PhD studies using qualitative

interviews’, In Forum qualitative Sozialforschung / Forum: qualitative social

research, 11(3).

McAfee, A., Brynjolfsson, E., Davenport, T. H., Patil, D. J. and Barton, D.

(2012) ‘Big data: the management revolution’, Harvard business review, 90(10),

pp. 60-68.

McKinsey Global Institute (MGI, 2017) ‘Jobs lost, jobs gained: Workforce

transitions in a time of automation’. Available at:

https://www.mckinsey.com/featured-insights/future-of-work/jobs-lost-jobs-

gained-what-the-future-of-work-will-mean-for-jobs-skills-and-wages (last

accessed: 26 August 2019)

Meyer, T. and Hartmann, E. (2019) ‘The bumpy road to the adoption of the

Physical Internet – Overcoming barriers from a stakeholder perspective’, In 6th

International Physical Internet Conference, IPIC 2019, pp. 406-419.

67

Montreuil, B. (2009–2012) ‘Physical Internet Manifesto: Globally Transforming

the Way Physical Objects are Handled, Moved, Stored, Realized, Supplied and

Used’, Versions 1.1 to 1.11.

Montreuil, B., Meller, R.D. and Ballot, E. (2010) 'Towards a Physical Internet:

the impact on logistics facilities and material handling systems design and

innovation', Progress in material handling research. pp. 305–327.

Montreuil, B. (2011) ‘Toward a Physical Internet: meeting the global logistics

sustainability grand challenge’, Logistics Research, 3(2-3), pp. 71-87.

Montreuil, B., Meller, R. D. and Ballot, E. (2013) ‘Physical internet foundations’,

In Borangiu, T., Thomas, A. and Trentesaux, D. (ed.) Service orientation in holonic

and multi-agent manufacturing control. Berlin, Heidelberg: Springer, pp. 151-166.

O’Brien, J.A. (2003) Introduction to information systems: essentials for the e-

business enterprise. Boston, MA: McGraw-Hill.

Olson, D. L. and Kesharwani, S. (2009) Enterprise information systems:

contemporary trends and issues. World Scientific.

Otto, B., Auer, S., Cirullies, J., Jürjens, J., Menz, N., Schon, J. and Wenzel, S.

(2016) ‘Industrial data space: digital sovereignity over data’, Fraunhofer White

Paper.

Panetto, H., Zdravkovic, M., Jardim-Goncalves, R., Romero, D., Cecil, J. and

Mezgár, I. (2016) ‘New perspectives for the future interoperable enterprise

systems’, Computers in Industry, 79, pp. 47-63.

Pearson, K.E. and Saunders, C.S. (2009) Strategic Management of Information

Systems. 5th edn. John Wiley & Sons.

Purao, S. (2002) ‘Design research in the technology of information systems:

Truth or dare’, GSU Department of CIS Working Paper, 34.

Rashid, M.A., Hossain, L. and Patrick, J.D. (2002) ‘The evolution of ERP

systems: A historical perspective’, In Nah, F.F.H. (ed.) Enterprise Resource

Planning: Solutions and Management. IGI Global, pp. 35-50.

Romero, D. and Vernadat, F. (2016) ‘Enterprise information systems state of

the art: Past, present and future trends’, Computers in Industry, 79, pp. 3-13.

68

Seidel, S., Chandra Kruse, L., Székely, N., Gau, M. and Stieger, D. (2018)

‘Design principles for sensemaking support systems in environmental

sustainability transformations’, European Journal of Information Systems, 27(2),

pp. 221-247.

Speranza, M.G. (2018) ‘Trends in transportation and logistics’, European

Journal of Operational Research, 264(3), pp. 830-836.

Statista (2019) ‘Enterprise software’. Available at:

https://www.statista.com/study/20237/business-software-statista-dossier (last

accessed: 22 August 2019)

Stein, S., Prandtstetter, M., Starkl, F., and Reiner, G. (2019) ‘Is collaboration

necessary? Or: Might the Physical Internet be implemented by internalization?’,

In 6th International Physical Internet Conference, IPIC 2019, pp. 286-295.

Syal, R. (2013) The Guardian. Available at:

https://www.theguardian.com/society/2013/sep/18/nhs-records-system-10bn

(last accessed: 21 November 2019).

Szirbik, N. B. (2019) Design Science Research for Technology and Operations

Management. University of Groningen, the Netherlands.

Treiblmaier, H., Mirkovski, K. and Lowry, P.B. (2016) 'Conceptualizing the

physical internet: Literature review, implications and directions for future

research', Annual European Research Seminar, (November), pp. 1–17.

