Enhancing Information Privacy and Data Sharing Case Enhancing Information Privacy and Data Sharing in a Healthcare IT Firm: The Case of Ricerro Communications Wingyan Chung, School of Business & Economics, Fayetteville State University, USA, wchung@uncfsu.edu Lewis Hershey, School of Business & Economics, Fayetteville State University, USA lhershey@uncfsu.edu ABSTRACT Information privacy and data sharing are two conflicting but important data management concerns. As more data are shared among stakeholders, the design of information systems (IS) often emphasizes on data sharing at the expense of information privacy. Unfortunately, existing IS research on designing tools to enhance information privacy is isolated from actual use of the tools. In this research, we examined the design of a data sharing system in a real-world company. The company, Ricerro Communications, Inc., produces and markets wearable communications devices used mainly in healthcare organizations. Poor data sharing in Ricerro’s multiple systems resulted in loss of information privacy and security and inefficiency, seriously affecting customer relationship management. A consulting team has analyzed Ricerro’s needs, gathered stakeholder requirements, and developed a privacy-enhancing data integration solution, which consists of database schema integration and data migration from various sources to a Web-based transaction processing system. Through this industry case, we illustrate how our developed principles and guidelines for designing IT artifacts incorporate the benefits of information privacy and data sharing. KEY WORDS Information Privacy, Data Sharing, Data Integration, Healthcare IT, CRM, Design-Science Research, Business Intelligence. PROLOGUE Ricerro’s1 CFO, Daniel Morgan, and IT Director, Carl Silver, were meeting in one of the company’s conference rooms. 1 While all organizations, people, and details mentioned in the case study are real, their names are fictitious due to a non-disclosure agreement. A list of abbreviations used in this research is shown in Appendix 1. 55 Enhancing Information Privacy and Data Sharing Case “Ricerro is growing quickly,” Daniel said, “but I am getting complaints from sales and administration about data privacy problems causing big headaches.” “What headaches are you talking about?” Carl asked. “I heard that customer data on software licenses and maintenance are not protected properly. Data privacy is lost and inaccuracy occurs in the process. They tell me stories about multiple versions of customer private data are available in Excel sheet, database, and paper format, some of which are accessible by unauthorized users in the company. They are even having trouble determining which information is correct, and they have to manually transfer this data between databases. What IT is doing with the budget they are given??” Daniel replied. Carl felt that he might not have enough time to tackle this problem and said, “Ok, I know people at Mission Consulting Group (MCG) that may be able to help us come up with a solution. Would the company be willing to support MCG as they work with us?” “Sure, I am looking forward to seeing accurate data being made available in a timely and secure manner.” Daniel replied. INTRODUCTION Information privacy and data sharing are two conflicting but important data management concerns. Data sharing aims at providing convenient, ubiquitous access and use of data. A major reason for the existence of information technology (IT) is to facilitate sharing of data and information. Database technologies, data integration software, and business intelligence tools are developed to support this important task. Customers can use shared data to track the orders they placed. Managers can use accurate and timely data to make the right decisions. Suppliers access these shared data to ensure their procurement and delivery are on-time and correct. Despite the benefits of sharing data, adoption of IT for healthcare application is not without its problems. For one, information privacy can be compromised in data sharing. As more data are shared among stakeholders, information privacy increasingly becomes a concern. Information privacy is the desire of individuals to have influence or control over data about themselves (Belanger, Hiller, & Smith, 2002). Bady (2011) traced back the history of privacy law since 1890 and found that modern technology development has consistently removed protection for information privacy. As contemporary information technologies continue to suppress information privacy, Bady concluded that new countervailing technologies are needed to enable privacy to survive. In this research, we examine through a real-world company case the design of information systems (IS) that could simultaneously enhance both data sharing and information privacy. We conducted a literature review to examine usual security and 56 Enhancing Information Privacy and Data Sharing Case privacy issues in healthcare IT firms and design of privacy-enhancing data integration solutions. We present a case study about a healthcare IT firm and describe the solution developed to address data sharing and information privacy. Case studies involving a single organization are not new (Zafar, 2011; Yin, 2008). We provide technical details in the design process and distill the systems design principles and guidelines. The results should contribute to the design science academic community and the IT development practice, especially concerning data sharing and information privacy. LITERATURE REVIEW In this section, we review security and privacy issues in healthcare data sharing that is served by the firm described in our case. We also review prior works on the design of privacy-enhancing information systems that relate to our research goals. Security and Privacy Issues in Healthcare Data Sharing Concerns about maintaining patient privacy when adopting IT solutions for healthcare systems involve several key areas such as organizational-level issues, individual-level issues, authentication, and privacy protection. Regarding organizational and protection issues, Winker et al. (2000) note the difficulty of developing and enforcing uniform standards for Web-based information