Academic literature on the topic 'Customer privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Customer privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Customer privacy"
Blight, Jim. "Customer privacy versus customer service." Information Security Technical Report 2, no. 1 (January 1997): 7–46. http://dx.doi.org/10.1016/s1363-4127(97)80880-1.
Full textLiu, Rong, Jiawei Yang, and Jifei Wu. "When Big Data Backfires: The Impact of a Perceived Privacy Breach by Pharmaceutical E-Retailers on Customer Boycott Intention in China." International Journal of Environmental Research and Public Health 19, no. 8 (April 15, 2022): 4831. http://dx.doi.org/10.3390/ijerph19084831.
Full textShy, Oz, and Rune Stenbacka. "Customer Privacy and Competition." Journal of Economics & Management Strategy 25, no. 3 (December 18, 2015): 539–62. http://dx.doi.org/10.1111/jems.12157.
Full textMandal, Pratap Chandra. "Public Policy Issues and Technoethics in Marketing Research in the Digital Age." International Journal of Technoethics 12, no. 1 (January 2021): 75–86. http://dx.doi.org/10.4018/ijt.2021010105.
Full textWijaya, Petra Surya Mega, and Ety Istriani. "PENGARUH FAKTOR-FAKTOR ANTESEDEN E-CUSTOMER SATISFACTION, E-CUSTOMER TRUST DAN COMPULSIVE BUYING PADA PEMBENTUKKAN E-CUSTOMER LOYALTY." Jurnal Manajemen 19, no. 1 (March 7, 2017): 1. http://dx.doi.org/10.24912/jm.v19i1.101.
Full textMartin, Kelly D., Abhishek Borah, and Robert W. Palmatier. "Data Privacy: Effects on Customer and Firm Performance." Journal of Marketing 81, no. 1 (January 2017): 36–58. http://dx.doi.org/10.1509/jm.15.0497.
Full textPradnyadewi, Luh Putu Ariestari, and IG A. K. Giantari. "Effect of E-Service Quality on Customer Satisfaction and Customer Loyalty on Tokopedia Customers in Denpasar." European Journal of Business and Management Research 7, no. 2 (April 6, 2022): 200–204. http://dx.doi.org/10.24018/ejbmr.2022.7.2.1297.
Full textMandal, Pratap Chandra. "Public Policy Issues in Direct and Digital Marketing – Concerns and Initiatives." International Journal of Public Administration in the Digital Age 6, no. 4 (October 2019): 54–71. http://dx.doi.org/10.4018/ijpada.2019100105.
Full textTop, Cemil, and Bayad Jamal Ali. "Customer satisfaction in online meeting platforms: Impact of efficiency, fulfillment, system availability, and privacy." Revista Amazonia Investiga 10, no. 38 (April 12, 2021): 70–81. http://dx.doi.org/10.34069/ai/2021.38.02.7.
Full textMandal, Pratap Chandra. "Shifts in Customer Relationship." International Journal of Applied Management Theory and Research 4, no. 1 (January 1, 2022): 1–19. http://dx.doi.org/10.4018/ijamtr.2022010102.
Full textDissertations / Theses on the topic "Customer privacy"
Dahlgren, Sanne, and Beatrice Tabell. "Personalized Advertising Online and its Difficulties with Customer Privacy." Thesis, Karlstads universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-66218.
Full textSarkar, Mainak. "Three essays on artificial intelligence models for customer relationship management." Thesis, Cergy-Pontoise, Ecole supérieure des sciences économiques et commerciales, 2022. http://www.theses.fr/2022ESEC0002.
Full textThe dissertation consists of three essays on “Artificial Intelligence Models for Customer Relationship Management”. In particular, the essays are built on novel deep learning algorithms known as long-short term memory (LSTM) neural networks. The first essay shows that LSTM neural networks, which rely exclusively on raw data as input, can replace feature-engineering based models for predicting customer behavior in the direct marketing context. In the second essay, I develop a dual-LSTM neural networks model for customer lifetime value (CLV) predictions that incorporates the firm’s adaptive policy as well as captures latent attrition. I show that integrating the firm’s adaptive marketing policy into customer valuation models leads to diverging paths of future profitability, highlighting bimodalities and modes at the tail of the CLV distribution. The presence of bimodalities and modes at the tail captured by my model has implications for a deeper understanding of customer potential (i.e., best-case scenario vs. traditional CLV expectation) and for fine-tuning customer prioritization. In the third essay, I leverage the ability of LSTM neural networks’ memory states to summarize useful information from the past transaction data to develop a novel approach that addresses customer privacy concerns in customer relationship management (CRM)
Chetty, Nirvashnee. "Privacy preserving data anonymisation: an experimental examination of customer data for POPI compliance in South Africa." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32448.
