Академический Документы
Профессиональный Документы
Культура Документы
IN TERMS OF REMARKETING
Dissertation Project
Submitted to
Ms. Alka Gupta, Dr. Sunita Konwar,
Dr. Preeti Goel & Mr. Varun Duggal
School of Business
Pearl Academy
In fulfillment of the
B.A. (Hons.) Degree in Fashion Marketing and Retail
Management
Submitted by
Sakshi Gupta
DFMRM40476 (2014-2018)
Submitted- 2018
DECLARATION
I hereby declare that the research paper titled ‘A Study On Consumer Privacy Breach
In Terms Of Remarketing’ is based on actual and original work carried out by me. Any
reference to work done by any other person or institution or any material obtained
from other sources have been duly cited and referenced. I further certify that the
research paper has not been published or submitted for publication anywhere else nor
it will be send for publication in the future.
This report has been compiled and submitted in partial fulfillment for the Four Year
Degree in B.A. (Hons.) Fashion Marketing and Retail Management (2014-2018). I assure
that the same has not been submitted to any other university or institute for award of
any degree or diploma.
Signature
I dedicate this project to the faculty of Fashion Marketing and Retail Management, who
brought the confidence in me, always motivated me to rise high and trusted on my
caliber. Without them, I wouldn’t have been what I am today. Most importantly, it is my
college Pearl Academy who nurtured and made me as close to being a professional, last
but not the least, this project is also dedicated to my parents who on every step
supported me to perform my best and helped me grow as an individual through all
these four years of my degree.
This dissertation is dedicated to my family and friends. All of them have been a
significantly integral part of this four years long journey through my graduation. They
have constantly supported me to keep learning and growing, and nurtured me to
become a fine professional and a humble individual. All my love, admiration and respect
for them.
Thanks
The thesis was given to me as part of the curriculum in B.A. (Hons) in Fashion
Marketing and Retail Management (FMRM). I have tried my best to present the
information as clearly as possible using the basic terms.
There are many people who contributed to make it a fairly enjoyable process and a
great learning opportunity. I would like to express my gratitude to all those who have
directly or indirectly helped me in the compilation of this dissertation project. There
are, however a few individuals who deserve a special mention.
First and foremost, I would like to express my gratitude towards my teachers for their
tremendous contributions and feedbacks. I would like to take this opportunity to
express my profound gratitude and deep regard to Mr. Alka Gupta for her exemplary
guidance, valuable feedback and constant encouragement throughout the duration of
the project. Her valuable suggestions were of immense help throughout our project
work.
I would like to thank my industry mentors, Ms.Sukhmani Sidhu and Mr. Sachin
Singhal for giving me an opportunity to work with their prestige organisation. Their
perceptive criticism kept me working to deliver this project in a much better way.
Working under the, was an extremely knowledgeable experience for me.
I would like to thank Dr. Sunita Konwar for guiding me in the area of research methods
and, for assisting me in the process of referencing. I shall also take this opportunity to
thank Mr. Varun Duggal, for imparting knowledge about statistical analysis.
A special thanks to all the respondents who gave their valuable time in filling
questionnaires and to all the industry experts who gave their views and gave their
precious time for interviews. Without the expert input, support and cooperation of all
the above-mentioned people, this project wouldn’t have commenced and acquired the
standard of work that it presently has.
I would also like to show my appreciation to my family and friends who motivated me
continuously and encouraged me to make this project see the light of the day. They have
been there like a backbone and supported me at each step.
Every brand wants to generate revenue and therefore they rely on unethical practices
such as compromising on a consumer’s private data. When companies like eBay, Sony
and Adobe were sacrificed by a group of hackers, information such as credit card
records, home address, phone number, email address was procured by these intruders.
When it comes to netizens, they are exposed to a flood of opportunities but with these
possibilities, they are also exposed to numerous security and privacy threats. One might
wonder that providing our personal information to a brand is time-saving, but it comes
with it own set of disadvantages. Once a consumer provides his information on any
digital platform, they should be ready to face a plethora of advertisements and spam
calls. To put an end to this era of security breach, the consumers should demand for
highly-secured systems to be incorporated in a company’s database.
Ever since a consumer connects to the internet and writes a few search phrases in
Google, he is under a company’s radar. And there on, his every move is carefully traced
and captured. This process comes to an end with the company bombarding the
consumer with untimed advertisements, spam emails, numerous calls and beeping
SMS’s.
For the execution of this project, first of all, I understood the realms of digital marketing,
then after understanding the industry, I understood the various concepts of digital
marketing and the current trends in digital marketing by working with NDTV
Bandbaajaa. Once that was done, I delved deeper into understanding how these digital
marketing tactics are influencing consumer privacy.The extent of consumer privacy
breach with regard to digital marketing is based on expert interviews, group
discussions with industry experts and consumer behaviour prevailing in the market.
REFERENCING 90-99
ANNEXURE 100-111
Annexure 1: Questionnaire 100-102
Annexure 2: Expert Interview 103-104
Annexure 3: Work Log for NDTV Bandbaajaa 105-108
Annexure 4: Paper Presentation At International Conference On
109-110
Technology For Education, Training And Business
Annexure 5: Infographic 111
LIST OF CHARTS
Objective- Ever since a consumer connects to the internet and writes a few search
phrases in Google, he is under the company’s radar. And there on, his every move is
carefully traced and captured. This process comes to an end with the company
bombarding the consumer with untimed advertisements, spam emails, numerous
calls and beeping SMS’s. Remarketing proved to be an effective method, but with
the growth of ad blocking software, ‘Do not Call’ and ‘Do not Track’ plug ins,
effectiveness of remarking is declining. While advertisers think it increases sales
and leads to conversions, it has also increased privacy related concerns for
consumers. This has also stopped many consumers from shopping from these ad -
bombarding companies.
The research aims to gain an in-depth understanding of consumer privacy and its
implications. After thorough understanding of this aspect, the research further
outlines the meaning of remarketing and the need for such practice by marketers
and advertisers. The research also briefs the reader about the various ways
remarketing activities are carried out. Moving forward, a comprehensive study on
consumer’s perceptions of remarketing has been covered. The research throws
limelight on the current scenario of remarketing and how it will be shaped in t he
near future.
Findings-This paper tries to find out various issues related to consumer privacy and
implications of privacy breach in e-commerce industry, also, understanding consumer buying
behavior with respect to remarketing activities. It will be done with the help of Primary and
secondary data collection.
“This is the age of mobility and there is substantial change in the way people access the
internet. There is an intrinsic expectation that data be protected." – Pavan Duggal,
Supreme Court Advocate.
An uprise in the usage of internet and with the advent of e-commerce, the consumer
privacy is at more risk than ever. In this age of digital era, Indian consumers are finding
it difficult to completely shift to online mediums due to the risk of privacy breach
(Sharma, 2017). Internet giants like Whatsapp and Facebook declared that they will
start sharing user data. If the top companies are found violating consumer’s personal
data for their own commercial means, a consumer’s trust is bound to be hampered
(Ayyar & Chitral, 2017).
A research conducted by Altimeter (2015) revealed that consumers have low trust
when asked, how much they trust companies use their data. In comparison to this,
around 47% consumers want to understand how their personal data is being used by
companies. Out of this 47% only 25 % respondents have high knowledge about how
their data is being used by companies. Majority of the consumers have low knowledge
in terms of data acquisition and data usage techniques.
