Internet Privacy and Security: An Examination of Online Retailer Disclosures

2000 ◽  
Vol 19 (1) ◽  
pp. 54-61 ◽  
Author(s):  
Anthony D. Miyazaki ◽  
Ana Fernandez

The Federal Trade Commission has declared the privacy and security of consumer information to be two major issues that stem from the rapid growth in e-commerce, particularly in terms of consumer-related commerce on the Internet. Although prior studies have assessed online retailer responses to privacy and security concerns with respect to retailers’ disclosure of their practices, these studies have been fairly general in their approaches and have not explored the potential for such disclosures to affect consumers. The authors examine online retailer disclosures of various privacy- and security-related practices for 17 product categories. They also compare the prevalence of disclosures to a subset of data from a consumer survey to evaluate potential relationships between online retailer practices and consumer perceptions of risk and purchase intentions across product categories.

Author(s):  
Alan R. Peslak

Privacy on the Internet has been of increasing concern with the explosive growth of electronic commerce. A series of past surveys by the Federal Trade Commission and other organizations measured the implementation of fair information practices and industry self-regulation of privacy. This report includes two important additional factors in the review—enforcement and simplicity. Using historical studies and this more comprehensive analysis, this article reviews the current Internet privacy polices of the 50 largest U.S. companies in 2003 and updates this review for 2006.


2017 ◽  
Vol 7 (1) ◽  
pp. 1-12
Author(s):  
Komal Nagar

The purpose of this research was to examine the influence of online retailer models on Indian consumer’s attitude towards retail websites and their purchase intentions. Using an online shopping scenario, a case study was conducted on 240 postgraduate marketing students at an Indian university to evaluate the effects of two online shopping website factors on the user’s attitude towards retail websites and their purchase intentions. The findings of the study suggest that players in the e-tailing business should increasingly move towards multi category purchase model to increase the purchase intentions of the consumers. They also need to constantly review and upgrade the services offered to ensure increased intentions to purchase. The findings can enable online retailers in India to explore and shape the Internet as the next big business opportunity.


2012 ◽  
Vol 2 (2) ◽  
pp. 10-24
Author(s):  
Anuradha Reddy ◽  
G. V. Bhavani Prasad

With the introduction of Internet and e-commerce many companies have been performing their business transactions through e-portals. Increasing technology has bought tremendous changes in online business transactions (buying and selling). This paper examines consumer perceptions of varying characteristics of e-portals, identifies various factors that influence consumer trust and privacy e-portals, and analyzes how various security and privacy factors affect consumer perceptions toward e-portals. A survey questionnaire consisting 21 questions was developed and mailed to 150 e-commerce (B2B and B2C) consumers in 3 emirates of UAE wherein 108 individuals responded. Questions were developed from a literature review of news, as well as security and privacy issues. Factor analysis that included principal component analysis and varimax rotation was performed on all multiple scale items that determined retention of items. Results indicated that most participants are concerned about security and privacy issues while they are using e-portals, but few participants stated that security is the main issue that creates a barrier for their online shopping. Most participants are not aware of internet privacy and security policies and are not interested in knowing technology used for security of e-portals.


2021 ◽  
pp. 1-31
Author(s):  
Sarah E. Lageson ◽  
Elizabeth Webster ◽  
Juan R. Sandoval

Digitization and the release of public records on the Internet have expanded the reach and uses of criminal record data in the United States. This study analyzes the types and volume of personally identifiable data released on the Internet via two hundred public governmental websites for law enforcement, criminal courts, corrections, and criminal record repositories in each state. We find that public disclosures often include information valuable to the personal data economy, including the full name, birthdate, home address, and physical characteristics of arrestees, detainees, and defendants. Using administrative data, we also estimate the volume of data disclosed online. Our findings highlight the mass dissemination of pre-conviction data: every year, over ten million arrests, 4.5 million mug shots, and 14.7 million criminal court proceedings are digitally released at no cost. Post-conviction, approximately 6.5 million current and former prisoners and 12.5 million people with a felony conviction have a record on the Internet. While justified through public records laws, such broad disclosures reveal an imbalance between the “transparency” of data releases that facilitate monitoring of state action and those that facilitate monitoring individual people. The results show how the criminal legal system increasingly distributes Internet privacy violations and community surveillance as part of contemporary punishment.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Amanda Kennedy ◽  
Stacey M. Baxter ◽  
Alicia Kulczynski

