{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:11:06Z","timestamp":1726848666758},"reference-count":101,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,11]]},"abstract":"Abstract<\/jats:title>Contemporary organisations struggle to develop effective responses to the complex challenge of deploying sophisticated information technology systems in an era characterised increasingly by customer demands for privacy. In this paper, we develop a conceptual framework of Company Information Privacy Orientation that attempts to reconcile the differences between the organisation's information management objectives and its ethical and legal obligations to address customers' privacy. Control theory and justice theory are utilised to build an organisation\u2010level framework that is composed of a firm's ethical obligation to its customers, its customer information management strategy and its assessment of the risks to its business created by legal demands to provide customer information privacy. The four different types of company privacy orientation profiles that emerge from this conceptual framework are then discussed, along with implications for future research.<\/jats:p>","DOI":"10.1111\/isj.12080","type":"journal-article","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T17:45:02Z","timestamp":1434995102000},"page":"579-606","source":"Crossref","is-referenced-by-count":33,"title":["Company information privacy orientation: a conceptual framework"],"prefix":"10.1111","volume":"25","author":[{"given":"Kathleen E.","family":"Greenaway","sequence":"first","affiliation":[{"name":"Reid Here & Associates Wellington Ontario Canada"}]},{"given":"Yolande E.","family":"Chan","sequence":"additional","affiliation":[{"name":"Management Information Systems Queen's University Kingston Ontario Canada"}]},{"given":"Robert E.","family":"Crossler","sequence":"additional","affiliation":[{"name":"Management and Information Systems Mississippi State University Mississippi State MS USA"}]}],"member":"311","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_2_7_2_1","first-page":"5B","author":"Anglen R.","year":"2015","journal-title":"For Uber, the road ahead is uncertain, in: USA Today, Gannett Company,"},{"key":"e_1_2_7_3_1","unstructured":"Apple(2015a)Manage your privacy Retrieved January 26 2015 fromhttp:\/\/www.apple.com\/privacy\/manage\u2010your\u2010privacy\/."},{"key":"e_1_2_7_4_1","unstructured":"Apple(2015b)Privacy built in Retrieved January 26 2015 fromhttp:\/\/www.apple.com\/privacy\/privacy\u2010built\u2010in\/."},{"key":"e_1_2_7_5_1","unstructured":"Apple(2015c)Privacy policy Retrieved January 26 2015 fromhttps:\/\/www.apple.com\/legal\/privacy\/en\u2010ww\/."},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148715"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_2_7_8_1","first-page":"349","article-title":"The governance of privacy: policy instruments in global perspective","volume":"48","author":"Bennett C.J.","year":"2008","journal-title":"Jurimetrics"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518105"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.03.001"},{"key":"e_1_2_7_11_1","unstructured":"Brian M.(2014)What you need to know about the 'right to be forgotten' on Google fromhttp:\/\/www.engadget.com\/2014\/06\/02\/right\u2010to\u2010be\u2010forgotten\u2010explainer\/."},{"key":"e_1_2_7_12_1","unstructured":"Brill J.(2013)Data industry must step up to protect consumer privacy Retrieved January 3 2014 fromhttp:\/\/adage.com\/article\/guest\u2010columnists\/data\u2010industry\u2010step\u2010protect\u2010consumer\u2010privacy\/244971\/."},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/777313.777339"},{"key":"e_1_2_7_14_1","unstructured":"Canada(2013)Investigation into the personal information handling practices of whatsapp Inc. Retrieved January 1 2014 fromhttp:\/\/www.priv.gc.ca\/cf\u2010dc\/2013\/2013_001_0115_e.asp."},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"e_1_2_7_16_1","volume-title":"Privacy Payoff: How Successful Businesses Build Customer Trust","author":"Cavoukian A.","year":"2002"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/0195159535.003.35-chapter-17"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013824909970"},{"key":"e_1_2_7_19_1","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.2307\/41703504","article-title":"Business intelligence in blogs: understanding consumer interactions and communities","volume":"36","author":"Chau M.","year":"2012","journal-title":"MIS Quarterly"},{"key":"e_1_2_7_20_1","unstructured":"Conrath C.(2005)Pipeda hurdles remain in sight say the experts Retrieved December 31 2013 fromhttp:\/\/www.itworldcanada.com\/article\/pipeda\u2010hurdles\u2010remain\u2010in\u2010sight\u2010say\u2010the\u2010experts\/10272."},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.2307\/249775"},{"key":"e_1_2_7_22_1","volume-title":"Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission, in: Washington","author":"Culnan M.J.","year":"1999"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.20.16944"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00067"},{"key":"e_1_2_7_26_1","first-page":"269","volume-title":"Computers, Ethics, and Social Values","author":"Culnan M.","year":"1995"},{"key":"e_1_2_7_27_1","first-page":"199","volume-title":"The Legalistic Organization","author":"Culnan M.","year":"1994"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650322"},{"key":"e_1_2_7_29_1","volume-title":"Working Knowledge","author":"Davenport T.H.","year":"1998"},{"key":"e_1_2_7_30_1","doi-asserted-by":"crossref","first-page":"341","DOI":"10.17705\/1CAIS.01222","article-title":"Information privacy in a globally networked society: implications for IS research","volume":"12","author":"Davison R.M.","year":"2003","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_7_31_1","first-page":"1013","article-title":"Understanding consumer information privacy in the realm of internet commerce: personhood and pragmatism, pop\u2010tarts and six\u2010packs","volume":"84","author":"DeMarco D.A.","year":"2006","journal-title":"Texas Law Review"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_2_7_33_1","unstructured":"Ernst & Young(2013)Privacy trends 2013: The uphill climb continues Retrieved June 3 2014 fromhttp:\/\/www.ey.com\/Publication\/vwLUAssets\/Privacy_trends_2013_\u2010_The_uphill_climb_continues\/$FILE\/Privacy%20trends%202013%20\u2010%20The%20uphill%20climb%20continues.pdf."},{"key":"e_1_2_7_34_1","unstructured":"FTC(2009)FTC staff revises online behavioral advertising principles Retrieved January 1 2014 fromwww.ftc.gov\/news\u2010events\/press\u2010releases\/2009\/02\/ftc\u2010staff\u2010revises\u2010online\u2010behavioral\u2010advertising\u2010principles."},{"key":"e_1_2_7_35_1","unstructured":"FTC(2011)Mobile apps developer settles FTC charges it violated children's privacy rule fromhttp:\/\/www.ftc.gov\/opa\/2011\/08\/w3mobileapps.shtm."},{"key":"e_1_2_7_36_1","unstructured":"FTC(2012)FTC approves final settlement with Facebook Retrieved January 1 2014 fromhttp:\/\/www.ftc.gov\/news\u2010events\/press\u2010releases\/2012\/08\/ftc\u2010approves\u2010final\u2010settlement\u2010facebook."},{"key":"e_1_2_7_37_1","unstructured":"FTC(2013)Path social networking app settles FTC charges it deceived consumers and improperly collected personal information from users' mobile address books Retrieved January 1 2014 fromhttp:\/\/www.ftc.gov\/news\u2010events\/press\u2010releases\/2013\/02\/path\u2010social\u2010networking\u2010app\u2010settles\u2010ftc\u2010charges\u2010it\u2010deceived."},{"key":"e_1_2_7_38_1","unstructured":"Geist M.(2014)Why Uber has a Canadian privacy problem Retrieved January 2 2015 fromhttp:\/\/www.thestar.com\/business\/2014\/11\/21\/why_uber_has_a_canadian_privacy_problem.html."},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.2307\/249564"},{"key":"e_1_2_7_40_1","unstructured":"Google(2015a) About Google Retrieved January 26 2015 fromhttps:\/\/www.google.com\/intl\/en\/about\/."},{"key":"e_1_2_7_41_1","unstructured":"Google(2015b)Our products and services Retrieved January 26 2015 fromhttps:\/\/www.google.com\/intl\/en\/about\/company\/products\/."},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00068"},{"key":"e_1_2_7_43_1","first-page":"137","article-title":"Designing a customer information privacy program aligned with organizational priorities","volume":"12","author":"Greenaway K.E.","year":"2013","journal-title":"MIS Quarterly Executive"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/257990"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148742"},{"key":"e_1_2_7_46_1","unstructured":"Griswold A.