Vous êtes sur la page 1sur 8

Information & Management 36 (1999) 213±220

Applications
Personal information privacy: implications for MIS managers
Sandra C. Henderson, Charles A. Snyder*
Department of Management, College of Business, Auburn University, 415 W. Magnolia, Auburn AL 36849, USA

Received 23 April 1998; revised 14 January 1999; accepted 20 March 1999

Abstract

Recent media attention to information privacy issues has shown that citizens are increasingly concerned about information
privacy and their right to it. Governmental and other organizations have been collecting data about individuals at an increasing
and, to many, alarming rate. The ability to gather so much information on individuals is largely because of advances in
information technology (IT). It is important for IS managers and professionals to understand the issues surrounding personal
information privacy in order to protect the rights of those from and about whom they collect data. A model is presented to
provide managers guidance in dealing with privacy policy. Taking a proactive stance against privacy invasion could help stave
off government intervention in passing legislation to create tighter controls over what can be done with an individual's
personal data. # 1999 Elsevier Science B.V. All rights reserved.

Keywords: Personal information privacy; Information privacy; Personal data; Privacy; Ethical issues; Right to privacy; Privacy policy

1. Introduction ability of the home and secrecy of communications,


many recently written constitutions, such as South
Privacy is a fundamental right recognized in the Africa's and Hungary's, include speci®c rights to
United Nations Universal Declaration of Human access and control one's personal information. In
Rights, the Council of Europe's Convention for the many countries such as the United States, Ireland,
Protection of Individuals with Regard to Automatic and India where privacy is not explicitly recognized in
Processing of Personal Data, the International Covenant the constitution, the courts or new laws have identi®ed
on Civil and Political Rights, and many other interna- the right to privacy. In addition, international agree-
tional and regional treaties. Privacy has been de®ned as ments that extol the right to privacy, such as the
the `right of individuals to control the collection and International Covenant on Civil and Political Rights
use of personal information about themselves.' The or the European Convention on Human Rights, have
right to privacy has become one of the most important been adopted into law by many countries.
ethical issues of the information age [19]. Privacy, as a right, has roots deep in history. Evi-
Nearly every country in the world recognizes the dence of the protection of privacy Ð with a focus on
right to privacy in their constitutions or laws. While the right to solitude Ð can be found in early Hebrew
some only provide provisions for such rights as inviol- culture and ancient China. Other cultures have recog-
nized the right of privacy as a formal concept for
*Corresponding author. Tel.: +1-334-844-4071; fax: +1-334- centuries: the Greek `contumelia,' the Roman
844-5159; e-mail: snyder@business.auburn.edu `injuria,' the German `Personlichkeitsrecht,' the Swiss
0378-7206/99/$ ± see front matter # 1999 Elsevier Science B.V. All rights reserved.
PII: S - 0 3 7 8 - 7 2 0 6 ( 9 9 ) 0 0 0 1 9 - 1
214 S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220

