Online Privacy

advertisement
Building Trust in an Online Environment
Angela D’Auria Stanton, Ph.D.
Building Trust is Critical

Marketers can build mutually valuable
relationships with customers through a
trust-based collaboration process.
–
The Trust Pyramid provides a framework for building trust.
–
You must establish Credibility to earn trust
–
The Value Exchange Process provides a framework for
building deeper relationships once trust has been
established.
According to
www.consumerinternetbarometer.us

The percentage of Americans going online at
least monthly has edged up to 67% today,
compared to 64% at the end of 2005.

While usage continues to increase, trust
levels have not (only 27% of Americans fully
trust the sites they visit). Bottom Line: The
majority of consumers still don't fully trust
that their personal information is secure.
What’s Important to Consumers?
1.
Company’s products and services
2.
Company’s treatment of customers
(77% USA – 74% EU)
(77% USA – 63% EU)
3.
Honesty and ethics
(62% USA – 48% EU)
4.
Security provided to customers
(33% USA – 39% EU)
5.
Employee treatment
(28% USA – 29% EU)
6.
Environmental concerns
(11% USA – 25% EU)
7.
Social responsibility
(11% USA – 17% EU)
Source: http://www.clickz.com/showPage.html?page=3623088
The Key is Trust!

On the marketer side:
–

Marketers must give consumers compelling reasons to share
the private information that drives many of the unique
features of the Internet
On the consumer side:
–
There are many fears that translate into consumer risks
 time risk
 vendor risk
 security risk
 brand risk
 privacy risk
Most Trusted Companies
eBay
American Express
Procter & Gamble (all brands)
Amazon
Hewlett Packard
U.S. Postal Service
IBM
Earthlink
Citibank
Dell
Source: Ponemon Institute and TRUSTe
Factors most influencing consumer trust with a company
Business
Respondents
Consumer
Respondents
Positive customer service experience
43%
26%
Length of relationship with company
27%
29%
Company or product reputation
23%
33%
Brand familiarity
6%
3%
Privacy policies
1%
9%
Source: Accenture
What Damages Trust?
Business
Respondents
Consumer
Respondents
Online security fears
74%
49%
Overly aggressive marketing,
Especially telemarketing
67%
76%
Company reputation has been
damaged by a past incident
60%
44%
Generally suspicious of corporations
52%
28%
An incident at a similar company
has damaged industry's reputation
52%
19%
Disapprove of the company's
business practices
43%
37%
Source: Accenture
Concerns about Misuse of
Personal Information
Identity theft
76%
Unwanted e-mail activity (spam)
58%
Loss of civil liberties
48%
Unwanted junk mail
37%
Telemarketing Abuse
36%
Stolen assets
32%
Public embarrassment
22%
Stalking or spying activities
21%
Source: Ponemon Institute and TRUSTe
Internet Fraud Safety Quiz
Trust
Differentiators
Basic
Building
Blocks
Trust
Differentiators
Consumer
Collaboration
Tone and Customer
Ambience Control
Fulfillment
Basic
Building
Blocks
State of the
Art Security
Merchant
Legitimacy
State of the Art Security
Security:
The 800 lb gorilla of reputation

53% of U.S. consumers say a company has lost or
compromised personal, financial or medical data

60% have experienced computer security breaches,
intrusion, hacking or other disruptions (e.g. viruses
and spyware) at home

43% have stopped a transaction when they began to
question security
Source: http://www.clickz.com/showPage.html?page=3623088
Trust
Differentiators
Basic
Building
Blocks
State of the
Art Security
Merchant
Legitimacy
Merchant Legitimacy


Encourage prospects to sample your
services through low-risk trials and
creative offers.
Sell branded products or ally your
product or service with an established
brand
More examples of allying your
product with an established brand.
Even well known brands
can benefit from this type of
alliance or relationship.
Trust
Differentiators
Fulfillment
Basic
Building
Blocks
State of the
Art Security
Merchant
Legitimacy
Fulfillment

Problems:
–

frozen computers, lack of clarity about costs, lengthy
registration processes, fighting to complete a transaction, etc.
Solutions:
–
–
Explain all costs, have an infrastructure that gets the right
product to the right buyer in a reasonable period, and KISS.
90% of Internet users expect companies to respond to
questions submitted via websites within 24 hours and nearly
60% say they want a response in less than 8 hours.
Tips for lowering shopping cart
abandonment rates



Remove most shopping navigation when a visitor
enters “the cart” so they are not distracted from
making a final purchase.
Leave customer service phone numbers, email, and
IM abilities prominently on check out pages.
Instead of saying “buy now” on a product page
button, say “add to cart.”
–
Buying is a bigger, harder decision than adding to cart.
Start with the easy decision and build the sale from there.
Trust
Differentiators
Tone and
Ambience
Fulfillment
Basic
Building
Blocks
State of the
Art Security
Merchant
Legitimacy
Tone and Ambience
A recent study by the Persuasive Technology Lab of Stanford
asked 1,500 active users of the web to rank items on a
continuum.

