Privacy of Internet Users in the Era of Transformative Marketing

  • Muhammad Farooq Limkokwing University of Creative Technology, Cyberjaya, Malaysia
  • Qasim Ali Qureshi Universiti Utara Malaysia, Changlun, Malaysia
Keywords: Customer Privacy, Internet Users, E-commerce, Consumer Protection View, Free-market View, Transformative Marketing

Abstract

This research aims to investigate the customer concern of privacy over the internet pertaining to e-commerce companies in the era of transformative marketing. The paper discusses different drivers and challenges of customer's data protection. The article also explores the two prominent prospects on internet privacy; the "consumer protection view" and "free-market view". To carry out the current study, a thorough literature review is done. Recent articles published in high-quality journals relevant to the topic were collected and analyzed for carrying out current study. Based on the review of literature, it can be stated the vast majority of consumers are unaware of how their personal data is used. Consumers are either too careless in managing their data or too cautious, which may lead to problems for all stakeholders. The researchers advocate the consumer protection view. The current article highlights alarming insight that consumers are unaware and unconcerned how their private data is used for commercial gain without taking their permission. The two views on consumer privacy are shared, and future evolution in these views is discussed. The article has also highlighted that the government has to play an active role since the issue pertains to the entire world.

References

Aichholzer, G., & Strauß, S. (2010). Electronic identity management in e-government 2.0: Exploring a system innovation exemplified by Austria. Information Polity, 15(1), 139-152.
doi:https://doi.org/10.3233/IP-2010-0203

Argyriou, E., Kitchen, P. J., & Melewar, T. (2006). The relationship between corporate websites and brand equity: A conceptual framework and research agenda. International Journal of Market Research, 48(5), 575-599.
doi:https://doi.org/10.1177/147078530604800507

Basu, C. (2009). Disrupting class how disruptive innovation will change the way the world learns. Journal of Information Privacy and Security, 5(4), 70-71.
doi:https://doi.org/10.1080/15536548.2009.10855877

Bordonaba-Juste, M. V., Lucia-Palacios, L., & Pérez-Ló pez, R. (2020). Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services. Information Systems and e-Business Management, 1-26.
doi:https://doi.org/10.1007/s10257-020-00462-8

Boritz, J. E., No, W. G., & Sundarraj, R. (2008). Internet privacy in e-commerce: Framework, review, and opportunities for future research. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences HICSS, Hawaii, HI. IEEE.

Cachin, C. (1997). Entropy measures and unconditional security in cryptography (Unpublished doctoral dissertation). ETH Zurich, Switzerland.

Deng, M., Wuyts, K., Scandariato, R., Preneel, B., & Joosen, W. (2011). A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering, 16(1), 3-32.

Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L. P., ... Sheth, A. N. (2014). Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 1-29.

Farooq, M., Kalimuthu, R., & Reza, M. (2019). Measuring and comparing brand equity of Malaysian banks in the era of transformative marketing. Global Journal of Emerging Sciences, 1, 96-102.

Farooq, M., Muhammad, S., Raju, V., Kalimuthu, K. R., & Qadir, A. (2019). Measuring and comparing the desired and actual service quality of Pakistan international airline. The Journal of Social Sciences Research, 52, 484-490. doi:https://doi.org/10.32861/jssr.52.484.490

Farooq, M., & Raju, V. (2019). Want to stay the market leader in the era of transformative marketing? keep the customers satisfied! Global Journal of Flexible Systems Management, 20(3), 257-266.
doi:https://doi.org/10.1007/s40171-019-00213-w

Farooq, M., Rehman, F. K.-U., Tijjani, A. D., Younas, W., Sajjad, S., & Zreen, A. (2019). Service quality analysis of private universities libraries in malaysia in the era of transformative marketing. International Journal for Quality Research, 13(2), 269–284.

