Skip to main content

Inoculating Against Customer Vulnerability

  • Chapter
  • First Online:
The Intelligent Marketer’s Guide to Data Privacy

Abstract

This chapter offers defensive strategies to protect customers from vulnerability and thereby guard the firm against financial harm and customer defection. We compile best practices from academic studies, business advice, expert insights, and our own extensive research with companies and customers. Rather than dealing with the technical details of cybersecurity, which is the purview of IT experts, we instead study and review inoculation strategies that can protect the firm by establishing sound data privacy “marketing” practices that are designed essentially to benefit customers. Companies can create powerful shields to guard against the harms of privacy failures simply by keeping customers’ best interests as the core of everything they do. We acknowledge that there are many sophisticated approaches for keeping data safe, but our goal is to consider the ways data are collected and managed by the company’s marketing team, because today’s marketers must take responsibility to consider how they gather and use data in the context of establishing and offering customer value. We also continue to emphasize the value of transparency and control, as well as creating a company culture that explicitly prioritizes minimizing customer harm. Such companies can realize important benefits to their own bottom lines and create an effective defense against the myriad harms of data breaches and other possible privacy failures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 44.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ponemon Institute. (2017). Cost of Data Breach Study: Global Overview. Ponemon Institute and IBM Security Research Report.

    Google Scholar 

  2. Identity Theft Resource Center. (2018). Annual Data Breach, Year-End Review. Available at www.idtheftcenter.org. Accessed July 14, 2018.

  3. See, for example, Zaretsky, R. (2015, June 2). There Are Three Certainties in Life: Death, Taxes, and Data Breaches. Tax Policy Center of the Urban Institute and the Brookings Institute. Available at https://www.taxpolicycenter.org/taxvox/there-are-three-certainties-life-death-taxes-and-data-breaches. Accessed July 14, 2018.

  4. Borah, A., & Tellis, G. (2016, April). Halo (Spillover) Effects in Social Media: Do Product Recalls of One Brand Hurt or Help Rival Brands? Journal of Marketing Research, 53, 143–160.

    Article  Google Scholar 

  5. Cleeren, K., van Heerde, H. J., & Dekimpe, M. G. (2013, March). Rising from the Ashes: How Brands and Categories Can Overcome Product-Harm Crises. Journal of Marketing, 77, 58–77.

    Article  Google Scholar 

  6. Roehm, M. L., & Tybout, A. M. (2006, August). When Will a Brand Scandal Spill Over, and How Should Competitors Respond? Journal of Marketing Research, 43, 366–373.

    Article  Google Scholar 

  7. Millar, B. (2018, April 19). Big Data Is a Sham. Fast Company. Available at https://www.fastcompany.com/90168426/big-data-is-a-sham. Accessed July 11, 2018.

  8. Pfitzmann, A., & Hansen, M. (2010). A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. University of Dresden Working Paper.

    Google Scholar 

  9. GDPR. Article 5. Principles Relating to Processing of Personal Data. Available at https://gdpr-info.eu/art-5-gdpr/. Accessed July 11, 2018.

  10. See, for example, Burn, A. C., Veeck, A., & Bush, R. F. (2017). Marketing Research (8th ed.). Boston: Pearson.

    Google Scholar 

  11. Stephens-Davidowitz, S. (2017). Everybody Lies: Big Data, New Data, and What the Internet Reveals About Who We Really Are. New York: HarperCollins.

    Google Scholar 

  12. NewVantage Partners. (2017). Big Data Executive Survey 2017. Boston: NewVantage Partners LLC.

    Google Scholar 

  13. McKinsey Analytics. (2016, April). How Companies Are Using Big Data and Analytics. McKinsey & Company. Available at https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/how-companies-are-using-big-data-and-analytics. Accessed August 27, 2018.

  14. St. Louis, M. (2018, April 3). 3 Ways Businesses Can Use Big Data Responsibly. AdWeek. Available at https://www.adweek.com/digital/3-ways-businesses-can-use-big-data-responsibly/. Accessed July 12, 2018.

  15. Bean, R. (2018, March 15). How American Express Excels as a Data-Driven Culture. Forbes. Available at https://www.forbes.com/sites/ciocentral/2018/03/15/how-american-express-excels-as-a-data-driven-culture/#116fa6ed1635. Accessed July 12, 2018.

  16. Martin, K. D., Borah, A., & Palmatier, R. W. (2018, February 15). A Strong Privacy Policy Can Save Your Company Millions. Harvard Business Review. www.hbr.org.

  17. McKinsey Analytics. (2016). How Companies are Using Big Data and Analytics. April Interviews. Available at https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/how-companies-are-using-big-data-and-analytics. Accessed July 12, 2018.

  18. Wilson, J. (2014, July 24). More Stores Affected by Listeria Fruit Recall. CNN. Available at https://www.cnn.com/2014/07/22/health/costco-fruit-recall/index.html. Accessed July 12, 2018.

  19. As quoted in O’Reilly, L. (2018, June 19). The Future of Digital Marketing in a Data-Privacy World. The Wall Street Journal, R1–R2.

    Google Scholar 

  20. Martin, K. D., Borah, A., & Palmatier, R. W. (2017, January). Data Privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81, 36–85.

    Article  Google Scholar 

  21. Quote from Camacho, N., de Jong, M., & Stremersch, S. (2014). The Effect of Customer Empowerment on Adherence to Expert Advice. International Journal of Research in Marketing, 31(3), 293–308. See also the work of Albert Bandura, e.g., Bandura, A. (1989). Human Agency in Social Cognitive Theory. American Psychologist, 44, 1175–1184.

    Article  Google Scholar 

  22. Martin, K. D., Borah, A., & Palmatier, R. W. (2018, February 15). A Strong Privacy Policy Can Save Your Company Millions. Harvard Business Review. www.hbr.org.

  23. Martin, K. D., & Murphy, P. E. (2017, March). The Role of Data Privacy in Marketing. Journal of the Academy of Marketing Science, 45, 135–155.

    Article  Google Scholar 

  24. Martin, K. D., Borah, A., & Palmatier, R. W. (2017). How Should Marketers Manage Data Privacy? AMA Scholarly Insights. Available at https://www.ama.org/resources/Pages/how-should-marketers-manage-data-privacy.aspx.

  25. Rose, J. (2018). The State of Consumer Privacy and Trust in 2017: Fear and Hope. GIGYA Research Report. www.gigya.com.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert W. Palmatier .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Palmatier, R.W., Martin, K.D. (2019). Inoculating Against Customer Vulnerability. In: The Intelligent Marketer’s Guide to Data Privacy. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-03724-6_5

Download citation

Publish with us

Policies and ethics