ArticlePDF Available

Spam and Marketing Communications

Authors:

Abstract

The purpose of this research is to describe how spam has become an issue in marketing communications, considering opinions of the digital marketing sector and Internet users. In-depth interviews were organized with digital marketing experts in order to gain a profounder understanding in the complex construct of spam. Additionally, a web-based survey explored whether and how Internet users handle spam and privacy online. Survey results unveiled three users segments, each holding specific profiles on concern for personal information exposed online, sharing information online, and particular coping actions against spamming (Buchanan, Paine, Joinson, & Reips, 2006; Smith, Milberg, & Burke, 1996).
Procedia Economics and Finance 12 ( 2014 ) 265 – 272
Available online at www.sciencedirect.com
2212-5671 © 2014 Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/3.0/).
Selection and/or peer-review under responsibility of the Organizing Committee of ECE 2014
doi: 10.1016/S2212-5671(14)00344-X
ScienceDirect
Enterprise and the Competitive Environment 2014 conference, ECE 2014, 6–7 March 2014, Brno,
Czech Republic
Spam and Marketing Communications
Kim Janssens
a,
*
, Nico Nijsten
a
, Robrecht Van Goolen
a
a
Leuven University College,Hertogstraat 178, Heverlee 3001, Belgium
Abstract
The purpose of this research is to describe how spam has become an issue in marketing communications, considering opinions of
the digital marketing sector and Internet users. In-depth interviews were organized with digital marketing experts in order to gain
a
profounder understanding in the complex construct of spam. Additionally, a web-based survey explored whether and how
In
ternet users handle spam and privacy online. Survey results unveiled three users segments, each holding specific profiles on
concern for personal information exposed online, sharing information online, and particular coping actions against spamming
(Buchanan, Paine, Joinson, & Reips, 2006; Smith, Milberg, & Burke, 1996).
© 2014 The Authors. Published by Elsevier B.V.
Selection and/or peer-review under responsibility of the Organizing Committee of ECE 2014.
Keywords: spam; privacy concern; e-marketing; marketing communications
1. Introduction
The explosive growth and evolution of the Internet have created
a borderless digital environment that has brought
forth new and creative ways of advertising. Whereas a decade ago marketers focused on reaching the consumer via
more traditional media channels (i.e. print media, TV), now more than half of the advertising efforts are aimed at
consumers via websites and social media (Fauconnier, 2012). This trend has brought forth a proliferation of
advertising messages spread online (De Bruyn & Lilien, 2008). Moreover, these online messages often are perceived
as unsolicited and/or unwanted messages, which is generally denoted as spam. Although the number of spam
٭
Corresponding author. Tel.: +(00)32 (0)16 375 329; fax: +(00)32(0)16 375 399.
Em
ail-address: kim.janssens@khleuven.be
© 2014 Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/3.0/).
Selection and/or peer-review under responsibility of the Organizing Committee of ECE 2014
266 Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
messages reaching Internet users’ mailbox has decreased substantially over the past years because of increasingly
performant mail filters and actions undertaken by Internet providers, still 70 % of all email traffic comprises spam
(Secu
relist, 2013).
Defining spam is not that straightforward. The concept can
be interpreted in a myriad of perspectives. In
accordance with European legislation (2002/58/EC) regarding the protection of electronic communication, spam is
defined as ‘unsolicited commercial email messages’ in the current research. Although spam can be dispersed through
different communication channels, the current study confines spam to all commercial messages derived from email
traffic.
Despite substantial EU legislation trying to ban spam in Europe (Directive 2002/21/EC of 7 March 2002
Framework Directive”, amongst others), illegal online activities still have a negative effect on the use of Internet
services. Hence, the European Commission has been sensitizing regulatory authorities and stakeholders on fighting
spam, spyware and malicious software. (COM (2006) 688 final).
According to Spamlaws (2012) spam messages emitted throu
gh email still are the most used type of spam. These
unwanted emails do not only cause irritation with the receivers (e.g. due to the dispersion of viruses and the overload
of their mailbox) but, moreover, an increase in online privacy concern is ascertained. While some Internet users
carefully monitor the personal information they reveal online, others take more risks regarding their privacy and
online security (Milne, Labrecque, & Cromer, 2009).
To gain a profounder underst
anding in the topic, in-depth interviews on spam and online privacy matters were
organized with experts in the direct marketing sector and with Internet service providers. In addition, via a web-
based survey, this study explored how Internet users manage online privacy and whether they take measures to
protect th
emselves against spamming on the Internet. The results of this survey showed three users segments, each
holding specific profiles on concern for personal information exposed online and on sharing information online, on
socio-demographics and on particular coping actions (Buchanan
, Paine, Joinson, & Reips, 2006; Smith, Milberg, &
Burke, 1996).
2. Research methods
In this research both quantitative as qualitative techniques wer
e used. For insights on thoughts from experts in the
digital marketing sector, in-depth interviews were organized. These insights were used to set up a web-based
co
nsumer survey in which consumers were questioned on their attitudes towards spam and the protection of personal
information online.
