Skip to main content

2018 | Supplement | Buchkapitel

Personal Data Protection Act Enforcement with PETs Adoption: An Exploratory Study on Employees’ Working Process Change

verfasst von : May Fen Gan, Hui Na Chua, Siew Fan Wong

Erschienen in: IT Convergence and Security 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is often that personal data were being misused by organizations for their own benefits. To tackle this issue, different countries had introduced and enforced personal data protection regulations. With the enforcement, organizations in the relevant countries need to comply with the law enforcement to protect personal data as their legal responsibility. Privacy Enhancing Technologies (PETs) act as a form of technology that protects individual privacy data in organizations. The purpose of this research is to discover the impact of personal data protection act enforcement with PETs adoption on organization employees’ working experience and performance through the study of their working process change. This research adopts a qualitative single case study on one of the telecommunication companies in Malaysia. The targeted participants are employees come from different work nature, i.e., use personal data, process personal data or setup system to protect personal data. The finding of this research will enable organizations to have better understanding in future PETs adoption and provide insights on the measures to be taken to comply with personal data protection. This paper presents our preliminary results based on semi-structured interviews with 8 participants from different groups of work nature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Personal Data Protection Act 2010.: Malaysia Attorney General’s Chambers (2010) Personal Data Protection Act 2010.: Malaysia Attorney General’s Chambers (2010)
2.
Zurück zum Zitat Blarkom, G.W.V., Borking, J.J., Verhaar, P.: PET. Handbook of privacy and privacy-enhancing technologies. In: Blarkom, G.W.V., Borking, J.J., Olk, J.G.E. (eds.) Handbook of Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents, Cambridge (2003) Blarkom, G.W.V., Borking, J.J., Verhaar, P.: PET. Handbook of privacy and privacy-enhancing technologies. In: Blarkom, G.W.V., Borking, J.J., Olk, J.G.E. (eds.) Handbook of Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents, Cambridge (2003)
3.
Zurück zum Zitat Chua, H.N., Wong, S.F., Chang, Y.H., Tan, C.M., Gan, M.F.: Personal data protection policy adoption: an exploratory study of Telco Industry’s Implementation. In: 21st Biennial Conference of the International Telecommunications Society, Taipei, 26–29 June 2016 Chua, H.N., Wong, S.F., Chang, Y.H., Tan, C.M., Gan, M.F.: Personal data protection policy adoption: an exploratory study of Telco Industry’s Implementation. In: 21st Biennial Conference of the International Telecommunications Society, Taipei, 26–29 June 2016
4.
Zurück zum Zitat Cao, Q., Jones, D.R., Sheng, H.: Contained nomadic information environments: technology, organization, and environment influences on adoption of hospital RFID patient tracking. Inf. Manage. 51(2), 225–239 (2014)CrossRef Cao, Q., Jones, D.R., Sheng, H.: Contained nomadic information environments: technology, organization, and environment influences on adoption of hospital RFID patient tracking. Inf. Manage. 51(2), 225–239 (2014)CrossRef
5.
Zurück zum Zitat Taneva, S., Law, E., Higgins, J., Easty, A., Plattner, B.: Operating room coordination with the eWhiteboard: the fine line between successful and challenged technology adoption. Health Technol. 1(2–4), 81–92 (2011)CrossRef Taneva, S., Law, E., Higgins, J., Easty, A., Plattner, B.: Operating room coordination with the eWhiteboard: the fine line between successful and challenged technology adoption. Health Technol. 1(2–4), 81–92 (2011)CrossRef
6.
Zurück zum Zitat Aboelmaged, M.G.: Predicting e-readiness at firm-level: an analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms. Int. J. Inf. Manage. 34(5), 639–651 (2014)CrossRef Aboelmaged, M.G.: Predicting e-readiness at firm-level: an analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms. Int. J. Inf. Manage. 34(5), 639–651 (2014)CrossRef
7.
Zurück zum Zitat Delaney, R., D’Agostino, R.: The Challenges of Integrating New Technology into an Organization. Mathematics and Computer Science Capstones, 25 (2015) Delaney, R., D’Agostino, R.: The Challenges of Integrating New Technology into an Organization. Mathematics and Computer Science Capstones, 25 (2015)
9.
Zurück zum Zitat Bergström, A.: Online privacy concerns: a broad approach to understanding the concerns of different groups for different uses. Comput. Hum. Behav. 53, 419–426 (2015)CrossRef Bergström, A.: Online privacy concerns: a broad approach to understanding the concerns of different groups for different uses. Comput. Hum. Behav. 53, 419–426 (2015)CrossRef
10.
