Abstract
Privacy, confidentiality, and information security constitute basic requirements for the design and implementation of IT-enabled platforms for information sharing such as the I-Choose platform described in this book. In this chapter, we discuss privacy and security issues from an organizational perspective along three dimensions: ownership, access rights, and data quality. The challenge of protecting the confidentiality and privacy of data lies in developing effective and transparent security policies and protocols that govern access to and integrity of both proprietary and public information. Our findings highlight that these challenges stem from the complexity of the information chain and the heterogeneity of stakeholders and data sources in the sustainable coffee supply chain. As a result, addressing these issues will require not only technologically sophisticated solutions but also creation of governance structures and adoption of appropriate business practices. In this chapter we propose five management and policy solutions for mitigating the privacy, confidentiality, and security challenges that confront successful implementation of I-Choose platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Examples of such interorganizational systems include efforts on Electronic Data Interchange (EDI), Electronic Markets, and Supply Chain Management Applications.
- 2.
Detailed description of data collection process can be found in documentations published by third-party certification bodies. For example, for FLO, refer to http://www.flocert.net/fairtrade-services/fairtrade-certification/how-it-works
- 3.
The seven major coffee certification initiatives: FLO, UTZ Good Inside, 4C, RAN, Organic, C.A.F.E Practices, and Nespresso AAA (Panhuysen & van Reenen, 2012).
- 4.
- 5.
- 6.
- 7.
Currently, only three out of seven major coffee certifications require specific educational background for their auditor. See Panhuysen and van Reenen (2012) or the International Trade Center (http://legacy.intracen.org/marketanalysis/Default.aspx).
- 8.
Based on the interviews with stakeholders in sustainable certified coffee and literary explorations.
References
Buneman, P. (2013). The providence of provenance. In G. Gottlob, G. Grasso, D. Olteanu, & C. Schallhart (Eds.), Big data (Vol. 7968, pp. 7–12). Berlin, Germany/Heidelberg, NY: Springer. Retrieved from http://link.springer.com/10.1007/978-3-642-39467-6_3
Buneman, P., & Davidson, S. B. (2010, September 1). Data provenance – The foundation of data quality. Retrieved from http://www.sei.cmu.edu/measurement/research/upload/Davidson.pdf
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69–104.
Choudhury, V., Hartzel, K. S., & Konsynski, B. R. (1998). Uses and consequences of electronic markets: An empirical investigation in the aircraft parts industry. MIS Quarterly, 22(4), 471–507.
Clemons, E. K., & Row, M. C. (1993). Limits to interfirm coordination through information technology: Results of a field study in consumer packaged goods distribution. Journal of Management Information Systems, 10(1), 73–95.
D’Aubeterre, F., Singh, R., & Iyer, L. (2008). A semantic approach to secure collaborative inter- organizational eBusiness processes. Journal of the Association for Information Systems, 9(3), 231–266.
Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196–207. http://doi.org/10.1016/j.cose.2009.09.002.
Fabian, B., Kunz, S., Müller, S., & Günther, O. (2013). Secure federation of semantic information services. Decision Support Systems, 55(1), 385–398. http://doi.org/10.1016/j.dss.2012.05.049.
Healy, P. M., & Palepu, K. G. (2001). Information asymmetry, corporate disclosure, and the capital markets: A review of the empirical disclosure literature. Journal of Accounting and Economics, 31(1–3), 405–440. http://doi.org/10.1016/S0165-4101(01)00018-0.
Huynh, T. D., Jennings, N. R., & Shadbolt, N. (2004). Developing an integrated trust and reputation model for open multi-agent systems (pp. 65–74). Presented at the 7th International Workshop on Trust in Agent Societies. Retrieved from http://eprints.soton.ac.uk/259557/
Jarman, H., Luna-Reyes, L. F., Zhang, J., Whitmore, A., Picazo-Vela, S., Andersen, D. L., et al. (2011). I-Choose: Consumer choice, digital government, and sustainability in North America. Presented at the APPAM Research Conference, Washington, DC.
Kagal, L., Finin, T., & Joshi, A. (2003). A policy based approach to security for the semantic web. In International semantic web conference (Vol. 2870, pp. 402–418). Sanibel Island, FL: Springer.
Klein, R., & Rai, A. (2009). Interfirm strategic information flows in logistics supply chain relationships. MIS Quarterly, 33(4), 735–762.
Leach, J. (2003). Improving user security behaviour. Computers & Security, 22(8), 685–692. http://doi.org/10.1016/S0167-4048(03)00007-5.
Lim, J. S., Chang, S., Maynard, S., & Ahmad, A. (2009). Exploring the relationship between organizational culture and information security culture. In Australian information security management conference (p. 12). Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1011&context=ism
Luna-Reyes, L. F., Zhang, J., Whitmore, A., Jarman, H., Picazo-Vela, S., Andersen, D. L., et al. (2014). Full information product pricing: An information strategy for harnessing consumer choice to create a more sustainable world. Communications of the Association for Information Systems, 34(1), 637–654.
