STRATEGIC USE OF INFORMATION PRIVACY FOR ORGANIZATIONAL SUSTAINABILITY

DR. (Mrs) A. E. BESTMAN (PhD), JOY ONYINYECHI CHINYERE, ABIODU AKINOLA ADEBAYO

Abstract


The purpose of this paper was to provide understanding about the strategic use of information privacy for organizational sustainability and also examine the relationship between information privacy and organizational sustainability. The baseline theory for this study was the restricted access and limited control theory (RALC), while the method used was the secondary methods where literatures were reviewed. The study findings revealed that, the strategic use of information privacy is vital for organizational sustainability as it protect individual’s personal information from malicious users and boosts the confidence and trust the customers have for the organization. The study also found that administrative control and technical control have huge impact on building information privacy protection to achieve organizations sustainability that was measured by corporate reputation and stakeholder’s satisfaction. The study concluded that there is a significant relationship between information privacy and organizational sustainability as well as the dimensions to the measures of the study. Based on the findings and conclusion, the study suggested that organizations and business firms should adopt strong administrative control and technical control as their strategies of ensuring information privacy protection in organization as it positively influence organizational sustainability, which can enable them achieved corporate reputation and stakeholder satisfaction. 

Keywords: Information privacy, organizational sustainability, administrative control, technical control, policy implementation, training, use of contract, access control, authentication, authorization, encryption, corporate reputation and stakeholder’s satisfaction.

CITATION: Bestman, A. E., Chinyere, J. O., & Adebayo, A. A. (2022). Strategic use of information privacy for organizational sustainability. The Strategic Journal of Business & Change Management, 9 (3), 517 - 527.


Full Text:

PDF

References


Ajaegbu, F.O. Andeze, E. (2010). Public policy making and analysis Enug: Spring Time Press.

Beaulieu, S. (2002). Reintroducing stakeholder dynamics in stakeholder thinking: a negotiated-order perspective /Unfolding stakeholder thinking, p. 93.

Belanger, F. & Crossler, R. E. (2011).Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly 35(4), 1017-1042.

Bélanger, F., Hiller, J., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11(4), 245-270.

Bestman, A. E., & Chinyere, J. O. (2021). Decisions support systems and organizational efficiency of the deposit money banks in Port Harcourt, Rivers State. The Strategic Journal of Business & Change Management, 8 (1), 183 – 196

Boudreau, J. & Ramstad, P. (2005). Talentship, talent segmentation, and sustainability: a new HR decision science paradigm for a new strategy definition. Human resource management, 44(2), 129–136.

Bourne, L. (2005), “Project relationship management and the stakeholder circle”, research thesis, RMIT, Melbourne.

Brammer, S. & Pavelin, S. (2004). Corporate reputation and social performance. Mimeo, University of Reading, Uk.

CIPD (2012). Responsible and Sustainable Business: HR leading the way – A collection of “thought pieces”. London: CIPD.

Colbert, B. & Kurucz, E. (2007). "Three conceptions of triple bottom line business sustainability and the role for HRM", Human Resource Planning 30(1) 21-29.

Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: lessons from the choice point and TJX data breaches. Mis Quarterly, 33(4), 673–687.

Fassin, Y. (2009), “The stakeholder model refined”, Journal of Business Ethics, 84(1), 113-135.

Funk, K. (2003). Sustainability and performance: companies that actively manage a wide range of sustainability indicators are better able to create long-term value for all stakeholders. MIT Sloan manag. Rev. (44), 65–70.

Gagular, A., & Lokovic, V. (2007). Interpretation of contract. see law journal, 1-28.

Grosu, V., Socoliuc, M., (2016). Discrimănări contabile privind tratarea fondului comercial, article published in the international conference”paradigm of accounting and auditing: national realities, regional and international trends”. 71-72.

Hamilton, D. I. & Jaja, S. A.(2008). Strategies of administrative control: A study of business organizations in Nigeria. European Journal of Scientific Research. 19(3), 501-509

Hart, S. L. & Milstein, M. B. (2003). Creating sustainable value. Acad. Manag. Perspect. (17), 56–67.

Huemann, M., Weninger, C., Cardoso de Oliveira, J., Mendonça, B., Filho, L. & Weitlaner, E. (2013). Experimenting with project stakeholder analysis: a case study”, in Silvius, G. and Tharp, J. (Eds), Sustainability Integration for effective Project Management. IGI Global, Hershey. 380-393

Lal, N. A., Prasad, S., & Farik, M. (2016). A review of authentication methods. International Journal of Scientific & Technology Research 5(11), 246–249.

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (iuipc): the construct, the scale, and a causal model,” Information Systems Research. 15(4), 336-355.