Full textPatania, Fortunato. "The future of retailing: analysis of the context and development of the Omni-Channel strategy." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Find full textFeliciano, Ana Rita Lemos. "Mobile Customer Relationship Management : questões de privacidade." Master's thesis, Instituto Superior de Economia e Gestão, 2013. http://hdl.handle.net/10400.5/11221.
Full textAs tecnologias de informação permitem um maior contato entre a organização e o cliente, como também auxiliam a perceber as necessidades e as preferências dos clientes, resultando na adoção de estratégias de Marketing com o objetivo de fidelizar o cliente. A gestão de relacionamento com o cliente (CRM - Customer Relationship Management) ajuda as organizações a satisfazer o cliente através de um relacionamento próximo. A gestão móvel de relacionamento com o cliente (MCRM ? Mobile Customer Relationship Management) funciona como uma ferramenta mais rápida e eficaz para publicitar os produtos e serviços das organizações. No entanto, existe uma questão fulcral nestes processos que é a privacidade dos utilizadores\clientes. Assim, este trabalho tem como objetivo perceber como são utilizadas as informações pessoais dadas às organizações através de aplicações móveis que podem influenciar na publicidade que se recebe de novos produtos e serviços, assim como, perceber a preocupação e importância que a privacidade tem para os utilizadores de aplicações móveis.
The information technologies allow greater contact between organization and customer, but also help to understand the needs and preferences of customers, resulting in the adoption of marketing strategies in order to build customer loyalty. The Customer Relationships Management (CRM) helps organizations satisfy the customer through a close relationship. The Mobile Customer Relationship Management (MCRM) works as a tool faster and more effective to advertise products and services of organizations. However, there is a major issue in these cases is that the privacy of users \ clients. Thus, this study aims to understand how it is used the personal information given to organizations through mobile applications that may influence the advertising we get from new products and services, as well as understand the concern and importance to the privacy of the users has to mobile applications.
Stevens, Arlonda M. "ANTECEDENTS AND OUTCOMES OF PERCEIVED CREEPINESS IN ONLINE PERSONALIZED COMMUNICATIONS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1459413626.
Full textHrach, Christian, and Rainer Alt. "Datenschutz in Call Centern – Bestandsaufnahme zur Aufzeichnung und Verwendung personenbezogener Daten." Universitätsbibliothek Leipzig, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-81865.
Full textAkanda, Md Mahmudul Alam, and Jasmin Dzeko. "Customers’ Perception on their Satisfaction about the Private Banks in a Developing Country : A perspective of Private Banks in Bangladesh." Thesis, Linköpings universitet, Företagsekonomi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-134462.
Full textAlnefelt, Patrik, and Petra Malmgren. "Automated error reporting : Business-to-business aspects to consider for a software provider." Thesis, Linköping University, Department of Management and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52247.
Full textComputer errors are a constant problem for software providers. To completely avoid bugs has proven very difficult even though computer software goes through rigorous testing before released. One of the challenges for developers is recreating errors that end-users experience. User-submitted error reports can often be of help for developers to localize and fix bugs. However, the reports often vary in quality depending on the user's experience and the effort they put into writing the report. Instead of relying on manual error reports, some software providers have equipped their software with automated error reporting functionality. These programs are set to collect important information about the computer and the software in the event of a crash. There are pros and cons with both automated and manual error reporting.
The research that has previously been done in the field of error reporting has mostly focused on the situation where private persons are senders and corporations are receivers. This report addresses the setting where both parties are corporations, which brings several new aspects to the problem. The five main topics this report focuses on are: customer attitude, which data to send, privacy, user interaction and feedback. A study has been conducted at the ERP system provider IFS in Sweden where interviews with employees and customers have been performed. Interviewees in the customer companies have been primarily ERP and application managers. The results of the study show that companies are less concerned than what the literature suggests even though the attitudes differ some depending on line of business. Conclusions are that a high degree of configurability of what is sent in the error reports and the level of user interaction is needed for companies to accept automated error reporting.
Buggar är ett ständigt problem för mjukvarutillverkare. Att helt undvika dessa har visat sig vara mycket svårt trots rigorösa tester innan ny mjukvara släpps. En av utmaningarna för utvecklare är att återskapa felen som uppstår hos användarna. Felrapporter inskickade av användare kan ofta vara till hjälp för utvecklare när de ska lokalisera och åtgärda fel. Men rapporterna kan variera i kvalitet beroende på användarnas erfarenhet och tiden de lägger på att skriva rapporten. Istället för att förlita sig på manuella felrapporter har vissa mjukvarutillverkare utrustat sin programvara med funktionalitet för automatiska felrapporter. Dessa program ska samla in viktig information om datorn och programvaran i händelse av att en krasch uppstår.
