Advances in Advertising Research (Vol. IV) pp 365-378 | Cite as
The Online Behavioural Advertising Icon: Two User Studies
Chapter
First Online:
Abstract
New Internet technologies provide the possibility of automated tracking of consumers’ Internet behaviour. Such tracking is used to create user profiles for the purpose of displaying advertisements that fit the interest of these individuals (e.g., Goldfarb and Tucker 2011; McDonald and Cranor 2010). Confident in the success of such targeted ads, businesses invested heavily in online targeted advertising and this spending is expected to increase.
Keywords
Coping Strategy Internet User User Study Online Behaviour Persuasive Message
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- Friestad, M. and P. Wright (1994), “The persuasion knowledge model: How people cope with persuasion attempts,” in: Journal of Consumer Research, 21(1),1–31.CrossRefGoogle Scholar
- Goldfarb, A. and C. E. Tucker (2011), “Privacy regulation and online advertising,” in: Management Science, 57(1),57–71.CrossRefGoogle Scholar
- Huang C. and R. G. Bias (2012), “Icons versus texts in accuracy and efficiency,” at iConference ’12Google Scholar
- Jacks, J. Z. and P. G. Devine (2000), “Attitude importance, forewarning of message content, and resistance to persuasion,” in: Basic and Applied Social Psychology, 22(1),19–29.Google Scholar
- Jacks, J. Z. and K. A. Cameron (2003), “Strategies for resisting persuasion,” in: Basic and Applied Social Psychology, 25(2),145–161.CrossRefGoogle Scholar
- Lee, S. Y. (2010), “Ad-induced affect: The effects of forewarning, affect intensity and brand atti-tude,” in: Journal of Marketing Communications, 16(4),225–237.CrossRefGoogle Scholar
- Leon , P. G.; Cranshaw, J.; Cranor, L. F.; Graves, J.; Hastak, M.; Ur, B.; and G. Xu (2012), What do online behavioral advertising disclosures communicate to users? In: Proceedings of the ACM workshop on privacy in the electronic society (WPES), October 15, 19–30.Google Scholar
- McDonald, A. M. and L. F. Cranor. (2010), “Americans’ attitudes about internet behaviour adver-tising practices,” in: Proceedings of the ACM workshop on privacy in the electronic society (WPES), October 4, 63–72.Google Scholar
- Milne , G. R.; Labrecque, L. I. , and C. Cromer (2009), “Toward an understanding of the online consumer’s risky behaviour and protection practices,” in: Journal of Consumer Affairs, 43(3),449–473.CrossRefGoogle Scholar
- Milne , G. R.; Rohm, A. and S. Bahl (2009), “If it’s legal it’s acceptable: Consumer reactions to online covert marketing,” in: Journal of Advertising, 38(4),107–122.CrossRefGoogle Scholar
- Morris , L. A.; Mazis, M. B. and D. Brindberg (1989), “Risk disclosures in televised prescription drug advertising to consumers,” in: Journal of Public Policy & Marketing, 8, 64–80.Google Scholar
- Phelps , J.; Nowak, G. and E. Ferrel (2000), “Privacy concerns and consumer willingness to provide personal information, “in: Journal of Public Policy and Marketing, 19(1),27–41.CrossRefGoogle Scholar
- Sagarin , B. J.; Cialdini, R. B.; Rice, W. E. and S. B. Serna (2002), “Dispelling the illusion of invul-nerability: The motivations and mechanisms of resistance to persuasion,” in: Journal of Per-sonality and Social Psychology, 83(3),526–541.CrossRefGoogle Scholar
- Stanaland , A. J. S.; Lwin, M. O.; and A. D. Miyazaki (2011), “Online privacy trustmarks: Enhanc-ing the perceived ethics of digital advertising,” in: Journal of Advertising Research, 51(3),511–523.CrossRefGoogle Scholar
- Turow , J.; King, J.; Hoofnagle, C.J.; Bleakley, A. and M. Hennessy (2009), „Americans reject tailored advertising and three activities that enable it: And three activities that enable it“ in: Annenberg School of Communication, Departmental Papers.Google Scholar
- Wei , M. L.; Fisher, E. and K. J. Main (2008), “An examination of the effects of activating persua-sion knowledge on consumer response to brand engaging in covert marketing,” in: Journal of Public Policy & Marketing, 27(1),34–44.CrossRefGoogle Scholar
- Wiedenbeck. S. (1999), “The use of icons and labels in an end user application program: an empiri-cal study of learning and retention,” in: Behaviour & Information Technology, 18(2),68–82.CrossRefGoogle Scholar
- Wills, C. E. and M. Zeljkovic (2011), “A personalized approach to web privacy: Awareness, atti-tudes and actions,” in: Information Management & Computer Security, 19(1),53–73.CrossRefGoogle Scholar
- Wood, W. and J. M. Quinn (2003), “Forewarned and forearmed? Two meta analytic syntheses of forewarnings of influence appeals,” in: Psychology Bulletin, 129(1),119–138.CrossRefGoogle Scholar
- Zaichowsky, J. L. (1985), “Measuring the involvement construct,“ in: Journal of Consumer Rese-arch, 12(3),341–352.CrossRefGoogle Scholar
Copyright information
© Springer Fachmedien Wiesbaden 2013