SPYWARE AS BARRIER TO E-MARKETING: AN EMPIRICAL STUDY

Authors

  • Dr. Satinder Kumar School of Management Studies
  • Rohit Kumar Dubey Punjabi University image/svg+xml

DOI:

https://doi.org/10.47701/icohetech.v4i1.3372

Keywords:

Spyware, Privacy, E-marketing, Adware, Spamming, etc

Abstract

Present paper motive is to explore perceptions of customers towards Spyware issues in E-Marketing and their structural relationship to influence the perception. In present scenario E-Marketing is playing an essential part in Indian economy, especially where Prime Minister promotes cashless economy or online marketplace. Although E-marketing is one of the best modern and economical mediums for reaching out to new customers, although internet has created many advantages for the business but it has also brought many numerous risks. It would be wise to contemplate the various E-marketing ethical issues because innovative way of marketing has also lead to unethical practices as spyware problem. Spyware has been in controversy as it gets setup without knowledge and breaks the user’s privacy; even it has the potential to be misused. The study has revealed the customers have no control on their personal information as spyware leads to control the online user’s visits, collecting personal information and also misusing the same. Majority Customers are unaware regarding Spyware problems and they do not know how to handle with it. As the result the customers felt more Unsecure while transacting on the network because of their ignorance in this respect as SEM analysis has revealed that most of the variance in spyware is explained by two factors, Unsecure and Control. The results of the study are useful for the marketers as it would help them to frame comprehensive policy in relation to protect the personal information of customers so that they can feel safe and secure while buying online.

References

AOL/NCSA, (2004), “online safety studyâ€, Assessed June 2008, Available: http://www.staysafeonline.info/pdf/safety study v04.pdf, October 2008

Arnold, M. J., & Reynolds, K. E., (2009), “Affect and Retail Shopping Behavior: Understanding the Role of Mood Regulation and Regulatory Focusâ€, Journal of Retailing, Vol.85 (3), (2009), PP: 308-320

Bagozzi, R.P., and Yi, Y., (1988), “On the Evaluation of Structure Equation Modelsâ€, Journal of the Academy of Marketing science, Vol. 16(1), PP: 70-83

Brown, P. (2007), “Spyware and pre texting: Recent developmentsâ€, The Computer & Internet Lawyer, Vol. 24(6), (2007), PP: 14-20

Cheung, C and Lee, Matthew, K.O., (2006), “Understanding Consumer Trust in Internet Shopping: A Multidisciplinary Approachâ€, Journal of the American Society for Information Science and Technology, Vol. 57(4), (2006), PP: 479-492

CIS (Consumer Information Sheet) (2012), “Protect Your Computer from Viruses, Hackers, and Spies†State of California, office of the Attorney General.

Cronbach Lee Joseph (1990), “Essentials of Psychological Testingâ€, 5th Edition, New York: Harper & Row

Crowe, E., & Higgins, T. (1997), “Regulatory Focus and Strategic Inclinations: Promotion and Prevention in Decision-Makingâ€, Organizational Behavior and Human Decision Processes, Vol. 69 (2), (1997), PP: 117-132

D. Rowland and E. McDonald (2000), “Information Technology Lawâ€, 2nd Edition, Cavendish Publishing, 2000

Engstrom U, Sandred J. (1999), Etik och moral -en kompass i cyberrymder, Argument Forlag AB, Uppsala

Federal Trade Commission (2005), “The UD safe web Act, protecting consumers from Spam, spyware and fraudâ€, A legislative recommendation to congress, June 2005, www.ftc.gov.

Freeman, L. A. and Urbaczewski, A. (2005), “Why do people hate Spyware?†Journal of Communications of the ACM, Vol. 48(8), (2005), PP: 5053

FTC (2008), “Minimizing the Effects of Malware on computerâ€

Gefen, D., Karahanna, E., and Straub, D. W., (2003), “Trust and TAM in Online Shopping: an Inte¬grated Modelâ€, Journal of Management Information Systems Quarterly, Vol. 27(1), (2003), PP: 51-90

Haines, M. (2001), “E-marketing efforts of IT solution providers: what can be expected in the next 12 monthsâ€, Var Business, Vol. 17(14), (2001), PP: 68

Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E. and Tatham, R. L. (2009), “Multivariate Data Analysisâ€, 7th Edition, Upper Saddle River, Pearson Education, Inc. Delhi

Hair, J. F., Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998), “Multivariate Data Analysis†5th Edition, California: Prentice-Hall International Inc, 1998

Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C., (1995), “Multivariate Data Analysisâ€, 4th Edition, New Jersey:Prentice Hall, 1995

Hui, K.-L., Teo, H. H., and Lee, S.-Y. T., (2007), “The Value of Privacy Assurance: An Exploratory Field Experimentâ€, Journal of MIS Quarterly, Vol. 31(1), 2007, PP: 19- 33

