Abstract
This study seeks to provide an understanding of how data security and trust is managed in the collaborative work between technology start-up firms in developing economies and third-party entities. Using qualitative data from Ghana which was analyzed thematically, it was found that the measures taken to ensure the security and privacy of client datasets vary in intensity among firms. Thus, in collaborating with third-parties, the firms largely depend on industry best practices, policies and service-level agreements, and thus do not attempt to integrate the policies of collaborators with their firm’s policies except in situations where the inclusion elimination of certain clauses are collaborative pre-requisites. The firms also have trust criteria which they use to pre-qualify third-party entities with whom they collaborate. It is concluded that technology start-ups possess attribute that show their core competencies and the quality of their deliveries, but might require a regulatory body to monitor their operations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dhillon, G., Syed, R., Sa-Soares, F.: Information security concerns in IT outsourcing: identifying (in)congruence between clients and vendors. Inf. Manag. 54(4), 452–464 (2017)
Gibson, C., Gibbs, J.: Unpacking the concept of virtuality - the effects of geographic dispersion, electronic dependence, dynamic structure and national diversity on team innovation. Admin. Sci. Quart. 51(3), 451–495 (2006)
Ntibrey, L.L.K.: ICT strategies of Ghana - the role of policies and regulations. Mini Project, mICT, Markets and Regulation, Aalborg University, Denmark, February 2012. http://www.academia.edu/10372484/ICT_STRATEGIES_OF_GHANA_The_role_of_policies_and_regulations. Accessed 10 September 2018
Greenberg, M.: The 2014 Ghanaian startup ecosystem. http://meltwater.org/wp-content/uploads/2014/09/Ghanaian_Startup_Ecosystem_Report.pdf. Accessed 12 September 2018
Sultan, N.A.: Reaching for the cloud: how SMEs can manage. Int. J. Inf. Manag. 31(3), 272–278 (2011)
Chiregi, M., Navimipour, J.N.: Trusted services identification in the cloud environment using the topological metrics. Karbala Int. J. Mod. Sci. 2(3), 203–210 (2016)
Manuel, P.: A trust model on cloud computing based on quality of service. Ann. Oper. Res. 233(1), 281–292 (2015)
Sherwin, K.: The hierarchy of trust: the 5 experiential levels of commitment, 2016. https://www.nngroup.com/articles/commitment-levels/. Accessed 15 September 2018
Chou, D.C.: Cloud computing: a value creation model. Comput. Stand. Inter. 38, 72–77 (2015)
Kumar, P.R., Raj, H.P., Jelciana, P.: Exploring security issues and solutions in cloud computing services – a survey. Cybern. Info. Tech. 17(4), 3–31 (2017)
Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15, 2852–2856 (2011)
Takabi, H., Joshi, J.B.D, Ahn, G.-J.: SecureCloud: towards a comprehensive security framework for cloud computing environments. In: 34th Annual IEEE Computer Software and Applications Conference Workshops, pp. 393–398. IEEE Computer Society (2010)
Noor, T.H., Sheng, Q.Z., Zeadally, S., Jian, Y.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), Article 12, October 2013. http://dx.doi.org/10.1145/2522968.2522980
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sanda, MA. (2020). Technology Start-Up Firms’ Management of Data Security and Trust in Collaborative Work with Third-Parties in a Developing Economy. In: Kantola, J., Nazir, S. (eds) Advances in Human Factors, Business Management and Leadership. AHFE 2019. Advances in Intelligent Systems and Computing, vol 961. Springer, Cham. https://doi.org/10.1007/978-3-030-20154-8_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-20154-8_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20153-1
Online ISBN: 978-3-030-20154-8
eBook Packages: EngineeringEngineering (R0)