that both enhances the physician-patient relationship and protects patient privacy. Regarding such enhancement, Tang, Ash, Bates, Overhage, & Sands (2006) report that the integration of personal health records (PHR) with electronic health records (EHR) systems allows patients to become active participants in improving their own healthcare outcomes. Despite the advantages of such integration, the authors note that the very act of combining such systems exposes the patient’s records to possible compromise of private information. As such, the need for authentication for access becomes paramount. Echoing concern for authentication issues, Vest & Gamm (2010) survey two decades of efforts to create comprehensive health information exchanges (HIE) to improve communication across fragmented patient records across medical specialties and identify concerns about security as a continuing issue. Yet advances in IT design and implementation are showing inroads into authentication concerns. For example, Ge, Ahn, Unde, Gage, & Carr (2013) address privacy concerns in the sharing of medical imagery by use of Patient Controlled Access-key REgistry (PCARE), whereby the patient provides digital access to identified providers who then can access the imagery data directly via electronic delivery. Furthermore, the issue of privacy itself may be of less concern for some patient groups than others or than for providers. For example, Hassol et al. (2004) report little concern among patients about breach of confidentiality in the use of electronic communications (email and web-based texting) in a survey of 4,282 registered patients. However, potential healthcare delivery outcomes may arise due to differences between patient preferences for mode of communication (email and 57 Enhancing Information Privacy and Data Sharing Case texting) and those of physicians (telephone). These differences are exacerbated by the fact that the preferred mode of communication for each group is the least preferred mode of the other. Table 1 summarizes the main findings. Table 1. Ongoing Security and Privacy Issues Regarding Healthcare Data Sharing Issue Research Winker, et al. (2000) Tang, et al. (2006); Vest & Gamm (2010) Seto & Friedman (2012) Finding Lack of industry-wide standards Personal records necessarily uniquely identifiable Organizational Level Issues Fragmentation across medical specialties Increased efficiencies and effectiveness Payne et al. (2012) possible Patient-physician differences in Hassol, et al. (2004) preferences for modes of communication Individual Level Issues Useful integration across IT creates risk Tang, et al. (2006) for privacy compromise Authentication Ge, et al. (2013) Use of patient controlled access keys Use of patient controlled access keys Ge, et al. (2013) Privacy Malin, Emam, & O'Keefe, Informatics innovations improve data Protection (2013); Ohno-Macado (2013) sharing while enhance privacy protection While risks to patient privacy are an on-going concern, adoption of the state of the art information technologies in the healthcare industry is critically important for at least two reasons: costs savings and improved healthcare delivery. Regarding cost savings, Hillestad et al. (2005) note the inefficiency of the U.S. Healthcare System and estimate that adoption and implementation of modern IT infrastructure could save $81 billion per year. Similarly, Payne, et al. (2012) identify substantial cost savings in the use of healthcare IT, not only in increased efficiencies for current treatments, but also in the support for developing new models of healthcare delivery systems. Along these lines, Woolhandler, Campbell, & Himmelstein (2003) compare discrepancies in cost structure between U.S. and Canadian healthcare administration systems and advocate savings for U.S. healthcare by adopting the Canadian model. Regarding health safety issues, Schnipper et al. (2012) studied the use of electronic personal health record (PHR) linked medications for accuracy and safety against traditional record keeping control groups and found improvements in both administration of the correct dosage and a decrease in potentially harmful effects from unexplained discrepancies between prescription and actual medication given. Similarly, Apparil, Carian, Johnson, & Anthony (2012) studied the use of computerized physician order entry (CPOE) and electronic medication administration records (eMAR) for monitoring medication order delivery effectiveness and found the use of eMAR alone or in combination with CPOE to improve adherence to guidelines. However, despite improvements in health delivery safety, adoption of IT for health 58 Enhancing Information Privacy and Data Sharing Case systems is not without its problems. For example, while Seto & Friedman (2012) recognize the value of sharing electronic health records (EHRs) across computerbased platforms, they note the difficulty implementing file sharing standards across differing medical specialties. Design of Privacy-Enhancing Data Integration Solutions Information privacy is an active research area within the information systems and computer science research communities. Privacy and trust issues are important yet frequently ignored concerns among systems designers and researchers. While many companies might have an explicit company privacy policy, few do so at the design level (Lahlou, Langheinrich, & Röcker, 2005). This is a significant issue, especially in the early stages of technological development, as design decisions have far-reaching consequences for the future costs of privacy protection within the system. According to Lahlou, et al. (2005), the design of adequate solutions will succeed only if privacyrelated problems are methodically approached from the initial stages of development. In the “Disappearing Computing” initiative, nine guidelines for information systems design were developed (Lahlou & Jegou, 2004): “think before doing,” “revisit classic solutions,” “openness,” “privacy razor,” “third-party guarantee,” “make risky operations expensive,” “avoid surprise,” consider time” and “good privacy is not enough.” Although privacy is a key design issue, the advocated guidelines are too general to be applicable to companies that have complex