`Geheimsspare,' and the French doctrine of `la droit de The advent of information technology (IT)
la personnalite.' The English allowed limited protec- increased interest in the right of privacy issue in the
tion only if a collateral property right or breach of a 1960s and 1970s. Largely due to increased surveil-
con®dential relationship was involved [16]. lance potential and record-keeping abilities of com-
Privacy laws can be traced as far back as 1361 when puter systems, laws governing the collection and
the Justices of the Peace Act in England provided handling of personal information were demanded.
protection from peeping Toms and eavesdroppers. In 1970, the ®rst data protection law in the world
During the following centuries, several countries was enacted in the Land of Hesse in Germany.
developed privacy laws. The Swedish Parliament National laws soon followed in several countries:
enacted the Access to Public Records Act in 1776. the Swedish Data Act of 1973, the United States
This Act required that all government-held informa- Privacy Act of 1974, the 1978 Austrian Datenschutz-
tion be used for legitimate purposes. In 1792, the gesetz (DSG), the 1977 German Federal Data Protec-
Declaration of the Rights of Man and the Citizen tion Act (BDSG), the Danish Private Registers Act of
proclaimed that private property was inviolable and 1978, and the 1978 French Act on Data Processing
sacred. Stiff ®nes were invoked in 1858 as France Data Files and Individual Liberties [22].
prohibited the publication of private facts about indi- At the international level, two crucial instruments
viduals. In 1890, American lawyers Samuel Warren evolved in the 1980s: the Council of Europe's (COE)
and Louis Brandeis published a paper that quoted Convention for the Protection of Individuals with
Judge Thomas Cooley's claim that the individual regard to Automatic Processing of Personal Data
has `the right to be let alone.' At this point, the whole and the Organization for Economic Cooperation and
issue of the right to privacy was the direct result of Development's (OECD) Guidelines Governing the
technology and lifestyle, thereby prompting the rather Protection of Privacy and Transborder Data Flows
stinging commentary by Warren and Brandeis: of Personal Data. The rules contained within these
``Instantaneous photographs and newspaper enterprise two documents call for the protection of personal
have invaded the sacred precincts of private and information at every step, from collection to storage
domestic life; and numerous mechanical devices that and dissemination. Individuals also have the right to
threaten to make good the prediction that `what is access and correct or amend their data [7, 23].
whispered in the closet shall be proclaimed from the Over 20 countries have adopted these documents as
house-tops''' [32]. the core as their data protection laws [14]. Based on
The 1948 U.N, Universal Declaration of Human Article 5 of the COE Convention, personal informa-
Rights provided a modern privacy benchmark. Article tion must be:
12 states: ``No one shall be subjected to arbitrary
 obtained fairly and lawfully;
interference with his privacy, family, home or corre-
 used only for the original speci®ed purpose;
spondence, not attacks upon his honour and reputa-
 adequate, relevant and not excessive to purpose;
tion. Everyone has the right to the protection of the law
 accurate and up to data; and
against such interference or attacks'' [31]. Similar
 destroyed after its purpose is completed.
provisions can also be found in Article 8 of the
1950 Convention for the Protection of Human Rights A renewal of the interest in information privacy
and Fundamental Freedoms. From this Convention, occurred in the late 1980s as a result of increased
the European Commission of Human Rights and the database marketing and telemarketing [8]. During this
European Court of Human Rights were created to period, many more countries around the world adopted
oversee the enforcement of privacy rights. The Amer- data protection laws. Information privacy issues
ican Convention on Human Rights Article 11 de®nes remained at the forefront of consumer concern into
the right to privacy in a manner similar to the Uni- the 1990s. This attention has been brought about by
versal Declaration. In 1965, the Organization for the increasing impact of IT on daily life [28] and by
American States called for the protection of privacy recent media attention. As evidence of the renewed
in the American Declaration of the Rights and Duties interest, articles have appeared in newspapers and
of Man. magazines. Television shows have included exposeÂs
S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220 215

involving loss of personal data, and books have been increased information security to policy makers, IS
published on privacy. All have contributed to the managers and professionals must understand the driv-
growing concern about information privacy. However, ing forces surrounding individuals' concern about
perhaps the major impact on information privacy and personal information privacy.
data protection concerns in many countries will come
from the two European Directives that provide their
citizens with a wider range of protection of their data. 2. Driving forces
In 1995, the European Union adopted the Directive
on Data Protection designed to establish minimum There are three main forces driving the growing
standards for the processing and use of personal data. focus on personal information privacy: (1) new tech-
There were two reasons: (1) to ensure protection of the nological capabilities; (2) increasing value of infor-
`fundamental right' to privacy with respect to the mation; and (3) confusion surrounding the de®nition
processing of personal data, and (2) to prevent restric- of what is ethically right and what is wrong [20].
tion of the `free ¯ow of personal data' among EU
Member States on grounds of privacy protection [9]. 2.1. Technological capabilities
The Telecommunications Directive was adopted by the
Council and Parliament of the European Union in 1997. Highly sophisticated technology with its enhanced
This Directive provides for protection to ensure the capacity for communication, computation, storage,
``fundamental rights and freedoms, and in particular and retrieval has given personal information privacy
the right to privacy, with respect to the processing of and the right of privacy new meaning [12]. In the
personal data in the telecommunications sector'' and to 1950s, when documents were kept in ®ling cabinets,
ensure free movement of data, telecommunications control over the information was relatively easy to
equipment and services among Member States [10]. maintain, because physical access to ®les could be
Consumer attitudes about information privacy, con- limited by the use of locks and guards. As computer-
current with the increased media attention and the ization increased, more documents were stored on
European Union Data Protection Directive, have magnetic media, making the provision of security a
brought about a signi®cant increase in the potential greater problem. In the 1990s, documents can still be
legal liability for misuse of an individual's personal ®led in ®ling cabinets, but most are stored on electro-
information [29]. Organizations are being held liable nic media and transmitted over networks in an elec-
for the improper use of information technology and tronic format. As organizations rely more on
personal information. Therefore, organizations need electronic communication, there is increased concern
to be constantly aware of the issues surrounding that privacy will be harder to maintain. The main
personal information privacy and any repercussions threats include computer matching, hackers seeking
that can occur if they do not take precautions to protect passwords or the challenge of breaking a security
the information they collect on individuals. This paper code, corrupt or careless medical records clerks,
presents a normative model designed to aid informa- insurance companies accessing medical records, busy-
tion system (IS) professionals and managers protect bodies in hospitals, e-mail monitoring, and electronic
the personal information of their customers and other surveillance [26, 30].
individuals. The proliferation of Enterprise Resource Planning
IS professionals and managers should be aware of (ERP) and client±server systems has allowed organi-
information privacy issues Ð especially the potential zations to pull data from a number of internal and
impact on existing IS and on future systems develop- external sources. The ability to cross-correlate and
ment. IS managers have the oversight responsibility share information is now relatively easy and cheap.
for information liability as they have the most exten- These capabilities come at a high price for personal
sive knowledge of their organization's systems and information Ð an increased threat to an individual's
programs, and an intimate understanding of the data privacy. Control over personal information is lost and
[27]. However, in order to perform this oversight any data errors are exacerbated as the data move from
function effectively and to provide justi®cation for one computer to another.
216 S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220

New developments in computer technology have decisions. Which actions can be deemed damaging to
enabled organizations to downsize and distribute their an individual's privacy and which are merely incon-
computing platforms. Applications once run on main- venient? Some inconvenient results of increased infor-
frames can now run on PCs with data stored on the mation gathering Ð such as mailbox clutter Ð may be
individual hard disk drives and on LAN ®le servers. acceptable as the price of progress. However, an
Use of corporate Intranets has also become wide- insurance company accessing an individual's medical
spread and data control has become more dif®cult. records to help in determining insurability may be
The trend toward decentralization has contributed to potentially damaging to the individual, especially if
the threat to personal information privacy, mainly there is an error in the database containing the records:
because it is harder to manage data and keep tight the individual may be wrongly denied insurance cov-
control when it is spread out over several computers. erage. With the massive amounts of data being col-
lected by business and government, privacy could
2.2. Increasing value of information easily be compromised by persons with authorized
access [3].
As computing and data management continue to
become more decentralized and control is diffused, the
value of information is increasing with new ways of 3. Rights of information privacy
using it for strategic and competitive advantage. Orga-
nizations have found that the data collected about According to Branscomb [4], ``privacy law consists
customers can be used to target prospects, improve primarily in the protection of that private space sur-
customer satisfaction and retention, and identify rounding one's person into which outsiders should not
opportunities for new products or services. For be permitted to penetrate. Its origins date back to
instance, companies are increasingly targeting certain common courtesy and social more that respected
consumer segments instead of all potential buyers. In the need for private spaces. . ..'' Currently, privacy
order to do this, companies need to know speci®c laws in the United States and many other countries
purchasing characteristics of individuals. Therefore, it do not provide the protection of, for instance, the
is necessary to store and share information with other European Union. For example, the U.S. Privacy Act
organizations Ð usually without user knowledge or of 1974 offers only protection against data held in
permission. The ability to gather this information, government databases about U.S. citizens. Where does
often from several sources, is made possible because this leave the protection an individual's personal data
of increased processing speeds and decline in storage from private sector organizations in the United States?
costs. The use of such capabilities for this unauthor- For the most part, private organizations are exempt
ized secondary use of personal information has caused from privacy legislation with the exception of the Fair
the largest outcry from the public about personal Credit Reporting Act of 1970, the Family Educational
information privacy violations. However, Hagel and Rights and Privacy Act of 1978, the Privacy Protection
Rayport [15] suggest that this outcry is more the result Act of 1980, the Cable Communications Policy Act of
of consumers becoming aware of the value of the 1984, and the Video Privacy Protection Act of 1988.
information that they have freely divulged in the past. The main limitations of these laws is that enforcement
Therefore, they propose that the legality of gathering is entirely in the hands of the individuals who must re-
and using an individual's personal information is coverdamagesincourt.Thus,privacylawsdonotprotect
largely dependent upon the individual's perception privacy well and, in fact, are far behind the develop-
of who is gaining value for the use of the information mental trajectory of information technology [18].
Ð the organization or the individual.

