|  |  |   
        
          |   | 
               
                |  |   
                |  |   
                |  |  | Use i-Meliore's e-Learning center to browse articles, white 
                  papers and research papers on technologies that make a difference 
                  today and that can be used to build the systems of tomorrow  |  |   
                |  |  
 |  
 
 
         
          | 
 
 
 
 
  | e-Learning: 
            Privacy 
 Control 
            of Personal Information: The Economic Benefits of Adopting an Enterprise-Wide 
            Permissions Management Platform
 Ongoing advances in information technology may cause general consumer 
            concern about data privacy, but such technology also provides new 
            opportunities for companies seeking to increase trust and brand equity 
            with their customer community. Historically, the cost of getting a 
            consumer's permission prior to data usage was so great that it was 
            more efficient to let a business "own" the customer information 
            it collected. But the increasing efficiency of modern data exchange 
            technologies brings with it large reductions to these costs. Businesses 
            can now obtain and apply customer permissions at a lower cost than 
            ever before, and certainly for less than the cost of being involved 
            in a class action lawsuit. In this article, we'll examine how technology 
            has changed some of the economic paradigms that surround privacy, 
            and then explore how Web services can increase the trust between businesses 
            and their customers.
 
 Personal 
            Privacy for Computer Users
 In this short paper, ordinary, non-technical users can get a sense 
            of the fundamental issues that face all of us as we try to strike 
            a balance between efficient commerce and our concerns about personal 
            privacy.
 
 Privacy 
            vs. Personalization
 Online businesses face a delicate balance between strong consumer 
            demand for privacy protection and a real consumer desire for personalized 
            treatment. Successful businesses must collect relevant information; 
            and use it properly as a competitive tool. As consumers become more 
            comfortable online, they are increasingly open to providing personal 
            information to their favorite Web sites. But, they are stridently 
            demanding that this information be used to enhance their experience 
            — and that the information is not used in ways that abuse a 
            privileged relationship, or even be subject to a perception of abuse. 
            And, you don't get a second chance if you get it wrong.
 
 Preparing 
            for the Privacy Rush
 Enterprises are now deploying applications and procedures to support 
            Internet based interactions and transactions. And to truly leverage 
            the huge investments to leap to the Internet, most enterprises will 
            need to bring along existing customers, suppliers, partners, and employees. 
            But while the current customers may gladly make the transition with 
            the enterprise, new Internet-savvy customers may be reticent. The 
            difference between the old and new worlds is privacy. Customers demand 
            it, but many enterprises are reluctant to assure that personal information 
            will be handled appropriately. For those enterprises that are not 
            motivated by the opportunity to capture privacy-oriented customers, 
            the evolving regulatory environment of the business may force a behavioral 
            change. Although privacy is a much talked about topic, security suppliers 
            have largely ignored the need for solutions that enable enterprises 
            to move forward while ensuring privacy for customers. Therefore, IS 
            buyers must be exceptionally creative during the next two to three 
            years in moving the enterprise into a new era of privacy.
 
 With 
            Respect to End-Users: Achieving Thoroughness and Privacy
 As new web management solutions permit better collection of End-user 
            information, Web site operators must balance the need for data against 
            the need to respect End user privacy. This paper examines the technologies 
            behind the latest systems, comparing them in the context of the privacy 
            issue. The paper also examines
 Content Annotation technology and how it balances comprehensiveness 
            against privacy in the data collection process.
 
 Six 
            Signs that your e-Business is Trustworthy
 In their rush to the Web, some businesses have overlooked the crucial 
            role that trust plays in building customer relationships online. Given 
            the notoriety of Internet fraud, earning consumer confidence "virtually" 
            has become a real challenge -- one that cannot be addressed with security 
            features and privacy controls alone. Research conducted at the Institute 
            for Knowledge Management highlights six factors that influence a consumer's 
            trust and willingness to do business with a Web-based enterprise.
 
 |  |    
 
 |  |