data sharing requirements; such as in healthcare IT firms. The Journal of the American Medical Informatics Association recently published a special issue on public sharing of medical informatics data while protecting individual privacy (Malin, Emam, & O'Keefe, 2013; Ohno-Macado, 2013). The issue contains papers grouped into socio-legal track and technical track, each offering examples of sharing public healthcare data in a privacy-preserving manner (through deidentification, e.g., as in the PopData project (Hertzman, Meagher, & McGrail, 2013)) and providing technical solutions to protecting patients’ privacy when sharing data (e.g., deriving a secure fingerprint from genomic data (Cassa, Miller, & Mandl, 2013)). Despite the cutting edge informatics research, none of the published papers describes their outcomes in the context of healthcare IT firms that have complicated data sharing requirements. In addition, the technical solutions described in some of the papers are applicable mainly in cryptographic applications but provide limited guidance for systems design of healthcare IT firms’ data sharing. After reviewing over 500 articles in information privacy research in information systems and having coded 142 journal articles and 102 conference proceedings papers, Belanger and Crossler found few studies in journal articles focusing on design and action contributions, which could potentially bring a larger impact to real-world businesses than USA-centric, student-based studies on which existing research relies heavily (Belanger & Crossler, 2011). Much of research on information privacy tools and technologies was conducted in isolation from actual future users of the tools. 59 Enhancing Information Privacy and Data Sharing Case Therefore, Belanger and Crossler recommended that researchers should conduct more design and action research, with an eye towards actual implementation. Major contributions expected from such research are tools and technologies developed from a design science perspective (Hevner, March, Park, & Ram, 2004). However, the design of these IT artifacts often emphasizes on data sharing at the expense of information privacy. RESEARCH DESIGN Considering the lack of design-science research on privacy-enhancing data integration solutions for healthcare IT firms, we conducted a case study research to examine the principles and guidelines of designing privacy-enhancing data sharing systems applicable to healthcare IT firms. The case study research method is defined as an empirical inquiry that investigates a contemporary phenomenon within its real-life context (Yin, 2008). Case study research brings an understanding of a complex issue or object and can extend experience or enrich the literature (Soy, 1997). The case study research method allows researchers to retain the holistic and meaningful characteristics of real-life events such as the lengthy process of designing and implementing a complicated data sharing solution in a healthcare IT firm (Yin, 2008). In this study, we address the following research questions: 1. How can an IT artifact that promotes both data sharing and information privacy be designed for a healthcare IT company? 2. What stakeholder concerns should be incorporated in the design and development of a privacy-enhancing data sharing system? 3. What are the principles and guidelines for designing IT artifacts that incorporate the benefits of information privacy and data sharing? To answer these questions, we followed an iterative process of describing experience, describing meaning, and identifying focus of the analysis in our research (Zucker, 2009). We present below the case about the healthcare IT company and describe the concerns in data sharing and information privacy. We provide technical details in the design process and distill the systems design principles to answer the research questions. RICERRO COMMUNICATIONS, INC. Located in California’s Silicon Valley, Ricerro Communications, Inc. specializes in wearable communications devices used mainly in healthcare settings. The company is young but is growing rapidly, expanding office space, acquiring complementary businesses, adding product lines, and expanding its IT infrastructure. Ricerro offers a system designed to streamline communications within organizations. The core system consists of voice-controllable wireless badges that serve as the primary communications interface for users, and a software suite that supports system 60 Enhancing Information Privacy and Data Sharing Case operations, integrates the system with other infrastructure, and provides a configuration interface for administrators. Additionally, the firm offers software products that enable third-party devices (such as Blackberry and iPhone) to work with their system. The system employs voice recognition, wireless networking, and voice over IP technologies to facilitate communications among mobile users in a work environment. For instance, users can call or locate other users by activating their wearable badges, speaking the desired command (e.g., “call”), and then speaking the target user’s name. This ability frees users from having to memorize or look up phone numbers and can shorten the time needed to locate a colleague, which leads to increases in efficiency. The system also enables broadcast communications to groups of users based on characteristics like job function. This capability reduces the need for overhead paging via loudspeakers. The system can improve communications for organizations in a variety of industries, but the majority of customers are health care providers for which employing handsfree devices and intelligent communications routing can yield improvements in workflow, collaboration, and ultimately patient safety (Runyon, Lovelock, Rishel, Edwards, & Shaffer, 2009). Ricerro has a CEO/Chairperson, a VP Sales, a VP Services, and a CFO at the executive level. All technology support and IT staff report to the VP Services, while all order administrators and finance related staff report to the CFO (see Figure 1 for key project stakeholders and Appendix 1 for full names of all abbreviations used in this case). While there are plenty of meetings that bring Ricerro employees together, there are some problems communicating information across the organization. After meetings, everyone goes back to whatever problem they were working on. Information Technology Ricerro sells the hardware and software components of its communications devices as well as contracts for maintenance and technical support. Additionally, the company provides technical support services to its customers. The following section describes the systems used by Ricerro order administration, technical support, and sales personnel to support these operations. 