Hostname: page-component-586b7cd67f-vdxz6 Total loading time: 0 Render date: 2024-11-27T18:38:46.508Z Has data issue: false hasContentIssue false

Marketing, Consumers and Technology: Perspectives for Enhancing Ethical Transactions

Published online by Cambridge University Press:  23 January 2015

Abstract:

The advance of technology has influenced marketing in a number of ways that have ethical implications. Growth in use of the Internet and e-commerce has placed electronic “cookies,” spyware, spam, RFIDs, and data mining at the forefront of the ethical debate. Some marketers have minimized the significance of these trends. This overview paper examines these issues and introduces the two articles that follow. It is hoped that these entries will further the important “marketing and technology” ethical debate.

Type
Special Forum Marketing and Technology
Copyright
Copyright © Society for Business Ethics 2006

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Appleby, J. 2004. “FDA Guidelines Call for Radio Technology to Control Counterfeit Drugs.” USA Today (November 16): 7B.Google Scholar
Berson, A., Smith, S., and Thurling, K.. 2000. Building Data Mining Applications for CRM (Columbus: McGraw Hill).Google Scholar
Borzo, J. 2004. “Something’s Phishy.” The Wall Street Journal (November 15): R8, R11.Google Scholar
Bowie, N., and Jamal, K.. 2006. “Privacy Rights on the Internet: Self Regulation or Government Regulation?” Business Ethics Quarterly 16:3 (July): 32342.CrossRefGoogle Scholar
Caudill, E. M., and Murphy, P. E.. 2000. “Consumer Online Privacy: Legal and Ethical Issues.” Journal of Public Policy & Marketing 19(1): 719.CrossRefGoogle Scholar
Chang, J. 2004. “Private Property.” Sale and Marketing Management (December): 2226.Google Scholar
Covert, J. 2004. “Down, but Far from Out.” The Wall Street Journal (January 12): R5, R8.Google Scholar
Davidson, P. 2003. “FTC Told to Enforce Do-Not-Call List.” USA Today (October 8): 1B.Google Scholar
Davidson, P. 2004. “Do-Not-Spam Registry Could Result in More Spam, FTC Says.” USA Today (June 16): B1.Google Scholar
De George, R. T. 1999. “Business Ethics and the Information Age.” Bentley College Center for Business Ethics/Bell Atlantic Lecture Series (March 22): 120.Google Scholar
Donaldson, T. 2001. “Ethics in Cyberspace: Have We Seen this Movie Before?” Business and Society Review 106(4): 273.CrossRefGoogle Scholar
Feder, B. J. 2003. “Wal-Mart Plan Could Cost Suppliers Millions.” The New York Times (November 10): 12, http://www.nytimes.com.Google Scholar
Friel, A. L. 2005. “The Spam Spat: How Will Marketers Be Affected by the Fight Against Spam?” Marketing Management (May/June): 4850.Google Scholar
Goldman, E. 2003. “Opinion: Hate Spam? Just Hit Delete.” http://www.TwinCities.com (August 11): 12.Google Scholar
Gordon, J. R. 2002. “Legal Services and the Digital Divide.” Albany Law Journal of Science and Technology 12: 80919.Google Scholar
Grabner-Kraeuter, S. 2002. “The Role of Consumers’ Trust in Online-Shopping.” Journal of Business Ethics 39(1/2): 4350.CrossRefGoogle Scholar
Hagerty, J. R., and Berman, D. K.. 2003. “New Battleground Over Web Privacy: Ads That Snoop.” The Wall Street Journal (August 27): A1, A8.Google Scholar
Hajewski, D. 2003. “High-Tech ID System Would Revolutionize Retail Industry.” Milwaukee Journal Sentinel (February 9): 1D, 3D.Google Scholar