Amidst all the chaos, marketers are taking advantage of this aspect and breaching
consumer privacy breach more than ever. There needs to be a bridge between privacy
and marketing. A consumer is bound to share information for their convenience and
personalized service. But the ball is in the marketer’s court when it comes to protecting
personal and sensitive data.
According to the Consumer Protection Act, 1986, in India, a consumer is a broad label
for any person who buys goods or services with the intent of using them for non-
commercial purposes. In the typical sense, when people think of themselves as being
consumers, they think about transactions with a vendor through a physical exchange of
money in a store or through an online exchange for a product or service. Certain
services that consumers use put an extraordinary amount of sensitive personal
information into the hands of vendors and there is no set way to control the amount
data that will be shared. From phone number, home address, IP Address, bank details,
security number, browsing activities, every trace of a consumer on the Internet can be
collected and used by the companies for their own means.
This research aims to explore the existing scenario of consumer privacy breach. With
this research, I want to point out provide a viable solution to marketers to attract
customers rather than breaching their consumer’s privacy for better targeting. For any
individual, personal data, whether that is sensitive information, is very important and
with the era of digitalization and personalization, safeguarding this data is the foremost
need. Deloitte (2016) conducted a survey with 2000 respondents out of which 81%
respondents feel that they have lost control of their personal data. The present study
outlines ways to target one's product and service better.
RO1: To gain in-depth understanding of the term ‘Remarketing’ and its implications
RO2: To explore the issue of consumer privacy breach in terms of remarketing
R03: To analyze the impact of remarketing on consumer buying behaviour
H1: Showing the same remarketing ad repeatedly (more than 10 times) has a negative
effect on consumers
H2: Consumers have stopped buying from websites that use their personal information to
show them ads.
RO4: To suggest measures to improve remarketing and to eliminate consumer privacy
breach
This is the background study done to suggest alternatives to the current marketing
activities that led to a breach of consumer privacy. The sections incorporated in the
project have been summarised in a sequential order below-
Although the research is carefully prepared, there were certain limitations involved.
These limitations mainly surround the nature of research sample and research
information. Firstly, the research was carried out in a limited time therefore limiting the
amount of information that could be researched. Secondly, since the questionnaire was
filled by students, the research analysis might differ a little due to their non-serious
behavior related to surveys. There were certain confinements within which the
research was conducted. These confinements include limited sample size and limited
information access. There is less information available about the various laws that
prevail in india and are related to consumer privacy. This confinement can also be
defined as an advantage to the project as it establishes why consumer privacy breach in
india is at its peak today. Also, there is no authentic government body that does
category specific detailed customer research as happens in west.
The purpose of the research is to gain thorough understanding of the consumer privacy
breach and to understand the need for such practices by marketers. It would help in
analyzing consumer’s perception of such activities and their reaction to such
implications. The research would help academically and would help in suggesting
various parameters to replace the current privacy breach marketing activities.
If these digital mediums are used in the correct manner, then it might do wonders for
the brand. But which marketing strategy to adopt is the challenge in all cases. Should it
be integrated communication marketing, should the brand just do traditional marketing
or should it just focus on digital marketing? Khan and Siddiqui (2014) state that for any
brand to survive focusing just on traditional marketing tactics is not enough. All
marketing activities should be an amalgamation of traditional and digital marketing
strategies. Way back in 1996, this same statement was passed by Parsons, Zeisser and
Waitman as well.
Keeping in mind the digital world, there are various marketing strategies that can be
followed. The objective of the marketing campaign decides what should be the
marketing strategy. Talking about these objectives, they vary from brand to brand. For a
small brand it might be brand building while for a big brand it might be consumer
retention (Landry, 2012). After understanding the basic marketing objectives for the
Having a visually appealing website leads to a huge amount of traffic. Along with a
appealing look of the website, UI and UX experience plays an important role. A website
that loads in 3-4 seconds gets more traffic and hence less bounce rate. Your website
should be able to provide an unparalleled experience to the site viewer. Today even the
smallest business firms have online presence and have an appalling website (Kaur,
2017, p.74). In the short run, it might be a money consuming process but in the long
run, its results are enthralling.
Source: Self-curated
2.1.2.2 Content Marketing
Content Marketing is related to website in some or the other way. It is further divided
into blogs, press release, status updates on social media handles, podcasts, infographics
and videos (Tutorials points, 2016, p.7). Content marketing is their in mostly all aspects
of digital marketing and fulfils all requisites and objectives of a marketing strategy. But
only the right content with correct targeting can deliver results (Netmark, 2016, p.9).
The complexity of so many social media handles might confuse an organisation but the
results it delivers is more effective than any other digital marketing strategy (Netmark,
2016). Wasting time in wondering whether to be on social media or not further leads to
loss in conversions. It is perhaps one of the most important tool for brand building and
brand awareness. Netmark (2016) states that Facebook, Youtube, LinkedIn, Twitter,
Pinterest and Google + are the top 6 six social media handles that companies should not
miss out on. Each of this social media handle can be used for achieving various
objectives (Tutorial Points, 2016). For example, Facebook is more about sharing the
tastes happenings while twitter is more for interacting with consumers and for creating
a strong consumer base (Netmark, 2016)
Growing business are now paying attention to the concept of Search Engine
Optimisation (SEO) and Search Engine Marketing (SEM). SEO refers to on which Google
page the website ranks and SEM refers to online advertisements on websites like Google
and Bing (Netmark, 2016, p. 15).
If a user visits a website, looks at certain products but does not make a purchase, the
website can place advertisements of those products on various other websites that the
user visits. This is known as remarketing (Adhesion, 2018). Broadly speaking,,
remarketing enables you to convey advertisements that specifically focus on users who
have gone to your site. When those individuals leave your site, regardless of whether
they purchased something or not, they will begin to see your advertisements appear in
important places over the web.
A study conducted by HostPapa, shows that 94% Internet users open emails and
newsletters. With an average open rate of 4%, email marketing is more popular than
ever. From discounts to relevant information, emailers can be used to attract a huge
chunk of consumers. According to mobilephonemarketing.us, SMS are read within four
minutes of their send out time. If the SMS, is well targeted, it delivers effective results. In
an SMS, call-to-actions like website links, email address and phone number perform
better (Doherty, 2014). According to Forbes, 60% of consumers prefer SMS Marketing
over other push-notification services. The main aim of sending out professional SMS’s is
to build customer loyalty by building a strong database of consumers (James, 2015).
SMS’s are the perfect method for telling individuals about any prompt offers, without
using push-message applications. More than illuminating your clients of forthcoming
offers, it can likewise be an extraordinary method to send updates for upcoming events
(Dutta, 2018).
-Understanding the market share and in beating our competitors (Kothiyal, 2017)
-Understanding their customers and to connect with them (Shaw Academy, 2015)
-Increasing visibly and awareness about your brand (Kothiyal, 2017)
-Helps your customer to understand your business better (Chaffey, 2018)
-Helps you in customer retention and customer acquisition (Chaffey, 2018)
Remarketing requires adding a JavaScript code, cookies or web bugs on the website
(Seo.com, 2017). The visitors will have not be aware , whether the website owner has
the code embedded on their website or not (Kilbourn, 2014).
Each time you get a user on your website, your webpage will drop an unknown program
cookie. When these users visit another webpage, your remarketing ads company will
know when to convey an advertisement from your site (Horton, 2017).
