Privacy and Security in the Age of Electronic Customer Relationship Management

Privacy and Security in the Age of Electronic Customer Relationship Management

Nicholas C. Romano Jr., Jerry Fjermestad
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch204
Cite Chapter Cite Chapter

MLA

Romano Jr., Nicholas C., and Jerry Fjermestad. "Privacy and Security in the Age of Electronic Customer Relationship Management." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 3045-3066. https://doi.org/10.4018/978-1-59904-937-3.ch204

APA

Romano Jr., N. C. & Fjermestad, J. (2008). Privacy and Security in the Age of Electronic Customer Relationship Management. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 3045-3066). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch204

Chicago

Romano Jr., Nicholas C., and Jerry Fjermestad. "Privacy and Security in the Age of Electronic Customer Relationship Management." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 3045-3066. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch204

Export Reference

Mendeley
Favorite

Abstract

This article presents a value exchange model of privacy and security for electronic customer relationship management within an electronic commerce environment. Enterprises and customers must carefully manage these new virtual relationships in order to ensure that they both derive value from them and minimize unintended consequences that result from the concomitant exchange of personal information that occurs in e-commerce. Based upon a customer’s requirements of privacy and an enterprise requirement to establish markets and sell goods and services, there is a value exchange relationship. The model is an integration of the customer sphere of privacy, sphere of security, and privacy/security sphere of implementation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.