Question

In: Operations Management

Privacy and security are two key reasons consumers are leery of online shopping and buying. A...

Privacy and security are two key reasons consumers are leery of online shopping and buying. A recent Jupiter Research poll reported that 70 percent of online consumers are concerned about threats to their personal privacy on the Internet. Even more telling, 53 percent have stopped shopping a website or forgone an online purchase because of privacy concerns. Industry analysts estimate that low consumer confidence in privacy and security resulted in lost sales of $24.5 billion in 2006.

The privacy and security concerns of online consumers are related to the cookies described in the text and how those cookies can be used or misused. A percolating issue is whether the U.S. government should pass more stringent Internet privacy laws. About 70 percent of online consumers favor such action. Companies have adopted initiatives to develop their own privacy standards government action.

Do you think that governmental or self-regulation is the best way to deal with issues of privacy and security in the new market space?

Solutions

Expert Solution

We are discussing about the privacy issue when the huge data breach case of Facebook is underway. Over the years we have heard of multiple cases where the companies were unable to secure the consumer data to get compromized. This is a serious issue as more and more such cases are coming on the surface.

Let's look at the facts regarding the online privacy concern. Any online platform is supposed to ask for customer's permission before utilizing any of their data. Now more often than not, the customers agree to the 'Terms and Conditions' without even going through it. But in no means this gives the companies the right to share these data with any other organization. However there is hardly any chance to verify if this is being followed by the companies or not. Facebook's case coming out in the open is really believed to be a sample issue. A lot of other companies may also misuse the data, without getting caught.

Now coming to the online shopping websites. Shopping pattern tells a lot about the behavior of the particular consumer. Hence this is considered to be a very importatn source for the companies. But the other data, which is available with the shopping platforms, and is a very critical data, is the payment card details. This data going into the wrong hands can greatly impact the users from around the world.

Now as I have already mentioned that it is not really a piece of cake to verify if the data is being misused or not, the government has no option but to interfere. In the current genaration of IOT and AI, the base of all these advancements is the connected world, where all the different parts (gadgets in this case) are connected to each other. So it is really expected that the companies will follow the ethical way of operation. As much as we, as customers, want our life to be easier through a connected world, we would never want this to happen at the cost of our privacy. Hence at this point of time, government regulation seems to be the only way to keep the companies in control.


Related Solutions

Discuss three approaches to safeguard online privacy of consumers.
Discuss three approaches to safeguard online privacy of consumers.
Most consumers don’t think about security or privacy until it has been compromised and they must...
Most consumers don’t think about security or privacy until it has been compromised and they must deal with the consequences. Your manager at the CPA firm where you work has asked you to produce a customer-oriented security and privacy brochure as part of a rollout plan for new online services the firm plans to offer. When asked for the details of these services so you can write about them, the reply is “I want you to tell me what typical...
7.7 Ch 7 Program: Online shopping cart (continued) (C) This program extends the earlier "Online shopping...
7.7 Ch 7 Program: Online shopping cart (continued) (C) This program extends the earlier "Online shopping cart" program. (Consider first saving your earlier program). (1) Extend the ItemToPurchase struct to contain a new data member. (2 pt) char itemDescription[ ] - set to "none" in MakeItemBlank() Implement the following related functions for the ItemToPurchase struct. PrintItemDescription() Has an ItemToPurchase parameter. Ex. of PrintItemDescription() output: Bottled Water: Deer Park, 12 oz. (2) Create three new files: ShoppingCart.h - struct definition and...
2. Is competition in privacy sufficient to protect users? Facebook and online Privacy. business and its...
2. Is competition in privacy sufficient to protect users? Facebook and online Privacy. business and its environment
draw traceability matrix for online shopping system ( online grocery store)
draw traceability matrix for online shopping system ( online grocery store)
draw a block diagram for online shopping website
draw a block diagram for online shopping website
Why is online marketing to children a controversial practice? What is the Children’s Online Privacy Protection...
Why is online marketing to children a controversial practice? What is the Children’s Online Privacy Protection Act (C O P P A) and how does it protect the privacy of children? How do companies verify the age of online users? Should companies be allowed to target marketing efforts to children under the age of 13?
Convenience Tech Shopping Ltd is a Namibian incorporated company specialising in providing online shopping via the...
Convenience Tech Shopping Ltd is a Namibian incorporated company specialising in providing online shopping via the internet. The company’s standard practice is to package a customer’s order for a price of $175. The company’s system operates as follows: i. Customers phone through their orders to the company representatives; ii. Company advises customer services offered and the cost thereof. For future reference purposes, all telephonic conversions are recorded; iii. iv. If the customer is agreeable to the terms provided by company...
Consumers usually adapt two types of shopping values. First, hedonic value, which is associated with satisfaction...
Consumers usually adapt two types of shopping values. First, hedonic value, which is associated with satisfaction of the senses enhanced by experiences of pleasure, entertainment and fun. Second, utilitarian value are focused on functional aspects of the product like durability, price, physical performance and environmental protection among others. Based on scientific literature review, hedonic and utilitarian consumer behavior can be the source of the ethical consumption. The notion hedonism is traditionally associated with negative emotions and is linked with immediate...
Imagine you are the Newly hired Security Personnel responsible for creating a security and privacy plan...
Imagine you are the Newly hired Security Personnel responsible for creating a security and privacy plan for your organization. The purpose of your plan is to describe standards that help ensure the privacy and integrity of the many different facets of a network. What policies will you include in your plan that protects the hardware and physical aspects of the network and; Identify hardware areas that need to be secured.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT