Article

Extending the value chain to incorporate privacy by design principles

Authors:
  • American Accounting Association
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to Privacy by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles (Cavoukian 2009), and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can “trust” their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Estudos recentes apontam uma tendência de estudar a cadeia de valor ligada às questões tecnológicas e de sistemas de informações. A cadeia de valor vem sendo examinada como um dos métodos mais comuns de identificação de tecnologia (Arasti & Outras propostas de aprofundamentos de pesquisas em cadeia de valor foram desenvolvidas como: nos recursos (Lin et al., 2012); na quantificação das atividades no biodiesel (Díaz-peña et al., 2013); na privacidade pelo Design (David & Prosch, 2010); na competividade pela terceirização (Souza & Rados, 2011); no meio do setor siderúrgico em inovação (Varandas et al., 2014); na hotelaria (Anjos et al., 2008); no relacionamento entre o tempo de vida dos ativos e as atividades (El-Akruti et al., 2013); nas estratégias de custos (Souza & Mello, 2011); e nas alternativas estratégicas para a melhora na ovinocultura (Viana et al., 2013). ...
... Neste caso, cada uma destas empresas fora dos muros da empresa focal executa mais as atividades na cadeia de valor do produto, intensificando a sua participação do processo de criação de valor. Este valor se expande ao longo da cadeia de suprimentos definida pelo desenvolvimento das atividades nas próprias empresas participantes, visando o desenvolvimento do produto ao cliente final (David & Prosch, 2010;Lollar et al.;Oliveira & Leite, 2010;Santos et al., 2010;Christopher, 2011). ...
Article
Full-text available
Event tourism is definitely consolidated as one of the ramifications of tourism that most contributes to the economic development of the localities where it is held. In Brazil, the practice of mega events boosts the segment and leverages the local services sector. However, to meet the expectations of its organizers, some processes need to be introduced properly. The value chain appears as an indispensable tool in their achievement. This paper aims to analyze the Business, Agriculture and Livestock Fair of the Western Border - Fenaoeste, held in the municipality of São Borja, Rio Grande do Sul state, Brazil, taking as a basis the Porterian value chain with an adaptation of its primary and support activities with the services lenses. This case study uses a qualitative and exploratory methodology. Based on interviews with experts and on the specific literature, it presents strategic points and issues for the competiveness of mega events, where the aspects related to the information technology used and the involvement of internal and external customers have intense influence. For the improvement of activities in the search for competitive advantage, it suggests a more intensive use of information technology, especially in the post-event phase, where there is a greater need for human interaction with customers, who are co-producers to obtain knowledge about these stakeholders. To this end, it is necessary to coordinate the aspects of intangibility, perishability, and simultaneity with attention to issues such as training, disclosure of the event, recruitment risks, management systems, and outsourcing of employees (with caution in relation to the strategic ones) to promote key products of the events: service quality, customer experience, and show. The university can assist in this development. Although this research is not of conclusive nature, some relevant reflections on the value chain of mega events are presented along with proposals for future research.
... In other words, privacy by design requires an individual-focused respect for user privacy. In light of this framework [69,70], we have seen how relevant the principle of privacy by design is in such different fields like the " future of the internet " [23], data protection via CCTV systems, biometrics, social networks, smart environments, data loss prevention, and more. However, the paper also stressed two critical issues of the principle, mainly involving points (ii) and (v) of Cavoukian " s scheme, so as to shed light on its conclusive point (vii), which is in regard to the autonomy of individuals. ...