2.3. Right and wrong 4. Privacy policy

IT has changed the public's perception of privacy. The publicity surrounding privacy issues has led to
Organizations are faced with completely new policy some action. ``Our awareness has been raised; our
S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220 217

resistance, increased. We must act with vigor and easily secure tax and income data without the IRS
vigilance to ensure our privacy, for it is a right that verifying the caller's true identity. The manager of any
affects every individual with an identity and a personal organization, public or private, with databases con-
history'' [11]. taining sensitive personal data should establish ade-
Despite privacy laws that have been enacted in quate policies and ensure that they are properly
many countries, there is still a need to develop national promulgated to those workers who have responsibility
privacy policies that address: the balance between the for the protection of privacy. However, one potential
right to privacy and the right to access; the expecta- problem with this concept or any other privacy rule or
tions of individuals and the needs of society; the standard is enforcement: Who decides what privacy
appropriate level of privacy protection that should rules, laws, or standards apply to any given situation?
be afforded to public ®gures, private persons, govern- Who enforces these rules or codes [13]?
ments and other organizations; clear guidelines as to Four principles should be followed in data collec-
what information an individual can be compelled to tion: (1) data should be collected on individuals only
reveal to bene®t society and what should be under his to accomplish a legitimate business objective; (2) data
or her control [33]. However, privacy policies are should be adequate, relevant, and not excessive in
notoriously weak Ð often reading more like a simple relation to the business objective; (3) data should be
disclaimer. According to Rotenberg [25], ``The essen- obtained in a lawful manner; and (4) individuals must
tial framework for privacy protection Ð a code of fair give their consent before data pertaining to them can
information practices, setting out the obligations of be gathered Ð such consent may be implied from the
companies that collect personal information and the individual's actions. Four principles also apply to data
rights of individuals that give personal information Ð accuracy to ensure that misleading information will
is often missing, incomplete or unenforceable.'' As not be distributed: (1) sensitive data gathered on
an alternative to government regulation, industries individuals should be veri®ed before it is entered into
and individual organizations should consider other the database; (2) data should be accurate and, where
methods. necessary, kept up to date; (3) the ®le should be made
available so that the individual can ensure that the
data are correct; and (4) if there is a disagreement
5. Self-regulation and policy about the accuracy of the data, the individual's version
should be noted and included in any disclosure of
Self-regulatory policies and procedures may be a the ®le. In order to ensure data con®dentiality: (1)
way to handle information privacy issues. The Asso- computer security procedures should include physical,
ciation for Computing Machinery (ACM) has included technical, and administrative security measures; (2)
a section on privacy in its Code of Ethics and Profes- third parties should not be given access to data
sional Conduct. Their code states that ``It is the without the individual's knowledge or permission,
responsibility of professionals to maintain the privacy except as required by law; (3) disclosures of data,
and integrity of data describing individuals. This other than the most routine, should be noted and
includes taking precautions to ensure the accuracy maintained for as long as the data are maintained;
of data, as well as protecting it from unauthorized and (4) data should not be disclosed for reasons
access or accidental disclosure to inappropriate indi- incompatible with the business objective for which
viduals'' [1]. it was collected [2].
The importance of having adequate policies in Whether governments enact more privacy laws or
effect is hard to overestimate. An example of loose organizations follow self-regulation, IS managers and
policy was the U.S. Internal Revenue Service (IRS) general managers need to implement controls to
revelation of sensitive private data from taxpayer ensure that the information collected is done so in a
records in response to telephone inquiries for which manner that protects the individuals' personal infor-
the caller only had to provide name, social security mation privacy. Several issues should be addressed by
number, and address. In an investigation, the IRS both managers to ensure they are knowledgeable about
found that their auditors (and other individuals) could the latest developments in information privacy.
218 S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220