Purpose This paper aims to examine the importance of celebrity brands in influencing consumer perceptions of celebrity authenticity, which drives positive consumer attitudes and intentions. In addition, the notion of low-celebrity investment is investigated as a factor that diminishes the positive outcomes associated with celebrity brands. Design/methodology/approach Study 1 examines the effect of brand situation (endorsement versus celebrity brand) on consumer attitudes and intentions. Studies 2 and 3 investigate the role of celebrity authenticity in explaining the effects observed in Study 1. Study 4 examines celebrity investment as a bound of the phenomenon. Findings Study 1 demonstrates that consumers report heightened attitudes and intentions towards celebrity brands when compared to endorsements. Studies 2 and 3 provide evidence that authenticity explains the effects observed in Study 1. Results of Study 4 show that when consumers are aware of low-celebrity investment, the celebrity is viewed as inauthentic regardless of brand situation. Research limitations/implications This research is limited as it focuses only on known celebrity endorsers who were matched with products that had a high level of fit. In addition, purchase intentions were measured as opposed to the study of actual purchase behaviour. Practical implications This research has important implications for the development of endorsements and celebrity brands by demonstrating that consumers view celebrities as authentic when they are involved with brands for reasons other than monetary compensation. Originality/value This research shows that consumers have heightened attitudes and intentions towards celebrity brands compared to endorsements. This research identifies celebrity authenticity as the process underlying the observed phenomenon. However, celebrity investment is identified as a boundary condition demonstrating that knowledge of low investment results in a celebrity being viewed as inauthentic.


2019 ◽  
Vol 11 (12) ◽  
pp. 3268
Author(s):  
Farhad Aliyev ◽  
Ralf Wagner ◽  
Stefan Seuring

Luxury is often blamed for creating social inequality and hampering sustainability, especially in the social and environmental realms. For instance, luxury goods entice people to conspicuous consumption that may result in showing off. However, study results show that luxury and environmental sustainability have common features. Notably, previous research mainly examined motivations for green purchases in general without relating to the specific product categories such as durables. Therefore, this study examines the relationship between these two—green and luxury automobile buying intentions—by analyzing the survey results of 1601 respondents relating to more than 60 nationalities. In contrast to a substantial effect on luxury buying intentions, perceived conspicuousness has no significant positive effect on green auto purchase intentions, and that price value has a limited influence compared with the effect on luxury automobile purchase intentions. Furthermore, hedonism has a less positive impact on green auto purchase intentions compared to its impact on luxury automobile buying intentions. The ‘extended self’ and the perception of high quality have been found to be drivers of luxury and green automobile purchase intentions, while unique value appears to have no impact on purchase intentions for green and conventional luxury automobiles. The present study contributes to the extant research by investigating common and contradictory motivations for luxury and green buying intentions of automobiles. Furthermore, it suggests a reconsideration of the traditional view that luxury and environmental consumption are inconsistent and contradictory concepts. The complementary managerial implications of this study guide practitioners in positioning the situatable variants of their automobiles as ethical luxury.


2020 ◽  
Vol 43 (338) ◽  
pp. 27-34
Author(s):  
Lasma Licite-Kurbe ◽  
Athul Chandramohan

AbstractThe Internet of Things (IoT) is a computing concept that describes the idea of everyday physical objects being connected to the Internet and being able to identify themselves to other devices, and day by day it becomes popular in everyday life as well as in entrepreneurship. The IoT covers broad areas, including manufacturing, the health sector, agriculture, smart cities, security and emergencies among many others. The market for the industrial IoT is estimated to surpass 107 billion euros by 2021 and reach a compound annual growth rate of 7.3% as of 2020. The IoT makes an impact on all industries and provides benefits for various areas of business; however, business may be faced with some risks as well. The research aim is to analyse the benefits and risks of the IoT in entrepreneurship. The descriptive method, analysis and synthesis, the induction and deduction methods were used to achieve the aim. The research has revealed that the IoT can provide several opportunities for business in all fields of operations – marketing, logistics, accounting and human resource management. However, businesses may be faced with some challenges related to privacy and security, processing, analysis and management of data, as well as monitoring and sensing.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Sign in / Sign up

Export Citation Format

Share Document