SlideShare a Scribd company logo
Anju Amatya<br />ACSG 575<br />Paper: Frequent Buyer Program<br />This is an information age where everybody relies on information. Everybody wants information about people - be it for business purpose, for keeping record or any other purpose. The businesses are modernizing with the world and thus with their business techniques and tactics. With the development of technology it is easy to keep record of individual. To take an example – you just provide your phone number to a phone company, it provides you all your call history and all the problems and solution related with that phone number. This arise a very important issue called “privacy”. Privacy issues are important because they affect all individual. <br />Let us take an example and be specific. In departmental stores, Safeway is a grocery store chain which uses a program called club card in which if a customer agrees to become the member of the store and provide their personal information, they provide them some sort of card like club card, loyalty card, membership card which can be used for discount while buying goods from them. To get the card each customers have to fill out the form which includes name, address, telephone number or billing information and in return they provide card with bar code in which all their information are stored. So each time whenever they buy anything if they have card they show it to attendant who scan it along with the thing one has purchased. It records everything date, time, quantity and record in the database which they can use it evaluates the customer what is his/her interest is what she frequently buys. We even don’t need any ID to become member of any club we can just give our telephone number (or someone else number).<br />Whenever we scan our membership card/club card assuming that we would get some kind of discount not knowing that instead we are providing them our personal information and allowing them to record in their database about what we bought. However in reality, the fact is different. We don’t get any discount; they raise the price of the product than their actual price. Customers who don’t have membership card have to pay much more than its actual price. Main target of the store is to profile and target their customers more accurately rather than giving some savings. <br />Most people think that companies keep their data private and it is only to benefit the customer.  This is not true, as of today there are no laws stating what a company may or may not do with this information, after all, you voluntarily signed for the card and presented it to the cashier upon checkout. In fact, there has actually been a case where the information collected on a particular customer has been used against him in court. Like for example firefighter, Philip Scott Lyons was arrested and charged with attempted arson. Police alleged that Lyons tried to set fire to his own house while his wife and children were inside and the evidence used against his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type that was used in the arson attempt.<br />Private information could be sold illegally and there is potential risk for identity theft. Identity theft is one of the risks that may arise through implementation of this technology. Identity thief may pay a store employee for information about us that appears on an application for goods or services. With our information they may apply for credit card, they can misuse our information and take benefit from us. Main issue raised in this article is how safe it is to be member of such frequent buyer program. How they use our information for our benefit as well as for their own benefit? How they use our purchase record to flourish their business and how they can use that record against us. Privacy issues arise because databases contain lots of information about an individual. Our privacy will not be ours as everybody will knows many things about us. Technology that is being used are like computer, software for examining customer data and provide them deals according to their purchase, database to store all the information, card with bar code, scanner or card reader. Internet is being used for online shopping and use card to take advantage of deals. Before use of technology the cash register can record amount of purchases and didn’t record about who bought what. It was not easy to track the purchase of each customer but now since every transaction is recorded in database due to which it is easy to trace customers. Companies can now directly market to greater amounts of people and build customer loyalty and relationship. <br />Similar program to frequent buyer program is electronic toll road technology. The objective of an electronic road toll system is to reduce traffic congestion, increase convenience and safety. The vehicles do not have to slow down or stop to pay the tolls, so it increases the overall efficiency. But while looking for our convenience we don’t see that every movement is being recorded which results in loss of privacy. The electronic road toll system creates large personal information database that could be useful to the government and the private industry. Vehicle tracking information could become important in many court cases, such as criminal investigations, work compensation and personal disputes. The government can have access to private information such as date and time and the route vehicle took. <br />So, the impact of data collection could be far more disturbing. Like using cards, they can track purchase histories, segment customers into groups based on how much and how often they purchase. Such information will help stores target profitable customers and supply their needs. This information’s about our shopping habits can be accessed with a subpoena or warrant and used against us in court proceedings. Companies that collect information from places like supermarkets can sell the information to insurance company, Credit Card Company. They can match up our shopping history with database from other databases or public records like how much we paid for our house, what we purchase and can use it to decide about our insurance etc. There are the possibilities that hacker and cracker can break into database creating threat to our privacy.<br />Even though Safeway insists that the data they collect is kept private, but there are no laws that state Safeway cannot sell this information to marketers/companies or even use it against you. Our personal information can be easily compromised and appropriated by others for illicit use. So to avoid becoming a victim, we must be careful in protecting our identity, and care should be taken when providing our name and address to, as well as other information relating to us.<br />References<br />http://www.dbmarketing.com/articles/Art144.htm<br />http://couponing.about.com/od/groceryzone/a/disccards.htm <br />http://couponing.about.com/od/groceryzone/a/loyaltyprograms.htm <br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm <br />http://couponing.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=couponing&cdn=money&tm=6168&f=10&su=p284.9.336.ip_&tt=2&bt=1&bts=0&zu=http://www.consumeraffairs.com/news04/2005/loyalty_cards2.html <br />http://www.consumeraffairs.com/news04/2005/loyalty_cards.hhtm <br />http://www.safeway.com/IFL/Grocery/Privacy-Policy <br />http://www.walgreens.com/topic/help/generalhelp/privacyandsecurity.jsp <br />http://www.schneier.com/blog/archives/2005/02/security_risks.html <br />http://archive.seattlepressonline.com/article-9715.html<br />http://www.nocards.org/savings/regular_price_study.shtml<br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm<br />http://www.nocards.org/overview/index.shtml<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26301<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26340<br />http://bhc3.wordpress.com/2009/02/23/data-privacy-data-ownership-and-who-you-trust/<br />http://www.seattlepi.com/local/70072_loyal11.asp<br />http://www.accessmylibrary.com/article-1G1-19018304/supermarket-loyalty-cards-can.html<br />
Frequent buyer program
Frequent buyer program

