Skip to main content

Privacy, Confidentiality, and Security Challenges for Interoperable Data Platforms in Supply Chains

  • Chapter
  • First Online:
Private Data and Public Value

Part of the book series: Public Administration and Information Technology ((PAIT,volume 26))

Abstract

Privacy, confidentiality, and information security constitute basic requirements for the design and implementation of IT-enabled platforms for information sharing such as the I-Choose platform described in this book. In this chapter, we discuss privacy and security issues from an organizational perspective along three dimensions: ownership, access rights, and data quality. The challenge of protecting the confidentiality and privacy of data lies in developing effective and transparent security policies and protocols that govern access to and integrity of both proprietary and public information. Our findings highlight that these challenges stem from the complexity of the information chain and the heterogeneity of stakeholders and data sources in the sustainable coffee supply chain. As a result, addressing these issues will require not only technologically sophisticated solutions but also creation of governance structures and adoption of appropriate business practices. In this chapter we propose five management and policy solutions for mitigating the privacy, confidentiality, and security challenges that confront successful implementation of I-Choose platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Examples of such interorganizational systems include efforts on Electronic Data Interchange (EDI), Electronic Markets, and Supply Chain Management Applications.

  2. 2.

    Detailed description of data collection process can be found in documentations published by third-party certification bodies. For example, for FLO, refer to http://www.flocert.net/fairtrade-services/fairtrade-certification/how-it-works

  3. 3.

    The seven major coffee certification initiatives: FLO, UTZ Good Inside, 4C, RAN, Organic, C.A.F.E Practices, and Nespresso AAA (Panhuysen & van Reenen, 2012).

  4. 4.

    http://www.fairforlife.org

  5. 5.

    http://www.ecolabelindex.com

  6. 6.

    http://www.fairtrade.net

  7. 7.

    Currently, only three out of seven major coffee certifications require specific educational background for their auditor. See Panhuysen and van Reenen (2012) or the International Trade Center (http://legacy.intracen.org/marketanalysis/Default.aspx).

  8. 8.

    Based on the interviews with stakeholders in sustainable certified coffee and literary explorations.

References

  • Buneman, P. (2013). The providence of provenance. In G. Gottlob, G. Grasso, D. Olteanu, & C. Schallhart (Eds.), Big data (Vol. 7968, pp. 7–12). Berlin, Germany/Heidelberg, NY: Springer. Retrieved from http://link.springer.com/10.1007/978-3-642-39467-6_3

  • Buneman, P., & Davidson, S. B. (2010, September 1). Data provenance – The foundation of data quality. Retrieved from http://www.sei.cmu.edu/measurement/research/upload/Davidson.pdf

  • Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69–104.

    Google Scholar 

  • Choudhury, V., Hartzel, K. S., & Konsynski, B. R. (1998). Uses and consequences of electronic markets: An empirical investigation in the aircraft parts industry. MIS Quarterly, 22(4), 471–507.

    Article  Google Scholar 

  • Clemons, E. K., & Row, M. C. (1993). Limits to interfirm coordination through information technology: Results of a field study in consumer packaged goods distribution. Journal of Management Information Systems, 10(1), 73–95.

    Article  Google Scholar 

  • D’Aubeterre, F., Singh, R., & Iyer, L. (2008). A semantic approach to secure collaborative inter- organizational eBusiness processes. Journal of the Association for Information Systems, 9(3), 231–266.

    Google Scholar 

  • Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196–207. http://doi.org/10.1016/j.cose.2009.09.002.

    Article  Google Scholar 

  • Fabian, B., Kunz, S., Müller, S., & Günther, O. (2013). Secure federation of semantic information services. Decision Support Systems, 55(1), 385–398. http://doi.org/10.1016/j.dss.2012.05.049.

    Article  Google Scholar 

  • Healy, P. M., & Palepu, K. G. (2001). Information asymmetry, corporate disclosure, and the capital markets: A review of the empirical disclosure literature. Journal of Accounting and Economics, 31(1–3), 405–440. http://doi.org/10.1016/S0165-4101(01)00018-0.

    Article  Google Scholar 

  • Huynh, T. D., Jennings, N. R., & Shadbolt, N. (2004). Developing an integrated trust and reputation model for open multi-agent systems (pp. 65–74). Presented at the 7th International Workshop on Trust in Agent Societies. Retrieved from http://eprints.soton.ac.uk/259557/

  • Jarman, H., Luna-Reyes, L. F., Zhang, J., Whitmore, A., Picazo-Vela, S., Andersen, D. L., et al. (2011). I-Choose: Consumer choice, digital government, and sustainability in North America. Presented at the APPAM Research Conference, Washington, DC.

    Google Scholar 

  • Kagal, L., Finin, T., & Joshi, A. (2003). A policy based approach to security for the semantic web. In International semantic web conference (Vol. 2870, pp. 402–418). Sanibel Island, FL: Springer.

    Google Scholar 

  • Klein, R., & Rai, A. (2009). Interfirm strategic information flows in logistics supply chain relationships. MIS Quarterly, 33(4), 735–762.

    Google Scholar 

  • Leach, J. (2003). Improving user security behaviour. Computers & Security, 22(8), 685–692. http://doi.org/10.1016/S0167-4048(03)00007-5.

    Article  Google Scholar 

  • Lim, J. S., Chang, S., Maynard, S., & Ahmad, A. (2009). Exploring the relationship between organizational culture and information security culture. In Australian information security management conference (p. 12). Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1011&context=ism

  • Luna-Reyes, L. F., Zhang, J., Whitmore, A., Jarman, H., Picazo-Vela, S., Andersen, D. L., et al. (2014). Full information product pricing: An information strategy for harnessing consumer choice to create a more sustainable world. Communications of the Association for Information Systems, 34(1), 637–654.