6. Implications for managers nated person keep up with the organization's practices
concerning personal information. Currently, there is a
Careful consideration of the implications of perso- need for IS managers to take a proactive stance re-
nal information privacy issues should be a priority in garding information privacy management issues. If
organizations. Conscious and deliberate decisions they do not do so, levels of concern about information
must be made by upper management on the operation, will continue to rise and citizens will look to the gover-
control, and management of information services [17]. nment for solutions [21]. While there is not necessarily
Managers should identify any potential underlying anything wrong with government intervention, in
privacy-related problems and be prepared to take many industries self-regulation works better.
corrective actions and appropriate measures to protect IS managers need to think through potential infor-
the individual's privacy. Table 1 contains a normative mation problems within their ®rms and take action to
model that could be embraced by organizations who reduce the risk that their information systems might be
are concerned about privacy issues and are ready to take used to invade an individual's privacy. There are
a stance to help ensure individuals' rights to privacy. several areas in which IS managers should be parti-
Managers need to be aware of new developments. cularly cautious. First, an organization does not need
One person should be designated responsible for to store information that it does not need nor informa-
information liability and to maintain a close connec- tion that could cause public backlash. Second, infor-
tion with functional area managers. This practice mation should be used for the purposes for which it
would help ensure that privacy policies are maintained was collected or for which individuals believe it was
and legislation monitored and that the information collected. Third, if information is shared electroni-
reaches the appropriate personnel. Close contact with cally, the organization should have approval of the
the functional area managers would help the desig- individuals concerned or knowledge that the indivi-
duals would approve of the sharing. Next, proper
Table 1 human judgement should be used in making decisions
A proposed normative model for privacy issues in the organization concerning an individual's personal information. A
manager should also be cautious when pieces of per-
1. Assume responsibility for personal information
sonal information are pulled from different sources to
a. Designate one individual responsible for information liability
b. Educate appropriate personnel on privacy policy
make a more complete ®le. Finally, internal controls and
2. Map privacy sensitive data procedures should be in place to prevent and/or correct
a. Identify databases with personal information any errors in an individual's personal information.
b. Identify use of personal information IS managers also need to take into consideration the
(1) Applications requiring use following points: access to data should be limited to
(2) Applications not requiring use
(3) Protection afforded an individual's personal information
only those who actually need access to the data, and
3. Ascertain extent of personal information hard copy and oral data need to be protected just as
a. Adequacy for business objective much as computerized data [24]. An IS manager
b. Relevance for business objective should also keep in mind the fact that individuals
c. Non-excessive data collected for business objective are less likely to perceive practices as privacy-invasive
4. Ensure data sources and controls
a. Lawful collection of personal information
when (1) information is collected under the umbrella
b. Accurate information in databases of an existing relationship; (2) they feel that they have
c. Verified information databases control over future use of the information; (3) the
d. Promulgation of policy information collected or used is relevant to the trans-
5. Disclose information to individuals concerned action; and (4) they believe the information will be
a. Resolve in favor of individuals
b. Assure security of data
used to draw reliable and valid inferences about them.
c. Obtain permissions for internal and third-party use With the proliferation of data warehousing and data
6. Document use mining, the vulnerability of organizations to accusa-
a. Record all disclosures and purposes (provide an audit trail) tions of misuse of personal data is likely to increase.
b. Designate responsible managers Most data warehouses re-orient data to have a custo-
7. Take action to limit damage if procedure breaks down
mer focus. Some organizations have reported the
S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220 219

ability to provide detailed personal data pro®les for page, Downloaded from http://www.acm.org/constitution/co-
their customers so that individuals can become market de.html.
[2] M.H. Agranoff, Controlling the threat to personal privacy:
segments of size one. Thereby, one long distance Corporate policies must be created, Journal of Information
provider is said to have greatly increased the effec- Systems Management 8, 1991, pp. 48±52.
tiveness of its telemarketing efforts to reduce loss of its [3] I.L. Auerbach, Professional responsibility for information
most valuable customers. The ability to amass perso- privacy, Journal of Information Systems Management 2(1),
nal data from multiple sources and generate `intimate' 1985, pp. 77±81.
[4] A.W. Branscomb, Who Owns Information? From Privacy to
customer pro®les is likely to lead to widespread Public Access, Basic Books, A Division of Harper Collins,
deployment of such systems. Managers contemplating New York, 1994.
such moves must be sure that they implement policies [5] J. Bresnahan, Up Close and Personal, CIO, 15 May, 1997.
to protect the personal data they wish to exploit or tell [6] J. Bresnahan, The Business Case for Privacy, CIO, 15 March,
their staffs that they are likely to face stiff rebuke and 1998.
[7] Council of Europe, Convention for the Protection of
penalties if the data are misused. Individuals with Regard to Automatic Processing of Personal
A proactive stance against personal privacy inva- Data, ETS No. 108, Strasbourg, 1981, Downloaded from
sion could help prevent tighter and possibly onerous http://www.coe.fr/eng/legaltxt/108e.htm.
legislation aimed at protecting individuals. With the [8] M.J. Culnan, How did they get my name? An exploratory
investigation of consumer attitudes toward secondary
U.S. government's inept handling of previous legis-
information use, MIS Quarterly 17(3), 1993, pp. 341±363.
lative attempts to control the proliferation of personal [9] Directive 95/46/EC of the European Parliament and of the
information available due to information technology, Council of 24 October 1995 on the protection of individuals
self-regulation either by the industry or individual with regard to the processing of personal data and on the free
organization could be the best answer. When indivi- movement of such data, Downloaded fromhttp://www.od-
duals have had enough of privacy-invasion issues, pr.org/resto®t/Directive/Directive_Contents.html.
[10] Directive 97/66EC of the European Parliament and of the
such as their personal information being massaged Council of 15 December 1997 concerning the processing of
by too many computers without their consent, govern- personal data and the protection of privacy in the
ments worldwide will be forced to deal with the issue telecommunications sector, Downloaded from http://
by enacting further legislation that will require the www2.echo.lu/legal/en/dataprot/protection.html.
consent of individuals before marketing information [11] P.F. Eder, Privacy on parade: Your secrets for sale! Futurist
28(4), 1994, 38±42.
about them. [12] W. Freedman, The Right of Privacy in the Computer Age,
Another twist to this complex issue deals with Quorum Books, Westport, CT, 1987.
individuals becoming increasingly aware of the value [13] R. Gellman, Con¯ict and overlap in privacy regulation:
of their personal data. Currently, organizations col- National, international, and private, in: B. Kahin, C. Nesson
(Eds.), Borders in Cyberspace: Information Policy and the
lecting personal data about individuals appear to have
Global Information Infrastructure, A Publication of the
the power of ownership of the data. However, indivi- Harvard Infrastructure Project, The MIT Press, Cambridge,
duals may soon reclaim ownership of their data and MA, 1997.
demand value Ð in the form of better service or even [14] Global Internet Liberty Campaign, Privacy and Human
cash Ð in exchange for it [5]. This could have a major Rights: An International Survey of Privacy Laws and
impact on the cost of collecting and maintaining Practice, Downloaded from http://www.gilc.org/privacy/sur-
vey/intro.html.
consumer data. Protecting individuals' privacy can [15] J. Hagel, III, J.F. Rayport, The coming battle for customer
help ensure the continued willingness of individuals information, Harvard Business Review 75(1), 1997, pp. 53±
to share their information. According to Bresnahan, 65.
`privacy protection pays' because `indifference can [16] M.L. Huttenstine, The right to be let alone: A descriptive
analysis of the right of privacy in the cases from 1880
get you in trouble' [6].
through 1983, unpublished doctoral dissertation, University
of North Carolina, Chapel Hill, 1985.
[17] R. Karni, A methodological framework for formulating
References information policy, Information and Management 6, 1983,
pp. 269±280.
[1] ACM (Association for Computing Machinery), Code of [18] K.C. Laudon, Markets and privacy, Communications of the
Ethics and Professional Conduct, Section 1.7, ACM web ACM 39(9), 1996, pp. 92±104.
220 S.C. Henderson, C.A. Snyder / Information & Management 36 (1999) 213±220

