Customer Privacy Concerns and Privacy Protective Responses

  • V. Kumar
  • Werner Reinartz
Chapter
Part of the Springer Texts in Business and Economics book series (STBE)

Abstract

Companies are increasingly collecting and using data on their current and potential customers to improve their CRM, sales, and service effectiveness. At the same time, they are faced with a growing reluctance of customers to disclose their personal information or to allow tracking of their behaviors because of privacy concerns. This chapter discusses the concept of customer privacy concerns and the respective implications for successful CRM practices. After introducing trends and underlying drivers of customer privacy concerns, this chapter sheds more light on the different governmental regulations concerning privacy in a cross-country comparison. Sections 14.4, 14.5, and 14.6 continue with presenting the underlying psychological processes and respective customer responses which are summarized in a comprehensive conceptual framework. At the end of this chapter, implications for a responsible privacy handling related to CRM are drawn.

References

  1. Aguirre, E., Mahr, D., Grewel, D., Ruyter, K. D., & Wetzels, M. (2015). Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness. Journal of Retailing, 91(1), 34–59.CrossRefGoogle Scholar
  2. Allen, & Overy. (2016). The EU general data protection regulation. http://www.allenovery.com/SiteCollectionDocuments/RadicalchangestoEuropeandataprotectionlegislation.pdf. Accessed October 14, 2016.
  3. Bisson, D. (2015). The Ashley Madison hack—A timeline. http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-ashley-madison-hack-a-timeline. Accessed October 10, 2016.
  4. Blattberg, R. C., Kim, B. D., & Neslin, S. A. (2008). Database marketing: Analyzing and managing customers. New York: Springer.CrossRefGoogle Scholar
  5. Bleier, A., & Eisenbeiss, M. (2015). The importance of trust for personalized online advertising. Journal of Retailing, 91(3), 390–409.CrossRefGoogle Scholar
  6. Court of Justice of the European Union. (2014). An internet search engine operator is responsible for the processing that it carries out of personal data which appear on web pages published by third parties. https://curia.europa.eu/jcms/upload/docs/application/pdf/2014-05/cp140070en.pdf. Accesed February 7, 2018.
  7. Datafloq. (2016). From data ownership to data usage: How consumers will monetize their personal data. https://datafloq.com/read/data-ownership-data-usage-consumers-monetize-data/68. Accessed November 17, 2016.
  8. Davies, S. (2015). The smart fitting room is the future of retail. http://tech.co/smart-fitting-room-future-retail-2015-12. Accessed October 10, 2016.
  9. Direct Marketing Association. (2015). Data privacy: What the consumer really thinks. https://dma.org.uk/uploads/ckeditor/Data-privacy-2015-what-consumers-really-thinks_final.pdf. Accessed November 17, 2016.
  10. EPIC. (2011). US Patriot Act. http://epic.org/privacy/terrorism/usapatriot/#introduction. Accessed September 29, 2011.
  11. European Commission. (2012). Proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf. Accessed October 10, 2016.
  12. EU-GDPR. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679. Accessed October 14, 2016.
  13. FTC. (2000). Privacy online: Fair information practices in the electronic marketplace. http://www.ftc.gov/reports/privacy2000/privacy2000.pdf. Accessed September 29, 2011.
  14. FTC. (2010). Protecting consumer privacy in an era of rapid change—A proposed framework for businesses and policymakers. http://www.ftc.gov/os/2010/12/101201privacyreport.pdf. Accessed September 29, 2011.
  15. FTC. (2015). National do not call registry. https://www.consumer.ftc.gov/articles/0108-national-do-not-call-registry#reregister. Accessed October 10, 2016.
  16. Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Privacy & Security, 3(3), 34–43.CrossRefGoogle Scholar
