SlideShare a Scribd company logo
1 of 3
Anju Amatya<br />ACSG 575<br />Paper: Frequent Buyer Program<br />This is an information age where everybody relies on information. Everybody wants information about people - be it for business purpose, for keeping record or any other purpose. The businesses are modernizing with the world and thus with their business techniques and tactics. With the development of technology it is easy to keep record of individual. To take an example – you just provide your phone number to a phone company, it provides you all your call history and all the problems and solution related with that phone number. This arise a very important issue called “privacy”. Privacy issues are important because they affect all individual. <br />Let us take an example and be specific. In departmental stores, Safeway is a grocery store chain which uses a program called club card in which if a customer agrees to become the member of the store and provide their personal information, they provide them some sort of card like club card, loyalty card, membership card which can be used for discount while buying goods from them. To get the card each customers have to fill out the form which includes name, address, telephone number or billing information and in return they provide card with bar code in which all their information are stored. So each time whenever they buy anything if they have card they show it to attendant who scan it along with the thing one has purchased. It records everything date, time, quantity and record in the database which they can use it evaluates the customer what is his/her interest is what she frequently buys. We even don’t need any ID to become member of any club we can just give our telephone number (or someone else number).<br />Whenever we scan our membership card/club card assuming that we would get some kind of discount not knowing that instead we are providing them our personal information and allowing them to record in their database about what we bought. However in reality, the fact is different. We don’t get any discount; they raise the price of the product than their actual price. Customers who don’t have membership card have to pay much more than its actual price. Main target of the store is to profile and target their customers more accurately rather than giving some savings. <br />Most people think that companies keep their data private and it is only to benefit the customer.  This is not true, as of today there are no laws stating what a company may or may not do with this information, after all, you voluntarily signed for the card and presented it to the cashier upon checkout. In fact, there has actually been a case where the information collected on a particular customer has been used against him in court. Like for example firefighter, Philip Scott Lyons was arrested and charged with attempted arson. Police alleged that Lyons tried to set fire to his own house while his wife and children were inside and the evidence used against his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type that was used in the arson attempt.<br />Private information could be sold illegally and there is potential risk for identity theft. Identity theft is one of the risks that may arise through implementation of this technology. Identity thief may pay a store employee for information about us that appears on an application for goods or services. With our information they may apply for credit card, they can misuse our information and take benefit from us. Main issue raised in this article is how safe it is to be member of such frequent buyer program. How they use our information for our benefit as well as for their own benefit? How they use our purchase record to flourish their business and how they can use that record against us. Privacy issues arise because databases contain lots of information about an individual. Our privacy will not be ours as everybody will knows many things about us. Technology that is being used are like computer, software for examining customer data and provide them deals according to their purchase, database to store all the information, card with bar code, scanner or card reader. Internet is being used for online shopping and use card to take advantage of deals. Before use of technology the cash register can record amount of purchases and didn’t record about who bought what. It was not easy to track the purchase of each customer but now since every transaction is recorded in database due to which it is easy to trace customers. Companies can now directly market to greater amounts of people and build customer loyalty and relationship. <br />Similar program to frequent buyer program is electronic toll road technology. The objective of an electronic road toll system is to reduce traffic congestion, increase convenience and safety. The vehicles do not have to slow down or stop to pay the tolls, so it increases the overall efficiency. But while looking for our convenience we don’t see that every movement is being recorded which results in loss of privacy. The electronic road toll system creates large personal information database that could be useful to the government and the private industry. Vehicle tracking information could become important in many court cases, such as criminal investigations, work compensation and personal disputes. The government can have access to private information such as date and time and the route vehicle took. <br />So, the impact of data collection could be far more disturbing. Like using cards, they can track purchase histories, segment customers into groups based on how much and how often they purchase. Such information will help stores target profitable customers and supply their needs. This information’s about our shopping habits can be accessed with a subpoena or warrant and used against us in court proceedings. Companies that collect information from places like supermarkets can sell the information to insurance company, Credit Card Company. They can match up our shopping history with database from other databases or public records like how much we paid for our house, what we purchase and can use it to decide about our insurance etc. There are the possibilities that hacker and cracker can break into database creating threat to our privacy.<br />Even though Safeway insists that the data they collect is kept private, but there are no laws that state Safeway cannot sell this information to marketers/companies or even use it against you. Our personal information can be easily compromised and appropriated by others for illicit use. So to avoid becoming a victim, we must be careful in protecting our identity, and care should be taken when providing our name and address to, as well as other information relating to us.<br />References<br />http://www.dbmarketing.com/articles/Art144.htm<br />http://couponing.about.com/od/groceryzone/a/disccards.htm <br />http://couponing.about.com/od/groceryzone/a/loyaltyprograms.htm <br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm <br />http://couponing.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=couponing&cdn=money&tm=6168&f=10&su=p284.9.336.ip_&tt=2&bt=1&bts=0&zu=http://www.consumeraffairs.com/news04/2005/loyalty_cards2.html <br />http://www.consumeraffairs.com/news04/2005/loyalty_cards.hhtm <br />http://www.safeway.com/IFL/Grocery/Privacy-Policy <br />http://www.walgreens.com/topic/help/generalhelp/privacyandsecurity.jsp <br />http://www.schneier.com/blog/archives/2005/02/security_risks.html <br />http://archive.seattlepressonline.com/article-9715.html<br />http://www.nocards.org/savings/regular_price_study.shtml<br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm<br />http://www.nocards.org/overview/index.shtml<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26301<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26340<br />http://bhc3.wordpress.com/2009/02/23/data-privacy-data-ownership-and-who-you-trust/<br />http://www.seattlepi.com/local/70072_loyal11.asp<br />http://www.accessmylibrary.com/article-1G1-19018304/supermarket-loyalty-cards-can.html<br />
Frequent buyer program
Frequent buyer program