[19] R.O. Mason, Four ethical issues of the information age, MIS sheworked as a controller and IS coordinator for a light
Quarterly 10(1), 1986, pp. 4±12. manufacturing plant. Her current research interests include
[20] F.W. McFarlan, Privacy and IT Use, CIO 3, 1990, pp. 82±85. information privacy, transborder data flows, and database systems
[21] S.J. Milberg, S.J. Burke, H.J. Smith, E.A. Kallman, Values, development. She has presented at the SAIS conference.
personal information privacy, and regulatory approaches,
Communications of the ACM 38(12), 1995, pp. 65±74. Charles A. Snyder is the Woodruff
[22] National Omnibus Laws, Data Protection Summaries, Endowed Professor of Management
Downloaded from. (MIS) in the Department of Management
[23] Organization for Economic Cooperation and Development, at Auburn University. He received a
Guidelines on the Protection of Privacy and Transborder Ph.D. in Management from the Univer-
Flows of Personal Data, Downloaded from http://www.oec- sity of Nebraska. He holds an MS in
d.org//dsti/sti/it/secur/prod/priv-en.htm. Economics from South Dakota State
[24] G. Rifkin, Information technology: Privacy matters, Harvard University, an MBA from Ohio State
Business Review 72, 1994, pp. 8±9. University, and a BFA from the Uni-
[25] M. Rotenberg, For Privacy, New Laws, The Industry versity of Georgia.
Standard, December 14±21, 1998, 1(23), p. 41. His more than 100 refereed publica-
[26] E.H. Sibley, IS as a Threat to Privacy, Chap. 2; Downloaded tions have appeared in leading journals such as The Journal of
from http://os¯.gmu.edu/esibley/ch2.html. Management Information Systems, Information and Management,
[27] D. Slater, The Data Game, CIO, 1 May 1997. The Academy of Management Review, The Academy of Manage-
[28] H.J. Smith, Privacy policies and practices: Inside the ment Executive, California Management Review, Data Manage-
organizational maze, Communications of the ACM 36(12), ment, The International Journal of Man±Machine Studies, The
1993, pp. 105±122. Journal of Information Systems Management, IEEE Transactions
[29] D.W. Straub, Jr., R.W. Collins, Key information liability on Engineering Management, The Journal of Engineering and
issues facing managers: Software piracy, proprietary data- Technology Management, Production and Inventory Management
bases, and individual rights to privacy, MIS Quarterly 14(2), Journal, and Decision Support Systems. He has published many
1990, pp. 143±156. scientific Proceedings articles, technical reports, and book chapters.
[30] C. Tenopir, Privacy, security, and data integrity, Information He is co-author of The Management of Telecommunications,
Today 14(8), 1997, pp. 9±67. published by Irwin McGraw-Hill.
[31] United Nations Universal Declaration of Human Rights, He has extensive management, research, and consulting
Downloaded from http://www.hrweb.org/legal/udhr.html. experience. His research interests include knowledge management,
[32] S.D. Warren, L.D. Brandeis, The right to privacy, Harvard information resource management, expert systems, computer-
Law Review, March 1890, 193±220. integrated manufacturing, systems analysis and design, and
[33] S. Warwick, Privacy and policy, American Society for telecommunications management. Dr. Snyder is a member of
Information Science Bulletin 23(3), 1997, pp. 14±15. SIM, DSI, ACM, IEEE, IRMA, AIS, SAIS, and other major
professional societies. He is the past President of the Alabama SIM
Sandra C. Henderson is a doctoral stu and the Southern MIS Association. He is currently a member of the
dent of Management Information Sys- Society for Information Management working group on knowledge
tems in the Department of Management management and is Alabama representative to the International
at Auburn University. She holds an organization. Dr. Snyder has consulted to such firms as AT&T,
Master's of Accountancy with a concen- BellSouth, South Central Bell, TRW, Coors, and software
tration in Accounting Information Sys- companies. He serves as a director of five organizations. Before
tem from Florida State University. She his academic career, he served for 20 years in a variety of
received a B.S. in Accounting from operations, staff, and command positions as an officer in the USAF.
Albany State University. Previously,

Vous aimerez peut-être aussi