IDEAS home Printed from https://ideas.repec.org/a/eee/eurman/v32y2014i1p84-90.html
   My bibliography  Save this article

When bubbles burst: Mimetic insights into minimising confidentiality breaches

Author

Listed:
  • Harwood, Ian A.
  • Turnock, Stephen R.
  • Ashleigh, Melanie J.

Abstract

This paper presents a theoretical model to help managers visualise and manage confidential situations more effectively. The model metaphorically likens a confidential setting to the properties of a soap bubble, e.g. elastic expansion or contraction, minimal surface area to contain a given volume, fragility, surface tension, pressure, stress, strain and the potential for bursting thereby releasing the contents to the external environment. We explore the conceptual developments in two phases. Firstly, looking at how a bubble and confidential scenario form and grow. Secondly, we consider how a bubble may burst and map these forces to ways in which confidentiality may be breached. Many attributes are mapped, the key ones being: the embedded value within the system, the criticality of maintaining confidentiality, increasing pressure, the corresponding stress/strain dynamics and the levels of trust between stakeholders. Key research propositions are derived from the model which aims to minimise the risk of a confidentiality breach.

Suggested Citation

  • Harwood, Ian A. & Turnock, Stephen R. & Ashleigh, Melanie J., 2014. "When bubbles burst: Mimetic insights into minimising confidentiality breaches," European Management Journal, Elsevier, vol. 32(1), pages 84-90.
  • Handle: RePEc:eee:eurman:v:32:y:2014:i:1:p:84-90
    DOI: 10.1016/j.emj.2013.07.011
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0263237313001060
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.emj.2013.07.011?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Lode Li & Hongtao Zhang, 2008. "Confidentiality and Information Sharing in Supply Chain Coordination," Management Science, INFORMS, vol. 54(8), pages 1467-1481, August.
    2. Steven W. Floyd, 2009. "‘Borrowing’ Theory: What Does This Mean and When Does It Make Sense in Management Scholarship?," Journal of Management Studies, Wiley Blackwell, vol. 46(6), pages 1057-1058, September.
    3. Harris, Ron, 1994. "The Bubble Act: Its Passage and Its Effects on Business Organization," The Journal of Economic History, Cambridge University Press, vol. 54(3), pages 610-627, September.
    4. Thomas F. Cargill & Michael M. Hutchison & Takatoshi Ito, 1997. "The Political Economy of Japanese Monetary Policy," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262032473, April.
    5. Shaker A. Zahra & Lance R. Newey, 2009. "Maximizing the Impact of Organization Science: Theory‐Building at the Intersection of Disciplines and/or Fields," Journal of Management Studies, Wiley Blackwell, vol. 46(6), pages 1059-1075, September.
    6. Sandra J. Milberg & H. Jeff Smith & Sandra J. Burke, 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science, INFORMS, vol. 11(1), pages 35-57, February.
    7. Lode Li, 2002. "Information Sharing in a Supply Chain with Horizontal Competition," Management Science, INFORMS, vol. 48(9), pages 1196-1212, September.
    8. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    9. Herbert A. Simon, 1955. "A Behavioral Model of Rational Choice," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 69(1), pages 99-118.
    10. Garber, Peter M, 1990. "Famous First Bubbles," Journal of Economic Perspectives, American Economic Association, vol. 4(2), pages 35-54, Spring.
    11. Krishnan S. Anand & Manu Goyal, 2009. "Strategic Information Management Under Leakage in a Supply Chain," Management Science, INFORMS, vol. 55(3), pages 438-452, March.
    12. Janice M. Beyer, 1992. "Metaphors, Misunderstandings, and Mischief: A Commentary," Organization Science, INFORMS, vol. 3(4), pages 467-474, November.
    13. J. Michael Steele, 1989. "Models for Managing Secrets," Management Science, INFORMS, vol. 35(2), pages 240-248, February.
    14. Bill McEvily & Vincenzo Perrone & Akbar Zaheer, 2003. "Trust as an Organizing Principle," Organization Science, INFORMS, vol. 14(1), pages 91-103, February.
    15. Sirkka L. Jarvenpaa & Ann Majchrzak, 2008. "Knowledge Collaboration Among Professionals Protecting National Security: Role of Transactive Memories in Ego-Centered Knowledge Networks," Organization Science, INFORMS, vol. 19(2), pages 260-276, April.