Article
Full-text available
Since the mid 1990s, lawmakers and scholars have worked on the idea of embedding data protection safeguards in information and communication technology (ICT) with the aim to access and control personal data in compliance with current regulatory frameworks. This effort has been strengthened by the capacities of computers to draw upon the tools of artificial intelligence (AI) and operations research. However, work on AI and the law entails crucial ethical issues concerning both values and modalities of design. On one hand, design choices might result in conflicts of values and, vice versa, values may affect design features. On the other hand, the modalities of design cannot only limit the impact of harm-generating behavior but also prevent such behavior from occurring via self-enforcement technologies. In order to address some of the most relevant issues of data protection today, the paper suggests we adopt a stricter, yet more effective version of “privacy by design.” The goal should be to reinforce people’s pre-existing autonomy, rather than having to build it from scratch.
Article
Full-text available
Power equipment is an important part of power grid construction, and the application of quality inspection industry standards of power equipment is the key to ensuring the safe operation of the power grid. In recent years, Zhejiang Electric Power Company has been subjected to frequent faults due to quality problems of power equipment and delayed feedback of quality inspection. Based on the theory of value chain, this article conducts a study on the power equipment inspection industry, and builds a three-dimensional combined value chain system that integrates “power equipment-quality inspection-power grid operation”. It is of great significance to reduce the security risks of power grid operation in Zhejiang Province and improve the economic and social benefits of Zhejiang Province.
Article
In privacy information security literature, Privacy by Design (PbD) is recognized as a positive protection paradigm capable of providing higher privacy protection throughout information products’ entire lifetime. It is becoming the dominant privacy protection pattern. Considered to be a promising development tendency towards the information industry, it is garnering interest among researchers and professionals. However, PbD still lacks specific implementation instructions, and it is not popularized among information system engineers. Weighing the pros and cons leads to information system engineers’ uncertainty regarding PbD adoption, since existing research on the linkage between PbD implementation and information system engineers’ individual factors is inconclusive. Through the lenses of information system engineers, this study aims to advance implementation of PbD by exploring the influence factors of individual and organizational contexts. Real data from 253 practitioners in China’s IT industry were used to understand the antecedent of PbD implementation and interaction effects among different dimensions of engineers’ adopting behaviors. The findings have demonstrated that appropriate incentive mechanism is a critical factor in PbD implementation by promoting engineer’s social influence regarding PbD usage and further affecting both their intentions about adopting PbD and implementing action. This study reveals, for the first time, the role of incentive mechanism in advancing PbD implementation from the information system engineer perspective, and contributes to a deeper understanding of the determinants of PbD adoption by providing a holistic theoretical lens. The findings provide theoretical guidance to IT organizations with guidelines on PbD implementation for higher privacy information protection performance of products.
Article
The information privacy of consumers is an important public policy issue in today’s society, and one that businesses, industries and governments are continuing to struggle with as information technology innovations create ever-stronger impacts. In this article, we explore consumer information privacy issues and review the results of related prior research. We provide a survey of the literature on information privacy based on our assessment from (1) the societal and public policy perspective, (2) the business practices perspective, and (3) the individual privacy and consumer behavior perspectives that relate to the disclosure of private information by individuals to firms. From the societal and public policy perspective, we identify main research directions that relate to the social welfare implications of personal information surveillance, the safeguards needed at the societal level, and the privacy-enhancing regulations that should especially target ITs. From the business practices perspective, we suggest research directions that involve the examination of factors influencing organizational choices of privacy practices. We also offer some ways to discover how organizations can leverage their investments in information privacy. The individual and consumer behavior perspective, in turn, prompts AIS researchers to look at the nature of people’s beliefs and attitudes about privacy, the ways such attitudes affect their intentions and behaviors, and how individuals' behaviors can be influenced by organizational privacy policies and practices. The main contribution of this article is to understand these issues and identify opportunities for enriching the current body of knowledge on this critical topic to Accounting Information Systems (AIS) researchers.