A massive 97% of consumers leave the website without making a purchase (Digitrio,
2016). Remarketing is an extremely compelling approach to achieve clients and urge
them to return to your site. Through remarketing, a website can target clients
specifically As these viewers visit a website, it gives the website owner a strong base of
prospects who are keen in his business and are willing to make a purchase, thus making
them potential customer. In this situation, remarketing promotions remind viewers
about the previous websites they have visited, and they might probably go back to the
site to purchase a product (Weintraub, 2016). Daviddraj (2015) writes that according
to a survey a returning visitor will likely to browse more pages and have chance of
purchasing the products.
Connecting your campaign and website to analytics helps in understanding where the
customers are spending time and at what points are they dropping out. Remarketing
helps in gaining an in-depth knowledge of consumer’s behavior. This further helps in
strategizing various changes in the current business structure.
Marketing strategies empower you to accomplish your expected target goal and to lift
your customer base. Remarketing is a response to accomplish to reach out to target
audience and to increase conversion rates (Iwasaki, 2016). Remarketing will lessen the
need of labor to market products and services continually. It automatically markets
items to viewers based on their interests and likes (Putta, 2015).
Neil Patel (2014) lays out the various objectives for which organizations indulge in
remarketing activities-
1. To gain consumers of competitor brands
2. To gain and to re-engage customers
3. To increase brand awareness
Remarketing is divided into different types to fulfill the various marketing objectives of
the organizations.
This refers to showing ads to users who have visited the site before. These ads will be
shown on other websites that are part of the Google Display Network apps. These ads
are also targeted on the basis of the search terms used in the Google search engine
(Falak, 2017).
Remarketing Lists for Search Ads is offered by Google AdWords that enables a marketer
to change the look of the ad campaigns for visitors who have been on the site page
previously. This allows the marketers to tailor their offers and ads to the visitors who
had visited the site before, they started looking on Google. This kind of remarketing
promotions is used for visitors who leave the site and after that go on Google to find
other similar products or services (Falak, 2017).
Video ads refer to videos that are shown to users who have seen a brand’s video or
visited the website. As of now video remarketing is only available for Google search
engine, not for Yahoo and Bing (Falak, 2017). In Youtube, the video advertisements are
showing in the beginning or at regular intervals in a long video. A viewer has the option
to skips these ads, however with new display network, some video advertisements
cannot be skipped.
“No one needs to tell us that the world of marketing is changing fast. We are living it.” –
Weber & Henderson, 2014
Marketers collect all the information and remove all the information that might identify
you, as this practice is illegally. Once all your personal identifiable information (PII) is
scraped off, marketers can legally use this data as there are no personal attributes
attached to it. Then they collate various attributes together to form a profile. Based on
this profile, various advertisements are targeted at you (Lacey, 2015).
Many marketers try to attract past website visitors back with coupons or offers. This
can be a bit tricky as customers may intentionally abandon their carts to search for
future discounts. Many marketers often switch between showcasing benefits or offers to
see which performs better (Sagin, 2018).
According to 2017 Adblock report by PageFair, there are 615 million active users of ad
blocking softwares, which includes 380 million mobiles with ad blockers. As of march
2016, there were 122 million Indian users who have ad blocking softwares installed on
their mobile phones. For marketers, this means that they are paying for advertisements
to be shown on various platforms but due to the ad blockers, these ads are not getting
through to the consumers thus leading to loss in conversions. This fact is clearly
These stats are supported by statista (2015) which reported that 64% of global internet
users are concerned about their online privacy. Around 83% of Indian internet users
are concerned about their online privacy. Keeping these figures in mind, tech giant
Apple has started building its products with in-built ad blockers and ‘Do Not Track’
plug-in.
With the wake of the social and digital marketing industry, consumers are exposed to a
plethora of websites that use their personal information. Consumer Privacy refers to
protecting a consumer’s personal information like their name, phone number, address,
bank details, etc (Rouse, 2006). Maintaining consumer privacy signifies a rich
relationship between a consumer and an organization (The Audiopedia, 2018). Talking
about personal information, it can be classified into two broad categories- static private
information which means information which remains same even after a prolonged
period of time) and dynamic personal information which refers to the information
which is bound to change such as online activities.
If a brand is not taking enough measures to protect personal information, they are not
only breaching a consumer’s privacy but are also challenging political norms (FSB,
2017). The consumers are providing their information on digital platforms for
convenience purposes, therefore it is the responsibility of an organization to protect
this personal information from third party frauds (SSL, 2017).
Every country follows different legislation laws in terms of consumer privacy. The
following section outlines the prevailing laws in various countries-
(i) Australia
Australia follows The Privacy Act, 1988. The law curtails schemes like Notifiable Data
Breaches scheme, Credit Reporting and Privacy Regulations (Federal Register of
Legislation, 2013). The Privacy Act, 1998 states that
…information or an opinion, whether true or not, and whether recorded in a material form
or not, about an identified individual, or an individual who is reasonably identifiable
(OAIC, 1999)
The law clearly focuses on notifying a consumer when their information is being used
for a cause that might lead to serious damage. This is done to maintain transparency
between organization and the consumers.
The Federal Trade Commission (FTC) is the main body that takes care of consumer
privacy in the United States. Besides launching the Federal Trade Commission Act, the
body also holds workshops and seminars to educate consumers about the unethical
practices followed by various organizations (Federal Trade Commission, 2018). The
FTC Act bans unlawful offline and digital activities practiced by organizations. Another
aspect of the law includes Behavioural Advertising Principles which asks the
organizations to provide an opt-out mechanism for consumers who do not want their
online activities, web page views and web searches to be traced (Jolly & Loeb, 2017).
The FTC Act covers alws related to unfair practices, telemarketing companies, deceptive
practices (Krulick, 2017). In order to build trust and to safeguard consumer privacy
breach, the Federal Trade Commission has taken various steps to stop companies from
unethical use of a consumer’s data. They have charged companies that
The commission has also worked towards ‘strengthening the enforcement of consumer
rule’s and educating them about ‘means of redress’ (European Commission, 2011). The
policy incorporates resolving consumer-trader issues, promoting fair trade practices
and ensuring all consumer rights, whether in the digital or social space are being taken
care of (European Union, 2018).
(iv) Canada
The Office of Consumer Affairs (OCA) is the angular body that is responsible for
safeguarding the consumer rights of Canadian citizens. These consumer rights include
(v) California
According to a study conducted by Statista (2017), there are over 460 million netizens
or Internet users in India. There are few potential avenues in India which can safeguard
the consumer privacy. These avenues include-
To cater to such rapidly growing market, there are certain amendments and law drafted
by the Indian Government. These laws are listed below-
The Indian Contract Act came into force in 1892. It talks about various amendments to
be followed when two or more parties enter into a contract. The act does not lay direct
emphasis on consumer privacy. In terms of privacy, it only outlines the need to maintain
and to protect consumer privacy when in contract (Anonymous, 2010).
