Extending the value chain to incorporate privacy by design principles View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2010-08

AUTHORS

Julie Smith David, Marilyn Prosch

ABSTRACT

Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to Privacy by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles (Cavoukian 2009), and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can “trust” their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented. More... »

PAGES

295-318

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s12394-010-0059-6

DOI

http://dx.doi.org/10.1007/s12394-010-0059-6

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1013277704


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1503", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Business and Management", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/15", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Commerce, Management, Tourism and Services", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Arizona State University", 
          "id": "https://www.grid.ac/institutes/grid.215654.1", 
          "name": [
            "The Privacy by Design Research Lab, W.P. Carey School of Business, Arizona State University, Tempe, AZ, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "David", 
        "givenName": "Julie Smith", 
        "id": "sg:person.011700442425.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011700442425.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Arizona State University", 
          "id": "https://www.grid.ac/institutes/grid.215654.1", 
          "name": [
            "The Privacy by Design Research Lab, W.P. Carey School of Business, Arizona State University, Tempe, AZ, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Prosch", 
        "givenName": "Marilyn", 
        "id": "sg:person.014036124072.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014036124072.94"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.2753/mis0742-1222230101", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004429419"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10676-005-4407-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004782359", 
          "https://doi.org/10.1007/s10676-005-4407-4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10676-005-4407-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004782359", 
          "https://doi.org/10.1007/s10676-005-4407-4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1044-5005(02)00067-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007719163"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1044-5005(02)00067-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007719163"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1108/08876049510079853", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013716160"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1108/14720700910936047", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026562554"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s0019-8501(01)00182-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026639563"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s0925-5273(00)00079-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033291925"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/smj.4250100207", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039222336"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s0263-2373(02)00029-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040722839"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1057/jdg.2008.7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047320567", 
          "https://doi.org/10.1057/jdg.2008.7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1108/03090560410539276", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052316708"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1177/0092070304271004", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1063722230", 
          "https://doi.org/10.1177/0092070304271004"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1287/isre.13.3.334.81", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1064711672"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1287/mnsc.43.4.546", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1064721617"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2010-08", 
    "datePublishedReg": "2010-08-01", 
    "description": "Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a \u201cnext generation\u201d approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company\u2019s value chain. We take this notion of corporate citizenship and apply it to Privacy by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles (Cavoukian 2009), and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization\u2014everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders\u2019 communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can \u201ctrust\u201d their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s12394-010-0059-6", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1149304", 
        "issn": [
          "1876-0678"
        ], 
        "name": "Identity in the Information Society", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "2", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "3"
      }
    ], 
    "name": "Extending the value chain to incorporate privacy by design principles", 
    "pagination": "295-318", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "3f40cbce6a11b84d1a48d1dbf7cdf64eff5bf9c418a68e0dee7cec7bd6d38dd8"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s12394-010-0059-6"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1013277704"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s12394-010-0059-6", 
      "https://app.dimensions.ai/details/publication/pub.1013277704"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T10:32", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000349_0000000349/records_113658_00000000.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007%2Fs12394-010-0059-6"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12394-010-0059-6'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12394-010-0059-6'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12394-010-0059-6'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12394-010-0059-6'


 

This table displays all metadata directly associated to this object as RDF triples.