Article
Full-text available
Purpose - The purpose of this paper is to benchmark how 25 companies in five industries are addressing corporate citizenship through their governance, structures and systems. The paper aims to look at patterns of leadership practice developing in firms in this regard and what might be shaping them. It also seeks to consider current practices in light of movement toward next-generation corporate citizenship. Design/methodology/approach - The study surveyed a representative sample of Fortune 500 companies. To benchmark how companies are embedding citizenship into their governance, structure, and systems, two scorecards were devised measuring practices pertaining to: Corporate Board Governance; and Operational Management of Corporate Citizenship. Criteria chosen represent Board and management policies, behaviors, and/or public commitments. Findings - It was found that, while corporate Boards are assuming more responsibility for oversight of conduct and taking account of specific social and environmental issues, citizenship is not yet fully embedded into Boards or the operating structures and systems of most firms. Research limitations/implications - Companies appear to be moving through developmental stages as they integrate citizenship into their governance and operations, with several developmental patterns emerging. While there seem to be specific patterns of development that link to the industry, issues faced, and culture of firms, it is difficult to generalize specific influences within industry from the relatively small sample. Further benchmarking is needed to better understand these issues and which ideas represent best practices going forward. Practical implications - A next generation approach to corporate citizenship requires more than top down advocacy - this needs to be backed up by Board oversight and engagement and by layered management structures, systems, processes, and policies that make citizenship part of every employee's remit, across the company's value chain. Originality/value - The paper provides a unique set of frameworks to assess company performance in relation to governing and managing corporate citizenship. It provides much needed data from companies across a number of industries to prompt further discussion on next generation corporate citizenship, where responsible business practices are woven into the corporate DNA.
Article
Full-text available
Abstract The literature on business and sustainability has been sparse to date. Theory building in the domain,has been especially scarce. One-pillar models emphasize an ecological dimension to sustainable development. These models talk about sustainability in terms of the reduction of pollution and the sustainability of ecological environments,without regard to human usage. That is, they emphasize sustainability from a ―natural‖ point of view. Multi-pillar models, most of
Article
Full-text available
Purpose The purpose of this paper is to benchmark how 25 companies in five industries are addressing corporate citizenship through their governance, structures and systems. The paper aims to look at patterns of leadership practice developing in firms in this regard and what might be shaping them. It also seeks to consider current practices in light of movement toward next‐generation corporate citizenship. Design/methodology/approach The study surveyed a representative sample of Fortune 500 companies. To benchmark how companies are embedding citizenship into their governance, structure, and systems, two scorecards were devised measuring practices pertaining to: Corporate Board Governance; and Operational Management of Corporate Citizenship. Criteria chosen represent Board and management policies, behaviors, and/or public commitments. Findings It was found that, while corporate Boards are assuming more responsibility for oversight of conduct and taking account of specific social and environmental issues, citizenship is not yet fully embedded into Boards or the operating structures and systems of most firms. Research limitations/implications Companies appear to be moving through developmental stages as they integrate citizenship into their governance and operations, with several developmental patterns emerging. While there seem to be specific patterns of development that link to the industry, issues faced, and culture of firms, it is difficult to generalize specific influences within industry from the relatively small sample. Further benchmarking is needed to better understand these issues and which ideas represent best practices going forward. Practical implications A next generation approach to corporate citizenship requires more than top down advocacy – this needs to be backed up by Board oversight and engagement and by layered management structures, systems, processes, and policies that make citizenship part of every employee's remit, across the company's value chain. Originality/value The paper provides a unique set of frameworks to assess company performance in relation to governing and managing corporate citizenship. It provides much needed data from companies across a number of industries to prompt further discussion on next generation corporate citizenship, where responsible business practices are woven into the corporate DNA.
Article
Full-text available
Examines the relative importance of service recovery in determining overall satisfaction and behavioral intentions. Recommendations include suggestions for implementing a service recovery program and for encouraging dissatisfied customers to complain.
