Online Privacy and Marketing

2009 ◽  
pp. 256-268
Author(s):  
Betty J. Parker

Marketing practices have always presented challenges for consumers seeking to protect their privacy. This chapter discusses the ways in which the Internet as a marketing medium introduces additional privacy concerns. Current privacy issues include the use of spyware and cookies, word-of-mouth marketing, online marketing to children, and the use of social networks. Related privacy practices, concerns, and recommendations are presented from the perspectives of Internet users, marketers, and government agencies. The chapter concludes with a discussion of the ways in which consumers’ privacy concerns, as they apply to Internet marketing, would benefit from additional research.

2018 ◽  
Vol 16 (3) ◽  
pp. 347-361
Author(s):  
Jelena Budak ◽  
Edo Rajh

This paper explores citizens’ privacy concerns and online surveillance perceptions by using the survey data of 2,060 internet users in Croatia. Respondents can be categorised into two groups with significant differences in their perceptions of online surveillance, quality of regulation, trust in institutions, and trust in other people. The more online-privacy concerned group consists of on average less educated, older people, who spend less time online. Also, there are more females in this cluster. The main finding is that internet users who are very concerned about online surveillance tend to have limited trust in both the government and other people and limited faith in the ability of regulation to protect them. More concerned people tend to adopt countersurveillance strategies such as providing false data on the internet.


2019 ◽  
Vol 43 (5) ◽  
pp. 799-817 ◽  
Author(s):  
Ivan-Damir Anic ◽  
Jelena Budak ◽  
Edo Rajh ◽  
Vedran Recher ◽  
Vatroslav Skare ◽  
...  

Purpose The purpose of this paper is to investigate the relationship between individual and societal determinants of online privacy concern (OPC) and behavioral intention of internet users. The study also aims to assess the degree of reciprocity between consumers’ perceived benefits of using the internet and their OPC in the context of their decision-making process in the online environment. Design/methodology/approach The study proposes comprehensive model for analysis of antecedents and consequences of OPC. Empirical analysis is performed using the PLS–SEM approach on a representative sample of 2,060 internet users. Findings The findings show that computer anxiety and perceived quality of regulatory framework are significant antecedents of OPC, while traditional values and inclinations toward security, family and social order; and social trust are not. Furthermore, the study reveals that perceived benefits of using the internet are the predominant factor explaining the intention to share personal information and adopt new technologies, while OPC dominates in explanation of protective behavior. Research limitations/implications Although the authors tested an extended model, there might be other individual characteristics driving the level of OPC. This research covers just one country and further replications should be conducted to confirm findings in diverse socio-economic contexts. It is impossible to capture the real behavior with survey data, and experimental studies may be needed to verify the research model. Practical implications Managers should work toward maximizing perceived benefits of consumers’ online interaction with the company, while at the same time being transparent about the gathered data and their intended purpose. Considering the latter, companies should clearly communicate their compliance with the emerging new data protection regulation. Originality/value New extended model is developed and empirically tested, consolidating current different streams of research into one conceptual model.


2021 ◽  
Vol 16 (2) ◽  
pp. 0
Author(s):  
Dmitry Muravyev

The authorization on sites, in social networks and personal accounts with passwords is an extremely common practice today. It has become an integral part of people's lives, even they are not aware of it. But despite this, most Internet users have difficulties in creating and remembering of the strong passwords. This article analyzes the problem using the speech act theory of John Austin and John Searle. It allows to shed light on a person's behaviour on the Internet and his reaction to the question "Who is there?", which the machine asks him.


Author(s):  
Vaggelis Saprikis

Contemporary commerce is completely different as regards features some years ago. Nowadays, a considerable number of individuals and firms take advantage of the information and communication technologies and conduct transactions online. In particular, the mobile industry along with the broad use of social networks and improvements in the internet bandwidth worldwide has created a completely different business environment. Consequently, the technology incited many consumers to cross-border e-shopping, allowing access to a wider variety of products and services, and in numerous circumstances, access to cheaper goods. The purpose of this chapter is to investigate the perceptions internet users have towards e-shops focusing on Greece. More precisely, it aims to find out whether there are contingent differences on customers' perceptions regarding domestic vs. international e-shops, since a gradually augmented number of people have been expressing their preference on non-domestic e-stores for their purchases. Additionally, the chapter intends to shed light on the difficulty in understanding vital aspects of e-consumer behaviour.


