Professional Documents
Culture Documents
MKT101
MKT101
MKT101- MKT1618
I. Introduction……………………………………………………………………. 3
1. Technological environment……………………………………………………… 3
3. Analyse the issue of customer privacy invasion in the era of digital marketing… 5
III. Recommendation……………………………………………………………….. 7
2. Suggest solutions to build trusting relationship with customers in the digital era.. 8
IV. Conclusion……………………………………………………………………… 9
2
I. Introduction
According to the Cambridge Dictionary: "The digital age is the present time, when most
information is in digital form". Nowadays, we are in the era of the industrial revolution 4.0 - the most
brilliant development so far in the digital age. Many activities have been gradually changing the
traditional marketing environment, including the development of a new type of environment, the
technology environment. This document was written to delve deeper into the technology environment,
key trends in the technology environment, and how to build trusting relationships with customers in the
digital age.
1. Technological environment
and technology in the country and related aspects such as rate of technological progress, institutional
Technological environment changes very fast, affects the way the resources of the economy are
The technological environment is perhaps the most dramatic force now shaping our destiny. New
technologies can offer exciting opportunities for marketers. For examples, For examples, chatbots
allow marketers to respond to basic customer questions more quickly, helping to increase customer
satisfaction.
However, new technology products also make customers feel more worried about the safety of their
personal information, directly affecting the process of building trust relationships with customers. in
Nowadays, technology is evolving at a rapid pace, enabling change and faster progress. During the
outbreak of the Covid19 pandemic, the importance of technology and technology trends has been
demonstrated even more clearly. Early adopters of new technology often gain a higher profit and
3
capture a higher market share. When researching, I have synthesized 4 main trends of the technology
environment: Artificial intelligence (AI) and machine learning; Robotic Process Automation (RPA);
machines, especially computer systems. In recent years, we have seen more of the presence of AI, but
it continues to be one of the new technology trends because of its remarkable impact on the way we
live, work, and live. Work and entertainment are just in the early stages.
Weak AI, also known as narrow AI, is an AI system that is designed and trained to complete a
specific task. Industrial robots, self-driving car, virtual personal assistants, such as Apple's Siri,
Strong AI, also known as artificial general intelligence (AGI), describes programming that can
replicate the cognitive abilities of the human brain. When presented with an unfamiliar task, a
strong AI system can use fuzzy logic to apply knowledge from one domain to another and find
a solution autonomously. In theory, a strong AI program should be able to pass both a Turing
Like AI and Machine Learning, Robotic Process Automation, or RPA, is another technology that is
automating jobs. RPA is the use of software to automate business processes such as interpreting
applications, processing transactions, dealing with data, and even replying to emails. RPA automates
Many CIOs are turning to this approach to streamline business operations and reduce costs. With
RPA, businesses can automate business processes based on common sense rules, allowing business
4
The Internet of Things is an emerging topic of technical, social, and economic significance.
Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and
other everyday objects are being combined with Internet connectivity and powerful data analytic
capabilities that promise to transform the way we work, live, and play. Projections for the impact of
IoT on the Internet and economy are impressive, with some anticipating as many as 100 billion
connected IoT devices and a global economic impact of more than $11 trillion by 2025.
At the same time, however, the Internet of Things raises significant challenges that could stand in
the way of realizing its potential benefits. Attention-grabbing headlines about the hacking of Internet-
connected devices, surveillance concerns, and privacy fears already have captured public attention.
Technical challenges remain and new policy, legal and development challenges are emerging.
3. Analyse the issue of customer privacy invasion in the era of digital marketing
The term privacy is usually described as “the right to be let alone,” and is related to solitude, secrecy,
and autonomy. However, when associated with consumer activities that take place in the arena of the
electronic marketplace, privacy usually refers to personal information and the invasion of privacy is
usually interpreted as the unauthorized collection, disclosure, or other use of personal information as a
direct result of electronic commerce transactions. When it comes to the invasion of personal information
privacy, the types of personal information that are involved can be classified into two major categories
On the one hand, personal information that is not expected to change dramatically over time can be
referred to as static private information, such as referential information, historical financial information,
Other private information includes information that changes dramatically over time, but nevertheless
can be collected and analyzed in such a way that a well-informed individual profile may be generated.
This information is referred to as dynamic personal information, such as activity history and content.
5
b. How customer privacy has been invaded
By being sophisticated with technology knowledge, customer privacy has been invaded in various ways:
Improper Collection: To collect a consumer’s private information from the Internet without
notice to or acknowledgment from the consumer. Such private information includes a consumer’s
email address, types of software the consumer uses, the consumer’s Web access history, private
files or databases, etc. Usually, improper collection will lead to improper analysis and improper
transfer.
without notice to or acknowledgment from the consumer. By using cookies, Internet marketing
businesses are able to watch where and when the consumer visits Web sites, how long the
Improper Analysis: To analyze a consumer’s private information without proper notice, and to
derive conclusions from such an analysis. Such conclusions may include a consumer’s shopping
notice to or acknowledgment from the consumer. For instance, various Internet companies sell,
acknowledgment or permission. Such privacy invasions include junk mail, mass direct email, and
trustworthiness of the stored information, or lack of authentication control for information access.
