Privacy and Security in the Age of Electronic Customer Relationship Management

2007 ◽  
Vol 1 (1) ◽  
pp. 65-86 ◽  
Author(s):  
Nicholas C. Romano Jr. ◽  
Jerry Fjermestad
2011 ◽  
pp. 1279-1301
Author(s):  
Nicholas C. Romano Jr. ◽  
Jerry Fjermestad

This article presents a value exchange model of privacy and security for electronic customer relationship management within an electronic commerce environment. Enterprises and customers must carefully manage these new virtual relationships in order to ensure that they both derive value from them and minimize unintended consequences that result from the concomitant exchange of personal information that occurs in e-commerce. Based upon a customer’s requirements of privacy and an enterprise requirement to establish markets and sell goods and services, there is a value exchange relationship. The model is an integration of the customer sphere of privacy, sphere of security, and privacy/security sphere of implementation.


Author(s):  
Nicholas C. Romano Jr. ◽  
Jerry Fjermestad

This article presents a value exchange model of privacy and security for electronic customer relationship management within an electronic commerce environment. Enterprises and customers must carefully manage these new virtual relationships in order to ensure that they both derive value from them and minimize unintended consequences that result from the concomitant exchange of personal information that occurs in e-commerce. Based upon a customer’s requirements of privacy and an enterprise requirement to establish markets and sell goods and services, there is a value exchange relationship. The model is an integration of the customer sphere of privacy, sphere of security, and privacy/security sphere of implementation.


2011 ◽  
pp. 1302-1312
Author(s):  
Nicholas C. Romano Jr. ◽  
Jerry Fjermestad

This article presents a value exchange model of privacy and security for electronic customer relationship management within an electronic commerce environment. Enterprises and customers must carefully manage these new virtual relationships in order to ensure that they both derive value from them and minimize unintended consequences that result from the concomitant exchange of personal information that occurs in e-commerce. Based upon a customer’s requirements of privacy and an enterprise requirement to establish markets and sell goods and services, there is a value exchange relationship. The model is an integration of the customer sphere of privacy, sphere of security, and privacy/security sphere of implementation.


2008 ◽  
pp. 3045-3066
Author(s):  
Nicholas C. Romano Jr. ◽  
Jerry Fjermestad

This article presents a value exchange model of privacy and security for electronic customer relationship management within an electronic commerce environment. Enterprises and customers must carefully manage these new virtual relationships in order to ensure that they both derive value from them and minimize unintended consequences that result from the concomitant exchange of personal information that occurs in e-commerce. Based upon a customer’s requirements of privacy and an enterprise requirement to establish markets and sell goods and services, there is a value exchange relationship. The model is an integration of the customer sphere of privacy, sphere of security, and privacy/security sphere of implementation.


2011 ◽  
pp. 2365-2386
Author(s):  
Nicholas C. Romano Jr. ◽  
Jerry Fjermestad

This article presents a value exchange model of privacy and security for electronic customer relationship management within an electronic commerce environment. Enterprises and customers must carefully manage these new virtual relationships in order to ensure that they both derive value from them and minimize unintended consequences that result from the concomitant exchange of personal information that occurs in e-commerce. Based upon a customer’s requirements of privacy and an enterprise requirement to establish markets and sell goods and services, there is a value exchange relationship. The model is an integration of the customer sphere of privacy, sphere of security, and privacy/security sphere of implementation.


2018 ◽  
Vol 7 (2) ◽  
pp. 180
Author(s):  
Wiyanto Wiyanto ◽  
Fajar Butsianto ◽  
Karsito Karsito

Information technology is rapidly developed in this century that impact to various aspects of the organization really need information technology to support the performance and everyday business processes. In health services, information technology is required to process and storage the patient medical records, so that the patient's medical record is well preserved, and competitive advantage can be obtained between patient and polyclinic. The application of Customer Relationship Management (CRM) approach can be developed by implementing information system of medical record history to get new patient and retain existing patient, improving relationship with patient and maintaining patient loyalty as well as supporting the company/organization to provide excellent service to customers in real time through the advantage of information technology. The aims of this research are to understand patient medical record by CRM approach and Unified Modeling Language (UML) for system design, system validation using Forum Group Discussion (FGD), and using software testing Model ISO 9126. The result of this research are Medical Record History Information System and the result of system validation with FGD is 100% accepted, the result of system test using Model ISO 9126 is good with success rate 82,86%, so it can give contribution to polyclinic.


2001 ◽  
Vol 30 (8) ◽  
pp. 417-422 ◽  
Author(s):  
Hajo Hippner ◽  
Stephan Martin ◽  
Klaus D. Wilde

Sign in / Sign up

Export Citation Format

Share Document