Open Access   Article Go Back

Data Mining: Perception of Customers towards Privacy Invasion

D Kumar1 , Ankita 2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-03 , Page no. 87-91, Feb-2019

Online published on Feb 15, 2019

Copyright © D Kumar, Ankita . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D Kumar, Ankita, “Data Mining: Perception of Customers towards Privacy Invasion,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.87-91, 2019.

MLA Style Citation: D Kumar, Ankita "Data Mining: Perception of Customers towards Privacy Invasion." International Journal of Computer Sciences and Engineering 07.03 (2019): 87-91.

APA Style Citation: D Kumar, Ankita, (2019). Data Mining: Perception of Customers towards Privacy Invasion. International Journal of Computer Sciences and Engineering, 07(03), 87-91.

BibTex Style Citation:
@article{Kumar_2019,
author = {D Kumar, Ankita},
title = {Data Mining: Perception of Customers towards Privacy Invasion},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {03},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {87-91},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=684},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=684
TI - Data Mining: Perception of Customers towards Privacy Invasion
T2 - International Journal of Computer Sciences and Engineering
AU - D Kumar, Ankita
PY - 2019
DA - 2019/02/15
PB - IJCSE, Indore, INDIA
SP - 87-91
IS - 03
VL - 07
SN - 2347-2693
ER -

           

Abstract

Nowadays ample amount of data including personal data is being collected by government and private sector. This data in turn helps in running countries and their economy effectively and efficiently. In order to achieve this, private as well as government institutions collect clients or consumers data. To be more specific, in retail sector, we can say, the more data they gather, the better will be the results. But, the more personal data which is collected and analyzed, the more individuals are at risk of crimes. One must be aware of privacy invasions and its rules. As coin has two sides, same goes with data mining; it too has positive and negative aspects. Nowadays, technology is advancing and so more of the awareness is required from the customers’ side. In this paper I look at the perception of customers towards privacy invasion with reference to data mining and how Customer tracking technology work in offline Retail Stores.

Key-Words / Index Term

Data mining, retail, customer privacy, Personal Data, micro data, information

References

[1] V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata protection", Secure Data Management in Decentralized Systems, pp. 291-321, 2007.
[2] Culnan, Mary J. and Pamela K. Armstrong. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation." Organization Science 10 (1): 104-115.
[3] Eastlick, Mary Ann, Sherry L. Lotz, and Patricia Warrington. 2006. "Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment." Journal of Business Research 59 (8): 877-886.
[4] Foxman, Ellen R. and Paula Kilcoyne. (1993). "Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues." Journal of Public Policy & Marketing 12 (1): 106-119.
[5] Goodwin, Cathy. (1991). "Privacy: Recognition of a Consumer Right." Journal of Public Policy & Marketing 10 (1): 149-166.
[6] Milne, George R. and Andrew J. Rohm. 2000. "Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives." Journal of Public Policy & Marketing 19 (2): 238- 249.
[7] Nowak, Glen J. and Joseph Phelps. (1997). "Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When `Privacy` Matters." Journal of Direct Marketing 11 (4): 94-108.
[8] Phelps, Joseph E., Giles D`Souza, and Glen J. Nowak. 2001. "Antecedents and consequences of consumer privacy concerns: An empirical investigation." Journal of Interactive Marketing 15 (4): 2-17.
[9] Sheehan, Kim Bartel and Mariea Grubbs Hoy. (2000). "Dimensions of Privacy Concern Among Online Consumers." Journal of Public Policy & Marketing 19 (1): 62-73.
[10] WANG,P. (2010) Survey on Privacy Preserving Data Mining, International Journal of Digital Content Technology and its Applications Volume 4, Number 9, December
[11] Zwick, Detlev and Nikhilesh Dholakia. 2004. "Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing." Journal of Macromarketing 24 (1): 31-43.