Part I Understanding Customer Data Privacy Fundamentals |
|
|
1 Customer Data Privacy: Why Every Marketer Should Care |
|
|
3 | (18) |
|
|
3 | (2) |
|
|
5 | (2) |
|
|
7 | (7) |
|
The Privacy Paradox Is No Excuse |
|
|
8 | (1) |
|
It Is on Companies to Do More |
|
|
9 | (5) |
|
Realm of Privacy and Data Collection |
|
|
14 | (2) |
|
|
15 | (1) |
|
|
16 | (2) |
|
|
18 | (3) |
|
2 The Psychology of Consumer Privacy |
|
|
21 | (22) |
|
|
21 | (2) |
|
Background: The Psychology of Privacy |
|
|
23 | (3) |
|
A Rational Model of Consumer Privacy Psychology |
|
|
26 | (5) |
|
|
27 | (2) |
|
Consumer Privacy Concerns |
|
|
29 | (1) |
|
Consumer Privacy Outcomes |
|
|
29 | (1) |
|
The Important Role of Trust |
|
|
30 | (1) |
|
Beyond the Rational Model: A Better Way for Marketers to Think About Consumer Privacy |
|
|
31 | (5) |
|
Consumer Data Vulnerability |
|
|
32 | (2) |
|
|
34 | (1) |
|
Data Vulnerability Suppressors |
|
|
35 | (1) |
|
|
36 | (7) |
|
3 The Changing Privacy Legal Landscape |
|
|
43 | (30) |
|
Introduction: The "Right" to Privacy |
|
|
43 | (1) |
|
The Patchwork of U.S. Privacy Protection |
|
|
44 | (2) |
|
Wiretapping and (No) Constitutional Right to Privacy |
|
|
45 | (1) |
|
Reasonable Expectation of Privacy |
|
|
45 | (1) |
|
|
46 | (9) |
|
Fair Information Practices |
|
|
46 | (1) |
|
The Fair Credit Reporting Act |
|
|
47 | (2) |
|
Gramm-Leach-Bliley Act (GLBA) |
|
|
49 | (1) |
|
Medical Privacy Law for Marketers |
|
|
49 | (2) |
|
Commercial Communications and Privacy |
|
|
51 | (3) |
|
Children's Personal Data and Marketing |
|
|
54 | (1) |
|
Litigation, Regulatory, and Financial Risks of Data Breaches |
|
|
55 | (3) |
|
State-by-State Legal Variations |
|
|
55 | (1) |
|
Regulatory Fines and Financial Risk |
|
|
56 | (1) |
|
|
57 | (1) |
|
The Privacy Regulator: Federal Trade Commission |
|
|
58 | (4) |
|
Mechanics of an FTC Enforcement Action |
|
|
58 | (1) |
|
What Marketers Can Learn from FTC Consent Orders |
|
|
59 | (3) |
|
European Data Protection Law |
|
|
62 | (4) |
|
Legal Basis for Processing Personal Data |
|
|
63 | (1) |
|
Lessons to Learn for the GDPR |
|
|
64 | (2) |
|
|
66 | (7) |
Part II Defensive Strategies: Protecting from Threats |
|
|
4 Big Data's Marketing Applications and Customer Privacy |
|
|
73 | (20) |
|
|
73 | (2) |
|
Advances in Marketing Applications |
|
|
75 | (4) |
|
Understanding the Marketing Environment |
|
|
75 | (1) |
|
|
76 | (1) |
|
Big Data's Role in Value Creation, Communication, and Delivery |
|
|
77 | (2) |
|
Big Data's Inherent Tensions |
|
|
79 | (7) |
|
|
79 | (2) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
84 | (2) |
|
Potential and Peril of Artificial Intelligence in Marketing |
|
|
86 | (3) |
|
|
86 | (2) |
|
Customer Vulnerability Escalation |
|
|
88 | (1) |
|
|
89 | (4) |
|
5 Inoculating Against Customer Vulnerability |
|
|
93 | (16) |
|
|
93 | (1) |
|
|
94 | (2) |
|
|
95 | (1) |
|
|
95 | (1) |
|
In Praise of Data Minimization |
|
|
96 | (2) |
|
From a Data-Driven Culture to a Customer-Learning Culture |
|
|
98 | (3) |
|
Empowering Customers with Transparency and Control |