Human Capital (2009), “Youth and Music Surveyâ€, Available online at: http://www.marrakeshrecords.com/Youth%20and%20Music%20Survey%202009%20 (c)%20Marrakesh%20Records%20Ltd.pdf (accessed 23.03.09)

Jensen, Carlos, Colin Potts, and Christian Jensen (2005), “Privacy Practices of Internet Users: Self-Reports Versus Observed Behavior,†International Journal of Human- Computer Studies, Vol. 63 (July 2005), PP: 203–227

Keeney, R.L., (1999), “The value of Internet commerce to the customer,†Journal of Management Science, Vol. 45(4), (1999), PP: 533-542

Kossecki Pawel, Swierczynska-Kaczor Urzula (2003), “No Trust, No Transaction-The Implication for Te Internet Suppliersâ€, Information Security Solution European Conference, The European contribution, Speech/00/344.

Kotler Philip (2003), “Marketing Managementâ€, 11th Edition, Upper saddle River, NJ: Prentice Hall

Kotler Philip (2004), “Principles of marketingâ€, European Fourth Edition, Prentice Hall

Liu, C., Marchewka, J. T., Lu, J., and Yu, C-S., (2005), “Beyond concern—a privacy- trust-behavioral intention model of electronic commerceâ€, Journal of Information and Management, Vol. (42), (2005), PP: 289-304

M Jaeger and N L. Clarke (2006), “The Awareness and Perception of Spyware amongst Home PC Computer Usersâ€, published in the Proceedings of 7th Australian Information Warfare and Security Conference, Edith Cowan University, Perth Western Australia, 4th - 5th December, 2006

Magee, M. (2003), “Boom or bust for e-shoppingâ€, The Sunday Tribune, (Online), Assessed December 22, 2008, http://web.lexisnexis.com/universe/document

Micu, C. C., and Chowdhury, T. G. (2010), “The Effect of Message's Regulatory Focus and Product Type on Persuasionâ€, Journal of Marketing Theory and Practice, Vol. 18(2), (2010), PP: 181-190

Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy (2006), “A crawler-based study of spyware on the webâ€, Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, (2006)

Paine, C., Reips, U.-D., Stieger, S., Joinson, A., and Buchanan, T., (2007), “Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actionsâ€, International Journal of Human-Computer Stud¬ies, Vol. 65, 2007, PP: 526-536

Pan, Y. and Zinkhan, G. M., (2006), “Exploring the impact of online privacy disclosures on consumer trustâ€, Journal of Retailing, Vol. 82(4), 2006, PP: 331-338

Petronas, U.T. and B. Seri., (2001), “Malaysian Internet User’s Motivation and Concerns for Shopping Onlineâ€, Malaysian Journal of Library and Information Science, Vol. 6(2), 2001, PP: 21-33

Ronald Jeurissen and Bert van de Ven, (2006), “Development in Marketing Ethics†, Journal of Business Ethics Quarterly, Vol. 16(3), PP. 427-439

Sally Harridge, (2006), “Can the building of trust overcome consumer perceived risk online?â€, Journal of Marketing Intelligence and Planning, Vol. 24(7), 2006, PP: 746-761

Sandra L. Calvert(2008), (2008), “Children as Consumers: Advertising and Marketingâ€, Journal of The Future of Children, Vol. 18(1), Spring 2008, PP: 205-234, www.futureofchildren.org

Smith, P.R and Chaffey, D. (2001), “E-marketing excellence: at the heart of e-Businessâ€, Butterworth Heinemann, Oxford, UK

Sorkin, D. (2001), “Technical and legal approaches to unsolicited electronic mailâ€, USFL Review, Winter 2001, PP: 325-83

Tynan, D., (2000), “Privacy 2000: in web we trust?â€, PC World, June 2000, PP: 103–116

Urbach, R. and G. A. Kibel (2004), “Adware/Spyware: an update regarding pending litigation and legislationâ€, Intellectual Property and Technology Law Journal, Vol. 16(7), 2004, PP :12-16

Vibhor Kalra, (2010), “E-marketingâ€, (Accessed November, 2011), Available at http://www.scribd.com/doc/38318465/EMarketing

Wang, H., M. K. O. Lee, and C. Wang (1998), “Consumer privacy concerns about Internet marketing Communications of the Association for Computing Machineryâ€, Vol. 41, 1998, PP: 63–70

Webroot Software Inc (2005), “State of Spyware Q3 2005â€, Webroot Software Inc., PP: 191

Wills, C.E. & Zeljkovic, M. (2011), “A Personalized Approach to Web Privacy: Awareness, Attitudes, and Actionsâ€, Journal of Information Management and Computer Science, Vol. 19(1), 2011, PP: 53-73

Wilsker Ira (2002), “The Internet Security: Cookies, Spyware, and other Privacy Threats on the Netâ€, Available at: http://www.1960pcug.org/~pcnews/2002/01/privacy_threats.htm

Zhang, X. (2005), “What do consumers really know about spyware?â€, Journal of Communications of the ACM, Vol. 48(8), 2005, PP: 4448

Downloads

Published

2023-09-23