2.1 In-depth interviews
In order to gain a better understanding in how the digital media sector reflects on spam, in-depth interviews were
org
anized. Open-ended questions were posed to allow respondents
to elaborate and expound on feelings and
concerns regarding spam, giving respondents the freedom to ans
wer the questions in their own words. The key
questions of the interviews were preplanned (and later used for the consumer’s questionnaire) but the interview was
conversational enough to enable questions flowing from prev
ious questions.
Three intensive individual interviews were conducted to ex
plore experts’ perspectives on spam. The purpose of
the in-depth interviews was to gauge the insights of experts on spam, discussing the current issues on spam and the
evolu
tion of spam since the introduction of the legislation concerning certain legal aspects on services of the
information society and sending of electronic mail. The three experts that were interviewed are Joris Buys of EDPnet
(Internet service provider) and member of ISPA (Internet service provider association), Patrick Marck, general
manager of Interactive Advertising Bureau Belgium (IAB) and Nicolas Cobbaert, inspector at FPS (Federal Public
Service) Economy.
The answers that surfaced were used to set up a survey ai
med at consumers, asking about their attitudes towards
spam and online privacy and whether and how they cope with spam.
267
Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
2.2 Web-based consumer survey
Participants were recruited via a commercial opt-in consumer panel. To stimulate involvement and in return for
co
mpleting a web-based survey participants could be included in a rando
m drawing for a gift certificate. Fifteen
hundred and one completed surveys were collected, representing the Flemish email user population. Participants
completed the online survey asking about their attitude, perception and behavior towards spam and gauged their
coping actions towards spam.
2.2.1 Questions regarding Internet use
Participants were asked to indicate for h
ow long they had been using the Internet, the main purposes for which
they use the Internet (e.g., reading emails, online gaming, participating in social network sites) and to estimate hours
spend on reading emails.
2.2.2. Spam questions
Spam
Participants were asked whether they had
ever accepted an offer of spam advertising and why they reacted upon
this offer. We also had participants indicate which topics occurred most in a received spam message (e.g., porn,
pharmaceutical products, investment opportunities) (Bergstein, 2004; Gobert, 2006; Purvis, 2011).
They needed to indicate which coping actions they had alre
ady taken against spam. We also asked them to what
extent they agreed upon receiving emails via opt-in (requiring prior permission from consumers before using
person
al information and thus giving them more control) and opt-out (including consumers in a mailing list with the
possibilit
y to unsubscribe, which means that consumers need take action to remove themselves from the list) (Milne
&
Bahl, 2010).
Privacy concern attitudes
Participants filled out a privacy concern
scale (eight items selected from Buchanan, Paine, Joinson, & Reips,
2006). This shorter version of the scale consisted of items such as “In general, how concerned are you about your
priv
acy while you are using the Internet?”. Participants had to indicate whether they agreed with each item on a five-
point Likert scale ranging from 1 (not at all) to 5 (very muc
h). In a principal components analysis (varimax rotation)
a one-factor solution emerged for the Privacy Concern Scale, explaining 57.72 % of the variance (EV = 4.62). In
ad
dition, the responses to all items of the privacy concern scale had a solid internal consistency (cronbach’s alpha =
.89).
Protecting personal information
Using the Information Privacy Instrument by Smith, Milberg
, and Burke (1996) participants indicated to what
extent they agreed with statements regarding privacy of personal information (e.g. “It usually bothers me when
companies ask me for personal information”). Each of the eight items was to be scored on a five-point Likert scale
an
chored by 1 (strongly disagree) to 5 (strongly agree) (cronbach’s alpha = .88). In a principal components analysis
(varimax rotation) a two-factor solution emerged, explaining each 55.48 % (EV = 4.44) and 14.37% (EV = 1.15) of
th
e variance. Accordingly, two subscales can be derived from this instrument: one concerning the collection of
personal information (cronbach’s alpha = .86) and one subscale comprising unauthorized secondary use of personal
information (cronbach’s alpha = .84). Besides filling out this instrument participants also had to answer questions
regarding sharing and falsifying personal information in order to protect their identity.
We asked about participants’ sex, age, educatio
n, and profession using standard questions.
268 Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
3. Results and discussion
3.1 In-depth interviews
In corroboration with the theoretical background (section 1), th
e experts, too, define spam messages as unwanted
digital messages. According to the Internet services provider sector, m
ost spam is dispersed by dishonest and
criminal organizations, containing criminal but most certainly misleading messages. As stated in the literature
overview, almost 70 % of email traffic contains spam. According to J
oris Buys of EDPnet (Internet service
provider), the amount of spam messages is certainly not decreasing but Internet service providers perform more
effectively at filtering spam. That is, currently, Internet service providers filter spam to an “acceptable” level for
consumers, but claim that fully reducing spam to a zero-level seems impossible. Patrick Ma
rck, general manager of
IAB, agrees to this opinion and adds that a zero-level only can be obtained when email becomes a paying service.