The Consumer Protection Act was passed passed on 24th December, 1986 in order to
provide better protection to consumer. This is the same day when National Consumer
Day is also observed (Jha, 2017). The act was carried out after thorough understanding
of various international laws. The act was amended in 1991, 1993 and 2002 to
incorporate various consumer rights (Kumar, 2011). The main characteristics outlined
in the act are as follows-
(a) To promote and protect the rights of consumers. The right to be protected against
marketing of goods which are hazardous to life and property;
(b) To inform consumers about the quality, quantity, potency, purity, standard and
price of goods so as to protect them against unfair trade practices;
(c) To confer the right to be assured, wherever possible, access to an authority of goods
at competitive prices;
(d) To provide the right to be heard and to be assured that consumers interests will
receive due consideration at appropriate forums;
(e) Right to seek redressal against unfair trade practices or unscrupulous exploitation of
consumers;
(f) Right to consumer education and consumer awareness. This objective is sought to
be promoted and protected by the Consumer Protection Council that are established at
the Central and State level; and
The Information Technology Act (IT Act) deals with electronically transmitted
information and transactions. Even after amendments, the IT Act only talks about
consumer privacy in a minute manner (Seth. 2010). It covers three broad aspects- (1)
To bring all electronic transactions in notice (2) to provide redressal for unethical
online practices and (3) disclosing identity-related offenses (Greenleaf, 2010).
The disputes that are being solved right now are mostly related to pornography. The
amended act talks about data protection in Section 43A (Seth, 2010) , but it gives no
narrow perspective as to what is the true definition of ‘data’ (Greenleaf, 2010). Also, in
the same section, it is specified that the company will be charged if they are found
negligent about safeguarding the ‘sensitive personal data’ from third parties (Mathan,
2016).
However, the act covers major privacy crisis such as identity theft, financial theft,
phishing scams, cyber crimes, stealing of personal data, downloading personal data. The
act states that in terms of violation of any of the guidelines, the suspect is viable for
imprisonment for upto 3 years or fine of Rs. 5 lakh or both. The law also covers
punishment to companies who send hoax and spam mails to the consumers (Iyengar,
2011).
Observed on March 15th every year, World Consumer Rights Day was started in 1982 by
ex-US President John F Kennedy. It is an endeavoring step towards uniting consumers
and awaring them about their consumer rights and existing policies to safeguard their
interests (Nair, 2017). Consumers International (2017) states that “45% of world’s
population is online now as compared to 1% in 1995”. With this thought in mind, the
theme for World Consumer Rights Day for 2017 was ‘Building a digital world
consumers can trust’ was observed (Jha, 2017). To maintain consumer data privacy and
to protect consumers from data breach, Consumer International outlined four
guidelines- Right to safety, Right to choose, Right to information and Right to be Heard
(MyGov, 2017). In India, various workshops and seminars are conducted to aware
consumers about their rights and to aware them about the injustice that online
ecommerce might be conducting (Apollo Pharmacy, 2017).
Besides World Consumer Rights Day, National Consumer Day is also celebrated in India
on 24th December (Jha, 2017). In accordance to the 2017 theme of World Consumer
Rights Day, theme for National Consumer Day 2017 was “Emerging Digital Markets:
Issues & Challenges for Consumer Protection” (DD News, 2017).
Children’s Privacy Protection Act (COPPA) first came into effect in 2000. The law
safeguards the private information of children below 13 years of age. The child-centric
websites should to collect information like child’s name, address, email address, phone
number, security password and use that information against parents (Sullivan, 2013).
As per COPPA guidelines, the websites have to specify about their privacy policies and
they need parental consent before asking for data from children. This protects the
child’s identity and saves the parents from other online frauds as well (Consumer
Federation of California, 2018). However, COPPA has only issued guidelines that sue
businesses that take information from children, it has no amendments which outlines
the information taken about the child such as the IP address (Herold, 2017).
The Anti-Spam Law, such as CAN-SPAM in the US and Privacy and Electronic
Communications (EC Directive) Regulations 2003 in the UK, refers to emails or
commercial messages (Hamilton, 2015). The Federal Trade Commission (2009) states
that besides bulk emails, Anti Spam Law refers to “any electronic mail message the
primary purpose of which is the commercial advertisement or promotion of a
commercial product or service”. Each country has its own set of Anti-Spam law
(Anonymous, 2015).
According to the CAN-SPAM Act, a person or business entity is prohibited from sending
an email to a recipient’s email address if the person or business entity had obtained the
recipient’s email address using computerized means from a website that has clearly
mentioned in its privacy policy, that it would “not give, sell, or otherwise transfer email
addresses obtained from its users for the purposes of commercial solicitation”
(Giacomo, 2016).
India has no law which refers to eliminating spam mails or controlling the spread of
telemarketing and phishing scam calls. As compared to the various laws in US and
Canada, India needs a strong legal framework that pertains to these illegal practices of
data breaching and then spamming the consumer. The below figure clearly states the
anti-spam law in various countries along with their major objectives-
With the advent of social media and the need for personalised services, consumer
privacy is at grave risk. Right from your internet activity to your shopping cart, every
inch of the user activities can be tracked. The companies are exposed to a plethora of
activity tracking softwares (ReputationDefender, 2017). After thoroughly examining the
Let’s consider real-life examples like RealNetwork and Yahoo. RealNetwork was held
responsible for tracking consumer’s browsing activities using RealJukebox. He talks
about another example about ReverseAuction.com. The website use to collect
information of the users of their rival company, eBay and then targeted advertisements
to these users. Bellefonds et. Al. (2017) states that personalised advertising will form
80% of the digital marketing and will slowly tap its footsteps in the traditional
marketing as well. A consumer health company conducted a pilot test wherein they
added sensors to a personal hygiene product and tracked how often the user is applying
their product and whether they are applying it in the right manner Bellefonds et. Al.
(2017).
To participate in the mad race for personalization and for providing world-class
products and services, the companies rely on many softwares and tools to collect
personal information about their consumers and potential consumers. Various ways to
collect such information is listed below-
(i) Cookies
Cookies are small messages that are saved in the user’s browser and store information
such as name, domain and IP address. It sends this information to the web server of the
website that the user wants to visit and makes it easier for the user to visit the same
website next time (Beal, 2008). Alarcon (2016) and Beal (2008) classify cookies into
three categories-
-Session cookies: These cookies get over once the session is over, in other words, when
the browser is closed.
-Third party/Malicious cookies: These cookies are used to track user’s website,
browsing habits, interests and preferences. A profile is formed on the basis of this data
which is then shared with the host of these cookies. Companies like Amazon, Facebook
and Google started the trend of using third party cookies to track and deliver
personalized webpages (Collins, 2017).
Source: Dyanmicyield.com
In the recent time, companies have started using these cookies in an unconventional
manner. Cookie Hosts collect all the sensitive information about a user and sell it to
fraud and third party websites (Collins, 2017). There have been cases when cookies
were hosted not by the visited website but by the companies that run advertisements
on the websites such as DoubleClick.com. These advertising companies use this data to
target advertisements based on your likes and increase their return on investment in
this process (University Information Technology Services , 2018).
Addthis, Adnxs, Yieldmanager, Quantserve are other cookie trackers. These cookies also
track your response to an advertisement and whether you clicked on the ad and what
was your response after clicking on the ad (Geary, 2012). Altimeter (2015) conducted a
survey and asked people whether they were aware that cookies track their browsing
habits and the results were astonishing.
The findings show that 40% respondents were aware that they were being tracked but
had no idea how advertising companies track them. Even after being used since last 20
years, 3% of respondents were not aware about cookies.
Gaining all the information about the person can also be done without asking the person
to fill their information. If a person’s Wifi is on while they are on the move, their IP
Address and MAC ID can be tracked. For there on, further personal information like the
person’s email address, contact number, likes and interests can be accessed.
