Derleme
BibTex RIS Kaynak Göster

KURUMSAL İTİBARIN KALKANI: ELEKTRONİK BELGE VE ARŞİVLERİN KRİZ ANINDAKİ STRATEJİK ÖNEMİ

Yıl 2026, Cilt: 9 Sayı: 19, 103 - 119, 31.01.2026
https://doi.org/10.55830/tje.1757325
https://izlik.org/JA46JP54HH

Öz

Dijital çağda elektronik belge ve arşiv yönetimi (EBYS), kurumların operasyonel verimliliğinin ötesinde, kurumsal itibarının korunması ve kriz yönetimi için kritik önem taşır. Belgeler, kurumların dijital belleğini oluşturur ve bu belleğin şeffaf, güvenli ve düzenli yönetimi, kamuoyu nezdindeki algıyı doğrudan etkiler. EBYS'deki aksaklıklar – belge ihlalleri, arşivleme hataları veya şeffaflık eksiklikleri – ciddi itibar krizlerine yol açabilir. Bu durum, güven kaybı, yasal yaptırımlar ve kamuoyu baskısı gibi olumsuz sonuçlarla detaylandırılmıştır. Makale, kurumların belgesel dijital belleklerini proaktif yöneterek itibar risklerini azaltacak stratejik çözümler sunar. Bu çözümler arasında "tasarımla güvenlik" ve "varsayılan olarak şeffaflık" ilkelerinin benimsenmesi, belge yaşam döngüsü yönetiminin halkla ilişkiler stratejileriyle entegrasyonu ve kriz anlarında doğru belgeye hızlı erişim sağlayan güvenli arşiv sistemleri bulunur. Ayrıca, belge okuryazarlığının artırılması, çalışanlara eğitim verilmesi ve kriz iletişim planlarının EBYS ile uyumlu hale getirilmesi gibi pratik adımlar da incelenmektedir. Şeffaf bir EBYS, yasal bir zorunluluk olmanın ötesinde, güçlü bir kurumsal itibarın inşasında stratejik bir varlıktır. Bu çalışma, EBYS'nin kurumların gelecekteki krizlere karşı dayanıklılığını artıran ve dijital itibarını güvence altına alan temel bir unsur olduğunu vurgulamaktadır.