More Related Content

What's hot

How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
E cigarettes Merchant Account
E cigarettes Merchant AccountE cigarettes Merchant Account
E cigarettes Merchant AccountHighRisk Gateways
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerceAleeza Haya
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraudshreemala1
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a SolutionChristopher Uriarte
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment modelsNiharika Gupta
 
Paypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your AccountPaypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your AccountRea A.
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 

What's hot (20)

How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
E cigarettes Merchant Account
E cigarettes Merchant AccountE cigarettes Merchant Account
E cigarettes Merchant Account
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Id Theft
Id TheftId Theft
Id Theft
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment models
 
Paypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your AccountPaypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your Account
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 

Viewers also liked

William chitwood resume
William chitwood resumeWilliam chitwood resume
William chitwood resumewnc52
 
Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016Ernesto Flores [LION]
 
Kpi závěrečný úkol
Kpi  závěrečný úkolKpi  závěrečný úkol
Kpi závěrečný úkolPeDominika
 
Basic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtlBasic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtlSeeds
 
Microexpression Recognition Training - Master
Microexpression Recognition Training - MasterMicroexpression Recognition Training - Master
Microexpression Recognition Training - MasterErnesto Flores [LION]
 
Greek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed CompaniesGreek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed CompaniesSeeds
 
Microexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - ProficientMicroexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - ProficientErnesto Flores [LION]
 
Navdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small FarmersNavdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small FarmersSeeds
 
Evaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growthEvaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growthAlexander Decker
 

Viewers also liked (17)

Etiqueta001
Etiqueta001Etiqueta001
Etiqueta001
 
fasli
faslifasli
fasli
 
William chitwood resume
William chitwood resumeWilliam chitwood resume
William chitwood resume
 
Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016
 
Kpi závěrečný úkol
Kpi  závěrečný úkolKpi  závěrečný úkol
Kpi závěrečný úkol
 
Basic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtlBasic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtl
 
fasli
faslifasli
fasli
 
Microexpression Recognition Training - Master
Microexpression Recognition Training - MasterMicroexpression Recognition Training - Master
Microexpression Recognition Training - Master
 
Greek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed CompaniesGreek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed Companies
 
Qs(ici&itd)
Qs(ici&itd)Qs(ici&itd)
Qs(ici&itd)
 