112 TRIPLES      21 PREDICATES      41 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s12394-010-0059-6 schema:about anzsrc-for:15
2 anzsrc-for:1503
3 schema:author Ne50eeb0ea677468394e4d740890c2b89
4 schema:citation sg:pub.10.1007/s10676-005-4407-4
5 sg:pub.10.1057/jdg.2008.7
6 sg:pub.10.1177/0092070304271004
7 https://doi.org/10.1002/smj.4250100207
8 https://doi.org/10.1016/s0019-8501(01)00182-1
9 https://doi.org/10.1016/s0263-2373(02)00029-4
10 https://doi.org/10.1016/s0925-5273(00)00079-7
11 https://doi.org/10.1016/s1044-5005(02)00067-7
12 https://doi.org/10.1108/03090560410539276
13 https://doi.org/10.1108/08876049510079853
14 https://doi.org/10.1108/14720700910936047
15 https://doi.org/10.1287/isre.13.3.334.81
16 https://doi.org/10.1287/mnsc.43.4.546
17 https://doi.org/10.2753/mis0742-1222230101
18 schema:datePublished 2010-08
19 schema:datePublishedReg 2010-08-01
20 schema:description Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to Privacy by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles (Cavoukian 2009), and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can “trust” their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented.
21 schema:genre research_article
22 schema:inLanguage en
23 schema:isAccessibleForFree true
24 schema:isPartOf Na2fd1533b56c41039bb7c1854cedebb1
25 Neaf2e07f778847deb12000b1db683622
26 sg:journal.1149304
27 schema:name Extending the value chain to incorporate privacy by design principles
28 schema:pagination 295-318
29 schema:productId N8a05029972bd4da498e3199c1c709452
30 Nb99fb262cf534bb8bfcfac13446f4d4b
31 Nf3dcdd4d059d48ba871c92939acf7beb
32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013277704
33 https://doi.org/10.1007/s12394-010-0059-6
34 schema:sdDatePublished 2019-04-11T10:32
35 schema:sdLicense https://scigraph.springernature.com/explorer/license/
36 schema:sdPublisher N8a4213bbfea24370aff8f6d56f29894c
37 schema:url http://link.springer.com/10.1007%2Fs12394-010-0059-6
38 sgo:license sg:explorer/license/
39 sgo:sdDataset articles
40 rdf:type schema:ScholarlyArticle
41 N8a05029972bd4da498e3199c1c709452 schema:name readcube_id
42 schema:value 3f40cbce6a11b84d1a48d1dbf7cdf64eff5bf9c418a68e0dee7cec7bd6d38dd8
43 rdf:type schema:PropertyValue
44 N8a4213bbfea24370aff8f6d56f29894c schema:name Springer Nature - SN SciGraph project
45 rdf:type schema:Organization
46 Na2fd1533b56c41039bb7c1854cedebb1 schema:issueNumber 2
47 rdf:type schema:PublicationIssue
48 Nb99fb262cf534bb8bfcfac13446f4d4b schema:name dimensions_id
49 schema:value pub.1013277704
50 rdf:type schema:PropertyValue
51 Nd05e99c4a3db47478f09aa88510cc6cf rdf:first sg:person.014036124072.94
52 rdf:rest rdf:nil
53 Ne50eeb0ea677468394e4d740890c2b89 rdf:first sg:person.011700442425.39
54 rdf:rest Nd05e99c4a3db47478f09aa88510cc6cf
55 Neaf2e07f778847deb12000b1db683622 schema:volumeNumber 3
56 rdf:type schema:PublicationVolume
57 Nf3dcdd4d059d48ba871c92939acf7beb schema:name doi
58 schema:value 10.1007/s12394-010-0059-6
59 rdf:type schema:PropertyValue
60 anzsrc-for:15 schema:inDefinedTermSet anzsrc-for:
61 schema:name Commerce, Management, Tourism and Services
62 rdf:type schema:DefinedTerm
63 anzsrc-for:1503 schema:inDefinedTermSet anzsrc-for:
64 schema:name Business and Management
65 rdf:type schema:DefinedTerm
66 sg:journal.1149304 schema:issn 1876-0678
67 schema:name Identity in the Information Society
68 rdf:type schema:Periodical
69 sg:person.011700442425.39 schema:affiliation https://www.grid.ac/institutes/grid.215654.1
70 schema:familyName David
71 schema:givenName Julie Smith
72 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011700442425.39
73 rdf:type schema:Person
74 sg:person.014036124072.94 schema:affiliation https://www.grid.ac/institutes/grid.215654.1
75 schema:familyName Prosch
76 schema:givenName Marilyn
77 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014036124072.94
78 rdf:type schema:Person
79 sg:pub.10.1007/s10676-005-4407-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004782359
80 https://doi.org/10.1007/s10676-005-4407-4
81 rdf:type schema:CreativeWork
82 sg:pub.10.1057/jdg.2008.7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047320567
83 https://doi.org/10.1057/jdg.2008.7
84 rdf:type schema:CreativeWork
85 sg:pub.10.1177/0092070304271004 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063722230
86 https://doi.org/10.1177/0092070304271004
87 rdf:type schema:CreativeWork
88 https://doi.org/10.1002/smj.4250100207 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039222336
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1016/s0019-8501(01)00182-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026639563
91 rdf:type schema:CreativeWork
92 https://doi.org/10.1016/s0263-2373(02)00029-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040722839
93 rdf:type schema:CreativeWork
94 https://doi.org/10.1016/s0925-5273(00)00079-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033291925
95 rdf:type schema:CreativeWork
96 https://doi.org/10.1016/s1044-5005(02)00067-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007719163
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1108/03090560410539276 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052316708
99 rdf:type schema:CreativeWork
100 https://doi.org/10.1108/08876049510079853 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013716160
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1108/14720700910936047 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026562554
103 rdf:type schema:CreativeWork
104 https://doi.org/10.1287/isre.13.3.334.81 schema:sameAs https://app.dimensions.ai/details/publication/pub.1064711672
105 rdf:type schema:CreativeWork
106 https://doi.org/10.1287/mnsc.43.4.546 schema:sameAs https://app.dimensions.ai/details/publication/pub.1064721617
107 rdf:type schema:CreativeWork
108 https://doi.org/10.2753/mis0742-1222230101 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004429419
109 rdf:type schema:CreativeWork
110 https://www.grid.ac/institutes/grid.215654.1 schema:alternateName Arizona State University
111 schema:name The Privacy by Design Research Lab, W.P. Carey School of Business, Arizona State University, Tempe, AZ, USA
112 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...