Featured Post

Raisin in the Sun Free Essays

McNevin O’GarroJanuary 7, 2013 EnglishPeriod: 9 A Raisin in the Sun Lena, Walter, Ruth, and Beneatha are on the whole individuals fro...

Tuesday, May 12, 2020

Online Data Collection and Personal Privacy-a Review of...

Introduction The growth of the internet enters into marketing world (KÄ ±mÄ ±loÄŸlu, 2004). The internet is used as another marketing tool in several purposes; a cost-effective advertising channel (Eri, Islam and Daud, 2011), a resource for customers’ personal data obtaining (Pope and Lowen, 2009), and a market place (Lwin, Wirtz and Williams, 2007). Apart from those rising benefits, there are also problems and ethical issues growing aside. Privacy seems to be the biggest issue that marketers have to deal with the growth marketing use of the internet (Pitta, Franzak and Laric, 2003; Miyazaki, 2008). Many researches found that privacy could have effects on trust, loyalty, and attitude on customers toward companies doing business on the†¦show more content†¦3.Collecting 2 personal data to create information with intention of selling it; this approach of data collecting tends to be the most invasive to personal privacy perspectives. Miyazaki (2008) states that the invasion of personal privacy of data collecting occurs when it is combined by two perspectives; tracking data and information of customers (KÄ ±mÄ ±loÄŸlu, 2004), and the lack of information about how data is collected or is used and ability to control. The latter seems to be a huge problem issue and privacy invasion (Dommeyer and Gross, 2003; Pitta, Franzak and Laric, 2003; Dubelaar, Jevons and Parker, 2003; Christiansen, 2011). There are many undisclosed circumstances of using personal information that threat customers’ privacy for example price adjusting and shopping pattern tracking. Insurance companies measure individual’s risk of injury and death based on personal information of the internet searches and blogs, then accordingly adjust one’s insurance price (Pitta, Franzak and Laric, 2003; Christiansen, 2011). Providing a club card to use in supermarkets for customers to collect points allows supermarkets to track consumer s’ shopping patterns (Pitta, Franzak and Laric, 2003). As the increase of data collection and media reports of its affect (Pitta, Franzak and Laric, 2003; Ha, 2004), privacy concern increases on customers (Pitta, Franzak and Laric, 2003; Ha, 2004; Spake, Finney and Joseph, 2011; Bernard, 2011). This is theShow MoreRelatedDetermining The Data Collection Tools823 Words   |  4 Pages5: Determine the data collection methods that will be used to collect the study data. The researcher examines the reason of the case study in depth using a selection of data gathering methods, to provide proof that leads to an understanding of the case, and answers the research questions. An important point of the case study method involves using multiple data collection; interviews, document reviews, collection of physical artifacts, and archival records. The data collection method the researcherRead MoreThe Expansion Of The Internet As A Primary Source For Communication1603 Words   |  7 Pagesconcerns over data security and privacy. Specifically the technical and legal capabilities of government agencies to coerce private businesses to turn over the data. This data collection often occurs without appropriate warrants and requires data centers to retain data for longer periods than required for business needs and build in code to give government agencies a backdoor for access. The net effect is increased security risks and decreased privacy protections for personal data. When US citizensRead MoreEthical Principles And Standards Of The Educational Research1130 Words   |  5 Pagesevaluation of the research project; data collection methods as part of the investigative process must be guided by the ethical principles and standards of the educational research. According to the American Educational Research Association (2011), there are twenty two ethical standards, which were created to ensure the validity, honesty, and reliability of all stages of the research process. there are several examples of the impact of ethical standards on data collection methods (Resnik, 2011): InformedRead MoreHow Privacy And User Control Within A World Of Big Web Data1551 Words   |  7 PagesA Proposal on: How to Preserve Privacy and User Control in a world of Big web Data Background to the study Over the past few years, the volume of data collected and stored by business and government organizations has exploded. This data are refer to as â€Å"big data†, as it is an evolving term that describes any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information. The big data is a by-product of everyday human activities on theRead MoreA Research Project On Social Networking Sites And Its Consequences1615 Words   |  7 PagesThis is the literature review. The literature review shares with the reader the results of other studies that are closely related to the one being studied. It relates the study to the larger ongoing dialogue in the literature, filling in the gaps and extending prior studies. It provides a framework for establishing the importance of your study. And it Provides a benchmark for comparing the results with other findings. The research centers on the prevailing theories in literature on the overRead MoreWhy Customers Care About Data Privacy1122 Words   |  5 PagesWhy customers care about data privacy? Nowadays, questions that involve data privacy and security are becoming progressively significant. There exist some data collectors that are almost impossible to be identified, so consumers are concerned about it. (Bergstrà ¶m, 2015) Consumers need to preserve their privacy, due to the fact that they don’t want to exposure their personal information to others. This fact has became one of the most important barrier for companies that try to collect as much informationRead MoreAn Empirical Study On Privacy Concerns Of Young Adults On Social Media Platforms Essay1470 Words   |  6 PagesEMPIRICAL STUDY ON PRIVACY CONCERNS OF YOUNG ADULTS ON SOCIAL MEDIA PLATFORMS Himani Sevekar, Neha Aranha ABSTRACT The research mainly examines the privacy concerns of the young adolescents with respect to their accounts on Social Media Platforms. The focus of the research intends to understand the privacy protection behaviors on social networks. The targeted population for this research paper was young adolescents. The result revealed that the young adults are concerned about their privacy settings beRead MoreThe Impact Of Media On Social Media1487 Words   |  6 Pagesthe human need to share has led to an increased inclination towards personal information sharing on social media [28]. Especially the number of photos and videos being shared across the social media has been ever increasing. There has been a lot of research on social media and privacy implications of sharing photos and videos on it. Privacy implications of cloud-based storage need to be researched further as the current literature on this is clearly not sufficient. Increasingly, many are storing theirRead MoreOnline Social Media And Social Networking Essay1568 Words   |  7 Pages2Details author2@email.com 3Details author3@email.com Abstract: Online social media services like Facebook witness an exponential increase in user activity when an event takes place in the real world. This activity is a combination of good quality content like information, personal views, opinions, comments, as well as poor quality content like rumours, spam, and other malicious content. Although, the good quality content makes online social media a rich source of information, consumption of poorRead MoreSocial Media Applications Affect Our Privacy1396 Words   |  6 Pageswell. My research questions states: Is social media applications affecting our privacy and if so in what ways? The use of social media applications affect our privacy in many ways including the collection of personal information such as messages, photos, videos, location, credit card information, phone information, device settings and monitor habits. They also affect our privacy by distributing a huge portion of personal information with third parties and allowing h ackers to hack the application due

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.