One of the negative consequences of an even stricter filte
ring option is that, for both businesses as individual
Internet users, a spam filter may filter an outgoing message that is not spam and thus not unwanted.
In all three interviews, the experts voiced their concern about the Internet literacy of consumers. They stated that
co
nsumers need to be sensitized on spam, specifically on new types of spam entering the digital environment. In
ad
dition, permission management becomes of growing importance: according to the digital marketing sector not all
Internet users are fully aware of the implications of permitting businesses to using personal information and that
permissions can be withdrawn at all times. Therefore, the opt-in principle (Internet users need to grant permission to
bu
sinesses before using personal information and thus users have more control) is an important legislation regarding
permission management. According to Patrick Marck, the opt-in principle was first introduced with the means of
eli
minating spam. However, in reality mala fide companies do not respect the opt-in legislation. Bona fide
co
mpanies understand that consumers are not interested in commercial messages without given permission. For bona
f
ide companies, the opt-in principle is in fact a mere marketing principle: a reduction of the number of unsolicited
e
mails in consumers’ inbox leads to more attention to each received email.
Since the cessation of Spamsquad, a Belgian governmenta
l platform where consumers could lodge complaints,
Nicolas Cobbaert, inspector at FPS (Federal
Public Service) Economy wonders whether Internet users know they
now need to address complaints to FPS.
3.2 Web-based consumer survey
3.2.1 Sample characteristics
Fifteen hundred and one participants (775 women and 726 men) took part in this study in Flanders (Dutch
s
peaking part of Belgium). Respondents varied in age from 16 to 74 years old (M = 41.41, SD = 14.76). Their
edu
cational level was classified in three groups: participants having a degree up to secondary education (n = 331),
participants holding a secondary education diploma (n = 636) and participants with a higher education diploma (n =
534).
3.2.2 Questions regarding Internet use
Most of the participants (37.5 %) have been using the Internet for 11 to 15 y
ears. Participants use the Internet the
most for reading their emails (96.7 %), followed by information seeking (89.6 %) and Internet banking (79.8 %). On
average, respon
dents spend 43.24 minutes a day checking their email (SD = 43.18).
3.2.3 Spam questions
Spam and privacy concern attitudes
Results show that 94 % of the participants has already received an e
mail with an offer for a product or service
without asking for it. Apparently, 17.9 % receives more than ten unwanted commercial email messages, 24.5 %
receiv
es between six and ten spam messages, and for 52.7 % spam is limited to less than six messages on a daily
basis
. Although participants receive a great amount of spam messages, 75.8 % of them has never engaged in buying
th
e offered product or service.
269
Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
Spam messages most frequently received are invitations to participate in contests, followed by the offering of free
gifts, receiving chain letters, gambling, and the sales of untrustworthy products (e.g., anabolic steroids or products to
enhance one’s sex life).
When receiving spam, only 2.6 % of the respondents reads the message, 55.4 % deletes the message immediately
w
ithout opening it, 43.6 % only reads the subject title and 27.6 % opens the email and tries to opt-out. Respondents
are co
nvinced that measures should be taken by the government (35.3 %), by the Internet service provider (60.5 %)
and by
the users themselves (49.4 %). Our respondents do take action to protect th
eir online privacy: in an attempt to
counter spam 27 % blocks unknown senders and 17.5 % has installed and uses spam filters.
Privacy concern and protection of pers
onal information
Participants were to specify the kind of person
al information they do not want to share or that they had already
falsified online (e.g., name, address, occupation). Results show that participants are reluctant to share their address
(80.4 %) and phone number (88.1 %) online, followed by information about others (family members or friends),
th
eir email address (29 %) and name (26.8 %). Participants also had to indicate if th
ey had ever falsified information
when being asked about personal information online. In line with the results on sharing personal information,
participants mostly falsified their phone number (29.2 %), their address (23.5 %), and name (22.3 %) when asked
on
line. However, 52.8 % of the participants indicated not falsifying any
personal information. These results clearly
demonstrate that participants are aware of the potential danger of sharing their personal information on the Internet.
In
the participants’ view, falsifying this information appears to be a bridge too far.
In order to segment Internet users’ profiles, a cluster analysis was run on 1501 cases, each responding to items on
priv
acy concern (Privacy Concern Scale), on unauthorized secondary use of personal information and on the
collection of personal information (Information Privacy Instrument). A hierarchical cluster analysis using Ward’s
method and applying squared Euclidean distance produced three clusters. ANOVA’s on the scale items showed three
clusters between which the variables were significantly different in the main (respectively F(2, 1498) = 532.35,
p<.001; F(2, 1498) = 804.46, p<.001; F(2, 1498) = 527.24, p<.001) (checked with a significant Tukey post-hoc test).
Th
e first cluster (30.4 % of the respondents) is characterized by an avera
ge privacy concern, a low concern for
collection of personal information and a high concern for unauthorized secondary use. The second cluster (39.9 %)
co
nsists of participants with an average privacy concern, an average concern for collection of personal information
and a low concern of unauthorized secondary use of personal information. The third cluster (29.7 %) is characterized
w
ith a high privacy concern, a high concern for collection of personal information as well as for unauthorized
secondary use of personal information.
Coping actions
Participants in all three clusters undertake coping actions t
o protect themselves from spam. However, the three
clusters significantly differ in results regarding participants’ perception of spam and whether they choose to opt-out
or opt-in on a commercial message. One third of our participants
indicated to open a spam email and immediately
opt-out. In cluster 2 we can notice a significant underrepresentation
of participants answering that they do
immediately opt-out. Still, the second cluster agrees more upon the opt-out principle (M = 4.14, SD =1.14) than the
fi
rst (M = 4.00, SD = 1.15) and third cluster (M = 3.88, SD = 1.06), F(2, 1498) = 7.04, p= .001. Considering the opt-
in principle, the means for the first, secon
d and third cluster are respectively 4.22 (SD = 0.85), 4.21 (SD = 0.98) and
3.96 (SD = 0.94), F(2, 1498) = 13.14, p< .001. More than half of
our participants (56.4 %) claims using a spam
folder. In cluster 1 participants answering they do not use such a folder were underrepresented. Reinforcing this
result, an overrepresentation of participants in this cluster answered they do protect themselves online by using a
spam folder.
The data used in the following paragraphs were analyzed using partitioned chi-square in accordance with
Wonnacott and Wonnacott (1990).
270 Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
Eighty-five percent of the participants claims refusing to give personal information online as a way of coping
with unwanted commercial email messages. The second cluster is the most reluctant in sharing personal information
(M = 3.97, SD = 1.71), whereas the first (M = 3.22, SD = 1.41) and third (M = 3.44, SD = 1.62) clusters significantly
prov
ide more information, F(2, 1498) = 27.56, p< .001. In cluster 1 we find an overrepresentation of participants
ans
wering they do not refuse to give personal information (i.e. they do share personal information), while an
underrepresentation was found in cluster 3. The three clusters are not different in falsifying personal information (M
= 1.34, SD =1.86, p> .05). The second cluster receives significantly
more spam messages than the first and third
cluster, F(2, 1498) = 7.35, p= .001.
Results showed that cluster 1 holds an overrepresentation of participants aged up to 30 years old, while
si
multaneously holds an underrepresentation of participants older than 50. In addition, in cluster 1 participants with a
higher educational level are overrepresented. Taking into account that participants in this cluster have the lowest
concern for their personal information being exposed online, that they share information online more easily but do
use their spam folder, we can conclude that these are the so-called digital natives. Oppositely, cluster 3 is identified
by
an underrepresentation of participants younger than 30 and at the same time an overrepresentation of participants
older than 50. This translates in their coping actions and in the high concern this cluster has for their privacy and
information sharing online. Participants in this cluster do not often ask to remove their personal information for
m
arketing purposes but they are more reluctant of sharing personal information on a website. Cluster 2 holds
participants with a high privacy concern, a high concern for the collection of personal information as well as for
unauthorized use of this information. However, this cluster cannot be characterized by a specific age range.
4. Conclusion
The purpose of the current study was to explore people’
s attitudes towards online privacy and the measures taken
to protect themselves against spamming. Insights were gathered from digital marketing experts, giving their thoughts
on spam, on online privacy and on legislation. In addition, a web-based survey unveiled three customer segments,
each h
olding specific profiles on online privacy concern, sharing of personal information and attitude towards spam,
socio demographics and particular coping actions. Results of this survey show that Internet users clearly engage in
various coping actions in protecting themselves from spam. Nevertheless, in the experts’ opinions Internet users
need to be sensitized on spam to an even greater extent, taking into account spamming via new technologies such as
blue spam or mobile spam. Experts claim that users do not fully grasp the construct of spam and in addition state that
users need to be empowered and educated on permission management and how to act upon cookies. Contrary to
most users, experts are well aware of the prevailing legislation on spam and indicate the opt-in legislation as a means
of
permission management. The Internet service provider sector expresses the concern that still too little users know
precisely where to denounce complaints on spam and point out the still existent Internet literacy gap, particularly
with vulnerable groups.
5. Limitations and future research
Even though in-depth interviews have the advantage of providing
more detailed information, the small sample
size inherent to this research method prohibits generalization of the results. However, in-depth interviews do
prov
ide valuable information that may give better understanding in the topic (Boyce & Neale, 2006). The survey
results are based on data from a Flemish commercial opt-in consumer panel and thus cannot be generalized to the
w
orld Internet population.
Although the results show that participants clearly engage in various coping actions in protecting themselves from
spa
m, more research is clearly needed entangling protective behaviors. These results may contribute into giving
more insight into marketing possibilities for each of the clusters taking into account the different profiles.