Article
Full-text available
Mass customization entails the mass production of individually customized goods and services. Co-design is a mass customization option where a product's design is based on the customer's selections from a range of design feature offerings. A model comprised of relationships between individual differences, motivations for using co-design, and willingness to use co-design was proposed and statistically supported using 521 university subjects from different regions of the USA and the analysis of moment structures (AMOS) statistic. As hypothesized, optimum stimulation level (OSL) predicted two clothing interest factors: experimenting with appearance (EA) and enhancement of individuality (EI). As proposed, OSL and EA predicted the two motivations, trying co-design as an exciting experience and using co-design to create a unique product, whereas EI only predicted using co-design to create a unique product. Both motives were mediating variables between individual differences and willingness to use co-design, but using co-design to create a unique product had a stronger effect. Theoretical and marketing implications were discussed.
Article
Full-text available
(This article originally appeared in Management Science, April 1997, Volume 43, Number 4, pp. 546--558, published by The Institute of Management Sciences.) Consider a series of companies in a supply chain, each of whom orders from its immediate upstream member. In this setting, inbound orders from a downstream member serve as a valuable informational input to upstream production and inventory decisions. This paper claims that the information transferred in the form of ÜordersÝ tends to be distorted and can misguide upstream members in their inventory and production decisions. In particular, the variance of orders may be larger than that of sales, and distortion tends to increase as one moves upstreamÔa phenomenon termed Übullwhip effect.Ý This paper analyzes four sources of the bullwhip effect: demand signal processing, rationing game, order batching, and price variations. Actions that can be taken to mitigate the detrimental impact of this distortion are also discussed.
Article
Full-text available
Mass customization relates to the ability to provide individually designed products and services to every customer through high process flexibility and integration. Mass customization has been identified as a competitive strategy by an increasing number of companies. This paper surveys the literature on mass customization. Enablers to mass customization and their impact on the development of production systems are discussed in length. Approaches to implementing mass customization are compiled and classified. Future research directions are outlined.
Article
Full-text available
RFID has recently received a lot of attention as an augmentation technology in manufacturing, SCM and retail inventory control. However, widespread deployment of RFID tags may create new threats to security and privacy of individuals and organizations. This paper gives an overview of all types of RFID privacy and security problems and its countermeasures.
Article
Full-text available
vidence suggests that consumers often hesitate to transact with Web-based vendors be- cause of uncertainty about vendor behavior or the perceived risk of having personal information stolen by hackers. Trust plays a central role in helping consumers overcome per- ceptions of risk and insecurity. Trust makes consumers comfortable sharing personal infor- mation, making purchases, and acting on Web vendor advice—behaviors essential to wide- spread adoption of e-commerce. Therefore, trust is critical to both researchers and practitioners. Prior research on e-commerce trust has used diverse, incomplete, and inconsis- tent definitions of trust, making it difficult to compare results across studies. This paper con- tributes by proposing and validating measures for a multidisciplinary, multidimensional model of trust in e-commerce. The model includes four high-level constructs—disposition to trust, institution-based trust, trusting beliefs, and trusting intentions—which are further de- lineated into 16 measurable, literature-grounded subconstructs. The psychometric properties of the measures are demonstrated through use of a hypothetical, legal advice Web site. The results show that trust is indeed a multidimensional concept. Proposed relationships among the trust constructs are tested (for internal nomological validity), as are relationships between the trust constructs and three other e-commerce constructs (for external nomological valid- ity)—Web experience, personal innovativeness, and Web site quality. Suggestions for future research as well as implications for practice are discussed. (Trust; Trusting Beliefs; Trusting Intentions; Institution-Based Trust; Disposition to Trust; e- Commerce; Measure; Site Quality; Disposition; Nomological Network; Web Vendor)
Article
Many of the pioneers of Internet business, both dot-corns and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way - and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it off en makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects.. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.