Big companies like Facebook, Google, Apple and Microsoft have started selling data to
advertisers who want to target their clients better (Hachman 2015). All the free data
that we provide to Google adds up to a huge amount of personal information being
traded away to create personalized, targeted ad experiences. (Hachman, 2015). By
buying all this personal information, Advertisers make money that allows them to give
themselves a paycheck while keeping the viewers afloat in free digital services (Mullian,
2012). From tracking location to all the personal information added by the user to all
the data that their friends upload about them, every information is being used by these
giants to mint money.
“...Facebook trackers are just about everywhere on the Internet. But because most of
Facebook’s 1.49 billion users routinely access the service through an app, the ads cannot
be hidden using one of the many blocker tools now topping the download charts on Apple’s
App Store.”-Bloomberg (Hachman, 2015)
For advertisers, it’s a well known fact that social media and mobile applications are
hotspots for gathering personal data. These are applications that probe individuals to
share information about themselves and share their interests (DeMer, 2017). According
to Rodriguez and Sundaresan (2017), more than 70% mobile applications are sharing a
user’s personal data with third-party tracking services like Google and Facebook.
Many mobile apps are developed by blending various functions which written by
various developers and companies, who are better known as third-party libraries.
Users would never know, because apps aren’t required to tell users what software
libraries they use. And only very few apps make public their policies on user privacy; if
they do, it’s usually in long legal documents a regular person won’t read, much less
understand. Leave aside marketers, government apps such as the Namo app collects
personal data such as photos, videos, audio and geographic location (Sekhose &
Upadhyay, 2018).
(v) Adware
As the name suggests, Adware is a bit of programming that showcases promotions for
profit. While a few types of adware are lawful and may even be incorporated with
specific applications, some are illegal and are better known as a malware (Arsene,
2017). These can go up against the type of pop-ups or windows that can't be shut or
they can run different types of malware through contaminated projects or sites. More
incognito types of adware track web behaviour whilethe one intrusive in nature, may
incorporate key-lumberjacks that track all the passwords (NPC, 2017).
“For the love of god, please give me a way to block them and not have them track my
every movement.”(Morron, 2014).
Benkendorf (2016) states that most of the remarketing advertisements that users see
are considered sleepy rather than helpful. A study conducted by InSkin Media and RAPP
Media clearly stated the implications of remarketing on consumer privacy breach.
According to the study, only 10% consumers make purchase after looking at an
remarketing advertisement (Jacob 2015). Even in terms of remarketing, there are
certain aspects that need to be taken care of-
According to the above figure, consumers are encouraged to buy the product when they
are shown remarketed ads during their research phase. If the consumers are shown
these ads after research or after purchase, they are more likely to get discouraged. Even
though 62% consumers are encouraged to purchase products, this purchasing decision
also depends on the frequency of the remarketed advertisements, or in simple words,
the number of remarketed advertisements shown to an individual. According to the
graph, majority of the consumers find these advertisements ‘annoying’ or evoke ‘anger’
in the viewer, whether they are shown these advertisements 3 times or more than 10
times.
With all this happening in the foreground, today consumers are worried about how
these remarketing advertisements are entering their personal space. 83% consumers
are worried about advertisers knowing their personal income, followed by 81%
consumers uncomfortable with their phone number being shared.
During a TED talk, Stuart Lacey (2015) talks about reversing the process of targeting
advertisements based on anonymous psychographic profile as it consumes lot of time
and money. He wants users to embrace their Personal Identifiable Information (PII) and
recommends that consumers should be allowed to decide whether they want their PII
to be shared for a better and personalized experience.
With much critical acclaim going on about 'Right to privacy is a fundamental right'
judgment by the Supreme Court, there still exists the issue of Aadhaar being legitimate
or not, which is as yet pending (Rathee, 2017). Much discussion has lit upon the
contention of Aadhaar, particularly, The Aadhaar Act, 2016 and the Right to Privacy of
each native of the nation being disregarded through it. The issues with the Aadhaar Act,
2016 in respect to security involves two sections: firstly, Aadhaar Act making Aadhaar
necessary for each citizen and furthermore making its mandatory linkage to different
The Aadhaar Act, 2016 permits sharing of information under the Aadhaar numbers for
the purposes behind "national security" which is an ambiguous and an indistinct term.
Further, there is a tremendous danger of information release given that there are no
current security laws in India. The dynamic government needs the Aadhaar approach to
proceed and is a step towards making Aadhaar required for more records, for eg.,
driving permit (Rathee, 2017). This decision also conflicts with the one passed by the
Supreme Court, wherein they have made Aadhaar voluntary (First Post, 2017). As
Aadhaar is currently made compulsory by the government for all administrations
including essential services, for example, telephone number, railroad tickets, and so on.,
this creates a loophole for the information to be spilled and abused by state and other
bodies, which is an unmistakable and direct infringement of the privilege to protection.
The Aadhaar Act accommodates a section which permits the individual data put away
under Aadhaar to be shared for the reasons for "national security" (The Aadhaar Act,
2016). The expression "national security" is a subjective term which can be confused
and abused by government officials (IANS, 2016).
The enrolment organizations of Aadhaar number are dealt with and controlled by
private administrators. These private operators get the information of the citizens to
upload it in the government database. There can be a conceivable abuse of such
information and as now, as the Aadhaar is linked to utilize a few government
sponsorships and subsidies, this expands the shot of abusing the data with a specific
The issue of information security likewise applies to the privately owned businesses
which require Aadhaar as an obligatory piece of the business. This incorporates service
providers, banks, and other private players who can approach the nation’s biometric
data. After the order of the Aadhaar Act, a case has also been brought to the limelight. A
current episode happened where it was found that a site called "magicapk" spilled
information of more than 100 million Reliance Jio Customers (Aadeetya, 2017). This was
affirmed by the Reliance Jio Infocomm Ltd. as it documented a grievance asserting
"unlawful access to its systems" (Reuters, 2017). Another occurrence happened, where
the digital personalities of more than a million citizens got traded off because of a
security glitch in Jharkhand's seniority annuity conspire which uncovered data like
Name, Aadhaar Number, bank and financial details, etc (Sethi, Bansal and Roy, 2017).
These sort of glitches and blunders demonstrate the absence of information security in
the nation and the danger of the presence of a database which contains citizen’s
exceptionally classified and private data.
Source: Loanbaba,2017
Absence of stringent protection laws like that in the US gives a space to abuse
information security. The administration's defense and barrier in the issue is constantly
focused towards avoiding corruption by executing linkage of one of a kind
distinguishing proof to PAN, Income Tax matters, banks, and so forth to evade
violations. Howsoever, the protection of nationals is of preeminent significance as
security is presently a fundamental right in India.
Further, the rationale of the administration to kill corruption turns into an incongruity
when corruption happens in the Aadhaar process itself as because of the pressing need
of having an Aadhaar number and due to the moderate pace of enrolment, natives are
compelled to bribe administrators in the enrolment centres (Bashir, 2017).
The personal information of up to 87 million users, primarily from U.S., was acquired by
an analytic firm that influenced the US elections and helped in electing of Donald Trump
as US President. The firm Cambridge Analytica took help of Aleksandr Kogan to collect
user’s information through a app called ‘This Is Your Digital Life’. 270,000 users used
this app and allowed their information to be used, the structure of the app was designed
to gather information of the user’s friends as well. They used this data to target
‘psychographic’ ads to the users and to influence their voting decision in the US
elections (Meyer, 2018).
“Facebook has made billions of dollars selling advertisements targeted to its customers,
and in this instance made millions selling advertisements to political campaigns that
developed those very ads on the back of their customers’ own … personal information.
That’s unacceptable, and they must be held accountable.” -Richard Fields, of the
Washington law firm Fields PLL (Bowcott & Hern, 2018).
Alexander Samuel (2018) claims that he was one of the marketers to know about this
breach even before the news came out. He further adds “It’s time for us to face up to
what online marketers and researchers have known for more than a decade: the
This digital outbreak was discouraged by some of the top companies of the world.
Whatsapp co-founder started the campaign #DeleteFacebook. This campaign was joined
by Elon Musk and Playboy, who deleted their specific Facebook pages. Amongst all this
chaos, Mark Zuckerberg, Founder of Facebook published full-page advertisements in
newspapers. Currently, Mark Zuckerberg is being testified by Federal Trade
Commission (FTC) and Congress (Warren, 2018). The allegations are not just restricted
to American politician Donald Trump, news about NaMo app based on the structure are
also doing the rounds. During all this confusion, the BJP is putting the blame for data
collection on Congress, whereas Congress is protesting against BJP (Deka, 2018).
To understand how much data about the researcher is available to Facebook, the
researcher downloaded her data from Facebook General Settings. The data file was of
104 MB with information like all the pokes, engaged advertisements, friends requests
sent, friends request received, all the posts uploaded (even the deleted ones). Most
importantly, in the ‘Ads’ section, there was information about brands who have access
to the researcher’s personal data. This scenario is when the privacy settings on
Facebook had been set high level of security.
Although all this information can be visible on Facebook, there is no way to delete this
information, the only way through is to delete your account on Facebook. Besides
Facebook, Google and Linkedin also allow access to this information, which is a massive
database on Google, however there is no option to delete this data. Amdist all this
chaoas, Rajiv Makhni (2018), managing director of NDTV sates that “Facebook may
profit from a problem of their making” as instead of third-part brokers, they will be
selling the personal information directly at a higher price.
With the emergence of technologies that hamper consumer privacy, a flood of data
protection tools also entered the market (Sartain, 2017). These tools include
safeguarding your personal information from cookies, social networking websites,
email and fraud advertisements and phishing scams (Ivana, 2016). Even though it is
not completely in our hands to safeguard our information and to protect
ourselves from these data breaching practises, there are various tools and
softwares available in the marketplace to protect our privacy as much as possible
(Snider, 2017). Most of the tools present in the market cater to only 3-4 aspects
of consumer privacy breach. These tools are listed below-
(i) Ad Blockers
Blocking all Facebook and Gmail advertisements, AdBlock has been fundamental in
providing peace to all impulsive shoppers. The pop-ups advertisements that hover in
your browser 24x7 are instantly blocked by these ad blockers (Ivana, 2016).
Adblock Plus, Adblock Ultimate, Adaway are some of the ad blockers available in
the market (Corpuz, 2018).
Virtual Private Network or VPN is a secure connection that connects you to the
internet by using encrypted nodes and internet relays. By using VPN, one cannot
enter your private vicinity and hence it protects your information from being
shared with anonymous websites and organizations (Newman, 2017). Your every
digital activity will be safeguard and no one will be able to track your activities.
Most of the VPN service providers charge a nominal fee for their services. Spotflux,
Do Not Track is a feature present in some of the top web browsers which ensures that
none of your online activity is tracked or recorded by any organization, unless you
want it to be shared (Albright, 2016). This means no retargeted
advertisements would be target at you. This feature is available in Safari, Mozilla
Firefox, Chrome, Opera and DuckDuckGo (Klosowski, 2013).
Cookies are responsible for transferring your data to fraud and third party
websites. There are various browser extensions and tools available in the market to
block invisible cookies and plugins (Snider, 2017). Ghostery and ScripNo catch hold
of such websites and block them from invading your personal space (Ivana, 2016).
Bandbaajaa.com CEO Sachin Singhal said, “Our focus is to help customers with the perfect
mix of right products, best vendors and amazing ideas in order to make their journey to
the big day hassle free and memorable”.
Website Sections- All the top vendors like photographers, makeup artists, mehendi
artists, venues, entertainers, wedding planners, wedding invitation designer and
wedding decorators are listed in the vendors section. The second section is wedding
ideas which is further divided into the blog page, photos and real weddings. For all the
modern brides who want to plan their wedding with the help of our wedding planners,
there is a Plan your wedding section. The last section is Destination wedding.
Source: Self-curated
Partnerships- The brand has partnered with more than 1500 vendors and
professionals for the website. Or the e-commerce brand, we have more than 5000
products for purchase. In terms of marketing, the brand has tied up with Kensico for
email platform host. The brand was previously associated with Taboola who helped
them earn a revenue of ₹10 crores in a year.
Target Market- As reported by IIFL (2017) , the Indian wedding industry is growing by
leaps and bounds. Keeping in mind current scenario, it is worth 1 trillion rupees and is
bound to further increase with a 25%-30% growth annually. Bandbaajaa.com
Managing Director Smeeta Chakrabarti said, “Weddings are a recession proof business,
the current generation of young Indians will find everything they need to plan a perfect
wedding with minimum fuss”. The market is predominately unorganised and therefore
there is more chance of development. With the advent of social media and tech savvy
generation, everyone is well aware about the latest trends.
In terms of email marketing, once an email is sent to all the email addresses in the data,
their activity is tracked thereafter. If a person opens a mail or click anywhere in the
mail, there information such as email addresses and phone number is saved in our
database. The leads team then calls these potential clients to convert them into leads.
The team got a mixed response from users after they called these prospective clients.
There were consumers who claimed that they clicked on the newsletter by mistake,
whereas some users said that they were casually browsing around. Amongst these
responses there was also a set of users who reacted positively to these calls. These
Talking about remarketing advertisements on social media handles, the viewers did see
the advertisements but it resulted in very few or negligible conversions as there is very
less brand awareness and users were more interested on scrolling through other well-
known Indian wedding portals. The major traffic that the website garnered was from
content marketing and video posts on Facebook. Comparatively there was more
engagement on Bandbaajaa’s generic marketing advertisements as compared to
retargeted advertisements.
If we look at the above figure, these leads have been generated when consumers
pondered upon an advertisement of Bandbaajaa on Facebook. These users were
Talking about service, Bandbaajaa thrives for a good customer support service.
Currently, the brand is not investing much in marketing and website development due
to which the brand awareness is not much. Even the organic marketing activities are not
getting as much response as expected. As users are aware about Bandbaajaa’s current
service structure, they prefer other Indian wedding portals. Bandbaajaa already has the
credibility of the name NDTV, once it works on a strong marketing strategy to generate
brand awareness, it will be easy to surpass portals such as wedmegood, shaadisaga,
popxowedding. And once there is brand awareness, even their remarketing
advertisements will start getting results.
Consumer behaviour is the investigation of people and associations and how they select
and use these products and services. Also, communicating with buyers and getting input
for them is an eminent piece of consumer behaviour and all advertisers should be
greatly enthusiastic about it (Stankevich, 2017).