Malhotra, A., Gosain, S., & Sawy, O. A. E. (2005). Absorptive capacity configurations in supply chains: Gearing for partner-enabled market knowledge creation. MIS Quarterly, 29(1), 145–187.
McLeod, A. J., Jr., Carpenter, D. R., & Clark, J. G. (2008). Measuring success in interorganizational information systems: A case study. Communications of AIS, 22(1), 617–634.
O’Hara, K., Alani, H., Kalfoglou, Y., & Shadbolt, N. (2004). Trust strategies for the semantic web. Presented at the Workshop on Trust, Security, and Reputation on the Semantic Web, 3rd International (ISWC’04). Retrieved from http://eprints.soton.ac.uk/260029/
Pahnila, S., Siponen, M., & Mahmood, A. (2007). Employees’ behavior towards IS security policy compliance. In 40th Annual Hawaii International Conference on System Sciences, 2007. HICSS 2007 (p. 156b). http://doi.org/10.1109/HICSS.2007.206.
Panhuysen, S., & van Reenen, M. (2012). Coffee barometer 2012. Report, The Hague, Netherlands. Retrieved from http://www.teacoffeecocoa.org/tcc/Media/Files/Coffee-Barometer-2012
Rindfleisch, T. C. (1997). Privacy, information technology, and health care. Communications of the ACM, 40(8), 92–100. http://doi.org/10.1145/257874.257896.
Saint-Germain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management Journal, 39(4), 60–66.
Sayogo, D. S. (2013). Modeling incentives to disclose: Smart disclosure policy, private sector transparency and demanded disclosure. Dissertation, University at Albany State University of New York, Albany, NY.
Sayogo, D. S., & Pardo, T. A. (2013). Exploring the determinants of scientific data sharing: Understanding the motivation to publish research data. Government Information Quarterly, 30(Supplement 1), S19–S31. http://doi.org/10.1016/j.giq.2012.06.011.
Smith, G. E., Watson, K. J., Baker, W. H., & Pokorski, J. A., II. (2007). A critical balance: Collaboration and security in the IT-enabled supply chain. International Journal of Production Research, 45(11), 2595–2613. http://doi.org/10.1080/00207540601020544.
Steinfield, C., Markus, M. L., & Wigand, R. T. (2011). Through a glass clearly: Standards, architecture, and process transparency in global supply chains. Journal of Management Information Systems, 28(2), 75–108. http://doi.org/10.2753/MIS0742-1222280204.
Stiglitz, J. E. (2000). The contributions of the economics of information to twentieth century economics. The Quarterly Journal of Economics, 115(4), 1441–1478. http://doi.org/10.1162/003355300555015.
Strong, D. M., Lee, Y. W., & Wang, R. Y. (1997). 10 potholes in the road to information quality. Computer, 30(8), 38–46.
Sunstein, C. (2012, March 30). Informing consumers through smart disclosure. Retrieved from http://www.whitehouse.gov/blog/2012/03/30/informing-consumers-through-smart-disclosure
Sutherland, W. J., Clout, M., Côté, I. M., Daszak, P., Depledge, M. H., Fellman, L., et al. (2010). A horizon scan of global conservation issues for 2010. Trends in Ecology & Evolution, 25(1), 1–7. http://doi.org/10.1016/j.tree.2009.10.003.
Tayi, G. K., & Ballou, D. P. (1998). Examining data quality. Communications of the ACM, 41(2), 54–57.
Thaler, R. H. (2013, May). Smart disclosure: The regulatory future. Presented at the Boulder Summer Conference on Consumer Financial Decision Making, Boulder, Colorado. Retrieved from http://leeds.colorado.edu/event/bouldersummerconference#2012conference
Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven, CT: Yale University Press.
Thaler, R. H., & Tucker, W. (2013, February). Smarter information, smarter consumers. Harvard Business Review. Retrieved from http://hbr.org/2013/01/smarter-information-smarter-consumers
Thompson, R. C. (2004). Lost at sea: Where is all the plastic? Science, 304(5672), 838. http://doi.org/10.1126/science.1094559.
Wang, R. Y. (1998). A product perspective on total data quality management. Communications of the ACM, 41(2), 58–65. http://doi.org/10.1145/269012.269022.
Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems, 12(4), 5–33.
Zhang, C., & Li, S. (2006). Secure information sharing in internet-based supply chain management systems. Journal of Computer Information Systems, 46(4), 18–24.
Zimmerman, A. (2007). Not by metadata alone: The use of diverse forms of knowledge to locate data for reuse. International Journal on Digital Libraries, 7(1), 5–16.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Sayogo, D.S., Najafabadi, M.M., Tayi, G.K., Pardo, T.A. (2016). Privacy, Confidentiality, and Security Challenges for Interoperable Data Platforms in Supply Chains. In: Jarman, H., Luna-Reyes, L. (eds) Private Data and Public Value. Public Administration and Information Technology, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-319-27823-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-27823-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27821-6
Online ISBN: 978-3-319-27823-0
eBook Packages: Economics and FinanceEconomics and Finance (R0)