Within the discussion of permission management, cookies are becoming of greater importance. A cookie is a
s
mall file of letters and numbers that is downloaded when accessing websites (Palmer, 2005). Cookies allow a
website to recognize a user’s preference, which can be of interest for a company and its marketing purposes. Spam
messages in the more traditional form of advertising are disappearing and new types are rising such as phishing
271
Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
emails and malware. Consequently, even Internet literate users should be cautious to avoid becoming a victim of
fraudulent practices online (Securelist, 2013).
Future research would benefit from insights on to w
hat level Internet users are familiar with permission
management and new emerging types of spam.
References
Aaron, G. (2010). The state of phishing. Computer Fraud & Security, 6, 58.
Bandyopadhyay, S. (2009). Antecedents and consequences of consumers online privacy concerns. Jo
urnal of Business & Economics Research, 7
(3), 4148.
Bergstein, B. (2004, January 1), AOL lists most common spam messages, Detroit Free Press. Retrieved November 20, 2012 from
h
ttp://www.crn.com/news/channel-programs/18825162/aol-cites-top-spam-topics.htm.
Boyce, C. & Neale, P. (2006). Conducting In-depth interviews: A Guide for Designing and Conducting In-depth Interviews for Evaluation Input.
h
ttp://www.pathfind.org/site/DocServer/m_e_tool_series_indepth_interviews.pdf?docID=6301.
Buchanan, T., Paine, C., Joinson, A., & Reips, U.-D. (2006). Development of measures of online privacy concern and protection for use on the
In
ternet. Journal of the American Society for Information Science and Technology, 58 (2), 157165.
COM(2006)688 final of 15 November 2006, Communication from the Commission to the European Parliament, the Council, the European
E
conomic and Social Committee and the Committee of the Regions on fighting spam, spyware and malicious software,
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52006DC0688:EN:HTML.
Culnan, M. J., & Milne, G. R. (2001). The Culnan-Milne survey on consumers & online privacy notices. Retrieved October 12, 2012 from
ht
tp://intra.som.umass.edu /georgemilne/pdffiles/culnan-milne.pdf.
De Bruyn, A., & Lilien, G. L. (2008). A multi-stage model of word-of-mouth influence through viral marketing. I
nternational Journal of
Research in Marketing, 25, 151163.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents measurement validity and a regression model. B
ehaviour &
Information Technology, 23 (6), 413422.
Directive 2002/21/EC of 7 March 2002 on a common regulatory framework for electronic communications networks and services (“Framewo
rk
Directive”); Directive 2002/22/EC on universal service and users’ rights relating to electronic communications networks and services;
Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector;
Regulation 1211/2009 of 25 November 2009 establishing the Body of European Regulators for Electronic Communications (BEREC) and th
e
Office (Text with EEA relevance); Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending
Di
rective 2002/22/EC.
Gautronet, S., & Drouard, E. (2001). Unsolicited commercial communication and data protection. Retrieved September 25, 2012 from
ht
tp://europa.eu.int/comm/internal_market/en/media/dataprot/studies/spamsum.pdf.
Gobert, D. (2006). Spamming in question [Brochure]. Brussels: FPS Economy, SMEs, Self-Employed and Energy.
Grimes, G. A. (2004). Issues with spam. Co
mputer Fraud and Security, 5, 1216.
Hinde, S. (2003). Spam: the evolution of a nuisance. Co
mputers & Security, 22, 474478.
LaRose, R., & Rifon, N. J. (2007). Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy
be
havior. The Journal of Consumer Affairs, 41 (1), 127149.
Milne, G. R., & Bahl, S. (2010). Are there differences between consumers’ and marketers’ privacy expectations? A segment- and technology-
level analysis. J
ournal of Public Policy & Marketing, 29 (1), 138149.
Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an understanding of the online consumer’s risky behavior and protect
ion practices.
The Journal of Consumer Affairs, 43 (3), 449473.
Nucleus Research & KnowledgeStorm (2007, April 2), Spam costing US businesses $712 per employee each year. Retrieved November 20, 2012
from
http://nucleusresearch.com/news/press-releases/nucleus-research-spam-costing-us-businesses-712-per-employee-each-year/
Palmer, D. E. (2005). Pop-ups, cookies, and spam: Toward a deeper analysis of the ethical significance of Internet marketing practices. Jo
urnal of
Business Ethics, 58, 271280.
Purvis, C. (2011, October 26), Most popular spam topics: pharmaceuticals and dating, Security Management. Retrieved October 12, 2
012 from
http://www.securitymanagement.com/news/most-popular-spam-topics-pharmaceuticals-and-dating-009171.
Rose, B., & Lenski, J. (2006). Internet and multimedia 2006: on-demand media explodes. Arbitron/Edison Media Research.
Schryen, G. (2007). The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis. Com
puters &
Security, 26, 3
61372.
