Advertisement

Privacy, Confidentiality, and Security Challenges for Interoperable Data Platforms in Supply Chains

  • Djoko S. SayogoEmail author
  • Mahdi Mirdamadi Najafabadi
  • Giri K. Tayi
  • Theresa A. Pardo
Chapter
Part of the Public Administration and Information Technology book series (PAIT, volume 26)

Abstract

Privacy, confidentiality, and information security constitute basic requirements for the design and implementation of IT-enabled platforms for information sharing such as the I-Choose platform described in this book. In this chapter, we discuss privacy and security issues from an organizational perspective along three dimensions: ownership, access rights, and data quality. The challenge of protecting the confidentiality and privacy of data lies in developing effective and transparent security policies and protocols that govern access to and integrity of both proprietary and public information. Our findings highlight that these challenges stem from the complexity of the information chain and the heterogeneity of stakeholders and data sources in the sustainable coffee supply chain. As a result, addressing these issues will require not only technologically sophisticated solutions but also creation of governance structures and adoption of appropriate business practices. In this chapter we propose five management and policy solutions for mitigating the privacy, confidentiality, and security challenges that confront successful implementation of I-Choose platform.

Keywords

Privacy Confidentiality Information security Data quality 

References

  1. Buneman, P. (2013). The providence of provenance. In G. Gottlob, G. Grasso, D. Olteanu, & C. Schallhart (Eds.), Big data (Vol. 7968, pp. 7–12). Berlin, Germany/Heidelberg, NY: Springer. Retrieved from http://link.springer.com/10.1007/978-3-642-39467-6_3
  2. Buneman, P., & Davidson, S. B. (2010, September 1). Data provenance – The foundation of data quality. Retrieved from http://www.sei.cmu.edu/measurement/research/upload/Davidson.pdf
  3. Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69–104.Google Scholar
  4. Choudhury, V., Hartzel, K. S., & Konsynski, B. R. (1998). Uses and consequences of electronic markets: An empirical investigation in the aircraft parts industry. MIS Quarterly, 22(4), 471–507.CrossRefGoogle Scholar
  5. Clemons, E. K., & Row, M. C. (1993). Limits to interfirm coordination through information technology: Results of a field study in consumer packaged goods distribution. Journal of Management Information Systems, 10(1), 73–95.CrossRefGoogle Scholar
  6. D’Aubeterre, F., Singh, R., & Iyer, L. (2008). A semantic approach to secure collaborative inter- organizational eBusiness processes. Journal of the Association for Information Systems, 9(3), 231–266.Google Scholar
  7. Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196–207. http://doi.org/10.1016/j.cose.2009.09.002.CrossRefGoogle Scholar
  8. Fabian, B., Kunz, S., Müller, S., & Günther, O. (2013). Secure federation of semantic information services. Decision Support Systems, 55(1), 385–398. http://doi.org/10.1016/j.dss.2012.05.049.CrossRefGoogle Scholar
  9. Healy, P. M., & Palepu, K. G. (2001). Information asymmetry, corporate disclosure, and the capital markets: A review of the empirical disclosure literature. Journal of Accounting and Economics, 31(1–3), 405–440. http://doi.org/10.1016/S0165-4101(01)00018-0.CrossRefGoogle Scholar
  10. Huynh, T. D., Jennings, N. R., & Shadbolt, N. (2004). Developing an integrated trust and reputation model for open multi-agent systems (pp. 65–74). Presented at the 7th International Workshop on Trust in Agent Societies. Retrieved from http://eprints.soton.ac.uk/259557/
  11. Jarman, H., Luna-Reyes, L. F., Zhang, J., Whitmore, A., Picazo-Vela, S., Andersen, D. L., et al. (2011). I-Choose: Consumer choice, digital government, and sustainability in North America. Presented at the APPAM Research Conference, Washington, DC.Google Scholar
  12. Kagal, L., Finin, T., & Joshi, A. (2003). A policy based approach to security for the semantic web. In International semantic web conference (Vol. 2870, pp. 402–418). Sanibel Island, FL: Springer.Google Scholar
  13. Klein, R., & Rai, A. (2009). Interfirm strategic information flows in logistics supply chain relationships. MIS Quarterly, 33(4), 735–762.Google Scholar
  14. Leach, J. (2003). Improving user security behaviour. Computers & Security, 22(8), 685–692. http://doi.org/10.1016/S0167-4048(03)00007-5.CrossRefGoogle Scholar
  15. Lim, J. S., Chang, S., Maynard, S., & Ahmad, A. (2009). Exploring the relationship between organizational culture and information security culture. In Australian information security management conference (p. 12). Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1011&context=ism
  16. Luna-Reyes, L. F., Zhang, J., Whitmore, A., Jarman, H., Picazo-Vela, S., Andersen, D. L., et al. (2014). Full information product pricing: An information strategy for harnessing consumer choice to create a more sustainable world. Communications of the Association for Information Systems, 34(1), 637–654.Google Scholar