61 Enhancing Information Privacy and Data Sharing Case Key project stakeholders are highlighted in blue. Chairman and CEO VP, Sales Sales Admin. Managing Dir., UK Outside Sales VP, Services Service Admin. Sr. Dir., Tech. Support Tech. Support Sr. Service Coord. Service Admin. Mgr., IT IT Lead Mgmt. Specialist Marketing CFO G&A Controller G&A Executive Asst. G&A Sr. Mgr., Sales Operations Sales Admin. FP&A Mgr. G&A Sr. Order Admin./Sales Support Sales Admin. Inside Account Mgr. Inside Sales Figure 1. Key Project Stakeholders Order Processing and Financial Accounting Order administration personnel track information that supports customer order processing and financial accounting activities in a database, an enterprise resource planning system, as well as a spreadsheet that tracks customer software license keys. These keys, which are required to activate customers’ systems, are generated via a custom-built License Maker application. Ricerro also uses two software products: one is a dashboard application that enables the database to track and report on net changes in customer purchase orders, and the other simplifies the consolidation of financial data between Ricerro’s domestic and international operations. Customer Relations Management Inside sales and technical support staffs primarily use a separate sales database to track information that underpins sales generation, customer maintenance, and technical support activities. Project stakeholders have requested extension of this system to store more information about customers' license growth and software maintenance contract details. Additionally, Ricerro’s account managers and technical support staff rely on a monthly spreadsheet-based report to obtain information about customers’ current 62 Enhancing Information Privacy and Data Sharing Case system configurations and the terms of their software maintenance contracts. This information is used to determine when customers should be contacted to initiate maintenance contract renewals and to identify up-sell opportunities. Integrative Technologies At present, much of data sharing between Ricerro’s systems of record is done manually. However, Ricerro has purchased and started to implement a data integration tool to help synchronize information between the two systems, with the intention of providing a more complete view of the customer for customer-facing groups like sales and technical support. Data Sharing and Information Privacy Concerns A general phenomenon challenging the data management is manual data import and transfer resulting in slow (or lack of) sharing. This can cause businesses to lose revenue as employees lack the information that was supposed to be communicated to them. Ricerro faced these problems stemming from manually tracking data in multiple information sources (license key and software support data were stored in spreadsheet documents and distributed manually). First, software maintenance term (SWMT) data was transferred manually between a database and a web-based transaction processing systems (WTPS), again increasing the potential for errors and data communication delay issues. Secondly, the processes used to manage customer license keys (LKs) was not scalable or secure (as it was also tracked manually on spreadsheets). Thirdly, administration, technical support, and sales users lack ready access to a consolidated view of customers' system profile (customer accounts, contract, support, and enabled products) and relevant purchase history (i.e., soon to expire licenses). A customer profile and relevant purchase history did not include a display of license key (a license key contains information needed to determine enabled products) or software maintenance support considerations (the software is what runs these communications systems used for instance in a hospital). Stakeholders have indicated that the users and maintainers of LK and SWMT information would benefit from more automated data transfer and maintenance processes, more flexible data storage methods, and an interface that consolidates and presents these data as part of a simple display. In addition, information privacy should be preserved in the sharing process, possibly by means of password-protected accounts and secure data dissemination. DATA INTEGRATION SOFTWARE AND SOLUTIONS Alternatives MCG Considered Alternatives considered were moving data directly from the GP and License Key databases to the Web-based Transaction Processing System (WTPS), sending the License Key data via email to the WTPS and moving the software maintenance term 63 Enhancing Information Privacy and Data Sharing Case (SWMT) data directly to the WTPS, or sending the License Key data via email to the WTPS and moving the SWMT data from the financial dataset to the WTPS. Systems Analysis Processes In the analysis phase, MCG mapped out the existing systems and stakeholder processes that were relevant to the user licenses and software purchases. Later MCG looked at the gathered requirements and “eliminated any redundancies” (Hoffer, 2008). Stakeholder Requirements Elicitation MCG interviewed and surveyed company representatives from the different stakeholder groups individually. From these interviews, MCG developed a set of requirements and business process models (a set of requirements relating to Service Contract Purchase/Modification Cases and License Key (LK) Use Cases). MCG analyzed business processes that involve customer LK and SWMT data, gathered system requirements from users and other stakeholders, developed and refined alternative system concepts, and incorporated stakeholder preferences into a final design concept. Following the selected design concept and requirements, MCG