Kaynakça

  • Acquisti, A., & John, L. (2012). What Is privacy worth? Journal of Legal Studies, 41(2), 1010-1033.
  • Alavi, M., & Leidner, D. (2001). Knowledge management and knowledge management systems: Conceptual foundations and future directions. Journal of Management Information Systems, 18(1), 107-130.
  • Argenti, P. A. (1998). Corporate communication. Irwin/McGraw-Hill.
  • Aula, P., & Heinonen, K. (2018). Reputation and crisis management: Emerging trends. Routledge.
  • Bennett, R., & Lyon, L. (2017). The impact of social media on customers' responses to data breach incidents. Journal of Retailing and Consumer Services, 34, 50-59.
  • Berman, B. (2006). Marketing management: Text and cases. Pearson Prentice Hall.
  • Cao, L. (2017). Data science for ubiquitous intelligence. IEEE Intelligent Systems, 32(3), 79-85.
  • Carroll, A. B. (1991). The pyramid of corporate social responsibility: Toward the moral management of organizational stakeholders. Business Horizons, 34(4), 39-48.
  • Carroll, A. B., & Meeks, M. (2017). Corporate social responsibility: Past, present, and future. O. C. Ferrell, & L. Ferrell içinde, Business Ethics: Ethical Decision Making and Cases (11th ed.) (s. 32-48). Cengage Learning.
  • Castells, M. (2010). The power of identity (2nd ed.). Wiley-Blackwell.
  • Cavoukian, A. (2011). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario.
  • Chaffey, D., & Ellis-Chadwick, F. (2019). Digital marketing: Strategy, implementation and practice. Pearson Education.
  • Christensen, L. T., & Cornelissen, J. (2015). Corporate communication: Integrating identity, image, and reputation. W. G. Scott, & L. Putnam içinde, The SAGE Handbook of Organizational Communication (3rd ed.) (s. 31-52). Sage Publications.
  • Clarke, R. (2009). The demise of privacy and the rise of surveillance societies. In T. V. den Hoven & J. Weckert (Eds.). Information Technology and Moral Philosophy, 119-141.
  • Coombs, W. T. (2007). Protecting organization reputations during a crisis: The development and application of situational crisis communication theory. Corporate Reputation Review, 10(3), 163-176.
  • Davenport, T. H., & Harris, J. (2007). Competing on analytics: The new science of winning. Harvard Business School Press.
  • Davenport, T. H., & Beck, J. (2001). The attention economy: Understanding the new currency of business. Harvard Business School Press.
  • Davenport, T. H., & Prusak, L. (1998). Working knowledge: How organizations manage what they know. Harvard Business School Press.
  • Doorley, J., & Garcia, H. (2015). Reputation management: The key to successful public relations and corporate communication (3rd ed.). Routledge.
  • Dowling, G. R. (2016). Creating corporate reputations: Identity, image, and performance (3rd ed.). Oxford University Press.
  • Duranti, L., & Franks, P. (2019). Encyclopedia of archival science. Rowman & Littlefield.
  • Fearn-Banks, K. (2017). Crisis communications: A casebook approach (5th ed.). Routledge.
  • Fink, S. (1986). Crisis management: Planning for the inevitable. AMACOM.
  • Fombrun, C. J. (1996). Reputation: Realizing value from the corporate image. Harvard Business School Press.
  • Freeman, R. E. (1984). Strategic management: A stakeholder approach. Pitman.
  • Gonzales-Herrero, A., & Pratt, C. (1995). How to manage a crisis before—or when—It hits. Public Relations Quarterly, 40(1), 25-29.
  • Grant, R. M. (1996). Toward a knowledge-Based theory of the firm. Strategic Management Journal, 17(S2), 109-122.
  • Grunig, J. E. (2001). Two-Way symmetrical public relations: Past, present, and future. Public Relations Review, 27(1), 17-38.
  • Grunig, J. E., & Hunt, T. (1984). Managing public relations. Holt, Rinehart and Winston.
  • Heath, R. L., & Gay, C. (1997). Strategic issues management: Organizations and public policy challenges. Sage Publications.
  • Heide, M., & Grønhaug, K. (2006). Corporate reputation: The concept and the research agenda. Corporate Reputation Review, 9(1), 44-54.
  • Herbig, P., & Milewicz, J. (1993). The relationship of reputation and credibility to business growth. Journal of Business Research, 26(1), 17-27.
  • Holtz, S. (2002). Public relations on the net: Winning strategies to inform, involve, and influence your publics online. AMACOM.
  • Institute-Ponemon. (2023). Cost of a data breach report. IBM Security.
  • Kaufman, P. (2009). Crisis management and leadership. Rothstein Publishing.
  • Kent, M. L., & Taylor, M. (2002). Toward a dialogic theory of public relations. Public Relations Review, 28(1), 21-37.
  • Kiousis, S. (2005). Interactivity: A concept explication. New Media & Society, 7(1), 9-33.
  • Lovejoy, K., & Harrison, K. (2012). Connecting with communities: How social media is changing contemporary public relations. Public Relations Review, 38(2), 329-331.
  • Mangold, W. G., & Faulds, D. (2009). Social media: The new hybrid element of the promotion mix. Business Horizons, 52(4), 357-365.
  • Manyika, J. (2011). Big data: The next frontier for innovation, competition and productivity. McKinsey Global Institute.
  • Marchand, D. A., & Davenport, T. (2001). Mastering information management. Pearson Education.
  • Marcus, A. A., & Goodman, R. (1991). Toward a comprehensive theory of business strategy: The management of strategic surprise. Academy of Management Review, 16(2), 289-306.
  • Mentzer, J. T. (2001). Defining supply chain management. Journal of Business Logistics, 22(2), 1-25.
  • Mitroff, I. I., & Alpaslan, M. (2003). Preparing for the worst: What leading companies are doing to manage global risks. California Management Review, 45(4), 58-86.
  • O'Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown.
  • Pearson, C. M., & Mitroff, I. (1993). From crisis prone to crisis prepared: A framework for crisis management. Academy of Management Executive, 7(1), 48-59.
  • Ponemon-Institute. (2023). Cost of a data breach report. IBM Security.
  • Rawlins, B. L. (2008). Measuring the relationship between organizational transparency and employee trust. Public Relations Journal, 2(2), 1-22.
  • Ross, j. W., & Quaddus, M. (2007). Knowledge management in organizations: A managerial perspective. Butterworth-Heinemann.
  • Schoeman, F. D. (2006). Privacy and social freedom. H. Nissenbaum, & F. D. Schoeman içinde, The Philosophical foundations of privacy (s. 55-90). Cambridge University Press.
  • Seeger, M. W., & Sellnow, T. (1998). Communication, organization, and crisis. Communication Yearbook, 231-275.
  • Shepherd, E., & Yeo, G. (2003). Managing records: A handbook of principles and practice. Facet Publishing.
  • Smallwood, R. F. (2014). Information governance: Concepts, strategies, and best practices. John Wiley & Sons. Smyth, P. (2017). Data quality and record keeping. Wiley.
  • Solove, D. J. (2008). Understanding privacy. Harvard University Press.
  • Ulmer, R. R., & Sellnow, T. (2011). Effective crisis communication: moving from crisis to opportunity (2nd ed.). Sage Publications.
  • Walsh, J. P., & Ungson , G. (1991). Organizational memory. Academy of Management Review, 16(1), 57-91.
  • Ward, S., & Ostrom, A. (2006). Social media and the crisis of trust: Ethical challenges in online journalism. Journal of Mass Media Ethics, 21(2-3), 85-101.
  • Werner, K. (2015). Corporate storytelling: Brand new communication for your business. Business Expert Press.
  • Xu, Q., & Wu, Y. (2021). The roles of social media in crisis communication: A systematic review. Journal of Public Relations Research, 33(3), 110-130.
  • Yerkey, A. C. (2003). Metadata and the management of electronic records. The American Archivist, 66(1), 69-80.
  • Zeithaml, V., & Berry, L. (1985). A conceptual model of service quality and its implications for future research. Journal of Marketing, 49(4), 41-50