(2014)While you were complaining about Uber's ethics its investors gave it another $1.2 billion Retrieved January 2 2015 fromhttp:\/\/www.slate.com\/blogs\/moneybox\/2014\/12\/04\/uber_raises_1_2_billion_new_funding_gives_travis_kalanick_s_ride_service.html."},{"key":"e_1_2_7_47_1","unstructured":"Halliday J.(2014)Google search results may indicate 'right to be forgotten' censorship fromhttp:\/\/www.theguardian.com\/technology\/2014\/jun\/08\/google\u2010search\u2010results\u2010indicate\u2010right\u2010to\u2010be\u2010forgotten\u2010censorship."},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"e_1_2_7_49_1","doi-asserted-by":"publisher","DOI":"10.2307\/249433"},{"key":"e_1_2_7_50_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392714"},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.28"},{"key":"e_1_2_7_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/256728"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_2_7_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1995.11518075"},{"key":"e_1_2_7_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2115-4"},{"key":"e_1_2_7_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_7_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/248873"},{"key":"e_1_2_7_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219681"},{"key":"e_1_2_7_59_1","unstructured":"Maxfield J.(2014)The bank of Wal\u2010Mart is open for business Retrieved January 2 2015 fromhttp:\/\/www.fool.com\/investing\/general\/2014\/09\/24\/the\u2010bank\u2010of\u2010walmart\u2010is\u2010open\u2010for\u2010business.aspx."},{"key":"e_1_2_7_60_1","unstructured":"McCarthy C.(2009)Ad industry groups agree to privacy guidelines Retrieved January 1 2014 fromhttp:\/\/news.cnet.com\/8301\u20101023_3\u201010278182\u201093.html."},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005939232327"},{"key":"e_1_2_7_62_1","unstructured":"McGarry C.(2014)Why Uber's long PR nightmare will end in a user privacy win fromhttp:\/\/www.macworld.com\/article\/2850884\/why\u2010uber\u2010s\u2010long\u2010pr\u2010nightmare\u2010will\u2010end\u2010in\u2010a\u2010user\u2010privacy\u2010win.html."},{"key":"e_1_2_7_63_1","unstructured":"McGrath M.(2014)Wal\u2010Mart snaps same\u2010store sales losing streak Retrieved January 2 2015 fromhttp:\/\/www.forbes.com\/sites\/maggiemcgrath\/2014\/11\/13\/wal\u2010mart\u2010same\u2010store\u2010sales\u2010grow\u2010for\u2010the\u2010first\u2010time\u2010in\u20107\u2010quarters\/."},{"key":"e_1_2_7_64_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.1.35.12567"},{"key":"e_1_2_7_65_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.1.16934"},{"key":"e_1_2_7_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290108168"},{"key":"e_1_2_7_67_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.54.16942"},{"key":"e_1_2_7_68_1","unstructured":"Mogull R.(2014)Why Apple really cares about your privacy Retrieved January 26 2015 fromhttp:\/\/www.macworld.com\/article\/2366921\/why\u2010apple\u2010really\u2010cares\u2010about\u2010your\u2010privacy.html."},{"key":"e_1_2_7_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(98)00037-1"},{"key":"e_1_2_7_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/641205.641212"},{"key":"e_1_2_7_71_1","unstructured":"Panzarino M.(2013)Yahoo will follow Google in encrypting data center traffic customer data flow by q1 '14 Retrieved January 2 2014 fromhttp:\/\/techcrunch.com\/2013\/11\/18\/yahoo\u2010will\u2010follow\u2010google\u2010in\u2010encrypting\u2010data\u2010center\u2010traffic\u2010all\u2010traffic\u2010between\u2010company\u2010and\u2010customers\u2010by\u2010q1\u201014\/."},{"key":"e_1_2_7_72_1","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.2307\/41703505","article-title":"A social network\u2010based inference model for validating customer profile data","volume":"36","author":"Park S.","year":"2012","journal-title":"MIS Quarterly"},{"key":"e_1_2_7_73_1","unstructured":"Price Waterhouse Coopers(2014)10 minutes on data privacy Retrieved June 3 2014 fromhttp:\/\/www.pwc.com\/en_US\/us\/10minutes\/assets\/pwc\u2010data\u2010privacy.pdf."