developed specifications for a solution to automate the transfer of customer LK data and SWMT data from the new License Database (License DB) system and the company’s financial database (GP), respectively, to the company’s WTPS instance. The WTPS is a system used to manage customer purchase details and history to company sales and support. MCG also developed specifications for the requisite data storage, workflow, and interface elements in the WTPS system. A Single View of Customer Profile is Needed Accessible only by Authenticated Users The information systems did not support ready access to a consolidated view of information about their customers' system profile and purchase history. A customer’s current system profile is critical to inside account managers (IAMs) and order administrators (OAs) because it informs future order processing for that customer. IAMs use this system profile to provide customers with quotes and OAs use it to process purchase orders as they are handed off by sales. Additionally, technical support staff uses system profile information to determine the proper support level for a given customer. Because this information was distributed among several sources (i.e., the license tracking spreadsheet and the maintenance tracking spreadsheet) that are updated manually, users had to check several sources often to find and verify a customer’s system configuration, which is time consuming. Information about past customer purchases is valuable to sales teams, which can use it to more effectively identify opportunities in existing accounts. To access this information, sales people used a spreadsheet report that was updated monthly using 64 Enhancing Information Privacy and Data Sharing Case data from another database system. OAs also rely on recent purchase history data to verify customers’ current system profiles and they may reference other databases directly, look at the aforementioned maintenance report, or both. While easy to interpret, the maintenance spreadsheet only represents a monthly snapshot of customer purchase activity and thus does not contain the most up-to-date information. The database system does contain the most current information, but the information is more difficult to find and requires some interpretation. Overall, personnel in the inside sales, technical support, and sales administration groups were losing time because customer information often must be parsed manually or verified among multiple sources. Management of Software License Key Process Needs to be Scalable and Secure Software license key (LK) management is a core process. A customer must be issued a valid LK before invoicing and each key represents information that is critical to future order processing as well as technical support activities for that customer. The processes employed to generate and manage LKs involved several manual steps, which increase the possibility of data entry errors as well as sequencing errors that complicate order processing. Additionally, LKs were tracked using a spreadsheet system that lacks referential integrity controls and access controls, putting crucial information at risk of corruption. Finally, the manual decoding process of each LK is onerous for those who are not familiar with the LK format and can cause confusion when the key structure is changed to incorporate new elements. Software Maintenance Reporting Needs to be Automatic Data about customer technical support contracts enter the company’s IT systems as sales transactions and are logged in a Microsoft Dynamics accounting database system named Great Plains (GP). Each day, the Senior Service Coordinator (SSC) selected and exported relevant information from GP and then transferred it to an Excel spreadsheet file, which holds details about the associated customer (such as the report server configuration they are using) in addition to storing the terms of their support agreement (e.g., the maintenance expiration date and the number of seats covered). Once the spreadsheet has been updated, the SSC manually transfers information from this spreadsheet to the WTPS system, where sales teams can use the information to identify opportunities. This process draws too much of the SSC’s time and delays the availability of information that the sales teams and the customer support teams rely on. Consequently, increases in activity would have likely challenged the current system and further compound these issues. 65 Enhancing Information Privacy and Data Sharing Case New or updated maintenance contracts were also extracted from GP each month and the data was consolidated into a spreadsheet. This spreadsheet contains information on all customer licenses and also a history of upgrades or downgrades. This spreadsheet was used by IAM as well as field sales to achieve a holistic view of the customer’s current standing. Table 2. Features and Functions Related to LK Integration and SWMT Integration Ft. # 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 10.0 11.0 12.0 13.0 14.0 15.0 Description Automatically transfer LK data from the License DB to WTPS Automatically update existing LK records in WTPS Enable users to manually associate LK records with one to many WTPS accounts Track and present historical LK records Support separation of duties (present LK information differently based on WTPS user profile) Provide a standard and component view of LK data in WTPS Automatically identify LK to customer account matches in WTPS Notify users of upcoming temporary LK expirations Enable reporting on individual license key fields Automatically transfer SWMT data from the financial database to WTPS Automatically update SWMT data in WTPS Automatically match SWMT data to customer accounts in WTPS Provide an itemized view of SWMT contract purchases in WTPS Notify users when there are changes to LK and SWMT information in WTPS (e.g., data inserts and updates) Use the same identifying field for both project data integrations Stakeholder Priority Must Have Must Have Must Have Must Have Must Have Must Have Must Have Nice to Have Nice to Have Must Have Must Have Must Have Must Have Nice to Have Nice to Have Additionally, GP data is replicated to a database for accounting and reporting purposes. The service coordinator sends an email monthly to field sales representatives. This email informs the representatives about their customers’ latest upgrade or downgrade and includes other important customer license data. This report helps the sales rep to confirm that a purchase order has been processed and to verify that the customer received what they ordered, but waiting on this monthly report does not give the company representatives the information in a timely manner. 