Securelist (2012). Spam and phishing. Retrieved November 23, 2012 from http://www.securelist.com/en/threats/spam?chapter=88.
Securelist (2013). Kaspersky security bulletin. Spam evolution 2013. Retrieved January 12, 2013 from
ht
tps://www.securelist.com/en/analysis/204792318/Kaspersky_Security_Bulletin_2013_Overall_statistics_for_2013.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy measuring individuals’ concerns about organizational practices. MI
S
Quarterly, 20 (2), 167196.
Spamlaws (2012). Spam: what is spam?. Retrieved November 26, 2012 from http://www.spamlaws.com/what-is-spam.html.
Valero, G. (2011). Spam levels drop drastically…then rise. Co
mputer Fraud & Security, 1, 13.
272 Kim Janssens et al. / Procedia Economics and Finance 12 ( 2014 ) 265 – 272
Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. Cyberpsychology, Behavior, and Social Networking, 15
(3), 181183.
Wonnacott, T. H., & Wonnacott, R. J. (1990). Introductory statistics (5th edition). New York: Wiley.
... Kotler & Keller notes that sales promotion includes different tools for consumer promotion; the ones directly price-oriented are: coupons and prices off (Kotler, Keller, 2009 given to the partners and incentives given to the employees (Chernev, 2012). Blythe describing price promotion, points to two discount categories -immediate and delayed discounts, and five immediate discount forms: seasonal discounts, multibuys, banded packs, reduced shelf price and extra-fill packs (Blythe, 2006). ...
... It also points to the risks arising by the use of discounts. Davis considers that the main risk of using price discounts is that competitors can easily retaliate in kind, leading to a price war that is damaging to both parties and ultimately weakens the industry, leaving it open to an attack from less immediate competitors (Blythe, 2006). Discounts may make sale today, but what are the long-run costs? ...
... Elementele care trebuie luate în considerare în cadrul procesului de planificare a comunicării sunt următoarele: analiza situațională ce presupune analiza mediului și contextului în care se desfășoară comunicarea și analiza situației curente a muzeului; fixarea obiectivelor -decizia privind indicatorii de imagine și de notorietate pe care trebuie să-i urmărească responsabilii realizării și implementării planului de comunicare și nivelul (măsurabil) la care trebuie să ajungă aceștia; luarea deciziilor strategice -fixarea direcției generale pe care trebuie să o urmărească comunicarea astfel încât să poată fi create punctele de contact între muzeu și audiența țintă; luarea deciziilor operaționale (tactice); evaluarea campaniei de comunicare (Blythe, 2006). ...
... Informațiile sunt transmise în flux continuu iar transmiterea mesajului verbal și a celui vizual sunt simultane. Ca mediu de comunicare, televiziunea prezintă atât avantaje, cât și dezavantaje (Blythe, 2006 În contextul campaniilor de comunicare pentru muzee, realizarea unor campanii de comunicare după rețeta urmată de mărcile de produse și servicii ale marilor companii rămâne un deziderat. Accesul muzeelor la acest mijloc de comunicare este restricționat de costurile foarte mari de difuzare. ...
Book
Full-text available
Prezenta lucrare este structurată pe cinci capitole. Primele trei se regăsesc într-o proporție destul de însemnată și în Interpretarea și promovarea patrimoniului cultural din muzee (Candrea și Nechita, 2015), însă orice discuție despre comunicarea de marketing a muzeelor în perioada actuală nu poate ignora abordarea plecând de la general (marketingul muzeal) și făcând o scurtă incursiune în utilizarea mediilor tradiționale de comunicare (prezentate în cele 27 de pagini ale capitolului al doilea). Mini-capitolul despre guerilla marketing a fost introdus cu scopul principal de a sublinia necesitatea adoptării de către muzee a unei abordări neconvenționale și creative, bugetul redus al comunicării fiind de la sine înțeles. Astfel, se asigură trecerea de la comunicarea tradițională la comunicarea prin noile canale digitale, canale care facilitează și efectul viral în răspândirea mesajelor ce pot fi încadrate în categoria guerilla marketing.
... From the point of view of digital marketing development, so far, 3 important roles have been identified in 3 different periods of time, approximately 5 years each: facilitator of individual expression, decision support tool, marketing intelligence [3]. On the other hand, advertising messages unsolicited or unwanted by the potential customers represent what is generally known as spam [4]. This topic has been included in European law as part of the protection of electronic communication (2002/58/EC) and only e-mail messages were included. ...
... The preferred preys of DW criminals are cyberspaces including digital information (mobile and immobile). Digital dangers are all actions that can randomly target digitalized parts of any personal or organizational activity and cause massive damage (e-commerce [12], logistics [13], finance [14,15], marketing [16,17], etc.). ...