Viss forskning har skett inom området automatiserad felrapportering men fokus har då legat på situationen då privatpersoner är avsändare och företag är mottagare. Denna rapport behandlar läget då båda parter är företag, vilket tillför flera nya aspekter till problemet. De fem huvudfrågorna som den här rapporten fokuserar på är: kunders attityd, vilken data ska skickas, integritet, användarinteraktion och feedback. En studie har utförts hos affärssystemleverantören IFS i Sverige, där intervjuer med anställda och kunder har genomförts. De intervjuade hos kundföretagen har huvudsakligen varit ERP- och applikationsansvariga. Resultaten av studien visar att företagen är mindre oroade än vad litteraturen indikerar även om attityderna skiljer sig något i olika branscher. Slutsatserna är att en hög grad av konfigurerbarhet behövs när det gäller vad som skickas i felrapporter samt vilken grad av interaktion med användaren som behövs. Detta för att kundföretagen ska acceptera automatisk felrapportering.
Hrach, Christian, and Rainer Alt. "Datenschutz in Call Centern – Bestandsaufnahme zur Aufzeichnung und Verwendung personenbezogener Daten." Universität Leipzig, 2010. https://ul.qucosa.de/id/qucosa%3A11331.
Full textBooks on the topic "Customer privacy"
E, Burns Robert. Utility customer information: Privacy and competitive implications. Columbus, Ohio (1080 Carmack Rd., Columbus 43210): National Regulatory Research Institute, Ohio State University, 1992.
Find full textThe privacy payoff: How successful businesses build customer trust. Toronto: McGraw-Hill Ryerson, 2002.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. "How do businesses use customer information: Is the customer's privacy protected?" : hearing before ... 107th Congress, 1st session, July 26, 2001. Washington, DC: U.S. G.P.O., 2001.
Find full textMaking it personal: How to profit from personalization without invading privacy. Cambridge, MA: Perseus, 2001.
Find full textPrivacy makeover: The essential guide to best practices : how to protect assets and foster consumer loyalty. Madison, WI: Bell House Press, 2008.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. How do businesses use customer information? Is the customer's privacy protected? : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, July 26, 2001. Washington: U.S. G.P.O., 2001.
Find full textSchweizer, Alex. Customer relationship management: Datenschutz- und Privatrechtsverletzungen beim CRM : Datenschutz und Privatrechtsverletzungen beim analytischen CRM mit Data Mining und Data Warehousing - zugleich ein Beitrag zu den technischen, organisatorischen und rechtlichen Lösungsansätzen. Bern: Ed. Weblaw, 2007.
Find full text"Know your customer" rules: Privacy in the hands of federal regulators : hearing before the Subcommittee on Commercial and Administrative Law of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, first session, March 4, 1999. Washington: U.S. G.P.O., 2000.
Find full textOffice, General Accounting. U.S. Postal Service: New focus on improving service quality and customer satisfaction : report to Congressional requesters. Washington, D.C: The Office, 1995.
Find full textSandra, Brown. Tough customer. London: Hodder & Stoughton, 2010.
Find full textBook chapters on the topic "Customer privacy"
Kumar, V., and Werner Reinartz. "Customer Privacy Concerns and Privacy Protective Responses." In Springer Texts in Business and Economics, 279–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-20110-3_14.
Full textKumar, V., and Werner Reinartz. "Customer Privacy Concerns and Privacy Protective Responses." In Springer Texts in Business and Economics, 285–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-55381-7_14.
Full textThompson, Frauke Mattison, and Kirk Plangger. "The Customer Fishbowl: Strategic Approaches to Customer Privacy." In Let’s Get Engaged! Crossing the Threshold of Marketing’s Engagement Era, 807–8. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-11815-4_235.
Full textBlattberg, Robert C., Byung-Do Kim, and Scott A. Neslin. "Customer Privacy and Database Marketing." In Database Marketing, 75–101. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-72579-6_4.
Full textVerhoef, Peter C., Edwin Kooge, Natasha Walk, and Jaap E. Wieringa. "Customer privacy and data security." In Creating Value with Data Analytics in Marketing, 99–118. 2nd ed. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003011163-6.
Full textHaag, Oliver, and Joachim Löffler. "Electronic Customer Care versus E-Privacy." In Handbuch Electronic Customer Care, 203–16. Heidelberg: Physica-Verlag HD, 2004. http://dx.doi.org/10.1007/978-3-7908-2680-7_12.