66 Enhancing Information Privacy and Data Sharing Case Identified Requirements Table 2 identifies requirements developed through iterative consultations with company stakeholders. Assumptions In order for MCG to proceed, it had to make some assumptions that Ricerro confirmed. The License database, a MySQL database, will become the system of record for LK data and will serve as the source of the LK data transferred to the WTPS. Implementation of the License database application is a major dependency for deployment of the LK data to the WTPS, and Ricerro’s System Test Engineer will work with MCG to make sure that LK data can be reliably transmitted from here. Ricerro will use an already purchased integration tool to copy SWMT data from the financial system of record to the WTPS. The structure of the financial database will be finalized before integration is configured to copy SWMT data to the WTPS. All customer accounts in the GP system will have representative account records in the WTPS. SOFTWARE LICENSING DATA INTEGRATION AT RICERRO Solution Developed by MCG Following the selected design concept and requirements, MCG developed specifications for a solution to automate the transfer of customer LK data and SWMT data from the new License Database (License DB) system and the company’s financial database, respectively, to the company’s WTPS instance. The WTPS is a system used to manage customer purchase details and history of company sales and support. MCG also developed specifications for the requisite data storage, workflow, and interface elements in the WTPS system. As shown in Figure 2, the solution involves importing software maintenance term data and license key data into the WTPS. The web-based transaction processing system was chosen because the data needs to be frequently updated to include recent customer purchases. Automatic secure data import is necessary to replace the convoluted process of manual tracking with multiple spreadsheets, a time consuming delay inducing method for sharing data. Having an automatic secure import resolves the problem of slow data sharing and enhances information privacy, and this allows users access to secure vital data when they need it. The WTPS is then configured to provide display and user generated reports on both customer software maintenance 67 Enhancing Information Privacy and Data Sharing Case terms and license keys. In this alternative, users would only have to consult one interface—the WTPS. It was important to users that they be able to easily view and analyze customer data in one system, which reduces the waiting time or checking of multiple data repositories. Clearly indicating current contracts and displaying the license key components (which refers to customer details such as how many users are entitled on that particular license) is something built into the WTPS. In the system tests this project reduced the time users spend accessing and validating key customer data by improving data sharing. Another product of the project is the protection of key information against human midstream errors by automating data management processes. The system design rested on some key factors. Figure 2. Solution Overview 68 Enhancing Information Privacy and Data Sharing Case Systems Design Rationale Automatic transferring of license key (LK) and software maintenance term (SWMT) data into the web-based transaction processing system (WTPS) while preserving customers’ information privacy may solve the manual data transfer problem. The web-based transaction processing system was chosen because the data needs to be frequently updated to include recent customer purchases. Automatic data import is necessary to replace the convoluted process of manual tracking with multiple spreadsheets, a time consuming delay inducing method for sharing data. Having an automatic import resolves the problem of slow data sharing, and this allows users access to vital data when they need it. The WTPS is configured to provide display and user generated reports on both customer software maintenance terms and license keys. Further, users would only have to consult one interface—the WTPS. It was important that users are able to easily view and analyze customer data in one secure system, which saves them the time and aggravation of having to wait or check multiple data repositories. Information privacy must be preserved through secure user account and proper authority management. Clearly indicating current contracts (SWMT derived information) and displaying the license key components (which reference customer details such as how many users are entitled on that particular license) is something the WTPS needs to handle. System Architecture The system architecture incorporates early design decisions that affect all subsequent software engineering work, directly controlling the ultimate success of the system as an operational entity (Pressman, 2010). Based on the high-level design described above, MCG developed the LK data sharing system architecture that depicts relationships between a license key and the relevant stakeholders (shown in Figure 3). This relationship mapping is the same for the software maintenance terms (SWMT) data sharing system. 