Five Tips to Protect Shoppers' Privacy and Security

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five tips on how consumers can protect their privacy and security, as identified by ISACA.

ISACA’s 2013 IT Risk/Reward Barometer found that two-thirds (67 percent) of U.S. consumers believe certain personalized promotional tactics are invasive when shopping at brick-and-mortar stores, while only 55 percent found a similar set of tactics invasive when shopping on the Web.

“Despite how much information people share online, they still cherish the concept of personal privacy,” said John Pironti, risk advisor with ISACA and president of IP Architects. “Retailers that use technology to try to save shoppers time and money without asking permission first may actually do more harm than help to their bottom line this holiday season.”

New technologies, such as facial recognition, geofencing and Bluetooth-enabled beacons, enable retailers to use more targeted marketing techniques than ever—but these capabilities come with benefits and drawbacks.

Forty-six percent of the ISACA survey respondents say they would find it invasive if a store texts them about specials as they walk past. An equal percentage would find it invasive if a store clerk they don’t know greets them by name and knows they’ve been there before. Surprisingly, older Millennials (age 25-34) are the group most likely to find these actions invasive. Among online shoppers, 35 percent find it invasive when a website knows their city or zip code.

The results show that consumers worry about their data online, with 90 percent concerned that their information will be stolen. Still, the survey found many consumers create risk through their own actions: 51 percent of respondents use the same two to three passwords across multiple sites and four in 10 write down their passwords to make them easier to remember.

ISACA offers the following tips to protect shoppers’ privacy and security this holiday shopping season.

 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

mobile58-190x128 Five Tips for Closing the Enterprise Mobility Gap

Without the right infrastructure, the essential business of app development ends up taking more time, money and resources, leaving businesses behind the eight ball. ...  More >>

Wearables1-190x128.jpg Five Ways Smartwatches Will Change E-Commerce

Smartwatches will change e-commerce as we know it, whether it's through altering the face of consumer data, miniaturizing the act of consumer engagement, or changing the way we pay for things. ...  More >>

EMCSyncplicityEnterpriseAppsUX0x Preventing Shadow IT: Tips for Designing Better Enterprise Apps

If users are dissatisfied with their UX, they often will migrate to less secure "shadow IT" service, which puts an entire company at risk of security incidents. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date