Full textPalmatier, Robert W., and Kelly D. Martin. "Inoculating Against Customer Vulnerability." In The Intelligent Marketer’s Guide to Data Privacy, 93–108. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03724-6_5.
Full textPalmatier, Robert W., and Kelly D. Martin. "Understanding and Valuing Customer Data." In The Intelligent Marketer’s Guide to Data Privacy, 133–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03724-6_7.
Full textKarjoth, Günter, Matthias Schunter, and Michael Waidner. "Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data." In Privacy Enhancing Technologies, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36467-6_6.
Full textPalmatier, Robert W., and Kelly D. Martin. "Big Data’s Marketing Applications and Customer Privacy." In The Intelligent Marketer’s Guide to Data Privacy, 73–92. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03724-6_4.
Full textConference papers on the topic "Customer privacy"
Youssef, Mahmoud, Vijayalakshmi Atluri, and Nabil R. Adam. "Preserving mobile customer privacy." In the 6th international conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1071246.1071257.
Full textMcBurney, Paul. "Customer Perceived Privacy, Corporate Privacy Adherence, Authentication Use Case." In 29th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2016). Institute of Navigation, 2016. http://dx.doi.org/10.33012/2016.14629.
Full textBoyce, Gordon. "Beyond Privacy: The Ethics of Customer Information Systems." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2444.
Full text"Cost-Effective Investments in Customer Information Privacy." In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 2009. http://dx.doi.org/10.1109/hicss.2009.135.
Full textZhong, Sheng, Zhiqiang Yang, and Rebecca N. Wright. "Privacy-enhancing k-anonymization of customer data." In the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1065167.1065185.
Full textZhao, Zhojun, and Jairo Gutierrez. "Customer Service Factors Influencing Internet Shopping in New Zealand." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2837.
Full textKuacharoen, Pramote. "A practical customer privacy protection on shared servers." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689544.
Full textRatliff, Lillian J., Roy Dong, Henrik Ohlsson, Alvaro A. Cardenas, and S. Shankar Sastry. "Privacy and customer segmentation in the smart grid." In 2014 IEEE 53rd Annual Conference on Decision and Control (CDC). IEEE, 2014. http://dx.doi.org/10.1109/cdc.2014.7039714.
Full textChen, Yi-Ming, and Yan-Hao Chu. "Outsourcing Data Mining Tasksto Cloud While Preserving Customer Privacy." In Annual International Academic Conference on Business Intelligence and Data Warehousing. Global Science and Technology Forum, 2010. http://dx.doi.org/10.5176/978-981-08-6308-1_59.
Full textZhao, Yingying, Dongsheng Li, Qi Liu, Qin Lv, and Li Shang. "Deriving Customer Privacy from Randomly Perturbed Smart Metering Data." In 2018 IEEE 16th International Conference on Industrial Informatics (INDIN). IEEE, 2018. http://dx.doi.org/10.1109/indin.2018.8471935.
Full textReports on the topic "Customer privacy"
Brockners, F., and Y. Serbest. Virtual Private LAN Service (VPLS) Interoperability with Customer Edge (CE) Bridges. Edited by A. Sajassi and D. Mohan. RFC Editor, June 2011. http://dx.doi.org/10.17487/rfc6246.
Full textAbuMezied, Asmaa, and Rahhal Rahhal. Towards a Gender-Sensitive Private Sector in the OPT. Oxfam, April 2021. http://dx.doi.org/10.21201/2021.7338.
Full textRosen, E., P. Psenak, and P. Pillay-Esnault. OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4577.
Full textMarques, P., R. Raszuk, K. Patel, K. Kumaki, and T. Yamagata. Internal BGP as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, September 2011. http://dx.doi.org/10.17487/rfc6368.
Full textNiles, John S., and J. M. Pogodzinski. Steps to Supplement Park-and-Ride Public Transit Access with Ride-and-Ride Shuttles. Mineta Transportation Institute, July 2021. http://dx.doi.org/10.31979/mti.2021.1950.
Full textOzano, Kim, Andrew Roby, and Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), January 2022. http://dx.doi.org/10.19088/k4d.2022.026.
Full textJones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, February 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.
Full textKira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, March 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.
Full textAccelerating Digital Payments in Latin America and the Caribbean. Inter-American Development Bank, May 2022. http://dx.doi.org/10.18235/0004256.
Full textPayment Systems Report - June of 2020. Banco de la República de Colombia, February 2021. http://dx.doi.org/10.32468/rept-sist-pag.eng.2020.
Full text