Attract audience
Attract audienceAttract audience
Attract audience
 
Microexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - ProficientMicroexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - Proficient
 
Navdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small FarmersNavdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small Farmers
 
Examen PAU Economia 4
Examen PAU Economia 4Examen PAU Economia 4
Examen PAU Economia 4
 
Evaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growthEvaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growth
 
What is dbt
What is dbtWhat is dbt
What is dbt
 
SEED- Arnab
SEED- ArnabSEED- Arnab
SEED- Arnab
 

Similar to Frequent buyer program

Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber securitynahinworld
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Vesta Corporation
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Technology makes us a marketing tool
Technology makes us a marketing toolTechnology makes us a marketing tool
Technology makes us a marketing toolrandomacca
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer dataSHARATH P G
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott mooreScott Moore
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxDIPESH30
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
The Times 3 December 2015
The Times 3 December 2015The Times 3 December 2015
The Times 3 December 2015Kurt Rowe
 
Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Lawrence Norman
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolutionDan Brookman
 
The lecturer
The lecturerThe lecturer
The lecturerndifuna
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityGigya
 
E-ceipts Business Plan
E-ceipts Business PlanE-ceipts Business Plan
E-ceipts Business PlanAlex Scott
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
 

Similar to Frequent buyer program (20)

Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
Latest business trends in e commerce market
Latest business trends in e commerce marketLatest business trends in e commerce market
Latest business trends in e commerce market
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Technology makes us a marketing tool
Technology makes us a marketing toolTechnology makes us a marketing tool
Technology makes us a marketing tool
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer data
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott moore
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docx
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
The Times 3 December 2015
The Times 3 December 2015The Times 3 December 2015
The Times 3 December 2015
 
Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1
 
E commerce
E commerceE commerce
E commerce
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
The lecturer
The lecturerThe lecturer
The lecturer
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
E commerce
E commerceE commerce
E commerce
 
E-ceipts Business Plan
E-ceipts Business PlanE-ceipts Business Plan
E-ceipts Business Plan
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 

More from aamatya

Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertyaamatya
 
Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1aamatya
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftwareaamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Google's censoship in china
Google's censoship in chinaGoogle's censoship in china
Google's censoship in chinaaamatya
 

More from aamatya (7)

Ethics
EthicsEthics
Ethics
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Google's censoship in china
Google's censoship in chinaGoogle's censoship in china
Google's censoship in china
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Frequent buyer program