Customer Behaviour is the procedure shoppers encounter when they make a purchase,
and it includes factors that impact their choice. For some items and services, buy
choices are the aftereffect of a detailed and a definite process that may incorporate a
wide data search, brands examination, and their assessment. Advertisers' achievement
in impacting consumer behaviour depends to a substantial degree on how well they
comprehend this behaviour. Advertisers need to know the particular needs of clients
and how they can fulfill them. Advertisers should understand how purchasers
accumulate data about various options and utilize this data to choose among competing
brands (Belch G. and Belch M., 2015).
With the expansion of the storage of individual data by companies, protection and
information breach are becoming a mainstream process. It is important to educate a
consumer how their information will be used. This process should be made more
transparent with the current situation of privacy breach expansion. Despite the fact that
a significant number of consumers call themselves ‘Tech-savvy’, most people who have
a laptop or a mobile phone understand that in the event that if they can get to delicate
data, others can too with the correct instruments (Santarcangelo, 2016).
Many consumers don’t understand how their data is being used. Others who knew their
data was being tracked responded in a different manner. According to a survey by
OnePoll (2017), 33% respondents decided to exercise their right to privacy and get
their personal data removed by the companies (Roberts, 2018). Another survey by SAP
SE (2017) revealed results that 72% of respondents do not want the advertisers to
know their mobile number, real-time location and monthly income. 79% of respondents
By executing targeted ads to online clients, the marketer gets an opportunity to remind
potential clients about products they like and might initiate a purchase for. From the
client's point of view, remarketing can once in a while appear to be "frightening" and
intrusive decisively in light of the fact that it makes the client mindful of how much
information is being stored by them. This discernment is much more probable when the
client is focused by forceful remarketing techniques that demonstrate numerous
promotions every day to the client over various sites.
For instance, once a client finishes buys a product on an online business site (in the
wake of tapping on a promotion from a remarketing crusade), it is feasible for a client's
behavioral profile to be connected to their email address, social media profiles, and
other identifiable data. These worries are intensified by the expanding utilization of
cross-device targeting to focus on clients on their cell phones, tablets and PCs.
The average website conversion rate is a little more than 2 percent. In other words,
nearly all of the people who visit a site for the first time leave without some form of
desired action (Roberts, 2018). That's why many brands have turned to retargeting,
which focuses on getting those previous visitors back to your site. Retargeting can be
accomplished via display ads, search, email, and now social media, as well as via
Facebook's FBX ad exchange and Twitter's new retargeting option (Patel, 2015).
Talking about the consumers who left the buying process in mid-way might be because
of the same reason they abandoned their cart at first place (Boag, 2017). These reasons
are listed in the figure below-
There are buyers who buy the product but return the product due to after sale services
or due to bad quality of the product. These consumers are looking for value driven
products and services along with personalization. Major reasons why these consumers
return their products are listed below-
There is also a set of consumers who claim that they clicked on the advertisement by
accident. A terrifying 34% consumers are a part of this bandwagon (Winsauer, 2016).
People who have a negative response to these remarketing advertisements have either
stopped buying or have installed ad blockers and other privacy protection plug ins.
Astonishingly, 85% consumers feel blocking these ads provide a positive and a good
internet experience (An, 2016).
The research aims to gain an in-depth understanding of consumer privacy and its
implications. After thorough understanding of this aspect, the research further outlines
the meaning of remarketing and the need for such practice by marketers and
advertisers. The research also briefs the reader about the various ways remarketing
activities are carried out. Moving forward, a comprehensive study on consumers
perceptions of remarketing has been covered. The research throws limelight on the
current scenario of remarketing and how it will be shaped in the near future. It would
help in analyzing consumer’s perception of such activities and their reaction to such
implications. The research would help academically and would help in suggesting
various parameters to replace the current privacy breach marketing activities. This
paper can inspire-marketer, digital marketing firms and allied agencies and experts in
this field for bringing certain changes in their existing marketing and promotional
strategies for better financial future.
The purpose of the research is to gain thorough understanding of the consumer privacy
breach and to understand the need for such practices by marketers. The background
study is conducted to get a more profound comprehension of the pervasive issues of the
research. The research objectives are listed below-
RO1: To gain in-depth understanding of the term ‘Remarketing’ and its implications
RO2: To explore the issue of consumer privacy breach in terms of remarketing
R03: To analyze the impact of remarketing on consumer buying behaviour
H1: Showing the same remarketing ad repeatedly (more than 10 times) has a negative
effect on consumers
H2: Consumers have stopped buying from websites that use their personal information to
show them ads.
RO 4
RO 1 RO 2 RO 3
To suggest
To gain in-depth To explore the To analyze the
measures to
understanding of issue of consumer impact of
improve
the term privacy breach in remarketing on
remarketing and to
‘Remarketing’ and terms of consumer buying
eliminate consumer
its implications remarketing behaviour
privayt breach
DATA COLLECTION
DATA ANALYSIS
RECCOMENDATIONS
CONCLUSION
Research Design is a layout of research which demonstrates what the research will do
after composing the theory and its operational ramifications to the final analysis of data.
A research design is the game plan of conditions for information gathering and
investigation of this information in a way prove relevant to the economical procedures.
The most widely recognized research outlines that the researchers utilize are
exploratory, descriptive and causal.
Research design conveys a critical effect on the unwavering quality of the outcomes
achieved. It gives a strong base to the entire research. It is required because of the way
it takes into consideration the smooth working of the numerous research activities. This
makes the exploration as efficient as possible by giving most extreme data least
spending of time, money and effort (Chowdhury, 2014).
A research project can only be considered efficient when it adapts the correct research
design which is a blend of both qualitative and quantitative research. In the present
research, exploratory and descriptive research is utilized as a motivation behind the
research to acquire and analyze the data.
Exploratory Research- Exploratory research is used when there is not much or vague
information available about a subject. It has led with the reason for increasing better
understanding into an issue. In this research, the exploratory research incorporates
writing literature with a specific end goal to acquire detailed data that supports the
research objectives. Exploratory research is a step towards seeking new information
and understanding of the current problem.
Descriptive Research- The researcher has no influence over the factors; he can as it
report what is going on. The descriptive research depicts the factors by answering
questions like who, what, and how (Babbie, 2002). Descriptive research is normally
more formal and organized than Exploratory research (Malhotra, 2005). It depends on
vast data collection methods and the information acquired is subjected to quantitative
investigation. In this research, descriptive research is attempted keeping in mind the
end goal to discover and depict the attributes of the research. Hence, the present
research is Exploratory-cum-Descriptive in nature as it tries to evaluate the impact of
remarketing activities by marketers on consumer privacy and its implications in
consumer privacy breach.
RO 1
To gain in-depth understanding of the term
‘Remarketing’ and its implications
RO2
To explore the issue of consumer privacy breach in
terms of remarketing
Websites
Expert Observation done
Online Journal
Interviews during Internship at
Blogs
NDTV Bandbaajaa
Newspaper
Magazines
Online Newspaper
Videos 1. Ishan Bansal,
Podcast Inklik.com
2. Jaya Sharma, ILFS
3. Manoj Negi, MDIS
The research objective has been achieved with the help of exploratory research design.
The data has been collected using both primary and secondary research. The primary
research has been collected through personal interviews with marketing firms and e-
commerce brands. This has been done to gain in-depth knowledge about the need for
remarketing. The secondary data is collected through articles, research papers, journals
and current information on the websites. It was collected to explore the concept of
remarketing and other marketing activities. It also outlines the various ways in which
remarketing has been adopted.
Exploratory research design has been used to understand the first objective clearly.