Treiblmaier, H. (2019) ‘Combining Blockchain Technology and the Physical

Internet to Achieve Triple Bottom Line Sustainability: A Comprehensive Research

Agenda for Modern Logistics and Supply Chain Management’, Logistics, 3(1), pp.

10.

Vargas, A., Patel, S. and Patel, D. (2018) ‘Towards a business model

framework to increase collaboration in the freight industry’ Logistics, 2(4), pp. 22.

Venable, J., Pries-Heje, J. and Baskerville, R. (2016) ‘FEDS: a framework for

evaluation in design science research’, European Journal of Information Systems,

25(1), pp. 77-89.

Weiss, G. (2013) Multiagent Systems. 2nd edn. Cambridge, MA: The MIT Press.

69

Wieringa, R. (2007) Writing a report about design research, February, pp. 1-

9. (PDF provided by the university of Groningen).

Wieringa, R. and Heerkens, H. (2007) ‘Designing requirements engineering

research’, Fifth International Workshop on Comparative Evaluation in

Requirements Engineering, October, pp. 36-48.

Wieringa, R. (2009) ‘Design science as nested problem solving’, Proceedings

of the 4th international conference on design science research in information

systems and technology, May, pp. 8.

Wieringa, R., Heerkens, H. and Regnell, B. (2009) ‘How to write and read a

scientific evaluation paper’, 17th IEEE International Requirements Engineering

Conference, August, pp. 361-364.

Wooldridge, M. (2009) An introduction to multiagent systems. 2nd edn.

Chichester: John Wiley & Sons.

World Economic Forum (WEF, 2018) ‘The Future of Jobs Report 2018’. Available

at: https://www.weforum.org/reports/the-future-of-jobs-report-2018 (last

accessed: 26 August 2019)

Zacharewicz, G., Diallo, S., Ducq, Y., Agostinho, C., Jardim-Goncalves, R.,

Bazoun, H., Wang, Z. and Doumeingts, G. (2017) ‘Model-based approaches for

interoperability of next generation enterprise information systems: state of the art

and future challenges’, Information Systems and e-Business Management, 15(2),

pp. 229-256.

Zhang, Y. and Wildemuth, B.M. (2009) ‘Qualitative analysis of content’,

Applications of social research methods to questions in information and library

science, 308, pp. 319-330.

Zijm, H., Klumpp, M., Regattieri, A. and Heragu, S. (2019) Operations,

Logistics and Supply Chain Management. Springer.

70

11 Appendices

Appendix A – PESTLE analysis logistics industry

Elements Analysis

Political As logistics is a global industry, many different political

situations should be accounted for. Currently, there is a lot of

uncertainty resulting from the Brexit case and the tense

relation between China and the US.

Economic Over the past decades, the industry has been growing

steadily. Volumes are expected to keep increasing, but profits

might decline relatively as green transportation has to be used

more, often being more expensive compared to conventional

shipping methods.

Social Social pressure for transparent, sustainable practices but

increasing demand for cheap logistics services, creating a

dichotomy which can be difficult for companies to address.

Technological Many opportunities to develop the industry, ranging from

more efficient contemporary fuel use to automation and

intelligent use of new technologies like AI and IoT.

Legal Next to basic legal requirements which differ across countries,

the industry is increasingly involved in legal issues as

governments have to regulate emissions and pollution.

Climate agreements cause logistics providers to innovate and

develop sustainable solutions for future transport.

Environmental One of the biggest threats to the current industry, which is

inherently bad for the environment. The main issue is the

pollution that is caused by logistics processes.

Table A1 – PESTLE analysis logistics industry

71

Appendix B – Data collection

Category Criteria

Logistics Relevant work experience in a logistics company / LSP

or logistics function in different industry

Physical Internet Extensive knowledge of the PI concept; awareness of

recent developments and research directions

EIS Knowledge and relevant work experience with EIS and

/ or data sharing

Other stakeholders Potential participants in a future PI network; frequent

users of (container) shipping; potential early adopter

of PI

Table B1 – Criteria for selecting case studies

Nr Company Interviewee Category Duration

A Global B2B

distributor luxury

goods

Director e-commerce

& wholesales

Other

stakeholders

+- 1 hour

B Leading

consultancy firm

Sr. manager SAP IBP

cap. lead Europe

Logistics +

EIS + other

27:42

C Leading global

port

Manager Business

Analytics and

Intelligence

Logistics + PI 45:10

D Global LSP /

transportation

company

Managing Director

Field Planning &

Engineering Europe

Logistics 34:12

E Regional port Manager Digital

Innovation

Logistics + PI 50:34

F Leading

consultancy firm

Director SAP Supply

Chain - Business Lead

Logistics +

EIS

+- 30 min

+ 25:29

I Global producer

in nutrition and

health

Director Global

Logistics

Other

stakeholders

45:14

Table B2 – Case study companies

72

Potential hazards Action

Breach of personal or company data

(interview recording)