  • 1. Anju Amatya<br />ACSG 575<br />Paper: Frequent Buyer Program<br />This is an information age where everybody relies on information. Everybody wants information about people - be it for business purpose, for keeping record or any other purpose. The businesses are modernizing with the world and thus with their business techniques and tactics. With the development of technology it is easy to keep record of individual. To take an example – you just provide your phone number to a phone company, it provides you all your call history and all the problems and solution related with that phone number. This arise a very important issue called “privacy”. Privacy issues are important because they affect all individual. <br />Let us take an example and be specific. In departmental stores, Safeway is a grocery store chain which uses a program called club card in which if a customer agrees to become the member of the store and provide their personal information, they provide them some sort of card like club card, loyalty card, membership card which can be used for discount while buying goods from them. To get the card each customers have to fill out the form which includes name, address, telephone number or billing information and in return they provide card with bar code in which all their information are stored. So each time whenever they buy anything if they have card they show it to attendant who scan it along with the thing one has purchased. It records everything date, time, quantity and record in the database which they can use it evaluates the customer what is his/her interest is what she frequently buys. We even don’t need any ID to become member of any club we can just give our telephone number (or someone else number).<br />Whenever we scan our membership card/club card assuming that we would get some kind of discount not knowing that instead we are providing them our personal information and allowing them to record in their database about what we bought. However in reality, the fact is different. We don’t get any discount; they raise the price of the product than their actual price. Customers who don’t have membership card have to pay much more than its actual price. Main target of the store is to profile and target their customers more accurately rather than giving some savings. <br />Most people think that companies keep their data private and it is only to benefit the customer.  This is not true, as of today there are no laws stating what a company may or may not do with this information, after all, you voluntarily signed for the card and presented it to the cashier upon checkout. In fact, there has actually been a case where the information collected on a particular customer has been used against him in court. Like for example firefighter, Philip Scott Lyons was arrested and charged with attempted arson. Police alleged that Lyons tried to set fire to his own house while his wife and children were inside and the evidence used against his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type that was used in the arson attempt.<br />Private information could be sold illegally and there is potential risk for identity theft. Identity theft is one of the risks that may arise through implementation of this technology. Identity thief may pay a store employee for information about us that appears on an application for goods or services. With our information they may apply for credit card, they can misuse our information and take benefit from us. Main issue raised in this article is how safe it is to be member of such frequent buyer program. How they use our information for our benefit as well as for their own benefit? How they use our purchase record to flourish their business and how they can use that record against us. Privacy issues arise because databases contain lots of information about an individual. Our privacy will not be ours as everybody will knows many things about us. Technology that is being used are like computer, software for examining customer data and provide them deals according to their purchase, database to store all the information, card with bar code, scanner or card reader. Internet is being used for online shopping and use card to take advantage of deals. Before use of technology the cash register can record amount of purchases and didn’t record about who bought what. It was not easy to track the purchase of each customer but now since every transaction is recorded in database due to which it is easy to trace customers. Companies can now directly market to greater amounts of people and build customer loyalty and relationship. <br />Similar program to frequent buyer program is electronic toll road technology. The objective of an electronic road toll system is to reduce traffic congestion, increase convenience and safety. The vehicles do not have to slow down or stop to pay the tolls, so it increases the overall efficiency. But while looking for our convenience we don’t see that every movement is being recorded which results in loss of privacy. The electronic road toll system creates large personal information database that could be useful to the government and the private industry. Vehicle tracking information could become important in many court cases, such as criminal investigations, work compensation and personal disputes. The government can have access to private information such as date and time and the route vehicle took. <br />So, the impact of data collection could be far more disturbing. Like using cards, they can track purchase histories, segment customers into groups based on how much and how often they purchase. Such information will help stores target profitable customers and supply their needs. This information’s about our shopping habits can be accessed with a subpoena or warrant and used against us in court proceedings. Companies that collect information from places like supermarkets can sell the information to insurance company, Credit Card Company. They can match up our shopping history with database from other databases or public records like how much we paid for our house, what we purchase and can use it to decide about our insurance etc. There are the possibilities that hacker and cracker can break into database creating threat to our privacy.<br />Even though Safeway insists that the data they collect is kept private, but there are no laws that state Safeway cannot sell this information to marketers/companies or even use it against you. Our personal information can be easily compromised and appropriated by others for illicit use. So to avoid becoming a victim, we must be careful in protecting our identity, and care should be taken when providing our name and address to, as well as other information relating to us.<br />References<br />http://www.dbmarketing.com/articles/Art144.htm<br />http://couponing.about.com/od/groceryzone/a/disccards.htm <br />http://couponing.about.com/od/groceryzone/a/loyaltyprograms.htm <br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm <br />http://couponing.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=couponing&cdn=money&tm=6168&f=10&su=p284.9.336.ip_&tt=2&bt=1&bts=0&zu=http://www.consumeraffairs.com/news04/2005/loyalty_cards2.html <br />http://www.consumeraffairs.com/news04/2005/loyalty_cards.hhtm <br />http://www.safeway.com/IFL/Grocery/Privacy-Policy <br />http://www.walgreens.com/topic/help/generalhelp/privacyandsecurity.jsp <br />http://www.schneier.com/blog/archives/2005/02/security_risks.html <br />http://archive.seattlepressonline.com/article-9715.html<br />http://www.nocards.org/savings/regular_price_study.shtml<br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm<br />http://www.nocards.org/overview/index.shtml<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26301<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26340<br />http://bhc3.wordpress.com/2009/02/23/data-privacy-data-ownership-and-who-you-trust/<br />http://www.seattlepi.com/local/70072_loyal11.asp<br />http://www.accessmylibrary.com/article-1G1-19018304/supermarket-loyalty-cards-can.html<br />