2009 ◽  
pp. 214-239
Author(s):  
Chiung-wen ("Julia") Hsu

This chapter introduces a situational paradigm as a means of studying online privacy. It argues that data subjects are not always opponent to data users. They judge contexts before disclosing information. This chapter proves it by examining online privacy concerns and practices with two contexts: technology platforms and users’ motivations. It explores gratifications of online photo album users in Taiwan, and finds the distinctive “staging” phenomenon under the theory of uses and gratifications, and a priori theoretical framework, the spectacle/performance paradigm. The users with “diffused audience” gratifications are concerned less about privacy but not disclose more of their information. Furthermore, it finds that users act differently in diverse platforms, implying that studying Internet as a whole is problematic. The author proposes that studying online privacy through the use of a situational paradigm will help better research designs for studying privacy, and assist in understanding of users’ behaviors among technology platforms.


Author(s):  
Vaggelis Saprikis

Contemporary commerce is completely different as regards features some years ago. Nowadays, a considerable number of individuals and firms take advantage of the information and communication technologies and conduct transactions online. In particular, the mobile industry along with the broad use of social networks and improvements in the internet bandwidth worldwide has created a completely different business environment. Consequently, the technology incited many consumers to cross-border e-shopping, allowing access to a wider variety of products and services, and in numerous circumstances, access to cheaper goods. The purpose of this chapter is to investigate the perceptions internet users have towards e-shops focusing on Greece. More precisely, it aims to find out whether there are contingent differences on customers' perceptions regarding domestic vs. international e-shops, since a gradually augmented number of people have been expressing their preference on non-domestic e-stores for their purchases. Additionally, the chapter intends to shed light on the difficulty in understanding vital aspects of e-consumer behaviour.


Author(s):  
Xichen Zhang ◽  
Ali A. Ghorbani

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.


Author(s):  
Kenneth J. Sousa ◽  
Laurie E. MacDonald ◽  
Kenneth T. Fougere

This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Tao Jing ◽  
Qiancheng Chen ◽  
Yingkun Wen

An online social network (OSN) is a platform that makes people communicate with friends, share messages, accelerate business, and enhance teamwork. In the OSN, privacy issues are increasingly concerned, especially in private message leaks in word-of-mouth. A user’s privacy may be leaked out by acquaintances without user’s consent. In this paper, an integrated system is designed to prevent this illegal privacy leak. In particular, we only use the method of space vector model to determine whether the user’s private message is really leaked. Canary traps techniques are used to detect leakers. Then, we define a trust degree mechanism to evaluate trustworthiness of a communicator dynamically. Finally, we set up a new message publishing system to determine who can obtain the message of publisher. Secrecy performance analysis is provided to verify the effectiveness of the proposed message publishing system. Accordingly, a user in social networks can check whether other users are trustworthy before sending their private messages.


2020 ◽  
Vol 10 (Special) ◽  
pp. 105-112
Author(s):  
Thi Yen Minh Tran ◽  
Thi Huong Pham

The 21st century is acknowledged as the age of information. Thanks to the development of science and technology, the audience become more active in absorbing and distributing information. However, the massive information on the Internet in general, and social networks in particular, is sometimes unreliable, inaccurate and untrustworthy, which can mislead the Internet users. By generalising the Internetand social media usage of Vietnameseaudience, the article provides a fundamental understanding ofinformation categorisation. By that, itsuggests several techniques todevelopcritical thinking and news literacy skills for audience tobecome a critical reader in the age of digital media.


Sign in / Sign up

Export Citation Format

Share Document