The dark side of personalization :: online privacy concerns influence customer behavior /
Hauptbeschreibung 'Online Privacy Fears Stoked By Google, Twitter, Facebook Data Collection Arms Race'', ''Your E-Book Is Reading You'', '' 'Instant personalization' brings more privacy issues to Facebook''. These are only a few recent...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hamburg :
Anchor Academic Pub.,
2013.
|
Schriftenreihe: | Compact.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Hauptbeschreibung 'Online Privacy Fears Stoked By Google, Twitter, Facebook Data Collection Arms Race'', ''Your E-Book Is Reading You'', '' 'Instant personalization' brings more privacy issues to Facebook''. These are only a few recent examples of media headlines that deal with the issue of online privacy and personalization. Scholars and managers have repeatedly stated the benefits of personalization which is targeting products and services to individual customers, and constitutes a key element of an interactive marketing strategy. In order to accurately estimate the needs and. |
Beschreibung: | "Disseminate knowledge"--Cover. |
Beschreibung: | 1 online resource (ix, 52 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9783954895618 3954895617 3954890615 9783954890613 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn857080642 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 130729s2013 gw a ob 000 0 eng d | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCO |d N$T |d OCLCF |d YDXCP |d EBLCP |d OCLCQ |d AGLDB |d MERUC |d OCLCQ |d OCLCA |d OCLCQ |d JBG |d STF |d UKAHL |d OCLCQ |d VT2 |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL |d SXB | ||
019 | |a 854977220 |a 1294692571 | ||
020 | |a 9783954895618 |q (electronic bk.) | ||
020 | |a 3954895617 |q (electronic bk.) | ||
020 | |z 9783954890613 | ||
020 | |a 3954890615 | ||
020 | |a 9783954890613 | ||
035 | |a (OCoLC)857080642 |z (OCoLC)854977220 |z (OCoLC)1294692571 | ||
050 | 4 | |a JC596 |b .Z54 2013eb | |
072 | 7 | |a BUS |x 041000 |2 bisacsh | |
072 | 7 | |a BUS |x 055000 |2 bisacsh | |
072 | 7 | |a BUS |x 059000 |2 bisacsh | |
082 | 7 | |a 650 | |
049 | |a MAIN | ||
100 | 1 | |a Ziesak, Jörg. | |
245 | 1 | 4 | |a The dark side of personalization : |b online privacy concerns influence customer behavior / |c Jörg Ziesak. |
260 | |a Hamburg : |b Anchor Academic Pub., |c 2013. | ||
300 | |a 1 online resource (ix, 52 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Compact | |
500 | |a "Disseminate knowledge"--Cover. | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a The Dark Side of Personalization; TABLE OF CONTENTS; List of Figures; List of Abbreviations; 1 Introduction; 2 Literature Background; 2.1 Personalization vs. Customization; 2.2 Personalization in an Online Marketing Environment; 3 Conceptual Framework and Hypotheses; 3.1 Privacy Concerns and CFIP; 3.2 Control of Personal Data and CFIP; 3.3 Data Gathering Method -- Overt and Covert Approach; 3.4 Use of Data -- Authorized Primary Use or Unauthorized Secondary Use; 3.5 Willingness to Transact; 3.6 Customers' Value of Online Personalization; 3.7 Risk Beliefs of Online Personalization. | |
505 | 8 | |a 3.8 Perceived Usefulness of Online Personalization3.9 Moderating Role of Trust Beliefs between Use of Data and CFIP; 4 Research Design and Results; 4.1 Data Collection Process; 4.2 Sample Description; 4.3 Questionnaire Design; 4.4 Measures; 4.5 Scale Validity and Reliability; 4.6 Data Analysis and Results; 4.7 Model Evaluation; 4.8 Main Effects and Path Coefficients; 4.9 Indirect Effects; 4.10 Moderation Analysis; 5 Discussion and Conclusion; 5.1 Theoretical Implications; 5.2 Managerial Implications; 5.3 Limitations and Future Research; Appendices; Appendix A: Antecedents of CFIP. | |
505 | 8 | |a Appendix B: Consequences of CFIPAppendix C: Manipulations; Appendix D: Measurement Constructs; Appendix E: Further conceptual models tested; References. | |
520 | |a Hauptbeschreibung 'Online Privacy Fears Stoked By Google, Twitter, Facebook Data Collection Arms Race'', ''Your E-Book Is Reading You'', '' 'Instant personalization' brings more privacy issues to Facebook''. These are only a few recent examples of media headlines that deal with the issue of online privacy and personalization. Scholars and managers have repeatedly stated the benefits of personalization which is targeting products and services to individual customers, and constitutes a key element of an interactive marketing strategy. In order to accurately estimate the needs and. | ||