Article
Full-text available
Cybercrime encompasses all illegal actions and facts that target cyberspaces and cause enormous economic and financial damages to organizations and individuals. A cyberspace is essentially composed of digital information as well as its store and communication instruments/platforms. To remedy this phenomenon, attention has focused particularly on both computer security and legislation in an area where the human behavior is also decisive. Social psychology has well defined the concept of behavior and also studied its relations with the attitude in human action. This paper aims to broaden the scope of cybercrime to also discuss marginal phenomena which do not attract enough attention but could easily be converted to digital criminals once circumstances become appropriate. The main objective of this work is the study of the 'human'-'digital world' interactivity in a specific geographical area or precisely the study of the human behavior towards digital crimes. The proposed study targets young people of a small Moroccan city that is in the south of the country central region and constitutes its global economy barycenter. The study dealt specifically with a sample of Moroccan young living in El Jadida city that coincidentally contains individuals from other Moroccan cities which enriched this study more.
Article
Full-text available
The study investigates the effect of customer satisfaction and marketing communication mix on customers' loyalty in the Ghanaian banking industry. Explanatory design was used to investigate the association between the independent variables: customer satisfaction, public relations, advertising, sales promotion and the dependent variable: customers' loyalty. Questionnaire was the main instruments for data collection from 250 customers of banks in Accra, Ghana. SPSS version 20 was employed for data analysis. The study revealed a strong positive relationship between customer satisfaction and customer loyalty in the Ghanaian banking industry. Also, the study showed a moderate but significant relationship between public relations and customers' loyalty in the Ghanaian banking industry. On the bases of these findings, the study recommended that the banks should continue to strive to achieve customer satisfaction by fulfilling customers' needs and wants since it can engender customer loyalty. This can be done by understanding all the factors affecting customer satisfaction. Also, it was recommended that public relations must not be discarded but strengthened to complement the other marketing communication mix to help encourage customer loyalty in the Ghanaian banking industry.
Conference Paper
Full-text available
üketici araştırmalarında yaşam tarzının belirlenmesi önemli adımlardan biridir. Bu çalışmanın amacı Internet kullanıcısı tüketicilerin yaşam tarzlarını ve farklılaşan yaşam tarzlarına göre Internet kullanım durumlarını belirleyerek, işletmelerin çevrim içi ortamda gelişen pazarlama iletişim faaliyetlerine yönelik öneriler geliştirmektir. Literatür incelemesinde, Internet kullanıcısı tüketicilerin yaşam tarzlarını belirlemek adına VALS2 ölçeği kullanılan bir çalışmaya rastlanmaması, bu çalışmanın özgün değerini ifade etmektedir. Çalışmada, VALS2 ölçeği kullanılarak Internet kullanıcısı tüketicilerin yaşam tarzları belirlenmiştir. VALS2 ölçeği literatürde olduğu gibi sekiz gruba ayrılmış ve her bir grubun yaşam tarzları demografik değişkenler açısından değerlendirilmiştir.
Book
Full-text available
This textbook is intended to provide a practical managerial understanding of consumer behavior in the rural market. It presents an inclusive description of various consumer buying concept useful in the decision-making process. It is also striving to make marketing intelligence significance of marketing strategy and easily understandable to marketers. The text gives a comprehensive coverage of three patterns- consumer buying behavior in the rural market, consumer buying behavior during bandhs and blockades and consumer awareness on consumer rights and protection acts. Which will enhance the management capability and decision-making skills? Key features • Emphasizes various marketing and decision-making skills. • Strategic development of consumer awareness in a un-organized market • Promote the consumer buying perception during bandhs and blockades • Useful for a marketer to developed effective and result-oriented decision-making skills.
Article
Full-text available
This paper proposes a theoretical framework to investigate the factors that influence the privacy concerns of consumers who use the Internet, and the possible outcomes of such privacy concerns. Factors identified as antecedents to online privacy concerns are perceived vulnerability to personal data collection and misuse, perceived ability to control data collection and subsequent use, the level of Internet literacy, social awareness, and background cultural factors. The possible consequences of online privacy concerns are the lack of willingness to provide personal information online, rejection of e-commerce, or even unwillingness to use the Internet. Managerial implications of the framework are discussed.
Article
Full-text available
As the Internet grows in importance, concerns about online privacy have arisen. The authors describe the development and validation of three short Internet- administered scales measuring privacy-related attitudes (Privacy Concern) and behaviors (General Caution and Technical Protection). In Study 1, 515 people completed an 82-item questionnaire from which the three scales were derived. In Study 2, scale validity was examined by comparing scores of individuals drawn from groups con- sidered likely to differ in privacy-protective behaviors. In Study 3, correlations between the scores on the current scales and two established measures of privacy concern were examined. The authors conclude that these scales are reliable and valid instruments suitable for administration via the Internet, and present them for use in online privacy research.