THE SHIELD OF CORPORATE REPUTATION: THE STRATEGIC IMPORTANCE OF ELECTRONIC DOCUMENTS AND ARCHIVES IN TIMES OF CRISIS

Yıl 2026, Cilt: 9 Sayı: 19, 103 - 119, 31.01.2026
https://doi.org/10.55830/tje.1757325
https://izlik.org/JA46JP54HH

Öz

In the digital age, electronic document and archive management (EDAMS) has become crucial for organizations, not just for operational efficiency, but also for preserving corporate reputation and managing potential crises. Documents form an organization's digital memory, and the transparent, secure, and organized management of this memory directly influences public perception. Lapses in EDAMS—such as document breaches, archiving errors, or lack of transparency—can lead to severe reputational crises. This is detailed with negative consequences like loss of trust, legal sanctions, and public pressure. The article proposes strategic solutions for organizations to proactively manage their digital documentary memory and mitigate reputational risks. These solutions include adopting "security by design" and "transparency by default" principles, integrating document lifecycle management with public relations strategies, and establishing secure archive systems that provide quick access to accurate documents during crises. Practical steps such as increasing document literacy, providing employees with security training, and aligning crisis communication plans with EDAMS are also examined. Transparent EDAMS is not merely a legal obligation; it's a strategic asset for building a strong corporate reputation. This study aims to demonstrate that EDAMS is a fundamental element in enhancing organizations' resilience against future crises and safeguarding their digital reputation.