650 | 0 | |a Privacy, Right of. |0 http://id.loc.gov/authorities/subjects/sh85107029 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer crimes. |0 http://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 0 | |a Consumer protection. |0 http://id.loc.gov/authorities/subjects/sh85031486 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 2 | |a Consumer Advocacy |0 https://id.nlm.nih.gov/mesh/D003254 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Criminalité informatique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Consommateurs |x Protection. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Reference. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Skills. |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Consumer protection |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
655 | 4 | |a Electronic book. | |
758 | |i has work: |a Dark Side of Personalization (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYhT4D46QT7FKCtP9grbYd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Ziesak, Jörg. |t Dark Side of Personalization: Online Privacy Concerns influence Customer Behavior. |d Hamburg : Diplomica Verlag, ©2013 |
830 | 0 | |a Compact. |0 http://id.loc.gov/authorities/names/n98015424 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=773023 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n BDZ0023602739 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1324048 | ||
938 | |a ebrary |b EBRY |n ebr10735035 | ||
938 | |a EBSCOhost |b EBSC |n 773023 | ||
938 | |a YBP Library Services |b YANK |n 10883306 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn857080642 |
---|---|
_version_ | 1816796910833369088 |
adam_text | |
any_adam_object | |
author | Ziesak, Jörg |
author_facet | Ziesak, Jörg |
author_role | |
author_sort | Ziesak, Jörg |
author_variant | j z jz |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | J - Political Science |
callnumber-label | JC596 |
callnumber-raw | JC596 .Z54 2013eb |
callnumber-search | JC596 .Z54 2013eb |
callnumber-sort | JC 3596 Z54 42013EB |
callnumber-subject | JC - Political Theory |
collection | ZDB-4-EBU |
contents | The Dark Side of Personalization; TABLE OF CONTENTS; List of Figures; List of Abbreviations; 1 Introduction; 2 Literature Background; 2.1 Personalization vs. Customization; 2.2 Personalization in an Online Marketing Environment; 3 Conceptual Framework and Hypotheses; 3.1 Privacy Concerns and CFIP; 3.2 Control of Personal Data and CFIP; 3.3 Data Gathering Method -- Overt and Covert Approach; 3.4 Use of Data -- Authorized Primary Use or Unauthorized Secondary Use; 3.5 Willingness to Transact; 3.6 Customers' Value of Online Personalization; 3.7 Risk Beliefs of Online Personalization. 3.8 Perceived Usefulness of Online Personalization3.9 Moderating Role of Trust Beliefs between Use of Data and CFIP; 4 Research Design and Results; 4.1 Data Collection Process; 4.2 Sample Description; 4.3 Questionnaire Design; 4.4 Measures; 4.5 Scale Validity and Reliability; 4.6 Data Analysis and Results; 4.7 Model Evaluation; 4.8 Main Effects and Path Coefficients; 4.9 Indirect Effects; 4.10 Moderation Analysis; 5 Discussion and Conclusion; 5.1 Theoretical Implications; 5.2 Managerial Implications; 5.3 Limitations and Future Research; Appendices; Appendix A: Antecedents of CFIP. Appendix B: Consequences of CFIPAppendix C: Manipulations; Appendix D: Measurement Constructs; Appendix E: Further conceptual models tested; References. |
ctrlnum | (OCoLC)857080642 |
dewey-full | 650 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 650 - Management and auxiliary services |
dewey-raw | 650 |
dewey-search | 650 |