Mbanaso, U. M., & Cooper, P. G. S. (2018). Privacy Characteristics Of Access Control Systems. September. information Research Institute (IRIS).

Merri, B. L. (2013). Information Privacy Revealed. Educause Review.

Milhem, W., Abushamsieh, K. & Arostegui, M. N. P. (2014). Training strategies , theories and types training strategies , theories and types. Journal of Accounting- Business & Management. 21(1), 12-26.

Moore, A. D. (2007). Toward informational privacy rights. San Diego Law Review. (44), 809-846.

Neubaum, D. O. & Zahra, S. A. (2006) Institutional ownership and corporate social performance: the moderating effects of investment horizon, activism, and coordination. J. Manag. 32, 108–131. 26.

Nofer, D. K. M., Hinz, O., Muntermann, J., & Rossnagel, H. (2014). The economic impact of privacy violations and security breaches. Business & Information Systems Engineering. 6(6), 339-348

Nweke, E. (2006). Public policy analysis: a strategic approach. Enugu: John Jacobs Publishers

Okoli, F. C. & Onah, F. O. (2002). Public administration in Nigeria: nature, principles and applications. Enugu: John Jacobs Classic Publishers.

Olufohunsi, T. (2019). Data Encryption. University of Salford, Manchester

Pelteret, M., & Ophoff, J. (2016). A review of information privacy and its importance to consumers and organizations. International Journal of an Emerging Transdiscipline. (19), 277–301.

Pires, V. & Trez G. (2018). Corporate reputation: a discussion on construct definition and measurement and its relation to performance. Emerald Publishing Limited. (25) 1, 47-64

Ramaswamy V, Ozcan K (2014). The co-creation paradigm. Stanford University Press, P333.

Roberts, P. W., & Dowling, G. R. (2002). Corporate reputation and sustained superior financial performance. Strategic Management Journal, 23 (12), 1077-1093.

Satt, H., Chetioui, Y. (2017). Does goodwill improve firm performance? Evidence from the mena region. Risk Governance & Control; Financial Markets & Institutions, 7(2), 108-115.

Serohin, V. (2021). Information Privacy: A conceptual approach. Constitutional And Legal Academic Studies, 2, 52–60.

Singh, K. J., & Manimegalai, R. (2015). Evolution of encryption techniques and data security mechanisms. Word Applied Sciences Journal. 33(10), 1597–1613.

Solan, L. (2007). Contract As Agreement. Brooklynworks, 353.

Susnienė, D., & Vanagas, P. (2007). Means for satisfaction of stakeholders’ needs and interests means for satisfaction of stakeholders needs and interests. Engineering Economics. 5 (55).

Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1-22.

Tavani, H. T., & Moor, J. H. (2001). Privacy protection, control of information, and privacy enhancing technologies. ACM SIGCAS Computers and Society, 31(1), 6-11.

Verhoeven, J. W. M., Van Hoof, J. J., Keurs, V. T., & Van Vuuren, M. (2012). Effects of apologies and crisis responsibility on corporate and spokesperson reputation. Public Relations Review, 38, 501–504.

White, P. ( 2009). Building a sustainability strategy into business. Corporate governance, 9(4) 386-94.




DOI: http://dx.doi.org/10.61426/sjbcm.v9i3.2386

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

PAST ISSUES:
20242023202220212020201920182017201620152014
Vol 11, No 2 [2024]Vol 10, No 4 [2023]Vol 9, No 4 [2022]Vol 8, No 4 [2021]Vol 7, No 4 [2020]Vol 6, No 4 [2019]Vol 5, No 4 [2018]Vol 4, No 4 [2017]Vol 3, No 4 [2016]Vol 2, No 2 [2015]Vol 1, No 2 [2014]
 Vol 11, No 1 [2024] Vol 10, No 3 [2023] Vol 9, No 3 [2022]Vol 8, No 3 [2021]Vol 7, No 3 [2020]Vol 6, No 3 [2019]Vol 5, No 3 [2019]Vol 4, No 3 [2017]Vol 3, No 3 [2016]Vol 2, No 1 [2015]Vol 1, No 1 [2014]
  Vol 10, No 2 [2023] Vol 9, No 2 [2022]Vol 8, No 2 [2021]Vol 7, No 2 [2020]Vol 6, No 2 [2019]Vol 5, No 2 [2018]Vol 4, No 2 [2017]Vol 3, No 2 [2016]  
  Vol 10, No 1 [2023] Vol 9, No 1 [2022]  Vol 8, No 1 [2021]Vol 7, No 1 [2020]Vol 6, No 1 [2019]Vol 5, No 1 [2018]Vol 4, No 1 [2017]Vol 3, No 1 [2016]   


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.