For instance, enabling individual account holders to view private information concerning other
6
accounts. Improper storage is commonly related to the concerns of information confidentiality and
data integrity.
The ability to conduct law enforcement against the violators of individual privacy is very limited. Even
though many countries have enacted similar privacy protection legislation, the enforcement of such local
legislation is difficult without the aid of international treaties and collaboration since the Internet has no
national boundaries. This difficulty is reflected by the inability of some nations in trying to impose
Today’s privacy enhancing technologies are not only primitive in nature, but also lacking the
integrated environment under which most of the Internet consumers’ privacy concerns can be dealt with.
Such technologies are often cumbersome to use, unfriendly and require a degree of knowledge exceeding
Non-negotiability: The current implementation of notice and choice is usually based on terms dictated
by the service provider, and users have to accept these terms in full to use the service. The other option,
III. Recommendation
An important issue of privacy in the Internet market is that the privacy of individuals must be balanced
against the interests associated with the free flow of information. Protecting privacy must be done in
conjunction with a number of other efforts. There are three main stakeholders, each playing different
roles: Government, Businesses, Individuals. To effectively collect customer information while ensuring
Focusing on The Platform for Privacy Preference (P3). It will enable Internet consumers to be
informed and to make choices about the collection, use and disclosure of their private information
on the Web. Under P3 each Internet merchant will profile and register his or her own privacy
practice. In the event that an Internet consumer's privacy preferences do not match an Internet
seller's privacy practice record, the Internet consumer will be notified of the discrepancy.
7
Building a trust platform for customers. Today there are a number of trusted identity
verification services between customers and marketers such as TRUSTe, VeriSign. Customers
will not have to worry about problems such as improper information collection, improper
monitoring. Their information will actually be used for the intended purpose.
Using Encryption. At present, the most successful and widely used technology that has had a
significant impact on the privacy concerns of Internet consumers has been cryptography.
Confidentiality of communication between the two communicating parties is dealing with, as any
observing third party can not view the contents of a message. Furthermore, encryption can also be
utilized for the purpose of protecting one's own data, since undesirable parties cannot collect
2. Suggest solutions to build trusting relationship with customers in the digital era
The digital age opens new opportunities, but at the same time comes with new challenges. How to
attract customers, give customers the best experience but still protect their safety and privacy? Building
trust with customers is the answer to that. Here are my recommendations for businesses to build trust with
Set policies to protect customers' privacy and let them know about it. This will make them
feel safe.
Encourage public customer reviews, including negative ones. Addressing negative feedback
openly will make customers feel more respected and trusted in your platform.
Clear design and content. A well-rounded image platform, no font errors, suitable colors, and
clear information is also the first step to make customers feel more sympathetic and trusting.
Regular content updates for your platform. When the website is always updated and refreshed,
the content will help your experience become more seamless and increase interaction with
customers.
The promptness and timeliness. Marketers can use Chatbots to answer basic customer questions.
Fast response rate will save time, increase sympathy, build trust with customers
8
IV. Conclusion
Technological advancements have ushered in the glorious era of the digital age, and with it the
expansion of the technological environment. In this research, I have come up with 3 main trends of the
technology environment. There are Artificial intelligence (AI) and machine learning, Robotic Process
Automation (RPA), Internet of Things (IoT). Each trend has its color, but they all have in common that it
brings convenience, superiority, and solves many human problems with higher performance. However, the
positive always comes with the negative, and so do these top 3 technologies.
The rapid development of the digital age also gives rise to many new problems, including invasion of
privacy, here I refer to the audience. For self-interest purposes, customers' information has been
compromised in many ways such as Improper Collection, Improper Monitoring, Improper Analysis,
Improper Access, Improper Transfer, Unwanted Solicitation, and Improper Storage. With so many
sophisticated forms, customers have encountered many obstacles in preventing such intrusion. Not to
mention: The ability to conduct law enforcement against the violators of individual privacy is very
limited; Today's privacy enhancement technologies are not only primitive, but also lack the integrated
environment; Non-negotiability: The current implementation of notice and choice is usually based on
terms dictated by the service provider, and users have to accept these terms in full to use the service.
The difficult problem for businesses is how to collect customer information without infringing on their
privacy. In this study, I cover the following methods: Focusing on The Platform for Privacy Preference
(P3), Building a trusted platform for customers, Using Encryption. In addition, building trust with
customers is necessary for businesses, a decisive factor for their development, because when there is no
9
References
10