首页
登录
职称英语
Internet Privacy With the rapid development of e-com
Internet Privacy With the rapid development of e-com
游客
2023-12-12
11
管理
问题
Internet Privacy
With the rapid development of e-commerce, companies are now capable of cultivating more (1)______relationships with their customers. It empowers companies to better understand their customers’wants and hence they are able to (2)______offerings to the unique needs of individuals. At the same time, this has become a (3)______because the technology involves the extensive collection and use of personal data.
The use of the cookie technology can help a website assign each individual user a unique identifier, so that he may be recognized in(4)______visits to the site. On each return visit, the site can call up user-specific information, including the consumer’s (5)______as indicated by documents the consumer accessed in prior visits.
Despite concerns about privacy and security with online shoppers, according to the 1999 survey, still 61% of the subjects surveyed said they were (6)______toward banner ads based on their personal interests rather than random ones.
The study seems to (7)______ the e-commerce firms who are willing to provide customized shopping experiences. Statistics also show that not all the websites post privacy policies. Furthermore, the exact definition of the privacy policies in themselves remains (8)______.
Finally, in spite of privacy (9)______, some companies, e.g. AdAge.com still offended customers by transferring users’ information data to another company.
To sum up, the (10)______of effective privacy protection is widely believed to be stunting the growth of e-commerce. [br]
Internet Privacy
Good morning. Today’s lecture still focuses on the e-commerce. One of the most important advances in the rapidly developing world of electronic commerce is the ability of companies to develop personalized relationships with their customers. Personalization empowers companies to better understand their customers’ wants and desires and improve customer service by tailoring offerings to the unique needs of individuals. At the same time, this has become a subject of hot controversy because the technology involves the extensive collection and use of personal data. Many, if not most, online shoppers and surfers are not aware of the extent of how much and what kind of information can be gathered about a person, even someone who is just visiting and not shopping or signing up for anything. Through the use of the cookie technology, a person’s movement through the Web can be tracked to provide information. Using cookies a website assigns each individual a unique identifier, so that he may be recognized in subsequent visits to the site. On each return visit, the site can call up user-specific information, which could include the consumer’s preferences or interests, as indicated by documents the consumer accessed in prior visits or items the consumer clicke while in the site.
Websites can also collect information about consumers through hidden electronic navigational software that captures information about site visits, including web pages visited and information downloaded, the types of browser used, and the referring websites’ Internet addresses. The result is that a website about Jane’s gardening could sell not only her name to mail-order companies, but also the fact that she spent a lot of time one Saturday night last month reading about how to fertilize roses. More disturbing scenarios along the same lines could be imagined.
However, although concern about privacy and security has long been the biggest issue with online shoppers, some of them may not mind their behaviour being watched if it allows their shopping experience to be customized. According to the 1999 Personalized Marketing and Privacy on the Net: What Consumers Want survey conducted by the non-profit research firm Privacy and American Business, 61 percent of the 474 Internet users surveyed said that they would be positive toward receiving banner ads tailored to their personal interests rather than receiving random ads. This represents about 56 million adult users interested in such personalization.
In addition, 68 percent of the users also said that they would provide personal information in order to receive tailored banner ads, on the condition that notice and opt-out are provided. The study seems to back the e-commerce firms who are watching online behaviour to provide customized shopping experiences, and not privacy advocates who say that this practice is an invasion of privacy. It is the purpose for gathering the information, it would seem, that is the key to drawing the line between acceptable personalization and invasion of privacy. This is why it is important to many shoppers that a site has a privacy policy that explains what information is gathered and how it is being used, before they relinquish their information. However, according to the 1999 Georgetown Internet Privacy Policy Survey, 94% of the top 100 websites post privacy policies, and 66% of the overall websites post privacy policies.