dewey-sort | 3650 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05273cam a2200793Ma 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn857080642</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">130729s2013 gw a ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">854977220</subfield><subfield code="a">1294692571</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783954895618</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3954895617</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783954890613</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3954890615</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783954890613</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)857080642</subfield><subfield code="z">(OCoLC)854977220</subfield><subfield code="z">(OCoLC)1294692571</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC596</subfield><subfield code="b">.Z54 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">055000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">059000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">650</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ziesak, Jörg.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The dark side of personalization :</subfield><subfield code="b">online privacy concerns influence customer behavior /</subfield><subfield code="c">Jörg Ziesak.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hamburg :</subfield><subfield code="b">Anchor Academic Pub.,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 52 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Compact</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Disseminate knowledge"--Cover.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The Dark Side of Personalization; TABLE OF CONTENTS; List of Figures; List of Abbreviations; 1 Introduction; 2 Literature Background; 2.1 Personalization vs. Customization; 2.2 Personalization in an Online Marketing Environment; 3 Conceptual Framework and Hypotheses; 3.1 Privacy Concerns and CFIP; 3.2 Control of Personal Data and CFIP; 3.3 Data Gathering Method -- Overt and Covert Approach; 3.4 Use of Data -- Authorized Primary Use or Unauthorized Secondary Use; 3.5 Willingness to Transact; 3.6 Customers' Value of Online Personalization; 3.7 Risk Beliefs of Online Personalization.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.8 Perceived Usefulness of Online Personalization3.9 Moderating Role of Trust Beliefs between Use of Data and CFIP; 4 Research Design and Results; 4.1 Data Collection Process; 4.2 Sample Description; 4.3 Questionnaire Design; 4.4 Measures; 4.5 Scale Validity and Reliability; 4.6 Data Analysis and Results; 4.7 Model Evaluation; 4.8 Main Effects and Path Coefficients; 4.9 Indirect Effects; 4.10 Moderation Analysis; 5 Discussion and Conclusion; 5.1 Theoretical Implications; 5.2 Managerial Implications; 5.3 Limitations and Future Research; Appendices; Appendix A: Antecedents of CFIP.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Appendix B: Consequences of CFIPAppendix C: Manipulations; Appendix D: Measurement Constructs; Appendix E: Further conceptual models tested; References.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hauptbeschreibung 'Online Privacy Fears Stoked By Google, Twitter, Facebook Data Collection Arms Race'', ''Your E-Book Is Reading You'', '' 'Instant personalization' brings more privacy issues to Facebook''. These are only a few recent examples of media headlines that deal with the issue of online privacy and personalization. Scholars and managers have repeatedly stated the benefits of personalization which is targeting products and services to individual customers, and constitutes a key element of an interactive marketing strategy. In order to accurately estimate the needs and.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107029</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029492</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Consumer protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85031486</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Consumer Advocacy</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D003254</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Consommateurs</subfield><subfield code="x">Protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Management.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Skills.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Consumer protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Dark Side of Personalization (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYhT4D46QT7FKCtP9grbYd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ziesak, Jörg.</subfield><subfield code="t">Dark Side of Personalization: Online Privacy Concerns influence Customer Behavior.</subfield><subfield code="d">Hamburg : Diplomica Verlag, ©2013</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Compact.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98015424</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=773023</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">BDZ0023602739</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1324048</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10735035</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">773023</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10883306</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBU-ocn857080642 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:49:11Z |