Kaynakça

  • Acquisti, A., & John, L. (2012). What Is privacy worth? Journal of Legal Studies, 41(2), 1010-1033.
  • Alavi, M., & Leidner, D. (2001). Knowledge management and knowledge management systems: Conceptual foundations and future directions. Journal of Management Information Systems, 18(1), 107-130.
  • Argenti, P. A. (1998). Corporate communication. Irwin/McGraw-Hill.
  • Aula, P., & Heinonen, K. (2018). Reputation and crisis management: Emerging trends. Routledge.
  • Bennett, R., & Lyon, L. (2017). The impact of social media on customers' responses to data breach incidents. Journal of Retailing and Consumer Services, 34, 50-59.
  • Berman, B. (2006). Marketing management: Text and cases. Pearson Prentice Hall.
  • Cao, L. (2017). Data science for ubiquitous intelligence. IEEE Intelligent Systems, 32(3), 79-85.
  • Carroll, A. B. (1991). The pyramid of corporate social responsibility: Toward the moral management of organizational stakeholders. Business Horizons, 34(4), 39-48.
  • Carroll, A. B., & Meeks, M. (2017). Corporate social responsibility: Past, present, and future. O. C. Ferrell, & L. Ferrell içinde, Business Ethics: Ethical Decision Making and Cases (11th ed.) (s. 32-48). Cengage Learning.
  • Castells, M. (2010). The power of identity (2nd ed.). Wiley-Blackwell.
  • Cavoukian, A. (2011). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario.
  • Chaffey, D., & Ellis-Chadwick, F. (2019). Digital marketing: Strategy, implementation and practice. Pearson Education.
  • Christensen, L. T., & Cornelissen, J. (2015). Corporate communication: Integrating identity, image, and reputation. W. G. Scott, & L. Putnam içinde, The SAGE Handbook of Organizational Communication (3rd ed.) (s. 31-52). Sage Publications.
  • Clarke, R. (2009). The demise of privacy and the rise of surveillance societies. In T. V. den Hoven & J. Weckert (Eds.). Information Technology and Moral Philosophy, 119-141.
  • Coombs, W. T. (2007). Protecting organization reputations during a crisis: The development and application of situational crisis communication theory. Corporate Reputation Review, 10(3), 163-176.
  • Davenport, T. H., & Harris, J. (2007). Competing on analytics: The new science of winning. Harvard Business School Press.
  • Davenport, T. H., & Beck, J. (2001). The attention economy: Understanding the new currency of business. Harvard Business School Press.
  • Davenport, T. H., & Prusak, L. (1998). Working knowledge: How organizations manage what they know. Harvard Business School Press.
  • Doorley, J., & Garcia, H. (2015). Reputation management: The key to successful public relations and corporate communication (3rd ed.). Routledge.
  • Dowling, G. R. (2016). Creating corporate reputations: Identity, image, and performance (3rd ed.). Oxford University Press.
  • Duranti, L., & Franks, P. (2019). Encyclopedia of archival science. Rowman & Littlefield.
  • Fearn-Banks, K. (2017). Crisis communications: A casebook approach (5th ed.). Routledge.
  • Fink, S. (1986). Crisis management: Planning for the inevitable. AMACOM.
  • Fombrun, C. J. (1996). Reputation: Realizing value from the corporate image. Harvard Business School Press.
  • Freeman, R. E. (1984). Strategic management: A stakeholder approach. Pitman.
  • Gonzales-Herrero, A., & Pratt, C. (1995). How to manage a crisis before—or when—It hits. Public Relations Quarterly, 40(1), 25-29.
  • Grant, R. M. (1996). Toward a knowledge-Based theory of the firm. Strategic Management Journal, 17(S2), 109-122.
  • Grunig, J. E. (2001). Two-Way symmetrical public relations: Past, present, and future. Public Relations Review, 27(1), 17-38.
  • Grunig, J. E., & Hunt, T. (1984). Managing public relations. Holt, Rinehart and Winston.
  • Heath, R. L., & Gay, C. (1997). Strategic issues management: Organizations and public policy challenges. Sage Publications.
  • Heide, M., & Grønhaug, K. (2006). Corporate reputation: The concept and the research agenda. Corporate Reputation Review, 9(1), 44-54.
  • Herbig, P., & Milewicz, J. (1993). The relationship of reputation and credibility to business growth. Journal of Business Research, 26(1), 17-27.