69 Enhancing Information Privacy and Data Sharing Case Figure 3. License Key Related Data Relationships As elaborated in system requirements 1.0-7.0, the first main function of this system will be to copy License Keys from the new License DB to WTPS. The system should integrate the License DB and WTPS in the following ways: Automate copy of new License Keys (LKs) from the License DB to a custom License WTPS object. Update existing LK data in WTPS when there are changes in the License DB. Use customer EU ID in the Licenses object to associate to Account Number in the Account object to relate the objects. The SWMT terms are transferred over to the WTPS using similar relationships except that rather than having license data fields and objects, there is software maintenances term data and related objects in the WTPS. Once the License Key and Software Maintenance Term data is imported to the WTPS (Figure 4), the information is displayed to WTPS users in simplified lists which the users can click on if they want to expand (if they want to see full data presentations). Preparing these systems was an iterative process, but laying out (and documenting) a clear vision for stakeholder needs was very helpful. Future steps are following up with their use of the system, and also thinking about other ways they may want to leverage these systems to move additional data or generate analytical reports. 70 Enhancing Information Privacy and Data Sharing Case Figure 4. License Key Related Structures in the License Database and WTPS Systems Implementation Implementation was done in phases. In the first phase, MCG implemented the License Key functionality. The WTPS objects to store the License Key information were tested, followed by testing of the License Key database to ensure data accuracy. After the data email handling for the License Key data integration was checked for automatic and accurate information transport, the License Key integration solution went active (live). In the second phase, MCG implemented the Service Contract (Software Maintenance Terms) functionality. The WTPS objects to store the software related purchases and create the associated service contracts were tested in conjunction with test data being run through a test system. After the integration was checked for automatic and accurate information transport, the software purchase integration solution went active (live). 71 Enhancing Information Privacy and Data Sharing Case Testing and Results In testing the data integration, the results of the varied tests showed that data was being accurately transferred to the WTPS. Next, the process of checking was done to make sure that data was easily manageable inside the WTPS. Various stakeholders had relationships to this data integration process. For sales, which needed to see up to date information, a simple view of this data (and some optional descriptions) satisfied them. For support, MCG created an automatic service contract for active maintenance contract holders. On this contract (displayed on an electronic customer page), users can see relevant purchases and can click on them if they want more details. For administrators, they are able to assign additional accounts and customer support contacts. Additionally, they are able to edit data though they shouldn’t ever have to. LESSONS LEARNED In the design of the solution, several principles and guidelines were developed and practiced to ensure that information privacy is preserved. First, while most stakeholders’ concerns were about sharing data, information privacy is always as important as data sharing. All data attributes and content that have implication on information privacy were carefully protected. Second, security is built into the design of all the interfaces of the components, e.g., between the database system and web interface, between the software license database and other data sources. Encryption and secure accounts that have different levels of authority are used throughout the system. Third, all stakeholders, especially the day-to-day users and managers, are educated on information privacy issues. Training and ongoing reminders are provided to them. Fourth, documentations of system design and development are stored and organized so that stakeholders can access and trace the design process and issues. This requirement can help ensure that information privacy continues to be built into future versions of the system. EPILOGUE IT Director, Carl Silver, was attending a meeting in the office of CFO, Daniel Morgan. “How is the MCG team doing on the IT integration project we talked about a while ago?” Daniel said. Carl replied, “Great, I’m glad you asked something. Since the License Key data project went live, I have heard that it has been a great time saver and confidence booster to have that data automatically available to authorized persons needing current product licensing information. Now we have the benefits of both data sharing and information privacy. In fact, I just heard from someone who thinks the secure, automatic counter of licensed users is just the coolest thing with this available data. As for the software support information, tech support finds it so useful because they can 72 Enhancing Information Privacy and Data Sharing Case easily see in a secure environment whether a customer has an active contract. I’ve heard sales persons also like it because they can easily target expiring customers without having to wait a month for a report. Excuse me, I’ve just been paged. Let’s talk later.” “Glad to hear that MCG and your team’s integration worked, we have got a lot more business we are absorbing. Thanks for stopping by.” Carl replied as he immersed himself into another stack of documents. ACKNOWLEDGMENTS This paper is based upon work supported in part by the National Science Foundation (through award DUE-1141209) and by the Knowledge Systems Laboratory (http://ksl.uncfsu.edu/). Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of NSF. We thank the students and company stakeholders who participated in this project. We thank the reviewers and editor for their work and valuable comments. REFERENCES Apparil, A., Carian, E., Johnson, E., & Anthony, D. (2012). Medication Administration Quality and Health Information Technology: A National Study of US Hospitals. Journal of the American Medical Informatics Association, 19(3), 360-367. Bady, A. (2011). World Without Walls. Technology Review, 114(6), 66-71. Belanger, F., & Crossler, R. E. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35(4), 1017-1042. Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes. Journal of Strategic Information Systems, 11(3-4), 245-270. Cassa, C. A., Miller, R. A., & Mandl, K. D. (2013). A Novel, Privacy-preserving Cryptographic Approach for Sharing Sequencing Data. Journal of the American Medical Informatics Association, 20(1), 69-76. Ge, Y., Ahn, D., Unde, B., Gage, D., & Carr, J. (2013). Patient-controlled Sharing of Medical Imaging Data Across Unaffiliated Healthcare Organizations. Journal of the American Medical Informatics Association, 20(1), 157-163. 73 Enhancing Information Privacy and Data Sharing Case Hassol, A., Walker, J., Kidder, D., Rokita, K., Young, D., Pierdon, S., Deitz,D., Kuck, S and Ortiz, E. (2004). Patient Experiences and Attitudes about Access to a Patient Electronic Health Care Record and Linked Web Messaging. Journal of the American Medical Informatics Association, 11(6), 505-513 Hertzman, C. P., Meagher, N., & McGrail, K. M. (2013). Privacy by Design at Population Data BC: A Case Study Describing the Technical, Administrative, and Physical Controls for Privacy-sensitive Secondary Use of Personal Information for Research in the Public Interest. Journal of the American Medical Informatics Association, 20(1), 25-28. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. Management Information Systems Quarterly, 28(1), 75-105. Hillestad, R., Bigelow, J., Bower, A., Girosi, F., Meili, R., Scoville, R., & Taylor, R. (2005). Can Electronic Medical Record Systems Transform Health Care? Potential Health Benefits, Savings, And Costs. Health Affairs, 24(5), 1103-1117. Hoffer, J. (2008). Systems Analysis and Design. Upper Saddle River, NJ: Prentice Hall. Lahlou, S., & Jegou, F. (2004). European Disappearing Computer Privacy Design Guidelines, Version 1.1. Retrieved from http://eprints.lse.ac.uk/33125/ Lahlou, S., Langheinrich, M., & Röcker, C. (2005). Privacy and Trust Issues with Invisible Computers. Communications of the ACM, 48(3), 59-60. Malin, B. A., Emam, K. E., & O'Keefe, C. M. (2013). Biomedical Data Privacy: Problems, Perspectives, and Recent Advances. Journal of the American Medical Informatics Association , 20(1), 2-6. Ohno-Macado, L. (2013). Sharing Data for the Public Good and Protecting Individual Privacy: Informatics Solutions to Combine Different Goals. Journal of the American Medical Informatics Association, 20(1), 1. Payne, T., Bates, D. W., Berner, E. S., Bernstam, E. V., Covvey, H. D., Frisse, M. E., Graf T, Greenes RA, Hoffer EP, Kuperman G, Lehmann HP, Liang L, Middleton B, Omenn GS and Ozbolt, J. (2012). Healthcare Information Technology and Economics. Journal of the American Medical Informatics Association , In Press. Pressman, R. (2010). Software Engineering: A Practitioner’s Approach. New York, NY: McGraw-Hill. 74 Enhancing Information Privacy and Data Sharing Case Runyon, B., Lovelock, J.-D., Rishel, W., Edwards, J., & Shaffer, V. (2009). Hype Cycle for Healthcare Provider Technologies and Standards Gartner Industry Research. Schnipper, J., Gandi, T., Wald, J., Grant, R., Poon, E., Volk, L., Businger A, Williams DH, Siteman E, Buckel L and Middelton, B. (2012). Effects of an Online Personal Health Record on Medication Accuracy and Safety: A Clusterrandomized Trial. Journal of the American Medical Informatics Association, 19(5), 728-734. Seto, B., & Friedman, C. (2012). Moving Toward Multimedia Electronic Health Records: How Do We Get There? Journal of the American Medical Informatics Association , 19(4), 503-505. Soy, S. (1997). The Case Study as a Research Method. Retrieved from http://www.gslis.utexas.edu/~ssoy/usesusers/l391d1b.htm, University of Texas at Austin Tang, P., Ash, J., Bates, D., Overhage, M., & Sands, D. (2006). Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption. Journal of the American Medical Informatics Association, 13(2), 121126. Vest, J., & Gamm, L. (2010). Health Information Exchange: Persistent Challenges and New Strategies. Journal of the American Medical Informatics Association, 17(3), 288-294. Winker MA, Flanagin A, Chi-Lum B, White J, Andrews K, Kennett RL, DeAngelis CD, Musacchio RA. (2000). Guidelines for Medical and Health Information Sites on the Internet: Principles Governing AMA Web Sites. The Journal of the American Medical Association, 283(12), 1600-1606. Woolhandler, S., Campbell, T., & Himmelstein, D. (2003). Costs of Health Care Administration in the United States and Canada. New England Journal of Medicine, 349(August), 768-775. Yin, R. K. (2008). Case Study Research: Design and Methods (4th edition): Sage Publications, Inc. Zafar, H. (2011). Security Risk Management at a Fortune 500 Firm: A Case Study, Journal of Information Privacy and Security, 7(4), 23-53. Zucker, D. M. (2009). How to Do Case Study Research. School of Nursing Faculty Publication Series. Amherst, MA: University of Massachusetts - Amherst. 75 Enhancing Information Privacy and Data Sharing Case APPENDIX 1 Abbreviation CEO CFO CRM DB Dir. ERP EU ID GP IAM IT LK MCG Mgr. OA PK Sr. SSC SWMT VP WTPS Full Name Chief Executive Officer Chief Financial Officer Customer Relationship Management Database Director Enterprise Resource Planning End-User Identification Number Great Plains – Microsoft Dynamics accounting and financial package Inside Account Manager Information Technology License Key Mission Consulting Group Manager Order Administrator Primary Key Senior Senior Service Coordinator Software maintenance term Vice President Web-based Transaction Processing System AUTHOR BIOGRAPHY Wingyan Chung is Associate Professor of MIS in the School of Business and Economics at UNC Fayetteville State University, where he is also the Founder and Director of Knowledge Systems Laboratory (http://ksl.uncfsu.edu/). He received his Ph.D. in MIS from The University of Arizona, and an MS and BBA from The Chinese University of Hong Kong. Dr. Chung’s scholarly interests and expertise include business intelligence, data/text/Web mining, knowledge management, security and health informatics, information visualization, and human-computer interaction. Lewis Hershey is Professor of Marketing in the School of Business and Economics at UNC Fayetteville State University. He received his Ph.D. from Louisiana State University, and MA and BA in Communications from UNC Chapel Hill. Dr. Hershey’s scholarly interests include marketing, management and leadership, information-processing and communications theory, narrative and literary criticism, intercultural communication, and classical rhetoric. 76