Article
Full-text available
With the growth and evolution of the Internet, electronic peer-to-peer referrals have become an important phenomenon, and marketers have tried to exploit their potential through viral marketing campaigns. At the same time, spam and e-mail-based viruses have cluttered electronic communications, making viral marketing campaigns problematic and challenging to deploy. The key driver in viral marketing is the effectiveness of unsolicited, electronic referrals to create awareness, trigger interest, and generate sales or product adoption. Yet, despite a large literature concerning interpersonal influence, little is known about how this electronic, or, indeed, any word-of-mouth process influences consumers' actual behaviors, particularly in a cluttered online environment. In this paper, we develop a model to help identify the role word-of-mouth plays during each stage of a viral marketing recipients' decision-making process, including the conditions that moderate such influence. We then present an innovative methodology for collecting data unobtrusively and in real time. We empirically test the model and methodology via a field study, where we observed the reactions of 1100 individuals after they received an unsolicited e-mail from one of their acquaintances, inviting them to take a survey and in turn spread the word about it. We found that characteristics of the social tie influenced recipients' behaviors, but had different effects at different stages: tie strength facilitated awareness, perceptual affinity triggered recipients' interest, and demographic similarity had a negative influence on each stage of the decision-making process. We conclude with a discussion of the theoretical and methodological contributions of our work and of managerial implications of these findings for online marketers interested in strategies for leveraging peer-to-peer referral networks.
Article
When dealing with online crimes like phishing, spam and malware, it's important to understand where the biggest threats are and what works to defeat them. The latest Global Phishing Survey, published by the Anti-Phishing Working Group (APWG), has new data that shows where phishing has been taking place, and in some cases how and why. The report indicates that, through the later part of 2009, a single gang of phishers – the ‘Avalanche’ operation – was responsible for two-thirds of all phishing attacks launched on the Internet. Greg Aaron, a director at Afilias, analyses the activities of the Avalanche group and asks what they tell us about the state of phishing today. Famous old-time bank robber Willie Sutton said, “Go where the money is … and go there often”. And that's what today's e-criminals are doing – they're going where the money is, and with startling frequency.
Article
This article takes a detailed view of unsolicited, commercial email, better known as “spam”, examining the current state of spam dissemination, how it is distributed by spammers, the impact and problems spam is causing the IT industry, and what methods are being employed both legislative and technological by various segments of government and the IT industry to help control and/or eliminate spam. In analyzing the various legislative and technological means that are being employed to control and/or eliminate spam, the pros and cons of each method and potential societal impacts are discussed.
Article
Despite previous examinations of business actions, consumer reactions, and regulatory efforts, there has been no direct comparison of consumer and marketer expectations for establishing and respecting privacy boundaries. This study directly compares consumer segments' and marketers' expectations for privacy boundaries that regulate marketers' access to consumers and their information. Using data from a national online survey, the authors compare three consumer segments' preferences regarding the boundaries for the use of eight information technologies (cookies, biometrics, loyalty cards, radio frequency identification, text messaging, pop-up advertisements, telemarketing, and spam) with survey results of marketing managers and database vendors for the same set of questions. The results identify consumer segments and technologies for which consumer expectations differ from marketers and, thus, for which more regulatory and public policy attention and research scholarship is needed.
Article
Using social cognitive theory, this study experimentally examines the effects of explicit privacy warnings, a clear, conspicuous, and concise presentation of the benefits and risks associated with database informa- tion practices stated in a Web site's privacy policy. Warnings increased perceptions of the risks associated with information practices and decreased disclosures, but not in the presence of a privacy seal. The effects were also moderated by consumer privacy self-efficacy and involvement with privacy. The results support the development of pri- vacy warnings as a part of consumer privacy self-regulatory efforts and the use of a social cognitive paradigm for understanding consumer pri- vacy behaviors.
Article
This research draws upon protection motivation theory and social cognitive theory to investigate the extent to which the level of perceived threat and likelihood of threat along with online self-efficacy affect online behaviors. This article contributes to the literature by investigating a wide range of risky and protective behaviors and examining the role of online self-efficacy with a national online survey of 449 nonstudent respondents. Results show that both self-efficacy and demographic factors such as age have a differential impact on the type of behaviors taken online.
Article
While e-commerce has grown rapidly in recent years, some of the practices associated with certain aspects of marketing on the Internet, such as pop-ups, cookies, and spam, have raised concerns on the part of Internet users. In this paper I examine the nature of these practices and what I take to be the underlying source of this concern. I argue that the ethical issues surrounding these Internet marketing techniques move us beyond the traditional treatment of the ethics of marketing and advertising found in discussions of business ethics previously. Rather, I show that the questions they raise ultimately turn upon questions of technique and the ways in which technologies can transform the fundamental means by which relationships are established and maintained within a social environment. I then argue that the techniques of e-commerce are indeed transforming the means by which businesses relate to consumers, and that this transformation is affecting the applicability of our previous ways of demarcating the imperatives determining the limits of accessibility between consumers and businesses. Properly addressing the ethical status of the techniques of e-marketing as such necessarily moves us to consider the changes that Internet commerce are having upon the norms that govern individuals in their relations with others.