Secure, encrypted storage of data;

anonymous storage of data and

interview recordings and transcripts

Confusion/insecurity of interviewees Providing an interview guide with

consent form to enhance clarity,

opportunities for questions

Accidents during transportation Responsible travelling; no risks taken;

timely planning

Involvement of vulnerable individuals /

groups in data collection

No involvement of these persons

Harm during company visits for

interviews and observations

Responsible behavior at visited

companies; wearing of safety

equipment if necessary (shoes, vest,

helmet, safety glasses etc.)

Table B3 – Ethics and risks

73

Interview guide – information sheet

Collaboration in the Physical Internet:

An exploration of third party data sharing enabled by Enterprise Information

Systems

Introduction

Dear interviewee,

With great gratitude, this interview guide is shared with you. First of all, thank

you for volunteering to participate in this research. Your input will create valuable

information to this research for my Master Thesis in Technology & Operations

Management. This document will provide you with all necessary information

needed before the interview will be conducted.

As the thesis will be written in English, this is the preferred language for the

interview. However, if you wish to do the interview in Dutch, this would be no

problem. Please notify this before, at the start or during the interview. In that

case, I will provide you with a Dutch version of the interview guide.

This page contains an outline of the interview guide, as well as a description of

the interview procedure. On page 2, you can find the context of the research,

which shortly explains what the research is about. Page 3 contains a consent form.

Please read it carefully, and send back a signed version when you agree with all

the statements. On page 4 and 5, the interview scheme is provided. Here, the

main questions are indicated, so you have the opportunity to prepare for the

interview. There might be some deviation from these questions when needed, to

ensure a smooth process and quality of information.

Procedure

After a short introduction, the audio recording will be started with your permission.

This recording will only be used for transcribing the interview so it can be used for

the data analysis, under complete confidentiality. From this point onwards, the

74

‘official’ interview commences. It begins by restating that the interviewee agrees

to the consent form. If agreed upon, the questions will be asked.

In case you want to skip a certain question, this is not a problem and can be

notified. If you feel at any moment to withdraw from the interview, this can also

be done without giving any reasons and will not have any consequences.

When all questions have been answered to a satisfactory extent, there will be an

option for you to ask additional questions or give remarks that might have come

up during the interview. Furthermore, feedback about the interview can be

provided. When agreed upon, the audio recording will then be ended and the

interview is finished. The interview is expected to take about 30-45 minutes. If

any valuable managerial insights are discovered in the research, a copy can be

requested for your use.

Research context

This thesis research is about a relatively new concept in logistics: the Physical

Internet (PI). The aim of this concept is to improve efficiency in logistics, which

in turn promotes the sustainability of the systems served by PI. It uses smart,

green, modular containers, combined with an interconnected network of

warehouses, transport modes, and information sharing. Key requirements of PI

are (ADOM):

- Automation: processes should be automated as much as possible (truck

loading, information sharing, container decoupling, transportation etc).

- Decentralization: There is no one governing body that regulates the

system. Containers have the autonomy to determine their most efficient

route.

- Openness: the PI is open to everybody, and information should be

available when needed.

- Modularity: Goods can be packed in smart containers of many different

sizes, which can be interlocked/combined into one shipping unit (like a 20ft

container or TEU).

75

Pictures can say more than a thousand words, so videos can say even more.

Therefore, if you want to know more about the Physical Internet, you can open

the following link to watch a short YouTube video that describes this concept.

The Physical Internet - YouTube link

(https://www.youtube.com/watch?v=PJyzFaKOXnY&feature=youtu.be)

As information sharing is one of the main requirements of PI, collaboration efforts

and trust between stakeholders should be improved to ensure this. Especially

during times where data privacy and security becomes more apparent. The

objective is therefore to explore how to handle this expected ‘data explosion’.

A novel business model architecture that was proposed by several academics will

be examined. This model uses data sharing through a third party mediator

company. The mediator has to be trusted by all involved stakeholders, and gives

recommendations (based on a recommenders system) on information flows and

business partners that are optimal for the specific company, while having no

authority. This business model is part of the discussion.

Resultingly, the main research question is: how can data be shared effectively in

the Physical Internet, enabled by Enterprise Information Systems?

Thank you for reading the information sheet about this research. Hopefully

everything was clear up to this moment. If not, do not hesitate to contact me with

any questions you might have. If you are happy to participate, please continue to

the consent form on the next page.

