Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In about 1000 words, Which privacy-invasive business practices, powered by data and enabled by information technology, weaken or strengthen customers' willingness to engage in transactions

In about 1000 words, Which privacy-invasive business practices, powered by data and enabled by information technology, weaken or strengthen customers' willingness to engage in transactions with a company? Chose two companies from the instructor-approved list of client companies in Table 1. Study their information privacy policies posted at their websites, and compare them in terms of their commitment to protect information privacy, security, and dignity of individuals. Identify a practice or process, see Table 2 for examples, used by one client company, the one that you think is less committed to protecting individuals' privacy, security and dignity. Identify different stakeholders, see Table 3 for examples, of this practice or process, and identify the stake of each stakeholder in this practice or process. Choose at least five scholarly articles from the instructor provided list of articles that you think are most relevant to support, oppose or modify this practice or process. Based on your knowledge from this course and from the scholarly articles, present arguments to support or oppose the business practice or process. If you oppose the practice, make a recommendation to make changes in the practice or process to protect individuals' privacy, security and dignity. Criteria for evaluating and analyzing a data-enabled business practice should include the following questions related to control, informed consent, unauthorized secondary use of data and customers' willingness to engage in transactions with a company. Control refers to one's ability to limit collection and use of data and information about oneself by others. Does this practice weaken or strengthen one's control on collection and use of data about oneself? Informed consentdoes the practice depend on collection and use of data about a person based on that person's informed consent? Unauthorized secondary use refers to the use of data about an individual for purposes other than what an individual authorized. Does this practice or process depend on unauthorized secondary use of data about individuals? Does this practice weaken or strengthen customers' willingness to engage in transactions with this company?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

PrivacyInvasive Business Practices and Their Impact on Customer Willingness to Engage In the digital age the collection use and management of customer data have become crucial for businesses seeking t... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Strategic management concepts

Authors: Fred david

13th Edition

9780136120988, 136120997, 136120989, 978-0136120995

More Books

Students also viewed these General Management questions

Question

Do you think hostile takeovers are unethical? Why or why not?

Answered: 1 week ago