},{"key":"e_1_2_7_74_1","first-page":"27","volume-title":"Cognition and Categorization","author":"Rosch E.H.","year":"1978"},{"key":"e_1_2_7_75_1","first-page":"1","article-title":"Issues of level in organizational research: multi\u2010level and cross\u2010level perspectives","volume":"7","author":"Rousseau D.M.","year":"1985","journal-title":"Research in Organizational Behavior"},{"key":"e_1_2_7_76_1","first-page":"15","article-title":"Online privacy policies: an assessment of the Fortune e\u201050","volume":"42","author":"Ryker R.","year":"2002","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_7_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047070.1047075"},{"key":"e_1_2_7_78_1","unstructured":"Schwartz E.H.(2014) Uber's PR problems are good news for Lyft fromhttp:\/\/inthecapital.streetwise.co\/2014\/12\/02\/ubers\u2010pr\u2010problems\u2010good\u2010lyft\/."},{"key":"e_1_2_7_79_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199808)19:8<729::AID-SMJ967>3.0.CO;2-4"},{"key":"e_1_2_7_80_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"e_1_2_7_81_1","unstructured":"Shey H.(2014)Privacy becomes a competitive differentiator in2015 Retrieved January 26 2015 fromhttp:\/\/blogs.forrester.com\/heidi_shey\/14-11-12-privacy_becomes_a_competitive_differentiator_in_2015."},{"key":"e_1_2_7_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/163298.163349"},{"key":"e_1_2_7_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/41166073"},{"key":"e_1_2_7_84_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"e_1_2_7_85_1","doi-asserted-by":"publisher","DOI":"10.2307\/249412"},{"key":"e_1_2_7_86_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_2_7_87_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"e_1_2_7_88_1","first-page":"349","volume-title":"Research in Personnel and Human Resources Management","author":"Stone E.F.","year":"1990"},{"key":"e_1_2_7_89_1","doi-asserted-by":"publisher","DOI":"10.2307\/248772"},{"key":"e_1_2_7_90_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.07"},{"key":"e_1_2_7_91_1","unstructured":"Toohey T.(2013)Designing for privacy & web success Retrieved January 2 2015 fromhttp:\/\/www.jdsupra.com\/legalnews\/designing\u2010for\u2010privacy\u2010web\u2010success\u201071797\/."},{"key":"e_1_2_7_92_1","first-page":"183","article-title":"\u201c There's no app for that\u201d: calibrating cybersecurity safeguards and disclosures","volume":"68","author":"Trope R.L.","year":"2012","journal-title":"Business Lawyer"},{"key":"e_1_2_7_93_1","unstructured":"Tung L.(2014)Google loses \u2018right to be forgotten\u2019 fight in Europe's top court Retrieved June 10 2014 fromhttp:\/\/www.zdnet.com\/google\u2010loses\u2010right\u2010to\u2010be\u2010forgotten\u2010fight\u2010in\u2010europes\u2010top\u2010court\u20107000029383\/."},{"key":"e_1_2_7_94_1","doi-asserted-by":"publisher","DOI":"10.2307\/257550"},{"key":"e_1_2_7_95_1","unstructured":"UK(2013)Enforcement notice against Google Inc. Retrieved January 1 2014 fromhttp:\/\/www.ico.org.uk\/enforcement\/~\/media\/documents\/library\/Data_Protection\/Notices\/google\u2010inc\u2010enforcement\u2010notice\u201011062013.pdf."},{"key":"e_1_2_7_96_1","unstructured":"Walmart(2015)Walmart privacy policy Retrieved January 26 2015 fromhttp:\/\/corporate.walmart.com\/privacy\u2010security\/walmart\u2010privacy\u2010policy."},{"key":"e_1_2_7_97_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00268.x"},{"key":"e_1_2_7_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70019-8"},{"key":"e_1_2_7_99_1","doi-asserted-by":"publisher","DOI":"10.2307\/249666"},{"key":"e_1_2_7_100_1","doi-asserted-by":"publisher","DOI":"10.2307\/41166102"},{"key":"e_1_2_7_101_1","unstructured":"Winkler R.&Barr A.(2014)Google profit engine rolls on Retrieved January 2 2015 fromhttp:\/\/www.wsj.com\/articles\/google\u2010reports\u201022\u2010revenue\u2010growth\u20101405628219."},{"key":"e_1_2_7_102_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:54:33Z","timestamp":1694501673000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":101,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["10.1111\/isj.12080"],"URL":"https:\/\/doi.org\/10.1111\/isj.12080","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,22]]}}}