institution | BVB |
isbn | 9783954895618 3954895617 3954890615 9783954890613 |
language | English |
oclc_num | 857080642 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (ix, 52 pages) : illustrations |
psigel | ZDB-4-EBU |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Anchor Academic Pub., |
record_format | marc |
series | Compact. |
series2 | Compact |
spelling | Ziesak, Jörg. The dark side of personalization : online privacy concerns influence customer behavior / Jörg Ziesak. Hamburg : Anchor Academic Pub., 2013. 1 online resource (ix, 52 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Compact "Disseminate knowledge"--Cover. Includes bibliographical references. The Dark Side of Personalization; TABLE OF CONTENTS; List of Figures; List of Abbreviations; 1 Introduction; 2 Literature Background; 2.1 Personalization vs. Customization; 2.2 Personalization in an Online Marketing Environment; 3 Conceptual Framework and Hypotheses; 3.1 Privacy Concerns and CFIP; 3.2 Control of Personal Data and CFIP; 3.3 Data Gathering Method -- Overt and Covert Approach; 3.4 Use of Data -- Authorized Primary Use or Unauthorized Secondary Use; 3.5 Willingness to Transact; 3.6 Customers' Value of Online Personalization; 3.7 Risk Beliefs of Online Personalization. 3.8 Perceived Usefulness of Online Personalization3.9 Moderating Role of Trust Beliefs between Use of Data and CFIP; 4 Research Design and Results; 4.1 Data Collection Process; 4.2 Sample Description; 4.3 Questionnaire Design; 4.4 Measures; 4.5 Scale Validity and Reliability; 4.6 Data Analysis and Results; 4.7 Model Evaluation; 4.8 Main Effects and Path Coefficients; 4.9 Indirect Effects; 4.10 Moderation Analysis; 5 Discussion and Conclusion; 5.1 Theoretical Implications; 5.2 Managerial Implications; 5.3 Limitations and Future Research; Appendices; Appendix A: Antecedents of CFIP. Appendix B: Consequences of CFIPAppendix C: Manipulations; Appendix D: Measurement Constructs; Appendix E: Further conceptual models tested; References. Hauptbeschreibung 'Online Privacy Fears Stoked By Google, Twitter, Facebook Data Collection Arms Race'', ''Your E-Book Is Reading You'', '' 'Instant personalization' brings more privacy issues to Facebook''. These are only a few recent examples of media headlines that deal with the issue of online privacy and personalization. Scholars and managers have repeatedly stated the benefits of personalization which is targeting products and services to individual customers, and constitutes a key element of an interactive marketing strategy. In order to accurately estimate the needs and. Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer security. Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Consumer protection. http://id.loc.gov/authorities/subjects/sh85031486 Computer Security https://id.nlm.nih.gov/mesh/D016494 Consumer Advocacy https://id.nlm.nih.gov/mesh/D003254 Sécurité informatique. Criminalité informatique. Protection de l'information (Informatique) Consommateurs Protection. BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Reference. bisacsh BUSINESS & ECONOMICS Skills. bisacsh Computer crimes fast Computer security fast Consumer protection fast Data protection fast Privacy, Right of fast Electronic book. has work: Dark Side of Personalization (Text) https://id.oclc.org/worldcat/entity/E39PCYhT4D46QT7FKCtP9grbYd https://id.oclc.org/worldcat/ontology/hasWork Print version: Ziesak, Jörg. Dark Side of Personalization: Online Privacy Concerns influence Customer Behavior. Hamburg : Diplomica Verlag, ©2013 Compact. http://id.loc.gov/authorities/names/n98015424 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=773023 Volltext |
