Managing the flow of data from regional offices, business partners, and customers around the world is an essential component to efficiently conduct business with any large multinational corporation (MNC). Advances in the Internet have allowed companies to more quickly collect accurate data to better coordinate and integrate all geographically dispersed subsidiaries (Sambharya, & Phatak 1990).
Managing Trans-border Data Flows introduces many complex restrictions that corporations must address, which will be discussed in this paper. Additionally this paper will look into the major challenges in managing global telecommunications network as well as what corporations can do to manage international data communications (IDC).
Restrictions of Trans-Border Data Flows and How to Deal with those Restrictions
Trans-border Data Flows (TDF) is the process to move machine-readable data across national boundaries using electronic means for the purpose of storage and processing (Sambharya, & Phatak 1990). Restrictions with TDF can be divided into three main areas: privacy protection, economic issues and national sovereignty considerations (Waples & Norris 1992).
Privacy Protection
Many countries enacted privacy protection laws in the 1970s to protect citizens from the growing ability to store and process personal data (Waples & Norris 1992). These privacy laws can cause major problems with MNCs especially when dealing with sensitive payroll information of employees in different countries. To help in dealing with this issue the Economic Cooperation and Development (OECD) published voluntary guidelines on personal privacy protection and TDF (Waples & Norris 1992). These guidelines addressed: Collection of personal data, security safegu...
... middle of paper ...
...Harish, C. & Bhatt, R.K. (1992). COMPUTER COMMUNICATION NETWORKS. Retrieved from: http://web.simmons.edu/~chen/nit/NIT'92/013-aro.htm Sambharya, R.B., & Phatak, A. (1990). The effect of transborder data flow restrictions on
American multinational corporations. Management International Review, 30(3),
267-290
Sarkar, M., Cavusgil, S., & Aulakh, P. S. (1999). International expansion of telecommunication carriers: The influence of market structure, network characteristics, and entry imperfections. Journal Of International Business
Studies, 30(2), 361-381.
Lai, V. S., & Chung, W. (2002). Managing international data communications.
Communications of the ACM, 45(3), 89-93.
Waples, E. & Norris, D. M. (1992). Information Systems and Transborder Data Flow.
Retrieved from: http://faculty.usfsp.edu/gkearns/Articles/Information%20Systems
%20and%20Transborder%20Data%20Flow.htm
Program on Telecommunications and Cybersecurity Policy. (n.d.). The Global Information Society Project Program for Telecommunications Policy. Retrieved November 11, 2013, from http://www.telecom-program.org/
Personal data are regulated by United Nations and urges States to implement effective measures to ensure t...
The Internet, originally arising from the American military, has grown to a main source of communication for millions around the world and has helped in creating a global village. The Internet started gaining fast acceptance in the 1990's especially in North America. Countries such as China however, still have limited access and control over the contents on the internet allowed ...
Ans: According to experts, the knowledge and methodologies regarding the offshore development models are growing day by day which inspires many BI professionals to determine the feasibility of offshoring data warehousing and business activities. The challenges such as physical distance and communication are surmountable, even though the extraction, transformation and loading is realistic; the cost involved in interpreting the rules and regulation offset the initial cost but still as compared to building our own data warehouse, its feasible. The social benefits derived from offshoring is huge as it will create ample job opportunities for the people abroad which will improve their economy which in turn reduces one’s costs and help to improve its own economy while paying less.
Privacy: Massive data is collected on individual organisations and used to detect customer shopping patterns, advertisement, security etc. Therefore org...
[8] Organization for Economic Cooperation and Development. (1980) OECD guidelines on the protection of privacy and transborder flows of personal data. [Online]. Available: http://www.oecd.org/EN/document/0,,EN-document-43-1-no-24-10 255-43,00.html
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
Many of us use the internet on a daily basis and the expectation of using the internet is that our research and information is private. The reasons why we have expectations of privacy are due to the rules, laws and regulations set forth in the past by cases involving the use of the internet. The case of Smyth v. Pillsbury Co., 914 F.Supp 97 is a prime example of internet use at work and the privacy expectations. The Communications Decency Act of 1996 criminalizes sending or displaying offensive messages on the internet less than 18 years of age. The Economic Espionage Act criminalizes the theft of confidential business information.
Solove, D. J., Marc R. and Paul M. S., 2006. Privacy, Information, and Technology. Aspen Publishers.
Privacy in the workplace has always been an issue, but now with the introduction of computers in the workplace the ability to collect data on employees has increased significantly. If an employer wanted to, every action by every employee could be collected and analyzed. This type of monitoring isn’t acceptable however, but there are some guidelines that can be followed to define what is acceptable. First we can break privacy into two main categories. Informational privacy, and physical privacy.
The finding of this report are based on four different factors for different factor for analysis of personal data protection and personal data privacy. The first is current regulations, which ……
Along with the incredible opportunities the Internet has created, this global connectivity also has exposed businesses to an excess of regional issues that can dramatically alter a business' potential for profit or loss and also change the risks and threats to the business.
As can be seen, from the information presented, the need for laws and restrictions concerning internet data collection is greatly needed. Moreover, the government can search private citizens data without warrant or cause. Also, companies are not only collecting internet user data but also selling it. The companies and agencies who commit such crimes should be fined or either closed down. In closing, the privacy and security of individuals on the internet should be upheld by the United States government.
Prior to the start of the Information Age in the late 20th century, businesses had to collect data from non-automated sources. Businesses then lacked the computing resources necessary to properly analyze the data, and as a result, companies often made business d...
Privacy is the condition where someone personal information can not be documented and be used by others (Parent, 1983). Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. The foll...