Zurück zum Zitat Gellman, R.: The digital person: technology and privacy in the information age. Gov. Inf. Q. 22(3), 530–532 (2005)CrossRef Gellman, R.: The digital person: technology and privacy in the information age. Gov. Inf. Q. 22(3), 530–532 (2005)CrossRef
11.
Zurück zum Zitat Seničar, V., Jerman-Blažič, B., Klobučar, T.: Privacy-enhancing technologies—approaches and development. Comput. Stand. Interfaces 25(2), 147–158 (2003)CrossRef Seničar, V., Jerman-Blažič, B., Klobučar, T.: Privacy-enhancing technologies—approaches and development. Comput. Stand. Interfaces 25(2), 147–158 (2003)CrossRef
14.
Zurück zum Zitat Chan, J.M.J., Chua, H.N., Lee, H.S., Iranmanesh, V.: Privacy and security: how to differentiate them using privacy-security tree (PST) classification. In: International Conference on Information Science and Security (2016) Chan, J.M.J., Chua, H.N., Lee, H.S., Iranmanesh, V.: Privacy and security: how to differentiate them using privacy-security tree (PST) classification. In: International Conference on Information Science and Security (2016)
15.
Zurück zum Zitat Olivier, M.S.: A layered architecture for privacy-enhancing technologies. S. Afr. Comput. J. 31, 53–61 (2003) Olivier, M.S.: A layered architecture for privacy-enhancing technologies. S. Afr. Comput. J. 31, 53–61 (2003)
16.
Zurück zum Zitat Borking, J.J.: Why adopting privacy enhancing technologies (PETs) takes so much time. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 309–341. Springer, Dordrecht (2011)CrossRef Borking, J.J.: Why adopting privacy enhancing technologies (PETs) takes so much time. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 309–341. Springer, Dordrecht (2011)CrossRef
18.
Zurück zum Zitat Wang, Y.-S., Li, H.-T., Li, C.-R., Zhang, D.-Z.: Factors affecting hotels’ adoption of mobile reservation systems: a technology-organization-environment framework. Tour. Manag. 53, 163–172 (2016)CrossRef Wang, Y.-S., Li, H.-T., Li, C.-R., Zhang, D.-Z.: Factors affecting hotels’ adoption of mobile reservation systems: a technology-organization-environment framework. Tour. Manag. 53, 163–172 (2016)CrossRef
20.
Zurück zum Zitat Weerd, I.V.D., Mangula, I.S., Brinkkemper, S.: Adoption of software as a service in Indonesia: examining the influence of organizational factors. Inf. Manag. 53(7), 915–928 (2016)CrossRef Weerd, I.V.D., Mangula, I.S., Brinkkemper, S.: Adoption of software as a service in Indonesia: examining the influence of organizational factors. Inf. Manag. 53(7), 915–928 (2016)CrossRef
21.
Zurück zum Zitat Yin, R.K.: Case Study Research: Design and Methods, 5th edn. SAGE Publications, Thousand Oaks (2009) Yin, R.K.: Case Study Research: Design and Methods, 5th edn. SAGE Publications, Thousand Oaks (2009)
22.
Zurück zum Zitat McGivern, Y.: The Practice of Market and Social Research: An Introduction. Pearson Education, Essex (2007) McGivern, Y.: The Practice of Market and Social Research: An Introduction. Pearson Education, Essex (2007)
23.
Zurück zum Zitat Bloomberg, L.D., Volpe, M.: Completing Your Qualitative Dissertation. Sage Publications, Thousand Oaks (2012) Bloomberg, L.D., Volpe, M.: Completing Your Qualitative Dissertation. Sage Publications, Thousand Oaks (2012)
24.
Zurück zum Zitat Creswell, J.W.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications, Thousand Oaks (2013) Creswell, J.W.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications, Thousand Oaks (2013)
25.
Zurück zum Zitat Proctor, E.K., Landsverk, J., Aarons, G., Chambers, D., Glisson, C., Mittman, B.: Implementation research in mental health services: an emerging science with conceptual, methodological, and training challenges. Adm. Policy Ment. Health Ment. Health Serv. Res. 36(1), 24–34 (2009)CrossRef Proctor, E.K., Landsverk, J., Aarons, G., Chambers, D., Glisson, C., Mittman, B.: Implementation research in mental health services: an emerging science with conceptual, methodological, and training challenges. Adm. Policy Ment. Health Ment. Health Serv. Res. 36(1), 24–34 (2009)CrossRef
26.
Zurück zum Zitat Durlak, J.A., DuPre, E.P.: Implementation matters: a review of research on the influence of implementation on program outcomes and the factors affecting implementation. Am. J. Community Psychol. 41(3–4), 327 (2008)CrossRef Durlak, J.A., DuPre, E.P.: Implementation matters: a review of research on the influence of implementation on program outcomes and the factors affecting implementation. Am. J. Community Psychol. 41(3–4), 327 (2008)CrossRef
27.
Zurück zum Zitat Moulton, S., Sandfort, J.R.: The strategic action field framework for policy implementation research. Policy Stud. J. 45(1), 144–169 (2017)CrossRef Moulton, S., Sandfort, J.R.: The strategic action field framework for policy implementation research. Policy Stud. J. 45(1), 144–169 (2017)CrossRef
Metadaten
Titel
Personal Data Protection Act Enforcement with PETs Adoption: An Exploratory Study on Employees’ Working Process Change
verfasst von
May Fen Gan
Hui Na Chua
Siew Fan Wong
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_25