Article
The purpose of this study is to provide a preliminary investigation of the effectiveness of Internet marketers’ various attempts to develop consumer trust through Web signals. The work is an exploration of the context-specific nature of trust in e-commerce. An online experiment compares three potential signals of trust in an Internet retail firm: (1) a third-party certification (i.e., a “trustmark”), (2) an objective-source rating (i.e., a review from Consumer Reports magazine), and (3) an implication of investment in advertising (i.e., a television advertisement to air during the Super Bowl). The trustmark had the greatest effect on perceived trustworthiness, influencing respondents’ beliefs about security and privacy, general beliefs about firm trustworthiness, and willingness to provide personal information. The relationship between Internet experience and trust was in the form of an inverted U.
Article
Trust plays a key role in the electronic market that involves high uncertainty and lack of legal protection. Building trust online is proposed as a solution to consumers' privacy concerns. Drawing from relationship marketing and social exchange theory, this study examined several key mechanisms that can help increase customers' trust of e-commerce and decrease privacy concerns. These mechanisms include characteristic-based (e.g., community), transaction process-based (e.g., repeated purchases), and institution-based trust production (e.g., digital certificate).
Article
EXECUTIVE SUMMARYThe first decade of the new millennium may well become known as the era of data breaches. In a recent speech given by the Federal Trade Commission's (FTC) Chief Privacy Officer, Marc Groman, he emphasised to the National Association of Secretaries of States to prepare well because `you will have a data breach' (Washington, DC, 18th February, 2008). This article discusses the present privacy crisis and offers a solution to managing and reducing privacy risk through the use of the AICPA/CICA's Generally Accepted Privacy Principles (GAPP). When the court of public opinion or the FTC is grilling an organisation regarding a data breach, the best defence for the organisation is to provide evidence, such as adherence to GAPP criteria or an actual GAPP audit, that they were diligent and serious about data protection policies. Recently, the Chair of Her Majesty's Revenue & Customs in the UK resigned after 25 million Britons had their personal information compromised and the investigation revealed that a mere 102,000 spent on data redaction would have prevented the snafu (see references 1 and 2). Top management, including CEOs, CFOs, CISOs, and CPOs all need to be aware of privacy risk management issues and techniques to reduce privacy risk. Researchers need to help advance the development and measurement of privacy-enhancing techniques and the implementation of GAPP in order to help move organisations along the Privacy Maturity Model. This article is written by a member of the AICPA's Privacy Task Force and a Certified Information Privacy Professional.International Journal of Disclosure and Governance (2008) 5, 153-166. doi:10.1057/jdg.2008.7 published online 10 April 2008
Article
Strategic planning frameworks provide a means of combining internal data about the firm's capabilities with external information about the competitive environment in a manner designed to guide resource allocation. The value chain approach to strategic planning, as described by Michael Porter in his book Competitive Advantage (1985), is a recent addition to this family of planning frameworks. In this article, we address some of the difficulties in using accounting data for value chain analysis. These difficulties are divided into those that are inherent, because of differences in methods of data accumulation, and those that are avoidable.
Article
This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion piece on privacy in Japan) give rise to intercultural comparisons. The paper addresses the question of privacy in cyberspace and mass media. Finally the question of freedom of speech is related to the Japanese concepts of Ohyake and Watakusi.
Article
Trust plays a key role in the electronic market that involves high uncertainty and lack of legal protection. Building trust online is proposed as a solution to consumers' privacy concerns. Drawing from relationship marketing and social exchange theory, this study examined several key mechanisms that can help increase customers' trust of e-commerce and decrease privacy concerns. These mechanisms include characteristic-based (e.g., community), transaction process-based (e.g., repeated purchases), and institution-based trust production (e.g., digital certificate).
Article
An international survey of outsourcing contrasts current practice between US and European companies. US companies are identified as pursuing more value adding sourcing strategies while European companies are more focused on gaining economies of scale through outsourcing. Despite the commodity orientation of outsourcing, both European and US companies consider outsourcing as critical to their organizational strategy. For both US and European companies the most preferred relationship between service purchaser and service provider is that of a single provider who has an industry focused, proven track record. Overall, US and European companies report higher than expected levels of satisfaction with outsourcing.