These figures sound reassuring but the exact definition of the privacy policies in themselves remains to be questioned. The 1998 Federal Trade Commission report on Internet privacy, Privacy Online: A Report to Congress outlined five criteria by which a commercial website can be said to have a truly comprehensive privacy policy. Known as the Fair Information Practice Principles, they are notice/awareness, choice/consent, access/participation, integrity/security, and enforcement/redress. In other words, websites should notify consumers that they’re collecting personal information and that the consumers can choose whether to provide it.
The result of a three-year study of 1,400 websites showed only 924 of the 1,400 websites surveyed were found to have privacy policies. 87 percent of these notified customers that they collect information, and 77 percent offered customers refusal rights. However, only 40 percent gave customers access to their information; 46 percent promised security; and 49 percent provided contact information. There is also the question of how much these privacy promises are enforced. In June 1998, AdAge.com had transferred user information—including log-on names and passwords—to the Globe.com, an unrelated site. Registered AdAge.com users had no idea that the site had done so until they received an e-mail note that welcomed them to the Globe.com and contained their AdAge.com passwords. This incident provoked outrage from some AdAge. com users and embarrassed both companies. Although AdAge.com later apologized to its users, explaining that the data transfer was part of a community partnership between the sites and was designd to allow AdAge.com users’ easy access to the Globe.com’s community features, this is a glaring example of what can happen despite privacy promises.
To sum up, today’s lecture mainly deals with the lack of effective privacy protection which is widely believed to be stunting the growth of e-commerce. Survey after survey has shown that more people would embrace e-commerce if they had better assurances about their privacy. Big businesses and small businesses have to realize that trust is necessary to build long-term, profitable customer relationships. Trust fosters customer loyalty, referrals and repeat business, so commercial enterprises that make privacy protection a priority will reap the returns from their customers.
选项
答案
lack/shortage
解析
本题为要点题,讲座中最后提到缺少有效的隐私保护,这是现存的电子商务发展的最大的绊脚石。
转载请注明原文地址:https://tihaiku.com/zcyy/3265700.html
相关试题推荐
WhatsuggestiondoesMsLiongivetothestudentsusingInternetasaninformati
WhatsuggestiondoesMsLiongivetothestudentsusingInternetasaninformati
WhatsuggestiondoesMsLiongivetothestudentsusingInternetasaninformati
WhatsuggestiondoesMsLiongivetothestudentsusingInternetasaninformati
BydrawingontheWorldBank’sprojectionsofsocioeconomicdevelopmentove
BydrawingontheWorldBank’sprojectionsofsocioeconomicdevelopmentove
BydrawingontheWorldBank’sprojectionsofsocioeconomicdevelopmentove
WiththerapiddevelopmentofChina’seconomy,manypeoplehaveboughtorar
WaltWhitmanhelpedtopromotethedevelopmentof______.A、sonnetB、coupletC、bl
It’sanoddparadox;thankstocellphones,PDAsandtheInternet,we’venev
随机试题
TheWritingsectiontestsyourabilitytowriteessaysinEnglishsimilarto
WhendoeshearriveinXiamen?[br]Whatisthenumberofthecheckheholds?No.
微机系统中系统总线的()是指单位时间内总线上传送的数据量。A.主频 B.工作
A.申脉、丘墟、解溪 B.膝眼、梁丘、膝阳关 C.曲池、小海、天井 D.阳
我国继承法规定,继承人对于被继承人生前的合法债务:A.应当负责全额偿还 B.可
金融资产定价是当代金融理论的核心,金融资产定价的基础是()。A.资金的实效价值
通过撤销危险地区网点、关闭高风险业务等方式进行规避属于()策略。A.消除风险
在商品营销活动中,企业和单位对营销业绩突出的非雇员(营销人员)以培训班、研讨会、
关于建设项目投资及矿业工程项目投资特点的说法,正确的是( )。A.建设项目投资构
在人类生态学上,疾病发生的三大要素是A.患者、潜在性患者、健康者 B.感受性、
最新回复
(
0
)