  17. Gartner. (2011). Google-FTC settlement may have important privacy implications. http://www.gartner.com/DisplayDocument?id=1620221. Accessed September 29, 2011.
  18. Gartner. (2014). Gartner Says the Internet of Things Will Transform the Data Center. http://www.gartner.com/newsroom/id/2684915. Accessed April 10, 2017.
  19. GBG. (2015). Data distrust pits consumers against business. www.thetrusteconomy.com/news/. Accessed October 10, 2016.
  20. Global Legal Group. (2016). The International Comparative Legal Guide to: Data Protection 2016. https://iclg.com/practice-areas/data-protection/data-protection-2016. Accessed April 10, 2017.
  21. Goldfarb, A., & Tucker, C. E. (2011). Privacy regulation and online advertising. Management Science, 57(1), 57–71.CrossRefGoogle Scholar
  22. Goldfarb, A., & Tucker, C. E. (2012). Shifts in privacy concerns. American Economic Review: Papers & Proceedings, 102(3), 349–353.CrossRefGoogle Scholar
  23. Harris, M. H., Van Hoye, G., & Lievens, F. (2003). Privacy and attitudes towards internet based selection systems: A cross cultural comparison. International Journal of Selection and Assessment, 11(2–3), 230–236.CrossRefGoogle Scholar
  24. Hildner, L. (2006). Defusing the threat of RFID: Protecting consumer privacy through technology-specific legislation at the state level. Harvard Civil Rights-Civil Liberties Law Review, 41(1), 133–176.Google Scholar
  25. Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Building consumer trust in online environments: The case for information privacy. Communications of the ACM, 42(4), 80–85.CrossRefGoogle Scholar
  26. IBM. (2016). 2016 Ponemon cost of data breach study. https://www.ibm.com/security/data-breach/. Accessed May 11, 2017.
  27. ICT. (2016). ICT facts and figures 2016. http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2016.pdf. Accessed October 10, 2016.
  28. Kluth, A. (2008). The perils of sharing. The Economist. http://www.economist.com/node/12499877. Accessed February 7, 2018.
  29. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRefGoogle Scholar
  30. Martin, K. D., & Murphy, P. E. (2016). The role of data privacy in marketing. Journal of the Academy of Marketing Science, forthcoming. Google Scholar
  31. Microsoft. (2000). Bill Gates opens SafeNet 2000 summit. http://www.microsoft.com/Presspass/press/2000/dec00/safenetpr.mspx. Accessed September 29, 2011.
  32. Morey, T., Forbath, T., & Schoop, A. (2015). Customer data: Designing for transparency and trust. Harvard Business Review, 93(5), 96–105.Google Scholar
  33. Nayak, R., Padhye, R., Wang, L., Chatterjee, K., & Gupta, S. (2015). The role of mass customisation in the apparel industry. International Journal of Fashion Design, Technology and Education, 8(2), 162–172.CrossRefGoogle Scholar
  34. Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126.CrossRefGoogle Scholar
  35. Pearson, H. (2007). Privacy checklist for business. Harvard Business Review, 86(10), 123–130.Google Scholar
  36. Peltier, J. W., Milne, G. R., & Phelps, J. E. (2009). Information privacy research: Framework for integrating multiple publics, information channels, and responses. Journal of Interactive Marketing, 23(2), 191–205.CrossRefGoogle Scholar
  37. Preibusch, S. (2015). Privacy behaviors after Snowden. Communications of the ACM, 58(5), 48–55.CrossRefGoogle Scholar
  38. Privacy International. (2016). The global surveillance industry. https://www.privacyinternational.org/node/911. Accessed October 10, 2016.
  39. Privacy International. (2015). The right to privacy in the United Kingdom. https://www.privacyinternational.org/sites/default/files/PI%20submission%20UK.pdf. Accessed October 10, 2016.
  40. PWC. (2016). Internet advertising. Key insights at a glance. https://www.pwc.com/gx/en/global-entertainment-media-outlook/assets/2015/internet-advertising-key-insights-1-advertising-segment.pdf. Accessed October 13, 2016.
