Concerns for Digital Privacy in Business and Management: An overview and Future Discourses Recommendation

Authors

  • Jaya Addin Linando Universitas Islam Indonesia
  • Guntur Budi Herwanto Universitas Gajah Mada

DOI:

https://doi.org/10.31763/businta.v6i2.508

Keywords:

Digital privacy, Data privacy, Consumer privacy, Business, Management

Abstract

This paper aims to highlight the developing awareness of concern for digital privacy from business and management viewpoint. The authors compile data privacy literature in management field and visualize the literature into 4 main clusters of concerns. The 4 main cluster of concerns in data privacy discourse on management field are: internet; roles-trust-security; locations; and consumer privacy. This paper contributes on the development of research and discourse in data privacy and management domain. Besides delivering the overviews of the digital privacy concerns in business and management fields, the paper also places suggestions for future researchers.

References

E. Santanen, “The value of protecting privacy,” Bus. Horiz., vol. 62, no. 1, pp. 5–14, Jan. 2019, doi: 10.1016/j.bushor.2018.04.004.

Z. Allam and Z. A. Dhunny, “On big data, artificial intelligence and smart cities,” Cities, vol. 89, pp. 80–91, Jun. 2019, doi: 10.1016/j.cities.2019.01.032.

V. S. Litvinenko, “Digital Economy as a Factor in the Technological Development of the Mineral Sector,” Nat. Resour. Res., vol. 29, no. 3, pp. 1521–1541, Jun. 2020, doi: 10.1007/s11053-019-09568-4.

Y. Wang, L. Kung, and T. A. Byrd, “Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations,” Technol. Forecast. Soc. Change, vol. 126, pp. 3–13, Jan. 2018, doi: 10.1016/j.techfore.2015.12.019.

C. Yang, Q. Huang, Z. Li, K. Liu, and F. Hu, “Big Data and cloud computing: innovation opportunities and challenges,” Int. J. Digit. Earth, vol. 10, no. 1, pp. 13–53, Jan. 2017, doi: 10.1080/17538947.2016.1239771.

L. Yang, N. Elisa, and N. Eliot, “Privacy and Security Aspects of E-Government in Smart Cities,” in Smart Cities Cybersecurity and Privacy, Elsevier, 2019, pp. 89–102, doi: 10.1016/B978-0-12-815032-0.00007-X.

J. R. Saura, D. Ribeiro-Soriano, and D. Palacios-Marqués, “Evaluating security and privacy issues of social networks based information systems in Industry 4.0,” Enterp. Inf. Syst., vol. 16, no. 10–11, pp. 1694–1710, Oct. 2022, doi: 10.1080/17517575.2021.1913765.

K. D. Martin and P. E. Murphy, “The role of data privacy in marketing,” J. Acad. Mark. Sci., vol. 45, no. 2, pp. 135–155, Mar. 2017, doi: 10.1007/s11747-016-0495-4.

X. Zhang, Y. Zhu, and N. Hua, “Privacy Parallel Algorithm for Mining Association Rules and its Application in HRM,” in 2009 Second International Symposium on Computational Intelligence and Design, 2009, vol. 2, pp. 296–299, doi: 10.1109/ISCID.2009.220.

P. Swartz, A. Da Veiga, and N. Martins, “Validating an information privacy governance questionnaire to measure the perception of employees,” Inf. Comput. Secur., vol. 29, no. 5, pp. 761–786, Nov. 2021, doi: 10.1108/ICS-08-2020-0135.

S. A. Smith and S. R. Brunner, “To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace,” Manag. Commun. Q., vol. 31, no. 3, pp. 429–446, Aug. 2017, doi: 10.1177/0893318917692896.

D. Carpenter, A. McLeod, C. Hicks, and M. Maasberg, “Privacy and biometrics: An empirical examination of employee concerns,” Inf. Syst. Front., vol. 20, no. 1, pp. 91–110, Feb. 2018, doi: 10.1007/s10796-016-9667-5.

D. Anthony, C. Campos-Castillo, and C. Horne, “Toward a Sociology of Privacy,” Annu. Rev. Sociol., vol. 43, no. 1, pp. 249–269, Jul. 2017, doi: 10.1146/annurev-soc-060116-053643.

Q. Chen, Y. Feng, L. Liu, and X. Tian, “Understanding consumers’ reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects,” Int. J. Inf. Manage., vol. 44, pp. 53–64, Feb. 2019, doi: 10.1016/j.ijinfomgt.2018.09.001.

L. O’Malley, M. Patterson, and M. Evans, “Intimacy or intrusion? The privacy dilemma for relationship marketing in consumer markets,” J. Mark. Manag., vol. 13, no. 6, pp. 541–559, Aug. 1997, doi: 10.1080/0267257X.1997.9964492.

F. A. Mael, “Privacy and personnel selection: Reciprocal rights and responsibilities,” Empl. Responsib. Rights J., vol. 11, no. 3, pp. 187–214, 1998, doi: 10.1023/A:1027307400954.

A. Bleier, A. Goldfarb, and C. Tucker, “Consumer privacy and the future of data-based innovation and marketing,” Int. J. Res. Mark., vol. 37, no. 3, pp. 466–480, Sep. 2020, doi: 10.1016/j.ijresmar.2020.03.006.

J. A. Obar and A. Oeldorf-Hirsch, “The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services,” Information, Commun. Soc., vol. 23, no. 1, pp. 128–147, Jan. 2020, doi: 10.1080/1369118X.2018.1486870.

M. A. Katell, S. R. Mishra, and L. Scaff, “A Fair Exchange: Exploring How Online Privacy is Valued,” in 2016 49th Hawaii International Conference on System Sciences (HICSS), Jan. 2016, vol. 2016-March, pp. 1881–1890, doi: 10.1109/HICSS.2016.239.

C. Prince, N. Omrani, A. Maalaoui, M. Dabic, and S. Kraus, “Are We Living in Surveillance Societies and Is Privacy an Illusion? An Empirical Study on Privacy Literacy and Privacy Concerns,” IEEE Trans. Eng. Manag., pp. 1–18, 2022, doi: 10.1109/TEM.2021.3092702

Downloads

Published

2022-12-30

How to Cite

Linando, J. A., & Herwanto, G. B. (2022). Concerns for Digital Privacy in Business and Management: An overview and Future Discourses Recommendation. Bulletin of Social Informatics Theory and Application, 6(2), 146–150. https://doi.org/10.31763/businta.v6i2.508

Issue

Section

Articles