spellingShingle | Ziesak, Jörg The dark side of personalization : online privacy concerns influence customer behavior / Compact. The Dark Side of Personalization; TABLE OF CONTENTS; List of Figures; List of Abbreviations; 1 Introduction; 2 Literature Background; 2.1 Personalization vs. Customization; 2.2 Personalization in an Online Marketing Environment; 3 Conceptual Framework and Hypotheses; 3.1 Privacy Concerns and CFIP; 3.2 Control of Personal Data and CFIP; 3.3 Data Gathering Method -- Overt and Covert Approach; 3.4 Use of Data -- Authorized Primary Use or Unauthorized Secondary Use; 3.5 Willingness to Transact; 3.6 Customers' Value of Online Personalization; 3.7 Risk Beliefs of Online Personalization. 3.8 Perceived Usefulness of Online Personalization3.9 Moderating Role of Trust Beliefs between Use of Data and CFIP; 4 Research Design and Results; 4.1 Data Collection Process; 4.2 Sample Description; 4.3 Questionnaire Design; 4.4 Measures; 4.5 Scale Validity and Reliability; 4.6 Data Analysis and Results; 4.7 Model Evaluation; 4.8 Main Effects and Path Coefficients; 4.9 Indirect Effects; 4.10 Moderation Analysis; 5 Discussion and Conclusion; 5.1 Theoretical Implications; 5.2 Managerial Implications; 5.3 Limitations and Future Research; Appendices; Appendix A: Antecedents of CFIP. Appendix B: Consequences of CFIPAppendix C: Manipulations; Appendix D: Measurement Constructs; Appendix E: Further conceptual models tested; References. Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer security. Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Consumer protection. http://id.loc.gov/authorities/subjects/sh85031486 Computer Security https://id.nlm.nih.gov/mesh/D016494 Consumer Advocacy https://id.nlm.nih.gov/mesh/D003254 Sécurité informatique. Criminalité informatique. Protection de l'information (Informatique) Consommateurs Protection. BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Reference. bisacsh BUSINESS & ECONOMICS Skills. bisacsh Computer crimes fast Computer security fast Consumer protection fast Data protection fast Privacy, Right of fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85107029 http://id.loc.gov/authorities/subjects/sh85029492 http://id.loc.gov/authorities/subjects/sh85035859 http://id.loc.gov/authorities/subjects/sh85031486 https://id.nlm.nih.gov/mesh/D016494 https://id.nlm.nih.gov/mesh/D003254 |
title | The dark side of personalization : online privacy concerns influence customer behavior / |
title_auth | The dark side of personalization : online privacy concerns influence customer behavior / |
title_exact_search | The dark side of personalization : online privacy concerns influence customer behavior / |
title_full | The dark side of personalization : online privacy concerns influence customer behavior / Jörg Ziesak. |
title_fullStr | The dark side of personalization : online privacy concerns influence customer behavior / Jörg Ziesak. |
title_full_unstemmed | The dark side of personalization : online privacy concerns influence customer behavior / Jörg Ziesak. |
title_short | The dark side of personalization : |
title_sort | dark side of personalization online privacy concerns influence customer behavior |
title_sub | online privacy concerns influence customer behavior / |
topic | Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer security. Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Consumer protection. http://id.loc.gov/authorities/subjects/sh85031486 Computer Security https://id.nlm.nih.gov/mesh/D016494 Consumer Advocacy https://id.nlm.nih.gov/mesh/D003254 Sécurité informatique. Criminalité informatique. Protection de l'information (Informatique) Consommateurs Protection. BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Reference. bisacsh BUSINESS & ECONOMICS Skills. bisacsh Computer crimes fast Computer security fast Consumer protection fast Data protection fast Privacy, Right of fast |
topic_facet | Privacy, Right of. Computer security. Computer crimes. Data protection. Consumer protection. Computer Security Consumer Advocacy Sécurité informatique. Criminalité informatique. Protection de l'information (Informatique) Consommateurs Protection. BUSINESS & ECONOMICS Management. BUSINESS & ECONOMICS Reference. BUSINESS & ECONOMICS Skills. Computer crimes Computer security Consumer protection Data protection Privacy, Right of Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=773023 |
work_keys_str_mv | AT ziesakjorg thedarksideofpersonalizationonlineprivacyconcernsinfluencecustomerbehavior AT ziesakjorg darksideofpersonalizationonlineprivacyconcernsinfluencecustomerbehavior |