  17. Malhotra, A., Gosain, S., & Sawy, O. A. E. (2005). Absorptive capacity configurations in supply chains: Gearing for partner-enabled market knowledge creation. MIS Quarterly, 29(1), 145–187.Google Scholar
  18. McLeod, A. J., Jr., Carpenter, D. R., & Clark, J. G. (2008). Measuring success in interorganizational information systems: A case study. Communications of AIS, 22(1), 617–634.Google Scholar
  19. O’Hara, K., Alani, H., Kalfoglou, Y., & Shadbolt, N. (2004). Trust strategies for the semantic web. Presented at the Workshop on Trust, Security, and Reputation on the Semantic Web, 3rd International (ISWC’04). Retrieved from http://eprints.soton.ac.uk/260029/
  20. Pahnila, S., Siponen, M., & Mahmood, A. (2007). Employees’ behavior towards IS security policy compliance. In 40th Annual Hawaii International Conference on System Sciences, 2007. HICSS 2007 (p. 156b). http://doi.org/10.1109/HICSS.2007.206.
  21. Panhuysen, S., & van Reenen, M. (2012). Coffee barometer 2012. Report, The Hague, Netherlands. Retrieved from http://www.teacoffeecocoa.org/tcc/Media/Files/Coffee-Barometer-2012
  22. Rindfleisch, T. C. (1997). Privacy, information technology, and health care. Communications of the ACM, 40(8), 92–100. http://doi.org/10.1145/257874.257896.CrossRefGoogle Scholar
  23. Saint-Germain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management Journal, 39(4), 60–66.Google Scholar
  24. Sayogo, D. S. (2013). Modeling incentives to disclose: Smart disclosure policy, private sector transparency and demanded disclosure. Dissertation, University at Albany State University of New York, Albany, NY.Google Scholar
  25. Sayogo, D. S., & Pardo, T. A. (2013). Exploring the determinants of scientific data sharing: Understanding the motivation to publish research data. Government Information Quarterly, 30(Supplement 1), S19–S31. http://doi.org/10.1016/j.giq.2012.06.011.CrossRefGoogle Scholar
  26. Smith, G. E., Watson, K. J., Baker, W. H., & Pokorski, J. A., II. (2007). A critical balance: Collaboration and security in the IT-enabled supply chain. International Journal of Production Research, 45(11), 2595–2613. http://doi.org/10.1080/00207540601020544.CrossRefGoogle Scholar
  27. Steinfield, C., Markus, M. L., & Wigand, R. T. (2011). Through a glass clearly: Standards, architecture, and process transparency in global supply chains. Journal of Management Information Systems, 28(2), 75–108. http://doi.org/10.2753/MIS0742-1222280204.CrossRefGoogle Scholar
  28. Stiglitz, J. E. (2000). The contributions of the economics of information to twentieth century economics. The Quarterly Journal of Economics, 115(4), 1441–1478. http://doi.org/10.1162/003355300555015.CrossRefGoogle Scholar
  29. Strong, D. M., Lee, Y. W., & Wang, R. Y. (1997). 10 potholes in the road to information quality. Computer, 30(8), 38–46.CrossRefGoogle Scholar
  30. Sunstein, C. (2012, March 30). Informing consumers through smart disclosure. Retrieved from http://www.whitehouse.gov/blog/2012/03/30/informing-consumers-through-smart-disclosure
  31. Sutherland, W. J., Clout, M., Côté, I. M., Daszak, P., Depledge, M. H., Fellman, L., et al. (2010). A horizon scan of global conservation issues for 2010. Trends in Ecology & Evolution, 25(1), 1–7. http://doi.org/10.1016/j.tree.2009.10.003.CrossRefGoogle Scholar
  32. Tayi, G. K., & Ballou, D. P. (1998). Examining data quality. Communications of the ACM, 41(2), 54–57.CrossRefGoogle Scholar
  33. Thaler, R. H. (2013, May). Smart disclosure: The regulatory future. Presented at the Boulder Summer Conference on Consumer Financial Decision Making, Boulder, Colorado. Retrieved from http://leeds.colorado.edu/event/bouldersummerconference#2012conference
  34. Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven, CT: Yale University Press.Google Scholar
  35. Thaler, R. H., & Tucker, W. (2013, February). Smarter information, smarter consumers. Harvard Business Review. Retrieved from http://hbr.org/2013/01/smarter-information-smarter-consumers
  36. Thompson, R. C. (2004). Lost at sea: Where is all the plastic? Science, 304(5672), 838. http://doi.org/10.1126/science.1094559.CrossRefGoogle Scholar
  37. Wang, R. Y. (1998). A product perspective on total data quality management. Communications of the ACM, 41(2), 58–65. http://doi.org/10.1145/269012.269022.CrossRefGoogle Scholar
  38. Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems, 12(4), 5–33.CrossRefGoogle Scholar
  39. Zhang, C., & Li, S. (2006). Secure information sharing in internet-based supply chain management systems. Journal of Computer Information Systems, 46(4), 18–24.Google Scholar
  40. Zimmerman, A. (2007). Not by metadata alone: The use of diverse forms of knowledge to locate data for reuse. International Journal on Digital Libraries, 7(1), 5–16.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Djoko S. Sayogo
    • 1
    • 2
    Email author
  • Mahdi Mirdamadi Najafabadi
    • 3
  • Giri K. Tayi
    • 4
  • Theresa A. Pardo
    • 2
  1. 1.University of Muhammadiyah at MalangMalangIndonesia
  2. 2.Center for Technology in GovernmentUniversity at AlbanyAlbanyUSA
  3. 3.Department of InformaticsUniversity at AlbanyAlbanyUSA
  4. 4.Department of Information Technology ManagementUniversity at AlbanyAlbanyUSA

Personalised recommendations