    Google Scholar 

  • Malhotra, A., Gosain, S., & Sawy, O. A. E. (2005). Absorptive capacity configurations in supply chains: Gearing for partner-enabled market knowledge creation. MIS Quarterly, 29(1), 145–187.

    Google Scholar 

  • McLeod, A. J., Jr., Carpenter, D. R., & Clark, J. G. (2008). Measuring success in interorganizational information systems: A case study. Communications of AIS, 22(1), 617–634.

    Google Scholar 

  • O’Hara, K., Alani, H., Kalfoglou, Y., & Shadbolt, N. (2004). Trust strategies for the semantic web. Presented at the Workshop on Trust, Security, and Reputation on the Semantic Web, 3rd International (ISWC’04). Retrieved from http://eprints.soton.ac.uk/260029/

  • Pahnila, S., Siponen, M., & Mahmood, A. (2007). Employees’ behavior towards IS security policy compliance. In 40th Annual Hawaii International Conference on System Sciences, 2007. HICSS 2007 (p. 156b). http://doi.org/10.1109/HICSS.2007.206.

  • Panhuysen, S., & van Reenen, M. (2012). Coffee barometer 2012. Report, The Hague, Netherlands. Retrieved from http://www.teacoffeecocoa.org/tcc/Media/Files/Coffee-Barometer-2012

  • Rindfleisch, T. C. (1997). Privacy, information technology, and health care. Communications of the ACM, 40(8), 92–100. http://doi.org/10.1145/257874.257896.

    Article  Google Scholar 

  • Saint-Germain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management Journal, 39(4), 60–66.

    Google Scholar 

  • Sayogo, D. S. (2013). Modeling incentives to disclose: Smart disclosure policy, private sector transparency and demanded disclosure. Dissertation, University at Albany State University of New York, Albany, NY.

    Google Scholar 

  • Sayogo, D. S., & Pardo, T. A. (2013). Exploring the determinants of scientific data sharing: Understanding the motivation to publish research data. Government Information Quarterly, 30(Supplement 1), S19–S31. http://doi.org/10.1016/j.giq.2012.06.011.

    Article  Google Scholar 

  • Smith, G. E., Watson, K. J., Baker, W. H., & Pokorski, J. A., II. (2007). A critical balance: Collaboration and security in the IT-enabled supply chain. International Journal of Production Research, 45(11), 2595–2613. http://doi.org/10.1080/00207540601020544.

    Article  Google Scholar 

  • Steinfield, C., Markus, M. L., & Wigand, R. T. (2011). Through a glass clearly: Standards, architecture, and process transparency in global supply chains. Journal of Management Information Systems, 28(2), 75–108. http://doi.org/10.2753/MIS0742-1222280204.

    Article  Google Scholar 

  • Stiglitz, J. E. (2000). The contributions of the economics of information to twentieth century economics. The Quarterly Journal of Economics, 115(4), 1441–1478. http://doi.org/10.1162/003355300555015.

    Article  Google Scholar 

  • Strong, D. M., Lee, Y. W., & Wang, R. Y. (1997). 10 potholes in the road to information quality. Computer, 30(8), 38–46.

    Article  Google Scholar 

  • Sunstein, C. (2012, March 30). Informing consumers through smart disclosure. Retrieved from http://www.whitehouse.gov/blog/2012/03/30/informing-consumers-through-smart-disclosure

  • Sutherland, W. J., Clout, M., Côté, I. M., Daszak, P., Depledge, M. H., Fellman, L., et al. (2010). A horizon scan of global conservation issues for 2010. Trends in Ecology & Evolution, 25(1), 1–7. http://doi.org/10.1016/j.tree.2009.10.003.

    Article  Google Scholar 

  • Tayi, G. K., & Ballou, D. P. (1998). Examining data quality. Communications of the ACM, 41(2), 54–57.

    Article  Google Scholar 

  • Thaler, R. H. (2013, May). Smart disclosure: The regulatory future. Presented at the Boulder Summer Conference on Consumer Financial Decision Making, Boulder, Colorado. Retrieved from http://leeds.colorado.edu/event/bouldersummerconference#2012conference

  • Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven, CT: Yale University Press.

    Google Scholar 

  • Thaler, R. H., & Tucker, W. (2013, February). Smarter information, smarter consumers. Harvard Business Review. Retrieved from http://hbr.org/2013/01/smarter-information-smarter-consumers

  • Thompson, R. C. (2004). Lost at sea: Where is all the plastic? Science, 304(5672), 838. http://doi.org/10.1126/science.1094559.

    Article  Google Scholar 

  • Wang, R. Y. (1998). A product perspective on total data quality management. Communications of the ACM, 41(2), 58–65. http://doi.org/10.1145/269012.269022.

    Article  Google Scholar 

  • Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems, 12(4), 5–33.

    Article  Google Scholar 

  • Zhang, C., & Li, S. (2006). Secure information sharing in internet-based supply chain management systems. Journal of Computer Information Systems, 46(4), 18–24.

    Google Scholar 

  • Zimmerman, A. (2007). Not by metadata alone: The use of diverse forms of knowledge to locate data for reuse. International Journal on Digital Libraries, 7(1), 5–16.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Djoko S. Sayogo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Sayogo, D.S., Najafabadi, M.M., Tayi, G.K., Pardo, T.A. (2016). Privacy, Confidentiality, and Security Challenges for Interoperable Data Platforms in Supply Chains. In: Jarman, H., Luna-Reyes, L. (eds) Private Data and Public Value. Public Administration and Information Technology, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-319-27823-0_6

Download citation

Publish with us

Policies and ethics