    16. Özalp Özer & Yanchong Zheng & Kay-Yut Chen, 2011. "Trust in Forecast Information Sharing," Management Science, INFORMS, vol. 57(6), pages 1111-1137, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Fedorenko, Ivan & Berthon, Pierre & Edelman, Linda, 2023. "Top secret: Integrating 20 years of research on secrecy," Technovation, Elsevier, vol. 123(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Leon Yang Chu & Noam Shamir & Hyoduk Shin, 2017. "Strategic Communication for Capacity Alignment with Pricing in a Supply Chain," Management Science, INFORMS, vol. 63(12), pages 4366-4377, December.
    2. Avinadav, Tal & Levy, Priel, 2022. "Value of information in a mobile app supply chain under hidden or known information superiority," International Journal of Production Economics, Elsevier, vol. 248(C).
    3. Noam Shamir & Hyoduk Shin, 2016. "Public Forecast Information Sharing in a Market with Competing Supply Chains," Management Science, INFORMS, vol. 62(10), pages 2994-3022, October.
    4. Guangwen Kong & Sampath Rajagopalan & Hao Zhang, 2013. "Revenue Sharing and Information Leakage in a Supply Chain," Management Science, INFORMS, vol. 59(3), pages 556-572, November.
    5. Wu, Junjian & Wang, Haiyan & Shang, Jennifer, 2019. "Multi-sourcing and information sharing under competition and supply uncertainty," European Journal of Operational Research, Elsevier, vol. 278(2), pages 658-671.
    6. Avinadav, Tal & Shamir, Noam, 2021. "The effect of information asymmetry on ordering and capacity decisions in supply chains," European Journal of Operational Research, Elsevier, vol. 292(2), pages 562-578.
    7. Ruomeng Cui & Hyoduk Shin, 2018. "Sharing Aggregate Inventory Information with Customers: Strategic Cross-Selling and Shortage Reduction," Management Science, INFORMS, vol. 64(1), pages 381-400, January.
    8. Jialu Li & Meiying Yang & Wei Xing & Xuan Zhao, 2018. "Information Acquisition Behavior: An Evolutionary Game Theory Perspective," Dynamic Games and Applications, Springer, vol. 8(2), pages 434-455, June.
    9. Hyoduk Shin & Tunay I. Tunca, 2010. "Do Firms Invest in Forecasting Efficiently? The Effect of Competition on Demand Forecast Investments and Supply Chain Coordination," Operations Research, INFORMS, vol. 58(6), pages 1592-1610, December.
    10. Susan A. Kayser & John W. Maxwell & Michael W. Toffel, 2014. "Supply chain screening without certification: The critical role of stakeholder pressure," Working Papers 2014-08, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
    11. Junjian Wu & Henry Xu, 2021. "Information Leakage and Financing Decisions in a Supply Chain with Corporate Social Responsibility and Supply Uncertainty," Sustainability, MDPI, vol. 13(21), pages 1-22, October.
    12. Albert Y. Ha & Huajiang Luo & Weixin Shang, 2022. "Supplier Encroachment, Information Sharing, and Channel Structure in Online Retail Platforms," Production and Operations Management, Production and Operations Management Society, vol. 31(3), pages 1235-1251, March.
    13. Wei-Shiun Chang & Daniel A. Sanchez-Loor, 2020. "Downstream Information Leaking and Information Sharing Between Partially Informed Retailers," Journal of Industry, Competition and Trade, Springer, vol. 20(4), pages 733-760, December.
    14. Zheng, Shiyuan & Jiang, Changmin, 2024. "Consortium blockchain in Shipping: Impacts on industry and social welfare," Transportation Research Part A: Policy and Practice, Elsevier, vol. 183(C).
    15. Wu, Jiang & Zou, Liuxin & Gong, Yeming & Chen, Mingyang, 2021. "The anti-collusion dilemma: Information sharing of the supply chain under buyback contracts," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 152(C).
    16. Tian Li & Hongtao Zhang, 2023. "Gaining by ceding ‐ bounded wholesale pricing for information sharing in a supply chain," Production and Operations Management, Production and Operations Management Society, vol. 32(3), pages 829-843, March.
    17. Weixin Shang & Albert Y. Ha & Shilu Tong, 2016. "Information Sharing in a Supply Chain with a Common Retailer," Management Science, INFORMS, vol. 62(1), pages 245-263, January.
    18. Matsui, Kenji, 2021. "Buyer’s strategic demand information sharing with an upstream echelon for entry promotion," International Journal of Production Economics, Elsevier, vol. 242(C).
    19. Zhang, Chu & Liu, Bin & Cai, Gangshu George & Huang, Tao, 2023. "When ignorance is bliss: The retailer’s intelligence hazard under information sharing and exchanging," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 180(C).
    20. Zhongyuan Hao & Li Jiang & Wenli Wang, 2018. "Impacts of sequential acquisition, market competition mode, and confidentiality on information flow," Naval Research Logistics (NRL), John Wiley & Sons, vol. 65(2), pages 135-159, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:eurman:v:32:y:2014:i:1:p:84-90. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/wps/find/journaldescription.cws_home/115/description#description .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.