Skip to main content

Technology Start-Up Firms’ Management of Data Security and Trust in Collaborative Work with Third-Parties in a Developing Economy

  • Conference paper
  • First Online:
Advances in Human Factors, Business Management and Leadership (AHFE 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 961))

Included in the following conference series:

  • 1674 Accesses

Abstract

This study seeks to provide an understanding of how data security and trust is managed in the collaborative work between technology start-up firms in developing economies and third-party entities. Using qualitative data from Ghana which was analyzed thematically, it was found that the measures taken to ensure the security and privacy of client datasets vary in intensity among firms. Thus, in collaborating with third-parties, the firms largely depend on industry best practices, policies and service-level agreements, and thus do not attempt to integrate the policies of collaborators with their firm’s policies except in situations where the inclusion elimination of certain clauses are collaborative pre-requisites. The firms also have trust criteria which they use to pre-qualify third-party entities with whom they collaborate. It is concluded that technology start-ups possess attribute that show their core competencies and the quality of their deliveries, but might require a regulatory body to monitor their operations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dhillon, G., Syed, R., Sa-Soares, F.: Information security concerns in IT outsourcing: identifying (in)congruence between clients and vendors. Inf. Manag. 54(4), 452–464 (2017)

    Article  Google Scholar 

  2. Gibson, C., Gibbs, J.: Unpacking the concept of virtuality - the effects of geographic dispersion, electronic dependence, dynamic structure and national diversity on team innovation. Admin. Sci. Quart. 51(3), 451–495 (2006)

    Article  Google Scholar 

  3. Ntibrey, L.L.K.: ICT strategies of Ghana - the role of policies and regulations. Mini Project, mICT, Markets and Regulation, Aalborg University, Denmark, February 2012. http://www.academia.edu/10372484/ICT_STRATEGIES_OF_GHANA_The_role_of_policies_and_regulations. Accessed 10 September 2018

  4. Greenberg, M.: The 2014 Ghanaian startup ecosystem. http://meltwater.org/wp-content/uploads/2014/09/Ghanaian_Startup_Ecosystem_Report.pdf. Accessed 12 September 2018

  5. Sultan, N.A.: Reaching for the cloud: how SMEs can manage. Int. J. Inf. Manag. 31(3), 272–278 (2011)

    Article  Google Scholar 

  6. Chiregi, M., Navimipour, J.N.: Trusted services identification in the cloud environment using the topological metrics. Karbala Int. J. Mod. Sci. 2(3), 203–210 (2016)

    Article  Google Scholar 

  7. Manuel, P.: A trust model on cloud computing based on quality of service. Ann. Oper. Res. 233(1), 281–292 (2015)

    Article  Google Scholar 

  8. Sherwin, K.: The hierarchy of trust: the 5 experiential levels of commitment, 2016. https://www.nngroup.com/articles/commitment-levels/. Accessed 15 September 2018

  9. Chou, D.C.: Cloud computing: a value creation model. Comput. Stand. Inter. 38, 72–77 (2015)

    Article  Google Scholar 

  10. Kumar, P.R., Raj, H.P., Jelciana, P.: Exploring security issues and solutions in cloud computing services – a survey. Cybern. Info. Tech. 17(4), 3–31 (2017)

    Google Scholar 

  11. Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15, 2852–2856 (2011)

    Article  Google Scholar 

  12. Takabi, H., Joshi, J.B.D, Ahn, G.-J.: SecureCloud: towards a comprehensive security framework for cloud computing environments. In: 34th Annual IEEE Computer Software and Applications Conference Workshops, pp. 393–398. IEEE Computer Society (2010)

    Google Scholar 

  13. Noor, T.H., Sheng, Q.Z., Zeadally, S., Jian, Y.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), Article 12, October 2013. http://dx.doi.org/10.1145/2522968.2522980

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed-Aminu Sanda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sanda, MA. (2020). Technology Start-Up Firms’ Management of Data Security and Trust in Collaborative Work with Third-Parties in a Developing Economy. In: Kantola, J., Nazir, S. (eds) Advances in Human Factors, Business Management and Leadership. AHFE 2019. Advances in Intelligent Systems and Computing, vol 961. Springer, Cham. https://doi.org/10.1007/978-3-030-20154-8_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20154-8_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20153-1

  • Online ISBN: 978-3-030-20154-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics