1. Pervasive Consumer Concerns

With its mere existence, every individual leaves a trace of information. This principle is even more of relevance in the digital world. It is obvious that businesses take advantage of this development by adapting and further evolving their business model: Targeted advertising has become the primary business model in the digital economy. No other business model is – yet − better suited to turn data as commodity into revenue.

Consumers know already that their personal data is precious. Whenever digital giants like Google and Facebook publish their impressively increasing revenues, their customer are left with the unpleasant feeling, that this success is built on their back without adequate compensation. This imbalance is likely to worsen with the inevitable and exponential growth of data.

iceberg.digital

On the other hand, digital communication has empowered customers. They are more connected, more tech-savvy and better informed. This results in a more illusive customer base that is characterized by decreasing band loyalty. Marketing strategies clearly have to adapt to this situation to remain effective. It is inevitable that the digital economy and its data driven business models have to get on their way towards truly trust-based customer relationships.

Explosive growth of data

Data Growth
Clarks Model

Questionable Business Models

The most popular business model in the digital economy is tailored advertising. The enormous amounts of data individuals leave behind when using online services allows for profiling and targeting, highly effective advertisements. It is incomprehensibly common that customers have their data arbitrarily mined by a “free” service for the purposes of ad targeting. Thereby, the true value of personal data used is often neither considered nor compensated.

Terms and Conditions on iceberg.digital
Whilst in earlier times control over personal data may have been undertaken by preventing the data from being disclosed, in an internet enabled society it is increasingly important to understand how disclosed data is being used and reused and what can be done to control this further use and reuse (Whitley 2009, 155)

Today’s add-centric business models will further evolve and will keep on creating interesting innovations. Recent, noteworthy innovations all have in common that they replace human-based methods and that they rely heavily on user data:

like iceberg.digital
Endorsment iceberg.digital
Programmatic iceberg.digital
Targeting

Today’s add-centric business models with its mechanisms for behavioral tracking and aggregation of personal data result in asteady erosion of privacy and therefore provoke pervasive customer concerns. It is mandatory to critically rethink digital business models and to eventually include a realistic value proposition for the use of personal data. Personal data will continue to be recognized as a source of macro-economic growth. Therefore, it is critical to find solutions that can both protect privacy and unlock value.

Privacy at risk

The described innovations in digital marketing indicate that privacy of online users is at risk. In fact, the word privacy in combination with online user activity is misleading. There is no such thing as true Internet anonymity and therefore, true privacy is a myth as well. A good understanding of current online analytics practices and their direction of development is required to understand the extent of risk an Internet user takes when participating in online transactions.

Analytics can be described as the practice of capturing, managing and analysing data to drive business strategy and performance. Businesses have developed very sophisticated approaches and solutions to turn data into insights and eventually to make smarter decision. On a lower maturity level, analytics capabilities deliver more descriptive results. This is the domain of traditional management reporting. More insights are generated trough classic ex-post analysis. The focus on these deeper levels of maturity lies on understanding mainly structured data. Processing and analysis of data in real-time allow for effective monitoring. This maturity level is already widely adapted by many online businesses. It allows for example to listen to conversations on social media “as it happens”. The highest maturity level of analytics describes practices that look ahead. Predictive analytics draws on simulation and modeling as well as sophisticated optimization algorithms.

iceberg.digital

The obvious fact that analytics capabilities become more and more powerful underlines the hypothesis that true privacy on the Internet doesn’t exist – any more. Even if a service provider guarantees privacy, users bear a certain risk that their personal data are mined and brought in context with their identity at a later stage. Modern analytics may inadvertently make it possible to re-identify individuals over large data sets. The numbers of data points that can be used to build a rich profile of users are countless. An insurance company can for example monitor the characteristics of a prospect’s keyboard usage (speed of typing and moments of hesitations, typing pressure and usage of small caps versus uppercase), which can reveal relevant information. Hesitation shows limited decisiveness and therefore may give hints regarding a customer’s willingness to pay. Individuals can often be re-identified from anonymised data because their personal data (especially critical data such as geo-locations) often narrows possible combinations down and finally lead to the individual. Behavioral psychologists came a long way in analyzing and profiling users based on their digital traces.