Farooq, M., Zareen, Z., Younas, W., Khalil-Ur-Rehman, K., & Yasmin, N. (2018). Impact of digitalization on Holy Quran readers: Experience and expectations. IOSR Journal of Humanities and Social Science (IOSR-JHSS), 23(7), 59-67.

Foltz, C. B., & Foltz, L. (2020). Mobile users' information privacy concerns instrument and IoT. Information & Computer Security, 28(3), 359-371.
doi:https://doi.org/10.1108/ics-07-2019-0090

Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733.

Jain, P., & Aggarwal, V. (2015). Service quality models: A review. BVIMSR's Journal of Management Research, 23, 125-136.

Johnson, G. (2017). Exploring strategy: Text and cases. London, UK: Pearson Education Limited.

Klewitz-Hommelsen, S. (2002). Indicators for privacy violation of internet sites. In Electronic government (p. 456-459). New York, NY: Springer.

Knijnenburg, B. P., Kobsa, A., & Jin, H. (2013). Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies, 71(12), 1144-1162.
doi:https://doi.org/10.1016/j.ijhcs.2013.06.003

Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 22-26.

Lee, J. (2020). The google-doubleclick merger: Lessons from the federal trade commission's limitations on protecting privacy. Communication Law and Policy, 25(1), 77-103.
doi:https://doi.org/10.1080/10811680.2020.1690330

Libaque-Sáenz, C. F., Wong, S. F., Chang, Y., & Bravo, E. R. (2020). The effect of fair information practices and data collection methods on privacy-related behaviors: A study of mobile apps. Information & Management, 10, 32-84.
doi:https://doi.org/10.1016/j.im.2020.103284

Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: Proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563.
doi:https://doi.org/10.1057/s41303-017-0066-x

Pomfret, L., Previte, J., & Coote, L. (2020). Beyond concern: socio-demographic and attitudinal influences on privacy and disclosure choices. Journal of Marketing Management, 36(5-6), 519-549.
doi:https://doi.org/10.1080/0267257x.2020.1715465

Ramaiyah, & Ahmad, H. A. (2010). Service quality dimensions: an examination of Gronroos’s service quality model. European Journal of Marketing, 8(4), 488-491.
doi:https://doi.org/10.1017/CBO9781107415324.004

Roy, I., Setty, S. T., Kilzer, A., Shmatikov, V., & Witchel, E. (2010). Airavat: Security and privacy for mapreduce. In NSDI: 7th USENIX Symposium on Networked Systems Design and Implementation, San Jose, CA (Vol. 10).

Schaewitz, L., Winter, S., & Krämer, N. C. (2020). The influence of privacy control options on the evaluation and user acceptance of mobile applications for volunteers in crisis situations. Behaviour & Information Technology, 12, 1-17.

Schurmann, T., Gerber, N., & Gerber, P. (2020). Benefits of formalized computational modeling for understanding user behavior in online privacy research. Journal of Intellectual Capital, 21(3), 431-458.
doi:https://doi.org/10.1108/jic-05-2019-0126

Spiekermann, S., & Cranor, L. (2009). Engineering privacy. IEEE Transactions on Software Engineering, 35(1), 67-82.
doi:https://doi.org/10.1109/tse.2008.88

Su, S., Fortes, J., Kasad, T., Patil, M., Matsunaga, A., Tsugawa, M.,... Herrera, M. (2005). Transnational information sharing, event notification, rule enforcement and process coordination. International Journal of Electronic Government Research, 1(2), 1-26.
doi:https://doi.org/10.4018/jegr.2005040101

Tseng, H.-T., Hung, W.-F., Hwang, H.-G., & Chang, I.-C. (2020). Do patients' privacy concerns in
Published
2020-12-19
How to Cite
Muhammad Farooq, & Qasim Ali Qureshi. (2020). Privacy of Internet Users in the Era of Transformative Marketing. Journal of Management Practices, Humanities and Social Sciences, 4(2), 25-28. Retrieved from https://global-jws.com/ojs/index.php/global-jws/article/view/33
Section
Articles