  41. PWC. (2014). Defending yesterday. Key findings from The Global State of Information Security Survey 2014. http://www.pwc.com/gx/en/consulting-services/information-security-survey/pwc-gsiss-2014-key-findings-report.pdf. Accessed May 11, 2017.
  42. Rainie, L. (2016). The state of privacy in post-Snowden America. http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/, Pew Research Center. Accessed October 10, 2016.
  43. Roznowski, J. L. (2003). A content analysis of mass media stories surrounding the consumer privacy issue 1990–2001. Journal of Interactive Marketing, 17(2), 52–69.CrossRefGoogle Scholar
  44. Rust, R. T., Kannan, P. K., & Peng, N. (2002). The customer economics of internet privacy. Journal of the Academy of Marketing Science, 30(4), 455–464.CrossRefGoogle Scholar
  45. Sidley. (2016). South Korea Enacts Stricter Penalties for Data Protection Violations by Telecommunications and Online Services Providers. http://datamatters.sidley.com/south-korea-enacts-stricter-penalties-for-data-protection-violations-by-telecommunications-and-online-services-providers/. Accessed April 10, 2017.
  46. Son, J. Y., & Kim, S. S. (2008). Internet Users’ information privacy-protective responses: A taxonomy and nomological model. MIS Quarterly, 32(3), 503–529.CrossRefGoogle Scholar
  47. Spiekermann, S. (2012). The privacy paradox. http://derstandard.at/1330390059705/The-Privacy-Paradox. Accessed October 10, 2016.
  48. Statista. (2016). Market capitalization of the largest U.S. internet companies as of March 2016 (in billion U.S. dollars). https://www.statista.com/statistics/209331/largest-us-internet-companies-by-market-cap. Accessed October 14, 2016.
  49. Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459–468.CrossRefGoogle Scholar
  50. Symantec. (2015). State of privacy report. https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf. Accessed October 11, 2016.
  51. Techworld. (2013). How NFC is transforming the weekly shopping experience. http://www.techworld.com/mobile/how-nfc-is-transforming-weekly-shopping-experience-3438410. Accessed October 10, 2016.
  52. The Economist. (2010). Location-based services on mobile phones—Follow me. The Economist. http://www.economist.com/node/15612291. Accessed February 7, 2018.
  53. The Economist. (2011). Anonymous no more. The Economist. http://www.economist.com/node/18304046. Accessed February 7, 2018.
  54. The Telegraph. (2013). One surveillance camera for every 11 people in Britain, says CCTV survey. http://www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html. Accessed October 10, 2016.
  55. Tucker, K. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5), 546–562.CrossRefGoogle Scholar
  56. Turner, M. A. (2001). The impact of data restrictions on consumer distance shopping. Direct Marketing Association. http://www.the-dma.org/isec/9.pdf. Accessed September 28, 2011.
  57. Whitman, J. Q. (2004). The Two western cultures of privacy: Dignity versus liberty. Yale Law Journal, 113(6), 1151–1221.CrossRefGoogle Scholar
  58. Wirtz, J., & Lwin, M. O. (2009). Regulatory focus theory, trust, and privacy concerns. Journal of Service Research, 12(2), 190–207.CrossRefGoogle Scholar
  59. Wirtz, J., Lwin, M. O., & Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326–348.CrossRefGoogle Scholar
  60. World Economic Forum. (2011). Personal data: The emergence of a new asset class. http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf. Accessed November 17, 2016.
  61. Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association of Information Systems, 12(12), 798–824.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • V. Kumar
    • 1
  • Werner Reinartz
    • 2
  1. 1.J. Mack Robinson College of Business, Center for Excellence in Brand and Customer ManagementGeorgia State UniversityAtlantaUSA
  2. 2.Department of Retailing and Customer ManagementUniversity of CologneCologneGermany

Personalised recommendations