Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
IRM PRESS Gupta & Sharma 1 701 E. Chocolate Avenue, Hershey PA 17033-1117, USA ITB7539 Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.irm-press.com . c n I p u o r G a e Id t h g i r y op Shopping and Privacy CCyber Chapter 1 Jatinder N. D. Gupta and Sushil K. Sharma Ball State University, USA c. n I p u o r G INTRODUCTION a e we find cyber shopping has become the order d As we enter a new millennium, I t hfind it easier to cyber shop than to take time from their of the day. Consumers g i r schedules toy visit malls. One can shop any time depending upon availability of time. p o Many working couples order the items as they leave from their workplaces and C receive deliveries right when they reach home. Some people shop late at night and c. receive items the very next morning. Cyber shopping is exciting because: 1) one can n I p shop directly from home or the workplace, and 2) the cost of items may be cheaper u o r than the traditional buying. Considering these conveniences,G many people prefer a cyber shopping. Also, there are very many exciting sites esuch as E-auction etc. on the Net which otherwise are not available. t Id h asunsafe.Theyarguethat:1)giving g Some consumers consider cyberrshopping i y bringproblemsifcreditcardinformationfalls credit card information on o the p net may into the wrong hands;C 2) the net does not provide the expected level of security; and 3) companies may record all their purchases, purchasing habits, etc., and may pass on or sell this information to other potential marketers who in turn may solicit the customer (Handerson, 1999). The growing popularity of cyber shopping means information can be transmitted all around the globe with just one click of the mouse (Manes, 2000). However, it also means that some information that was thought to be private, such as medical records or financial data, is now out in the public domain for all to see and there are people who are actually hacking them all the time. Those hackers or companies know an individual’s name, address, phone number, marital status, age and c. n I p u o r G a e d I t h g i r y p Co Previously Published in Managing Business with Electronic Commerce: Issues and Trends edited by Aryya Gangopadhyay, Copyright © 2002, Idea Group Publishing. This chapter appears in the book, Strategies for eCommerce Success by Bijan Fazlollahi. Copyright © 2002, IRM Press, an imprint of Idea Group Inc. 2 Cyber Shopping and Privacy approximate income level. They know what publications people read, what catalogs they receive, what Web sites they visit and what products they buy both online and off. The ability of marketers to track customers’ surfing and buying patterns can lead to abuses. Before the advent of cyber shopping, direct-mail marketers would at times collect information and threaten privacy, but they didn’t have the breadth of information now available on the Internet (Lawton, 1998). Today, when a customer goes online for rentals, credit card purchases, airline reservations and other such electronic transactions, s/he is required to complete a form which contains personal information that defines or represents his/her habits. This information is collected and can be passed to other marketing companies to market their product and services without their knowledge. Many believe that too much personal information is being collected when they go online (Caudill, 2000). Others are not willing to use credit card numbers to purchase items on the Internet. The strange contradiction is that people like to use the Internet for cyber shopping while at the same time they do not trust it. Millions of people are using the Internet everyday, for work, play, learning, business and for social interaction. As we depend on and enjoy it more, we are worried if and how others or organizations may be secretly watching us and collecting information for purposes that we are unaware. “Spamming,” which is the practice of sending out unsolicited e-mail, is growing because it costs so little to send out millions of messages or advertisements electronically. Many prominent high-technology companies have already been caught attempting to quietly collect information about their customers via the Internet. DoubleClick, a popular supplier of online advertising services, and RealNetworks, the producer of the RealPlayer line of multimedia software, were subjects of a scandal when their millions of trusted users learned that their personal information was being collected without their consent (Kling, 1996; Gurak, 1997). Privacy can be defined as an individual’s right to be left alone, free from interference or surveillance from other parties. Privacy requires security mechanism, policy and technology to provide control over information. The way sites handle personal information is a concern to the general public. The general population is very cold to the idea of having personal information distributed without the knowledge of the individuals in question. It is an issue because of the risk of taking adverse actions based on inaccurate information, i.e., spam, phone call (Gillin, 2000a ). Internet privacy is clearly controversial and can be confusing. As mentioned above there are companies who are keeping track of the Net users. Most of the time they do that with the help of a unique identifier called a cookie, usually a string of random-looking letters, that a Web server places on a computer’s hard drive. Cookies enable Web sites to track usage patterns and deliver customized content to visitors. c. n I up o r G a e Id t h g i r y Cop c. n I up o r G a e Id t h g i r . y c p n I p Co u o r G a e d I t h g i r y p Co a e d I t h g ri y p Co c. n I up o r G 14 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/chapter/cyber-shoppingprivacy/29838?camid=4v1 This title is available in InfoSci-Books, InfoSci-EGovernment, InfoSci-Business Technologies, Business, Administration, and Management, InfoSci-Business and Management Information Science and Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=1 Related Content Different Types of Business-to-Business Integration: Extended Enterprise Integration vs Market B2B Integration Frank Goethals, Jacgues Vandenbulcke, Wilfried Lemahieu and Monique Snoeck (2008). Electronic Commerce: Concepts, Methodologies, Tools, and Applications (pp. 137-151). www.igi-global.com/chapter/different-types-business-businessintegration/9460?camid=4v1a Empirical Study on Multi-Channel Service Quality and Customer Loyalty of Retailers Qi Yong-zhi (2014). Journal of Electronic Commerce in Organizations (pp. 1-12). www.igi-global.com/article/empirical-study-on-multi-channel-service-qualityand-customer-loyalty-of-retailers/124072?camid=4v1a E-Commerce Diffusion: Critical Factors Affecting Diffusion of E-Commerce Mahmud Akhter Shareef, Yogesh K. Dwivedi, Michael D. Williams and Nitish Singh (2009). Proliferation of the Internet Economy: E-Commerce for Global Adoption, Resistance, and Cultural Evolution (pp. 79-106). www.igi-global.com/chapter/commerce-diffusion-critical-factorsaffecting/28195?camid=4v1a UbiSrvInt: A Context-Aware Fault-Tolerance Approach for WP2P Service Provision Soe-Tsyr Yuan and Fang-Yu Chen (2009). Mobile and Ubiquitous Commerce: Advanced E-Business Methods (pp. 135-171). www.igi-global.com/chapter/ubisrvint-context-aware-faulttolerance/26420?camid=4v1a