Online privacy is at risk. As a natural reaction to the described developments, consumer concerns regarding the provision of personal data are increasing. However, the motivation of online businesses to protect user’s privacy and to act as an advocate for the customers is often surprisingly low. It is usually limited to peruse objectives in marketing such as avoiding reputation risks. Businesses have to change their attitude in order to be successful in the future. Economists would label privacy a merit good. The market for merit goods is an example of an incomplete market. This is the reason why a strong regulatory framework is essential.

 

Customers face a diverse bouquet of risks regarding the use of their data. As we will learn drawing on the prospect theory in chapter 3 the user’s perception of these risk strongly influence their decision making online. While the probability of their occurrence is perceived as quite low, the potential impact of these privacy risks is grave. A quantification of perceives risk therefore depends on two major components: the impact of a certain transaction and the perceived uncertainty about the likelihood of occurrence of a transaction result (Plötner, 1995). Hence, trust is a function of risk and relevance. When facing a highly relevant interaction target, a user’s level of trust is supposed to rise with increasing risk (Koller, 1997). The goal of getting well lets a patient develop a high level ot trust towards a surgeon.

 

Next to a list of personal risks the discussion about the use of personal data also leads to diverse superordinate, often ethical risks. The groundbreaking success of electronic commerce and the emergence of disruptive technologies imply new types of risk.

privacy risks

Consumer Concerns in Numbers

As we are going to learn in chapter 3 “Understanding Digital Trust”, the disposition to trust and therefore the acceptability of data use strongly depend on cognitive constructs that are individual to the trusting person. Interestingly, variances in these dispositions can also be observed on an aggregated level. Broad research identifies significant differences in the acceptability of data use and confidence in the security of personal data between countries. A recent study by Accenture shows that India is probably to country with the highest confidence in the use of personal data, whereas Japan is very reluctant in terms of building trust (Accenture, 2014). Other studies emphasize that these differences between cultures also heavily depend on the context of data usage (WEF, 2014). China and India are countries that tend to trust digital service providers more than USA or Europe – even without knowledge of data use, the service provider itself and the underlying value proposition.

Concerns In Numbers iceberg.digital
81%

Legal standards & oversight

80%

Transparency about data use

75%

Data storage & security

58%

Collection of location data

With all the outrageous disclosures about practices of the NSA and other governmental institutions, it is not surprising that the majority of respondents to the survey of the White House don’t trust intelligence as well as law enforcement agencies “not at all”. On the positive side, majorities were generally trusting of how professional practices (such as law and medial offices) and academic institutions use and handle data.

 

The progress bars indicate how many percent of the respondents don’t trust each entity at all:

Intelligence0%
Law enforcement0%
Business0%
State and Local0%
Government Agencies0%
Academia0%
Professional Practices0%

These findings illustrate that businesses are asked to act. Privacy concerns are likely to increase with the economy’s ever-growing appetite for data. Building a trusted relationship with consumers will be key. In order to reach this goal, companies must provide a clear value proposition (please refer to details about the trust clue “reciprocity” in chapter 3). The digital economy has very good chances to eventually move closer to their customer base. The study from Accenture also shows that about two-thirds of consumers globally are willing to share additional personal data with digital service providers in exchange for additional services or discounts (Accenture, 2014). However, sharing personal data with third parties remains a critical pitfall for engendering trust.

Willingness to share additional personal data in exchange for additional services or discounts:

If used by your provider only0%
If complies with all data protection laws in country0%
If shared by your provider with a third party0%
Did you know ?

You can now directly contribute to iceberg.digital. Click here to contribute.

Contact Us

    Your Name (required)

    Your Email (required)

    Subject

    Your Message

    Please master this little challenge by retyping these letters and numbers
    [recaptcha]

    Contribute to iceberg.digital

    Use this form to directly contribute to the iceberg project

    4+6=
    View latest Contributions
    • ShineRanker is an exceptional tool that utilizes Artificial Intelligence to automate content creation and income generation. It offers a wide range of impressive features, including: Don’t miss the opportunity to grab your $1 Dollar Trial of ShineRanker. Start here: ==> https://tinyurl.com/ShineRanker1DollarTrial – Viral Topic Finder:......

    • Have you checked this cool tool? My name is Kevin, and I would like to introduce you to a brand new tool: AI Diffusion. This tool will help you create your creatives for any niche in a short time using Artificial Intelligence. You can watch......

    • Hi there, My name is Kevin, and I am an expert in qualified traffic generation and I am excited to introduce my system called Free Traffic Shotgun. Considering the ongoing recession, I am pleased to offer you a significant discount, reducing the price from $197......