Article
Interfirm relationships introduce new challenges for management accounting. One such challenge is the provision of information for the coordination and optimization of activities across firms in a value chain. According to the literature, a value chain analysis (VCA) is a useful tool to meet this challenge. However, little empirical evidence has been published on the use of this analysis in practice. This paper presents a case study on the use of an activity-based costing (ABC) model by a large UK retail firm and a group of suppliers for supporting their supply chain management (SCM) practices. This cost model was based on the principles of value chain analysis and integrated cost information across the supply chain. It was used to improve supply chain operations by performing benchmark analyses, strategic what-if analyses and cost monitoring. An interpretation of the case findings is provided using organizational theory and transaction cost economics.
Article
A new model of competition, where competition is among supply chain networks rather than individual firms, is transforming traditional market-based buyer-supplier relations to one of competition among cooperative sets. In order to integrate and realize performance gains from participating in cooperative supply networks, the importance of information sharing across the supply chain has been emphasized in different literature streams. In this study, we examine the relational antecedents of this critical aspect of supply chain integration-that is, information flow integration. Our objective is to investigate the relationship between relational orientation of the focal firm, as characterized by (1) long-term orientation of its supply chain relationships, (2) asset specificity, and (3) interaction routines and the information flow integration between a firm and its supply chain partners. A research model was developed and data were collected from 110 supply chain and logistics managers in manufacturing and retail organizations. Our results suggest that tangible and intangible resources invested in supply chain relationships enable the integration of information flows with supply chain partners. Specifically, formal and informal interaction routines that take time and effort to develop enable integration of informational flows across a firm's supply chain. Investments in relation-specific assets and long-term orientation in relationships enable the development of these interaction routines.
Article
Teenagers will freely give up personal information to join social networks on the Internet. Afterwards, they are surprised when their parents read their journals. Communities are outraged by the personal information posted by young people online and colleges keep track of student activities on and off campus. The posting of personal information by teens and students has consequences. This article will discuss the uproar over privacy issues in social networks by describing a privacy paradox; private versus public space; and, social networking privacy issues. It will finally discuss proposed privacy solutions and steps that can be taken to help resolve the privacy paradox.
RFID devices: privacy and security aspects Service recovery: impact on satisfaction and intentions
  • Lin D C Shih
  • Lin
  • Ra Spreng
  • Harrell Gd
  • Mackoy
Shih D, Lin C, Lin B. RFID devices: privacy and security aspects. Int J Mobile Commun, 2005. Spreng RA, Harrell GD, Mackoy RD. Service recovery: impact on satisfaction and intentions. J Serv Market 9(1);
The emergence of on-demand software aggregators: implications for developers, customers, and software companies Dekker HC. Value chain analysis in interfirm relationships: a field study
  • David Js Mann
David JS, Mann A. The emergence of on-demand software aggregators: implications for developers, customers, and software companies. Proc. Americas Conference on Information Systems (AMCIS), Keystone, CO, 2007. Dekker HC. Value chain analysis in interfirm relationships: a field study. Manage Account Res. 2003;14 (2003):1–23.
Ontario issues guidance on RFID use
  • A Cavoukian
The big switch: rewiring the world, from edison to google
  • N Carr
Prison call centers put squeeze on service sector
  • L Sullivan
Protecting personal information using Generally Accepted Accounting Principles and continuous control monitoring
_____. 2008. Protecting personal information using Generally Accepted Accounting Principles and continuous control monitoring. International Journal of Disclosure and Governance 5 (2): 153-166.
Salesforce Automation
  • Salesforce
Salesforce.com. 2009. Salesforce Automation. http://www.salesforce.com/crm/salesforce-automation/ Downloaded October 25, 2009.
Supply-Chain Operations Reference Model
  • Supply-Chain
  • Council
Privacy by design: take the challenge. Office of the Information and Privacy Commissioner of Ontario
  • A Cavoukian