|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBSCO_ocn857080642 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
130729s2013 gw a ob 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCO
|d N$T
|d OCLCF
|d YDXCP
|d EBLCP
|d OCLCQ
|d AGLDB
|d MERUC
|d OCLCQ
|d OCLCA
|d OCLCQ
|d JBG
|d STF
|d UKAHL
|d OCLCQ
|d VT2
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 854977220
|a 1294692571
|
020 |
|
|
|a 9783954895618
|q (electronic bk.)
|
020 |
|
|
|a 3954895617
|q (electronic bk.)
|
020 |
|
|
|z 9783954890613
|
020 |
|
|
|a 3954890615
|
020 |
|
|
|a 9783954890613
|
029 |
1 |
|
|a DEBBG
|b BV042970122
|
029 |
1 |
|
|a DEBSZ
|b 423716190
|
029 |
1 |
|
|a GBVCP
|b 799410918
|
029 |
1 |
|
|a AU@
|b 000070392112
|
029 |
1 |
|
|a AU@
|b 000055217542
|
035 |
|
|
|a (OCoLC)857080642
|z (OCoLC)854977220
|z (OCoLC)1294692571
|
050 |
|
4 |
|a JC596
|b .Z54 2013eb
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 055000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 059000
|2 bisacsh
|
082 |
0 |
4 |
|a 650
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ziesak, Jörg.
|
245 |
1 |
4 |
|a The dark side of personalization :
|b online privacy concerns influence customer behavior /
|c Jörg Ziesak.
|
260 |
|
|
|a Hamburg :
|b Anchor Academic Pub.,
|c 2013.
|
300 |
|
|
|a 1 online resource (ix, 52 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Compact
|
500 |
|
|
|a "Disseminate knowledge"--Cover.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a The Dark Side of Personalization; TABLE OF CONTENTS; List of Figures; List of Abbreviations; 1 Introduction; 2 Literature Background; 2.1 Personalization vs. Customization; 2.2 Personalization in an Online Marketing Environment; 3 Conceptual Framework and Hypotheses; 3.1 Privacy Concerns and CFIP; 3.2 Control of Personal Data and CFIP; 3.3 Data Gathering Method -- Overt and Covert Approach; 3.4 Use of Data -- Authorized Primary Use or Unauthorized Secondary Use; 3.5 Willingness to Transact; 3.6 Customers' Value of Online Personalization; 3.7 Risk Beliefs of Online Personalization.
|
505 |
8 |
|
|a 3.8 Perceived Usefulness of Online Personalization3.9 Moderating Role of Trust Beliefs between Use of Data and CFIP; 4 Research Design and Results; 4.1 Data Collection Process; 4.2 Sample Description; 4.3 Questionnaire Design; 4.4 Measures; 4.5 Scale Validity and Reliability; 4.6 Data Analysis and Results; 4.7 Model Evaluation; 4.8 Main Effects and Path Coefficients; 4.9 Indirect Effects; 4.10 Moderation Analysis; 5 Discussion and Conclusion; 5.1 Theoretical Implications; 5.2 Managerial Implications; 5.3 Limitations and Future Research; Appendices; Appendix A: Antecedents of CFIP.
|
505 |
8 |
|
|a Appendix B: Consequences of CFIPAppendix C: Manipulations; Appendix D: Measurement Constructs; Appendix E: Further conceptual models tested; References.
|
520 |
|
|
|a Hauptbeschreibung 'Online Privacy Fears Stoked By Google, Twitter, Facebook Data Collection Arms Race'', ''Your E-Book Is Reading You'', '' 'Instant personalization' brings more privacy issues to Facebook''. These are only a few recent examples of media headlines that deal with the issue of online privacy and personalization. Scholars and managers have repeatedly stated the benefits of personalization which is targeting products and services to individual customers, and constitutes a key element of an interactive marketing strategy. In order to accurately estimate the needs and.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Privacy, Right of.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Consumer protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Consumer Advocacy
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Consommateurs
|x Protection.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Skills.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Consumer protection
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Privacy, Right of
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Ziesak, Jörg.
|t Dark Side of Personalization: Online Privacy Concerns influence Customer Behavior.
|d Hamburg : Diplomica Verlag, ©2013
|
830 |
|
0 |
|a Compact.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=773023
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0023602739
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1324048
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10735035
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 773023
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10883306
|
994 |
|
|
|a 92
|b IZTAP
|