|
|
101 | (4) |
|
Breaking Down Transparency and Control |
|
|
101 | (1) |
|
Customer Empowerment Outcomes |
|
|
102 | (3) |
|
Keeping the Customer Relationship Focal: Advice to Managers |
|
|
105 | (1) |
|
|
106 | (3) |
|
6 Privacy Failures and Recovery Strategies |
|
|
109 | (24) |
|
|
109 | (2) |
|
Data Breach as a Marketing Crisis |
|
|
111 | (3) |
|
Recovery Effectiveness: What Customers Want |
|
|
114 | (2) |
|
Customer Vulnerability and Firm Benevolence |
|
|
114 | (1) |
|
Customer Behavior Effects |
|
|
115 | (1) |
|
Learning from Bearers of Bad News |
|
|
116 | (4) |
|
|
116 | (2) |
|
How Bad Is It? Sources of Severity |
|
|
118 | (2) |
|
Customer-Focused Data Breach Recovery Strategies |
|
|
120 | (6) |
|
Recovery Strategy Delivery |
|
|
121 | (2) |
|
Recovery Strategy Content |
|
|
123 | (2) |
|
Keeping the Customer Focal: One More Reminder |
|
|
125 | (1) |
|
|
126 | (7) |
Part III Offensive Strategies: Competing with Privacy |
|
|
7 Understanding and Valuing Customer Data |
|
|
133 | (20) |
|
|
133 | (2) |
|
Firm Perspectives on Data Value |
|
|
135 | (4) |
|
|
135 | (3) |
|
|
138 | (1) |
|
Customer Perspectives on Data Value |
|
|
139 | (2) |
|
Sources of Customer Value |
|
|
139 | (1) |
|
Role of Loyalty Programs from Customers' Perspective |
|
|
140 | (1) |
|
Putting a Price Tag on Customer Data |
|
|
141 | (5) |
|
Customer Data Value Framework |
|
|
141 | (2) |
|
Analyzing Customer Valuations of Data |
|
|
143 | (3) |
|
Strategies for Sharing Data Value with Customers |
|
|
146 | (3) |
|
|
149 | (4) |
|
8 Data Privacy Marketing Audits, Benchmarking, and Metrics |
|
|
153 | (16) |
|
|
153 | (1) |
|
Data Privacy Marketing Audit |
|
|
154 | (9) |
|
Benchmarking Privacy Marketing Practices |
|
|
155 | (1) |
|
|
156 | (1) |
|
Regulatory and Legal Perspectives |
|
|
157 | (1) |
|
|
158 | (3) |
|
Data Privacy Marketing with SWOT Analysis |
|
|
161 | (1) |
|
Data Privacy Marketing: Objectives, Strategies, and Action Plans |
|
|
162 | (1) |
|
|
163 | (4) |
|
Privacy Policy Violations |
|
|
164 | (1) |
|
|
164 | (1) |
|
Financial Impact of Data Incidents |
|
|
164 | (1) |
|
Customer Data Vulnerability |
|
|
165 | (1) |
|
|
165 | (1) |
|
Customer Willingness to Share Data |
|
|
165 | (1) |
|
Customer Privacy Related Complaints |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
Time to Initiate Response |
|
|
166 | (1) |
|
Percentage of Staff Receiving Privacy Training |
|
|
167 | (1) |
|
|
167 | (2) |
|
9 Effective Privacy Marketing Strategies |
|
|
169 | (14) |
|
|
169 | (1) |
|
Six Tenets for Effective Privacy Marketing |
|
|
170 | (9) |
|
Tenet #1: Avoid Customer Data Vulnerability |
|
|
170 | (2) |
|
Tenet #2: Balance Big Data and Privacy |
|
|
172 | (1) |
|
Tenet #3: Share Data Value |
|
|
173 | (2) |
|
Tenet #4: Preempt Privacy Regulations |
|
|
175 | (1) |
|
Tenet #5: Recover from Data Breaches |
|
|
176 | (2) |
|
Tenet #6: Audit for Knowledge |
|
|
178 | (1) |
|
The Future of Data Privacy Marketing |
|
|
179 | (2) |
|
|
181 | (2) |
Company Index |
|
183 | (4) |
Subject Index |
|
187 | |