Page 625 - Encyclopedia of Business and Finance
P. 625

eobf_P  7/5/06  3:18 PM  Page 602


             Privacy and Security


             Volume pricing is also useful for building customer loy-  PRIVACY AND
             alty. For example, Stacks and Stacks HomeWares often  SECURITY
             provides volume discounts to customers ordering $1,000
                                                              The use of computers by business, industry, health care,
             worth of any one item.
                                                              education, and government enhances their ability to col-
                                                              lect, analyze, and communicate information quickly and
             DYNAMIC PRICING                                  efficiently. The availability and access of this information,
             The strategy where price is negotiated between buyers and  however, significantly affects individual privacy and secu-
             sellers, dynamic pricing, has been used throughout his-  rity. Personal information is transmitted and stored every
             tory, but its use waned when fixed pricing became popu-  time a credit card is used, a telephone call is made, or an
             lar during the later part of the nineteenth century.  electronic mail (e-mail) message is sent or received. Per-
             Dynamic pricing is a strategy where price is set based on  sonal information regarding health care, insurance, and
             the individual customer and situations.          Social Security records is digitized, stored, and maintained
                                                              in easily accessible computer files. Although computer
                Advances in technology such as the Internet have
                                                              technology makes data easier to compile, combine, and
             made modern dynamic pricing possible. Companies sell-
                                                              circulate, it dramatically increases potential violations of
             ing via the Internet can mine databases to determine cus-
                                                              personal privacy and security.
             tomer characteristics and adapt products to match buying
                                                                 Privacy is an individual’s ability to be anonymous. It
             behavior and set prices accordingly. Companies selling via
                                                              is not a constitutional right; unsanctioned intrusion of
             the Internet can also adjust pricing based on customer
                                                              privacy, however, is legislated against at various federal
             demand and product supply.  The speed with which
                                                              and state levels. Once personal information is shared—
             changes can be made on the Internet allows sellers to
                                                              whether in electronic, written, or oral form—the individ-
             make pricing changes on a daily or even hourly basis. Buy-
                                                              ual’s privacy cannot be assured. Security implies
             ers can even negotiate prices with sellers via the Internet.
                                                              confidentiality, integrity, and the assurance that personal
             For example, buyers can negotiate prices on products such
                                                              information will remain private. In the information age of
             as hotel rooms and rental cars at the  Web site  the twenty-first century, privacy and security are difficult
             Priceline.com (http://tickets.priceline.com).
                                                              to maintain. Identity theft is a continuous threat.
             SEE ALSO Marketing; Marketing Mix; Supply and
                Demand                                        IDENTITY THEFT
                                                              During 2004 more than 9.3 million Americans were vic-
             BIBLIOGRAPHY                                     tims of identity theft. This activity resulted in $52.6 bil-
             Boone, Louis E., and Kurtz, David L. (2005). Contemporary  lion in damages. On average, victims of identity theft
               marketing 2006 (12th ed.). Eagan, MN: Thomson South-  spent 600 hours repairing their credit. As victims of iden-
               Western.                                       tity theft, individuals reported a temporary loss of credit
             Churchill, Gilbert A., Jr., and Peter, Paul J. (1998). Marketing:  as well as significant mental anguish. Although personal
               Creating value for customers (2nd ed.). New York: Irwin  identities may be stolen by computerized methods, the
               McGraw-Hill.                                   majority (62.8%) of identity theft occurred by more tra-
             Farese, Lois, Kimbrell, Grady, and Woloszyk, Carl (2002). Mar-  ditional means (stolen wallets, mail removed from house-
               keting essentials (3rd ed.). Mission Hills, CA:  hold mailboxes, dumpster diving, and employee theft).
               Glencoe/McGraw-Hill.
                                                                 Employee theft occurs in places such as medical
             Kotler, Philip, and Armstrong, Gary (2006). Principles of market-  offices and human resource departments where confiden-
               ing (11th ed.). Upper Saddle River, NJ: Pearson Prentice-
                                                              tial personal information is routinely recorded and distrib-
               Hall.
                                                              uted. Although many people are more comfortable
             Pride, William M., and Ferrell, O. C. (2006). Marketing concepts  providing their credit cards in face-to-face transactions
               and strategies. New York: Houghton Mifflin.
                                                              (e.g., at stores or restaurants) rather than electronically
             Semenik, Richard J., and Bamossy, Gary J. (1995). Principles of  (e.g., online shopping), a level of personal trust is assumed
               marketing: A global perspective (2nd ed.). Cincinnati: South-  in both cases. Online transactions, however, are often
               Western.
                                                              processed without human intervention. The potential risk
                                                              is the security of the database of customer information
                                               Allen D. Truell  stored online. Security engineering attempts to protect
                                              Michael Milbier  customer information from corporate hacking.


             602                                 ENCYCLOPEDIA OF BUSINESS AND FINANCE, SECOND EDITION
   620   621   622   623   624   625   626   627   628   629   630