David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):295-318 (2010)
Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a next generation approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to Privacy by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles (Cavoukian 2009), and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can trust their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented.
|Keywords||Privacy by design Value chain|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Terry McQuay & Ann Cavoukian (2010). A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW] Identity in the Information Society 3 (2):379-396.
Ann Cavoukian (2010). Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW] Identity in the Information Society 3 (2):247-251.
Lucas Introna & Athanasia Pouloudi (1999). Privacy in the Information Age: Stakeholders, Interests and Values. [REVIEW] Journal of Business Ethics 22 (1):27 - 38.
Thomas B. Hodel-Widmer (2006). Designing Databases That Enhance People's Privacy Without Hindering Organizations. Ethics and Information Technology 8 (1):3-15.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Graham Greenleaf, Nigel Waters & Lee A. Bygrave, Strengthening Uniform Privacy Principles: An Analysis of the Alrc's Proposed Principles.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Lawrence O. Gostin (2001). Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW] Health Care Analysis 9 (3):321-335.
Irene Pollach (2011). Online Privacy as a Corporate Social Responsibility: An Empirical Study. Business Ethics 20 (1):88-102.
Lars Oystein Ursin (2010). Privacy and Property in the Biobank Context. HEC Forum 22 (3):211-224.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW] Identity in the Information Society 3 (3):539-563.
Added to index2010-12-05
Total downloads4 ( #258,599 of 1,102,819 )
Recent downloads (6 months)1 ( #296,987 of 1,102,819 )
How can I increase my downloads?