76

Participant consent form for interviews Interviewee nr: _____

Before participating in the interview, please read the statements below and

confirm these by ticking the box. If all are confirmed, please sign below.

Statement Tick

1. I voluntarily participate in this interview.

2. I understand that the researcher can use (parts of) this interview for

his research.

3. I understand that this research will be publicly available.

4. I understand that I can withdraw at any time from the interview

without reason and consequences, even after signing this form.

5. I understand that I can withdraw my responses up until two weeks

after the interview. The data will then be terminated.

6. I understand that I am free to decline any question that I do not wish

to answer.

7. I confirm that I understand the information provided in the

information sheet above.

8. I have had the opportunity to ask questions about the information

sheet above.

9. I agree that the interview will be audio recorded for transcription

purposes.

10. I understand that the researcher provides complete security,

confidentiality and anonymity of all my data.

11. I understand that the anonymized data will be retained and can be

used for future research in this field.

Participant name: _____________________

Participant signature: Date: _____________

Researcher name: Mart Kreijkes

Researcher signature: Date: _____________

E-Mail: [email protected] Phone: +31614712504

77

Main interview questions

General / warm-up questions

1. Could you shortly introduce yourself?

a. Background

b. Education

c. Expertise

d. Work experience

e. Years in industry/function

2. Could you also introduce the company you work for? (if relevant)

a. Industry / market

3. What is your current role and responsibilities within this company?

a. Role

b. Responsibilities

c. Years in this role

4. Have you heard before about the concept of PI?

a. If yes, when, how, why?

b. If no, show video / describe the concept.

5. What are your first thoughts about this concept?

Specific questions:

Logistics companies (for logistics processes knowledge):

- Start with warm-up questions above.

- What do you see as important/recent developments in the logistics

industry?

- What challenges are there still?

- Could you describe the regular logistics processes for a shipment, going

from supplier to customer? (physical as well as information flows)

o What types of logistics data are you currently sharing with other

companies?

o Is data sharing done frequently, and how is this currently done

(which EIS?)?

o What issues do you currently experience related to data sharing?

78

o What kind of data do you need from others to work efficiently?

- How important is data security to you (your company)?

o Do you sometimes feel competitors/customers might have access to

valuable data via shipments?

- In what ways can trust be enhanced with other companies that you

collaborate with?

- Any experience with 3rd party companies/mediators for collaboration with

other companies?

- Would this model be something you would consider using?

- Would you trust the PI (container) to make optimal decisions for you?

Enterprise Information Systems (EIS) experts:

- Start with warm-up questions above.

- What systems (do you currently have that/are often used that) could

describe as EIS?

- What is your view on the flexibility of (these) EIS?

- What are the current best practices of EIS?

o What are their core abilities compared to ‘older’ EIS?

o How is data sharing addressed through EIS?

- What aspects of PI do you think touch (these) EIS?

- To what extend would it be possible to adjust (these) EIS to align with PI?

- What would the challenges be in this adjustment?

- Can you think of any developments that might help improve collaboration?

- How important is data security to you (your company)?

- In what ways can trust be enhanced with other companies that need your

data?

- Do you have any experience with third party companies regarding data

sharing?

o If yes, how do you feel about this?

o If no, do you think this might be helpful?

- What kind of EIS could be used for this third party type of collaboration?

79

Other stakeholders (customers/suppliers/hubs, retailers e.g.):

- Start with warm-up questions above.

- Could you describe your current logistics processes for a shipment?

o What types of logistics data are you currently sharing with other

companies?

o Is data sharing done frequently / how is this currently done (which

EIS?)?

o What are the reasons for sharing this data?

o What issues do you currently experience related to data sharing?

o What kind of data do you need from others to work efficiently?

- What are the latest developments you made in your logistics (digitally)?

o Anything related to Automation, Decentralization, Openness or

Modularity?

o To what extend did your EIS enable or hold back these

developments?

- How do you ensure smooth collaboration with other companies? (in logistics

context)

o In what ways do you improve collaboration?

o Do you have any experience with third party mediators?

- Would you trust the PI (container) to make optimal decisions for you?

o Would advise from a trusted third party company help with this?

Closure: Thank you for all the valuable answers, this will be very helpful for the

research. Is there anything else you would like to add before we end?

80

Appendix C - Code trees

Figure C1 - Coding tree I - methods of data sharing

Figure C2 - Coding tree II - types of data shared

81

Figure C3 - Coding tree III - reasons for sharing data (or not)

Figure C4 - Coding tree IV - challenges in data sharing