Hays, C. L. 2004. “What They Know About You.” The New York Times (November 14): section 3.Google Scholar
Hemphill, T. A. 2002. “Electronic Commerce and Consumer Privacy: Establishing Online Trust in the U.S. Digital Economy.” Business and Society Review 107(2): 22139.CrossRefGoogle Scholar
Jamal, K., Maier, M., and Sunder, S.. 2003. “Privacy in E-Commerce: Development of Reporting Standards, Disclosure and Assurance Services in an Unregulated Market.” Journal of Accounting Research 41(2): 285310.CrossRefGoogle Scholar
Kelly, E. P., and Rowland, H. C.. 2000. “Ethical and Online Privacy Issues in Electronic Commerce.” Business Horizons (May–June): 312.CrossRefGoogle Scholar
Kesmodel, D. 2005. “When the Cookies Crumble.” The Wall Street Journal (September 12): R6.Google Scholar
Koehn, D. 2003. “The Nature of and Conditions for Online Trust.” Journal of Business Ethics 43(1/2): 319.CrossRefGoogle Scholar
Kracher, B., and Corritore, C. L.. 2004. “Is There a Special E-Commerce Ethics?” Business Ethics Quarterly 14(1): 7194.CrossRefGoogle Scholar
Lager, M. 2005. “CRM in an Age of Legislation,” Customer Relationship Management (August): 3035.Google Scholar
Lans-Retsky, M. 2004. “COPPA Sets Tone for Privacy Policies.” Marketing News (March 15): 8.Google Scholar
Linn, A. 2004. “Bugged By Spies: Imports Clog Computers.” USA Today (November 1): 4D.Google Scholar
Loveman, G. 2003. “Diamonds in the Data Mine.” Harvard Business Review (May): 10913.Google Scholar
Loyle, D. 2003. “Privacy Under Scrutiny.” Catalog Success (June 1); www.catalogsuccess.com, 17.Google Scholar
Mangalindan, M. 2003. “Putting a Lid on Spam.” The Wall Street Journal (June 6): B1, B4.Google Scholar
Marshall, K. P. 1999. “Has Technology Introduced New Ethical Problems?” Journal of Business Ethics 19(1): 8190.CrossRefGoogle Scholar
McWilliams, G. 2004. “Analyzing Customers, Best Buy Decides Not All Are Welcome.” The Wall Street Journal (November 8): A1, A8.Google Scholar
Milne, G., and Rohm, A. J.. 2000. “Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives.” Journal of Public Policy & Marketing 19(2): 23849.CrossRefGoogle Scholar
Murphy, P. E., Laczniak, G. R., Bowie, N. E., and Klein, T. A.. 2005. Ethical Marketing (Upper Saddle River, N.J.: Pearson Prentice Hall), 205.Google Scholar
Ody, Penelope. 2004. “RFID Not Ready yet for Baked Beans.” Financial Times (June 23): 3.Google Scholar
Peace, G., Weber, J., Hartzel, K. S., and Nightingale, J.. 2002. “Ethical Issues in eBusiness: A Proposal for Creating the eBusiness Principles.” Business Society Review 107(1): 4160.CrossRefGoogle Scholar
Peslak, A. R. 2005. “An Ethical Exploration of Privacy and Radio Frequency Identification.” Journal of Business Ethics 59: 32745.CrossRefGoogle Scholar
Richtel, M. 2004. “In Texas, 28,000 Students Test an Electronic Eye.” The New York Times (November 17): 13, www.nytimes.com.Google Scholar
Scheibal, W. J., and Gladstone, J. A.. 2000. “Privacy on the Net: Europe Changes the Rules.” Business Horizons (May–June): 1318.CrossRefGoogle Scholar
Spinello, R. 2006. “Online Brands and Trademark Conflicts: A Hegelian Perspective.” Business Ethics Quarterly 16:3 (July): 34367.CrossRefGoogle Scholar
Swartz, J. 2004. “Is the Future of E-Mail Under Cyberattack?” USA Today (June 15): 4B.Google Scholar
Tedeschi, B. 2000. “E-Commerce Report: Giving Consumers Access to the Data Collected About Them Online.” The New York Times (July 3): C6.Google Scholar