More Related Content

What's hot

How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
Digital EYE Media
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
- Mark - Fullbright
 
E cigarettes Merchant Account
E cigarettes Merchant AccountE cigarettes Merchant Account
E cigarettes Merchant Account
HighRisk Gateways
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
Aleeza Haya
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Donald E. Hester
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
shreemala1
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
Id Theft
Id TheftId Theft
Id Theft
mojo_5
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
Dr. S. Bulomine Regi
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
Nitin kumar Gupta
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
Jeetendra Khilnani
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Christopher Uriarte
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Lisa Sosebee
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
Mrwilson6
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
Rastislav Turek
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment models
Niharika Gupta
 
Paypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your AccountPaypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your Account
Rea A.
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
tommy2tone44
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
alessio d
 

What's hot (20)

How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
E cigarettes Merchant Account
E cigarettes Merchant AccountE cigarettes Merchant Account
E cigarettes Merchant Account
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Id Theft
Id TheftId Theft
Id Theft
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment models
 
Paypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your AccountPaypal Tutorial: How to Open and Set- Up Your Account
Paypal Tutorial: How to Open and Set- Up Your Account
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 

Viewers also liked

fasli
faslifasli
fasli
Hani Muner
 
William chitwood resume
William chitwood resumeWilliam chitwood resume
William chitwood resume
wnc52
 
Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016Ernesto Flores [LION]
 
Kpi závěrečný úkol
Kpi  závěrečný úkolKpi  závěrečný úkol
Kpi závěrečný úkol
PeDominika
 
Basic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtlBasic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtl
Seeds
 
fasli
faslifasli
fasli
Hani Muner
 
Microexpression Recognition Training - Master
Microexpression Recognition Training - MasterMicroexpression Recognition Training - Master
Microexpression Recognition Training - Master
Ernesto Flores [LION]
 
Greek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed CompaniesGreek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed Companies
Seeds
 
Qs(ici&itd)
Qs(ici&itd)Qs(ici&itd)
Qs(ici&itd)
Sysy Jnthn
 
Attract audience
Attract audienceAttract audience
Attract audience
bethanygoldfinch
 
Microexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - ProficientMicroexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - Proficient
Ernesto Flores [LION]
 
Navdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small FarmersNavdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small Farmers
Seeds
 
Examen PAU Economia 4
Examen PAU Economia 4Examen PAU Economia 4
Examen PAU Economia 4
Laura Ceballos Leva
 
Evaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growthEvaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growth
Alexander Decker
 
What is dbt
What is dbtWhat is dbt
What is dbt
Abhishek Goyal
 
SEED- Arnab
SEED- ArnabSEED- Arnab
SEED- Arnab
arnab das
 

Viewers also liked (17)

Etiqueta001
Etiqueta001Etiqueta001
Etiqueta001
 
fasli
faslifasli
fasli
 
William chitwood resume
William chitwood resumeWilliam chitwood resume
William chitwood resume
 
Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016Deteccion de Mentiras y Evaluacion de la Verdad 2016
Deteccion de Mentiras y Evaluacion de la Verdad 2016
 
Kpi závěrečný úkol
Kpi  závěrečný úkolKpi  závěrečný úkol
Kpi závěrečný úkol
 
Basic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtlBasic Seedsaving for Beginners ~ herbskoolmtl
Basic Seedsaving for Beginners ~ herbskoolmtl
 
fasli
faslifasli
fasli
 
Microexpression Recognition Training - Master
Microexpression Recognition Training - MasterMicroexpression Recognition Training - Master
Microexpression Recognition Training - Master
 