The credibility of a web site greatly increased with the following
factors:
–
–
–
–
–
–

The site has proven useful to you before (2.0)
The site provides a quick response to your customer service questions (1.8)
The site has a clear connection to the world (1.7 - 1.5) and lists the
organization's physical address, a contact phone number and an email
address.
The site has been updated since your last visit (1.7)
The site looks professionally designed (1.5)
Extra features such as search capabilities and multilingual support (1.2 .98)
The credibility of a web site decreased with the following factors:
–
–
–
–
–
The site makes it hard to distinguish ads from content (-1.9)
The site is rarely updated with new content. (-1.7)
The site automatically pops up new windows with ads. (-1.6)
The site is difficult to navigate. (-1.4)
Technical problems such as broken links and typographical errors (-1.4)
http://www.webcredibility.org/guidelines/index.html
Trust
Differentiators
Tone and Customer
Ambience Control
Fulfillment
Basic
Building
Blocks
State of the
Art Security
Merchant
Legitimacy
Customer Control
Trust
Differentiators
Consumer
Collaboration
Tone and Customer
Ambience Control
Fulfillment
Basic
Building
Blocks
State of the
Art Security
Merchant
Legitimacy
Consumer Collaboration
The Value Exchange Process Stage 4:
Stage 3:
Stage 2:
User-Driven
Stage 1:
Trust-Based
Marketer-Driven Collaboration
Personalization
Personalization
CONSUMER GETS
CONSUMER GIVES
Attraction
•Time and
•Performance
attention
information
•Browsing and
transaction
information
•Reactions
•Sensitive
and feedback preference
information
•“One size fits
all”
experiences
•Tailored offers •Consultative
and
problem
recommend- solving and
ations
custom
experiences
•Personalized
experiences
Customer Respect Index (CRI)

The CRI based on:
–
Site Usability – How usable is the site to a wide range of
users? This includes ease of use and accessibility
–
Communication – How willing is the company to engage in
1-on-1 communication to answer specific questions?
–
Trust – Can this site be trusted with your personal data?
This includes transparency (clarity and comprehensiveness
of privacy policies), Principles (respect for data privacy,
cookie explanations) and Privacy (respect for data privacy,
clarity and comprehensiveness of privacy policies)
Source: The Customer Respect Group, September 2006
CRI 2006 Findings – Fortune 100

Highest CRI Index: Intel, Sears Roebuck, HP, Medco
and Proctor & Gamble

Fewer companies sharing personal data w/outside
organizations

More than ½ continue to send unsolicited marketing
e-mails to those who supply personal information for
other reasons

54% clearly explain their marketing opt-out or opt-in
policies (52% do so for data sharing)
What is Privacy?

“The right to be left alone.” (Samuel Warren and Louis Brandeis, 1890)

Privacy is the interest that individuals have in
sustaining a 'personal space', free from interference
by other people and organizations (Roger Clarke, 1999)

The rights and responsibilities that govern the
acquisition, disclosure and use of personal
information (Off ice of Governmentwide Policy, General Services Administration,
1997)
Privacy Has Several Dimensions

Privacy of the person

Privacy of personal behavior

Privacy of personal communication

Privacy of personal data
Information Privacy
The Current State of Online Privacy

Only 23% of companies had privacy policies that were
considered “good” for allowing users to destroy their own
information stored on corporate databases

Only 42% score “good” for their policies towards sharing of
collected personal data

72% scored “poor” for their policies towards re-using personal
data for marketing purposes

64% of companies now have privacy polices that scored “good”
on clarity and are written for the customer
Source: The Customer Respect Group Privacy Report
Top 10 Companies Rated for Privacy
1.
2.
3.
4.
5.
Intel
Expedia
E-Loan
Verizon Wireless
Estee Lauder (The
Estee Lauder
Companies Inc.)
6.
7.
8.
9.
10.
Marriott International, Inc.
Con-Way Transportation
Services, Inc.
International Business
Machines Corporation
Medco Health Solutions
Orbitz
Developing a Privacy Policy:
Questions to be Addressed
1.
What personal information do you collect from individuals? How do
you collect it? Do you have different policies for online and offline
data collection?
2.
Why is the information collected and how is it used? Do you merge
online and offline data?
3.
Do you use cookies? For what purpose?
4.
If you collect identifiable information online, can a visitor choose not
to allow your use or transfer to a third-party to use in e-mail or postal
mailings? How can a consumer exercise this choice? What choices
do individuals have with regard to data collected offline?
Developing a Privacy Policy:
Questions to be Addressed
5.
Do you enhance data collected by you with third party data? If so,
how and why?
6.
With whom do you share data? Do you provide marketing for
business partners to your customers? Do you allow third parties to
collect personal information from your web site?
7.
If you change your information policy, how will you let individuals
know?
8.
Do you allow individuals to access the information you have
gathered about them and correct errors?
Developing a Privacy Policy:
Questions to be Addressed
9.
How do you secure personal information from unauthorized access?
10.
How can individuals seek redress if you are perceived to have
violated your own privacy policy?
11.
What are the right messages for your customers? How do you tie
your data collection and use practices to the provision of real value
for your customers?
12.
What laws or industry codes of conduct regulate your data collection
use and practices?
http://www.the-dma.org/privacy/privacypolicygenerator.shtml
Download