Page 243 - E-Bussiness and E-Commerce Management Strategy, Implementation, and Practice
P. 243

M04_CHAF9601_04_SE_C04.QXD:D01_CHAF7409_04_SE_C01.QXD  16/4/09  11:11  Page 210





                210  Part 1 Introduction



                                   Notes:
                                     Identity fraud cases include cases of false identity and identity theft.
                                     Application fraud/false insurance claim relates to applications or claims with material falsehood (lies) or
                                      false supporting documentation where the name has not been identified as false.
                                     Facility takeover fraud occurs where a person (the ‘facility hijacker’) unlawfully obtains access to details of
                                      the ‘victim of takeover’, namely an existing account holder or policy holder (or of an account or policy of a
                                      genuine customer or policy holder) and fraudulently operates the account or policy for their own (or some-
                                      one else’s) benefit.
                                     Asset conversion relates to the sale of assets subject to a credit agreement where the lender retained own-
                                      ership of the asset (for example a car or a lorry).
                                     Misuse of facility is where an account, policy or other facility is used fraudulently.
                                   Source: CIFAS (2008)



                                 While identity theft is traumatic for the person who has their identity stolen, in the majority
                                 of cases, they will eventually be able to regain any lost funds through their financial services
                                 providers. This is not necessarily the case for the e-retailer. In the first part of 2008, CIFAS
                                 members reported 104,548 cases of identify theft to a potential value of £431,967,984.

                                 Why personal data are valuable for e-businesses

                                 While there is much natural concern amongst consumers about their online privacy, infor-
                                 mation about these consumers is very useful to marketers. Through understanding their
                                 customers’ needs, characteristics and behaviours it is possible to create more personalized,
                                 targeted communications such as e-mails and web-based personalization about related
                                 products and offers which help increase sales. How should marketers respond to this
                                 dilemma? An obvious step is to ensure that marketing activities are consistent with the latest
                                 data protection and privacy laws. Although compliance with the laws may sound straightfor-
                                 ward, in practice different interpretations of the law are possible and since these are new
                                 laws they have not been tested in court. As a result, companies have to take their own busi-
                                 ness decision based on the business benefits of applying particular marketing practices,
                                 against the financial and reputational risks of less strict compliance.
                                   Effective e-commerce requires a delicate balance to be struck between the benefits the
                                 individual customer will gain to their online experience through providing personal infor-
                                 mation and the amount and type of information that they are prepared for companies to
                                 hold about them.
                                   What are the main information types used by the Internet marketer which are governed
                                 by ethics and legislation? The information needs are:

                                 1 Contact information. This is the name, postal address, e-mail address and, for B2B companies,
                                   web site address.
                                 2 Profile information. This is information about a customer’s characteristics that can be used
                                   for segmentation. They include age, sex and social group for consumers, and company
                                   characteristics and individual role for business customers. The specific types of information
                                   and how they are used is referenced in Chapters 2 and 6. The willingness of consumers to
                                   give this information and the effectiveness of incentives have been researched in Australian
                                   consumers by Ward et al. (2005). They found that consumers are willing to give non-
                                   financial data if there is an appropriate incentive.
                                  3 Platform usage information. Through web analytics systems it is possible to collect infor-
                                   mation on type of computer, browser and screen resolution used by site users (see Chapter 7).
                                   For example, Figure 4.7 shows detail collected by a widget installed on Dave Chaffey.com. As
                                   well as the platform used, the search term referred from Google is shown. Many Internet users
                                   will not realize that their visits are tracked in this way on virtually all sites, but the important
                                   point to know is that it is not possible to identify an individual unless they have agreed to give
                                   information through a web form and their profile information is then collected which is the
                                   situation when someone subscribes to an e-newsletter or purchases a product online.
   238   239   240   241   242   243   244   245   246   247   248