Greek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed CompaniesGreek Farmers Sue the Seed Companies
Greek Farmers Sue the Seed Companies
 
Qs(ici&itd)
Qs(ici&itd)Qs(ici&itd)
Qs(ici&itd)
 
Attract audience
Attract audienceAttract audience
Attract audience
 
Microexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - ProficientMicroexpression Recognition Training (Elite) - Proficient
Microexpression Recognition Training (Elite) - Proficient
 
Navdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small FarmersNavdanya: Two Decades of Service to the Earth & Small Farmers
Navdanya: Two Decades of Service to the Earth & Small Farmers
 
Examen PAU Economia 4
Examen PAU Economia 4Examen PAU Economia 4
Examen PAU Economia 4
 
Evaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growthEvaluation of seed rates and sowing methods on growth
Evaluation of seed rates and sowing methods on growth
 
What is dbt
What is dbtWhat is dbt
What is dbt
 
SEED- Arnab
SEED- ArnabSEED- Arnab
SEED- Arnab
 

Similar to Frequent buyer program

Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
nahinworld
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Vesta Corporation
 
Latest business trends in e commerce market
Latest business trends in e commerce marketLatest business trends in e commerce market
Latest business trends in e commerce market
university of education,Lahore
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
Technology makes us a marketing tool
Technology makes us a marketing toolTechnology makes us a marketing tool
Technology makes us a marketing tool
randomacca
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer data
SHARATH P G
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott moore
Scott Moore
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docx
DIPESH30
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 
The Times 3 December 2015
The Times 3 December 2015The Times 3 December 2015
The Times 3 December 2015
Kurt Rowe
 
Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1
Lawrence Norman
 
E commerce
E commerceE commerce
E commerce
Parvez Alam
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
Dan Brookman
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
 
The lecturer
The lecturerThe lecturer
The lecturer
ndifuna
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise Hunt
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
Gigya
 
E commerce
E commerceE commerce
E commerce
Noor Mohammad Khan
 
E-ceipts Business Plan
E-ceipts Business PlanE-ceipts Business Plan
E-ceipts Business Plan
Alex Scott
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
Abhijeet Kelkar
 

Similar to Frequent buyer program (20)

Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
Latest business trends in e commerce market
Latest business trends in e commerce marketLatest business trends in e commerce market
Latest business trends in e commerce market
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Technology makes us a marketing tool
Technology makes us a marketing toolTechnology makes us a marketing tool
Technology makes us a marketing tool
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer data
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott moore
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docx
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
The Times 3 December 2015
The Times 3 December 2015The Times 3 December 2015
The Times 3 December 2015
 
Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1Publicis_Pitch for BT_v1
Publicis_Pitch for BT_v1
 
E commerce
E commerceE commerce
E commerce
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
The lecturer
The lecturerThe lecturer
The lecturer
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
E commerce
E commerceE commerce
E commerce
 
E-ceipts Business Plan
E-ceipts Business PlanE-ceipts Business Plan
E-ceipts Business Plan
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 

More from aamatya

Ethics
EthicsEthics
Ethics
aamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
aamatya
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
aamatya
 
Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1
aamatya
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
aamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
aamatya
 
Google's censoship in china
Google's censoship in chinaGoogle's censoship in china
Google's censoship in china
aamatya
 

More from aamatya (7)

Ethics
EthicsEthics
Ethics
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1Sxu carpool spec sheet ver1
Sxu carpool spec sheet ver1
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Google's censoship in china
Google's censoship in chinaGoogle's censoship in china
Google's censoship in china
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Frequent buyer program

