1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.

Slides:



Advertisements
Similar presentations
■ Google’s Ad Distribution Network ■ Primary Benefits of AdWords ■ Online Advertising Stats and Trends ■ Appendix: Basic AdWords Features ■ Introduction.
Advertisements

Back to Table of Contents
E-commerce Chapter 9 pp E-Commerce Buyer 1. Search & Identification 3. Purchasing 2. Selection & Negotiation 4. Product & Service Delivery 5.
Week 6 Lecture Part 2 Databases in Electronic Commerce Samuel Conn, Asst. Professor.
Personalization Usually refers to e-commerce. Benefits Searches (ex: amazon.com) Customized or localized for each user Using zip code, past purchases.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
MIS625 Session #3. Outline Porter paper –Note process orientation via competitive forces and value chain –Tie to Peter Keen slides Information Economy.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Chapter 13: GlobalizationCopyright © 2004 by Prentice Hall User-Centered Website Development: A Human- Computer Interaction Approach.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Chapter 14: Personalization and TrustCopyright © 2004 by Prentice Hall User-Centered Website Development: A Human- Computer Interaction Approach.
Chapter 9 e-Commerce Systems.
Customer Service and Web Site Personalization Back to Table of Contents.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Class Discussion Notes MKT March 27, 2001.
IDENTIFY AND MEET A MARKET NEED
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Chapter 3 The Internet micro-environment
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Jupiter Electronic Commerce In Latin America Lucas Graves Jupiter Communications “Latin America: Clicks and Mortar” LABA, Stern School of Business 6 October.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
HTML ~ Web Design.
P3P: User Empowerment Tools for Web Privacy Daniel J. Weitzner World Wide Web Consortium 23 April 2001 National Association of Attorneys General.
Use of a P3P User Agent by Early Adopters Lorrie Faith Cranor Manjula Arjula Praven Guduru AT&T Labs November 2002.
Copyright  2007 McGraw-Hill Pty Ltd PPTs t/a Marketing Research 2e by Hair, Lukas, Bush and Ortinau Slides prepared by Judy Rex 1-1 Chapter One Overview.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
1 Chapter 12. Web Information Integration Using Multiple Character Agents Soft computing Laboratory Yonsei University October 27, 2004.
Sears Privacy Policy & Security information Shaina Lacher.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Chapter 7- slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter Seven Customer-Driven Marketing Strategy Creating Value.
Julie Latham Digital Citizenship: An Informational Guide.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Chapter 6 Managing E-Service Quality What is E-Service Quality? Why it Matters How to Improve It JW:sel#5.
This system will help the users to know automatically when certain book requested by them has arrived once they have registered with the website. It will.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
CHAPTER 6 Concept of Virtual Store for Marketing Products and Services.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Concept and Context of CRM
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Section 12.1 Section 12.2 Discuss the functions of a Web site
Personalization Strategy for gaining competitive advantage
E-commerce Chapter 9 pp
MIS625 Session #3.
Chapter 7 Electronic Business Systems
Internet.
Chapter 7 Electronic Business Systems
Presentation transcript:

1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users Trust How people view the integrity of the site

2 Personalization and Trust After studying this chapter you will: Know about the different kinds of personalization on the Web Be aware of privacy issues, and some ways of responding to them Understand some of what inspires trust in websites

3 Benefits of Personalization A strategy for gaining competitive advantage Often a value-added service for user Example: knowing ZIP code permits listing only nearby restaurants If the information that is most relevant to a particular user is placed near the top of the page, the user can find what he/she wants quickly A little information from user may permit narrowing range of choices; example Dell.com

4 Personalization But requires information from user Personal or non-personal Track clicks Cookies Small programs that collect information from you or your computer But how will the information be used

5 Personalization: The Computer Finder at Dell.com

6 Examples of Personalization Amazon.com presents book suggestions based on past purchases Netscape offers opportunity to choose content and specify appearance; see next two slides Conversational interface: Software that “converses” with the user, helping to make choices

7 netscape.com without personalization—only top half shown, for legibility

8 netscape.com with personalization

9 Personalization via a conversational interface at Sililoquy.com, 1

10 Personalization via a conversational interface at Sililoquy.com, 2

11 Personalization via a conversational interface at Sililoquy.com, 3

12 Privacy Concerns “ Privacy” is not mentioned in the US Constitution Supreme Court decisions have established a loose concept of “the right to be left alone” In a practical sense, it’s not al legal issue: if users don’t trust you not to misuse personal information, they won’t do business with you Surveys show that trust in a website is a major factor in users’ choices of where to shop

13 Privacy Concerns Few laws regarding privacy; apply mostly to the government, not private business “Law of Contract” – the “promises” in privacy statements, etc. establish a contract; user can sue if contract is broken Survey of web users - Important # 1: Ease of navigation #2: Credibility

14 Factors Affecting Trust Context: potential for loss Perceived similarity: we tend to trust people we think of as having concerns like ours Standing in the community: a leader got there, most of the time, by doing the right thing Behavior: do words match actions? Certification: example, a doctor has proved competence to his or her peers Referrals: Amazon.com uses reviews written by buyers, as well as by authors and publishers

15 Fostering Trust in Websites A security statement lists precautions that a site takes to protect sensitive information Type of encryption Secure server in use A privacy statement lists the types of information gathered and the manner in which it is used Some offer user choices: opt-in vs. opt-out Confirmation of expected delivery date Policy on returns

16 Secure display of credit card information Enough to be recognizable by the user, but not complete

17 Giving user a choice: opt-in vs. opt-out

18 Giving information about expected delivery date fosters trust

19 New Developments in Controlling Privacy Browser suppliers try, but they do not have a standard privacy policy World Wide Web Consortium (W3C) created recommendations for protecting user data from abuse The Platform for Privacy Protection Project (P3P) provides a standard way for websites to communicate their practices for collecting, using, and distributing personal information

20 Privacy preferences in a P3P-enabled browser

21 Sites Adopting P3P MSN.com Yahoo.com About.com MS Internet Explorer 6 – first browser to adopt AT&T Privacy Bird: application that implements entire P3P & warns you if web site matches your preferences

22 Summary In this chapter you learned about: The benefits of personalization A number of ways that a website can be personalized to the preferences of an individual user Privacy concerns and some of the ways of reassuring users of their privacy The factors affecting trust, and some ways to foster trust The W3C P3P initiative