  • Holtz, S. (2002). Public relations on the net: Winning strategies to inform, involve, and influence your publics online. AMACOM.
  • Institute-Ponemon. (2023). Cost of a data breach report. IBM Security.
  • Kaufman, P. (2009). Crisis management and leadership. Rothstein Publishing.
  • Kent, M. L., & Taylor, M. (2002). Toward a dialogic theory of public relations. Public Relations Review, 28(1), 21-37.
  • Kiousis, S. (2005). Interactivity: A concept explication. New Media & Society, 7(1), 9-33.
  • Lovejoy, K., & Harrison, K. (2012). Connecting with communities: How social media is changing contemporary public relations. Public Relations Review, 38(2), 329-331.
  • Mangold, W. G., & Faulds, D. (2009). Social media: The new hybrid element of the promotion mix. Business Horizons, 52(4), 357-365.
  • Manyika, J. (2011). Big data: The next frontier for innovation, competition and productivity. McKinsey Global Institute.
  • Marchand, D. A., & Davenport, T. (2001). Mastering information management. Pearson Education.
  • Marcus, A. A., & Goodman, R. (1991). Toward a comprehensive theory of business strategy: The management of strategic surprise. Academy of Management Review, 16(2), 289-306.
  • Mentzer, J. T. (2001). Defining supply chain management. Journal of Business Logistics, 22(2), 1-25.
  • Mitroff, I. I., & Alpaslan, M. (2003). Preparing for the worst: What leading companies are doing to manage global risks. California Management Review, 45(4), 58-86.
  • O'Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown.
  • Pearson, C. M., & Mitroff, I. (1993). From crisis prone to crisis prepared: A framework for crisis management. Academy of Management Executive, 7(1), 48-59.
  • Ponemon-Institute. (2023). Cost of a data breach report. IBM Security.
  • Rawlins, B. L. (2008). Measuring the relationship between organizational transparency and employee trust. Public Relations Journal, 2(2), 1-22.
  • Ross, j. W., & Quaddus, M. (2007). Knowledge management in organizations: A managerial perspective. Butterworth-Heinemann.
  • Schoeman, F. D. (2006). Privacy and social freedom. H. Nissenbaum, & F. D. Schoeman içinde, The Philosophical foundations of privacy (s. 55-90). Cambridge University Press.
  • Seeger, M. W., & Sellnow, T. (1998). Communication, organization, and crisis. Communication Yearbook, 231-275.
  • Shepherd, E., & Yeo, G. (2003). Managing records: A handbook of principles and practice. Facet Publishing.
  • Smallwood, R. F. (2014). Information governance: Concepts, strategies, and best practices. John Wiley & Sons. Smyth, P. (2017). Data quality and record keeping. Wiley.
  • Solove, D. J. (2008). Understanding privacy. Harvard University Press.
  • Ulmer, R. R., & Sellnow, T. (2011). Effective crisis communication: moving from crisis to opportunity (2nd ed.). Sage Publications.
  • Walsh, J. P., & Ungson , G. (1991). Organizational memory. Academy of Management Review, 16(1), 57-91.
  • Ward, S., & Ostrom, A. (2006). Social media and the crisis of trust: Ethical challenges in online journalism. Journal of Mass Media Ethics, 21(2-3), 85-101.
  • Werner, K. (2015). Corporate storytelling: Brand new communication for your business. Business Expert Press.
  • Xu, Q., & Wu, Y. (2021). The roles of social media in crisis communication: A systematic review. Journal of Public Relations Research, 33(3), 110-130.
  • Yerkey, A. C. (2003). Metadata and the management of electronic records. The American Archivist, 66(1), 69-80.
  • Zeithaml, V., & Berry, L. (1985). A conceptual model of service quality and its implications for future research. Journal of Marketing, 49(4), 41-50
Toplam 61 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Bilgi Güvenliği Yönetimi
Bölüm Derleme
Yazarlar

Pınar Yağmur Demir 0009-0002-8824-9646

Gönderilme Tarihi 3 Ağustos 2025
Kabul Tarihi 8 Kasım 2025
Yayımlanma Tarihi 31 Ocak 2026
DOI https://doi.org/10.55830/tje.1757325
IZ https://izlik.org/JA46JP54HH
Yayımlandığı Sayı Yıl 2026 Cilt: 9 Sayı: 19

Kaynak Göster

APA Demir, P. Y. (2026). KURUMSAL İTİBARIN KALKANI: ELEKTRONİK BELGE VE ARŞİVLERİN KRİZ ANINDAKİ STRATEJİK ÖNEMİ. İstanbul Ticaret Üniversitesi Girişimcilik Dergisi, 9(19), 103-119. https://doi.org/10.55830/tje.1757325