  • 1. Anju Amatya<br />ACSG 575<br />Paper: Frequent Buyer Program<br />This is an information age where everybody relies on information. Everybody wants information about people - be it for business purpose, for keeping record or any other purpose. The businesses are modernizing with the world and thus with their business techniques and tactics. With the development of technology it is easy to keep record of individual. To take an example – you just provide your phone number to a phone company, it provides you all your call history and all the problems and solution related with that phone number. This arise a very important issue called “privacy”. Privacy issues are important because they affect all individual. <br />Let us take an example and be specific. In departmental stores, Safeway is a grocery store chain which uses a program called club card in which if a customer agrees to become the member of the store and provide their personal information, they provide them some sort of card like club card, loyalty card, membership card which can be used for discount while buying goods from them. To get the card each customers have to fill out the form which includes name, address, telephone number or billing information and in return they provide card with bar code in which all their information are stored. So each time whenever they buy anything if they have card they show it to attendant who scan it along with the thing one has purchased. It records everything date, time, quantity and record in the database which they can use it evaluates the customer what is his/her interest is what she frequently buys. We even don’t need any ID to become member of any club we can just give our telephone number (or someone else number).<br />Whenever we scan our membership card/club card assuming that we would get some kind of discount not knowing that instead we are providing them our personal information and allowing them to record in their database about what we bought. However in reality, the fact is different. We don’t get any discount; they raise the price of the product than their actual price. Customers who don’t have membership card have to pay much more than its actual price. Main target of the store is to profile and target their customers more accurately rather than giving some savings. <br />Most people think that companies keep their data private and it is only to benefit the customer.  This is not true, as of today there are no laws stating what a company may or may not do with this information, after all, you voluntarily signed for the card and presented it to the cashier upon checkout. In fact, there has actually been a case where the information collected on a particular customer has been used against him in court. Like for example firefighter, Philip Scott Lyons was arrested and charged with attempted arson. Police alleged that Lyons tried to set fire to his own house while his wife and children were inside and the evidence used against his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type that was used in the arson attempt.<br />Private information could be sold illegally and there is potential risk for identity theft. Identity theft is one of the risks that may arise through implementation of this technology. Identity thief may pay a store employee for information about us that appears on an application for goods or services. With our information they may apply for credit card, they can misuse our information and take benefit from us. Main issue raised in this article is how safe it is to be member of such frequent buyer program. How they use our information for our benefit as well as for their own benefit? How they use our purchase record to flourish their business and how they can use that record against us. Privacy issues arise because databases contain lots of information about an individual. Our privacy will not be ours as everybody will knows many things about us. Technology that is being used are like computer, software for examining customer data and provide them deals according to their purchase, database to store all the information, card with bar code, scanner or card reader. Internet is being used for online shopping and use card to take advantage of deals. Before use of technology the cash register can record amount of purchases and didn’t record about who bought what. It was not easy to track the purchase of each customer but now since every transaction is recorded in database due to which it is easy to trace customers. Companies can now directly market to greater amounts of people and build customer loyalty and relationship. <br />Similar program to frequent buyer program is electronic toll road technology. The objective of an electronic road toll system is to reduce traffic congestion, increase convenience and safety. The vehicles do not have to slow down or stop to pay the tolls, so it increases the overall efficiency. But while looking for our convenience we don’t see that every movement is being recorded which results in loss of privacy. The electronic road toll system creates large personal information database that could be useful to the government and the private industry. Vehicle tracking information could become important in many court cases, such as criminal investigations, work compensation and personal disputes. The government can have access to private information such as date and time and the route vehicle took. <br />So, the impact of data collection could be far more disturbing. Like using cards, they can track purchase histories, segment customers into groups based on how much and how often they purchase. Such information will help stores target profitable customers and supply their needs. This information’s about our shopping habits can be accessed with a subpoena or warrant and used against us in court proceedings. Companies that collect information from places like supermarkets can sell the information to insurance company, Credit Card Company. They can match up our shopping history with database from other databases or public records like how much we paid for our house, what we purchase and can use it to decide about our insurance etc. There are the possibilities that hacker and cracker can break into database creating threat to our privacy.<br />Even though Safeway insists that the data they collect is kept private, but there are no laws that state Safeway cannot sell this information to marketers/companies or even use it against you. Our personal information can be easily compromised and appropriated by others for illicit use. So to avoid becoming a victim, we must be careful in protecting our identity, and care should be taken when providing our name and address to, as well as other information relating to us.<br />References<br />http://www.dbmarketing.com/articles/Art144.htm<br />http://couponing.about.com/od/groceryzone/a/disccards.htm <br />http://couponing.about.com/od/groceryzone/a/loyaltyprograms.htm <br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm <br />http://couponing.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=couponing&cdn=money&tm=6168&f=10&su=p284.9.336.ip_&tt=2&bt=1&bts=0&zu=http://www.consumeraffairs.com/news04/2005/loyalty_cards2.html <br />http://www.consumeraffairs.com/news04/2005/loyalty_cards.hhtm <br />http://www.safeway.com/IFL/Grocery/Privacy-Policy <br />http://www.walgreens.com/topic/help/generalhelp/privacyandsecurity.jsp <br />http://www.schneier.com/blog/archives/2005/02/security_risks.html <br />http://archive.seattlepressonline.com/article-9715.html<br />http://www.nocards.org/savings/regular_price_study.shtml<br />http://www.businessweek.com/bwdaily/dnflash/jun2002/nf20020620_7007.htm<br />http://www.nocards.org/overview/index.shtml<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26301<br />http://www.wnd.com/news/article.asp?ARTICLE_ID=26340<br />http://bhc3.wordpress.com/2009/02/23/data-privacy-data-ownership-and-who-you-trust/<br />http://www.seattlepi.com/local/70072_loyal11.asp<br />http://www.accessmylibrary.com/article-1G1-19018304/supermarket-loyalty-cards-can.html<br />