This research design has helped in establishing the meaning of consumer privacy and
consumer privacy breach. It further ventures deep into understanding the implications
of consumer privacy breach. The research outlines the various laws implemented by the
Indian and the international legislations to seize these privacy breaches. The purpose to
select this research design was to thoroughly understand about consumer privacy
through available sources. To collect information about all these aspects, secondary
data has been used. This data has been acquired from research reports, research
articles, various blogs, online journals, books and websites.
RO 3
To analyze the impact of remarketing on consumer
buying behaviour
PRIMARY RESEARCH
Quantitative Qualitative
Descriptive Research has been used to understand the third objective- To analyze the impact
of remarketing on consumer buying behaviour. The researcher collected information from
200 respondents for fulfilling the objectives of the study and to test the various hypothesis
mentioned below-
H1: Showing the same remarketing ad repeatedly (more than 10 times) has a negative
effect on consumers
H2: Consumers have stopped buying from websites that use their personal information to
show them ads.
A pilot study was conducted with a total of 89 respondents to receive the feedback.
Based on the feedback and reliability of the survey, the study further progressed for
getting the balance respondents. In order to achieve results the data is collected by using
questionnaire, conducting personal interviews with consumers and by talking to the experts in
this field. The collected data is systematically tabulated and analyzed with the help of PSPP.
Sampling Technique: A non probability sampling has been used for the research. Purposive
Sampling Technique or Judgmental sampling is best suited for this research, as the aim is to
establish a difference between online shoppers and traditional shoppers.
Sample Unit, Size and Frame: In non-probability sampling, the sample that is selected is
not completely randomized, therefore the researcher laid great emphasis to make sure that the
sample was a true representative of the target population. To confirm the validity of the
research finding, the researcher conducted a survey of 200 males and females between the
age of 18-40 years. The research focuses on the digital world but due to time constraint
consumers in Delhi-NCR are only considered, as its sample frame.
RO 4
To suggest measures to improve remarketing
and to eliminate consumer privacy breach
DESCRIPTIVE RESEARCH
DESIGN
PRIMARY SECONDARY
RESEARCH RESEARCH
QUALITATIVE QUANTITATIVE
RESEARCH RESEARCH Websites
Blogs
Newspaper
Expert Interview Magazines
Personal Online Newspaper
Questionnaire
Observation Articles
Purposive Sampling
Close Ended Questions
Sample Size-62
Sample Unit-18-40 years
Sample Frame-Delhi/NCR
Scaling Method- Likert
Scale
Chart 12: Research Planning for RO4
Source: Self-curated
3.7 LIMITATIONS
Although the research paper is carefully prepared, there are certain limitations
involved. These limitations mainly surround the nature of research sample and research
information. Firstly, the research was carried out in a limited time therefore limiting the
amount of information that could be researched. Secondly, since the questionnaire was
SUMMARY: This part covered techniques attempted to accomplish the objectives of the
research. It incorporated problem statement research aim, operational definitions, the
exploration outline, strategy for information gathering and understanding of the
information. The research undertakes both, exploratory and descriptive research
approach.
Secondary data has been used to study about the concept remarketing and its need in
the digital world. To This data has been acquired from research reports, research
articles, various blogs, online journals, books and websites. It also outlines the various
ways in which remarketing has been adopted. The research also briefs the reader about
the various ways remarketing activities are carried out. Moving forward, the research
throws limelight on the current scenario of remarketing and how it will be shaped in the
near future.
4.1.1 Remarketing
Remarketing is a clever form of running online advertisements that are well targeted
and personalised. These targeted ads will be visible to the user while he is doing online
shopping, watching a video on youtube or when he is just browsing the net.
Remarketing works on the simple concept of placing pixels or cookies on the user’s
browser when he visits the website and thereafter, his every move is being watched
carefully by the digital companies. Based on all the information grasped by these
remarketing tags, a psychographic profile is maintained for every user. Eventually
based on your browsing and shopping history, ads are targeted at you. Seeing an
advertisement of a product that you added to the cart is just another aspect of this
concept. These remarketing advertisements can be scheduled on Google, Facebook,
Instagram, Youtube, Gmail, Pinterest, Linkedin and possible every platform.
Based on the expert interviews, remarketing can be defined as a concept to identify and
to target website users by using cookies or pixels These remarketing advertisements
are then shown on Google Display Network (A network of websites on which
advertisements are shown in collaboration with Google). and social media website,
mainly Facebook.
Even though traditional marketing plays an important role in today’s digital world,
remarketing has proved to be more effective than the traditional methods. While the
traditional methods lead to a low conversion rate, remarketing advertisements have
increased the conversion rate from 8% to a massive 26%. Before remarketing actually
came into existence, around 96% consumers left the website without making the
Remarketing uses a consumer’s personal data to target ads at them but with the
growing need of data being protected, marketers need to ideate ways to target to
consumers without misusing a consumer’s personal data. A nine-member committee of
experts by Union government stated that ‘While data can be put of beneficial use, the
unregulated and arbitrary use of data, especially personal data, has raised concerns
regarding the privacy and autonomy of an individual.” (Deka, 2018). Of course with the
unprecedented use of data has made 83% indian consumers concerned about the
protection of their personal data online.
Consumers want a personalised experience but at the same time they also want their
personal data to be protected. It truly is the end of privacy as social media giants
Facebook and Whatsapp have completely changed the ball game. Facebook has 250
million active Indian users and information of all these users is saved by Facebook in a
Question- Do you think there are other measures that can be used instead of
remarketing? If yes, could you please elaborate.
Considering the crucial analysis of this report, these questions are of utmost
importance. The questions mentioned above provide a way to understand the
loopholes in current remarketing techniques and how marketers and advertisers can
work on improving them. Remarketing has proved to be effective over the years, but it
also has a few key areas which can be worked upon. Instead of working on
advertisements that follow users on every device, a subtle process of email marketing
or website notifications can be implemented. In order to eliminate the simple look of an
remarketing ad, marketers can experiment with various design templates. These
remarketing ads use a consumer’s personal information to track them and to target
them with specific advertisements. Consumers can be given an option to opt out of
these remarketing advertisements, if they want to.
The second research objective has been analyzed with the help of secondary data.
Based on the expert interviews, it can be said that there are marketers who maintain a
gap between privacy and invading personal space. However, the number of marketers
who have filled this gap are outnumbered.
The main reason behind breach of consumer privacy is the ever-evolving need to offer
personalised services by marketers. Once a consumer visits a website, ever since then
he is under the company’s radar and his every move is tracked from there on. For a
modern consumer of the digital world, having a control over his online privacy is of
utmost importance. Remarketing advertisements were started to offer a personalised
and targeted experience to the users who leave the website without making a purchase.
Even though these advertisements are able to deliver a well targeted view but these
advertisements have also raised serious consumer privacy concerns. Remarketing ads
are based on tracking a user’s digital footstep. It required adding a cookie or a
remarketing tag on the user’s browser without their knowledge and there in every
move of the user is carefully tracked by the marketer and advertisers.
If that was not enough, these marketers and advertisers gain access a consumer’s
personal data by buying consumer data from data brokers and by making associations
Based on the expert interviews, it can be said that there are marketers who inform their
consumers when their personal information is at stake and maintain transparency in
this whole process. Some resort to a strong security system to protect their database
from hackers and malwares. It can be concluded that there is a set of marketers who do
not consider these remarketing advertisements a process of privacy breach and have
not informed their users about the information they have stored about them.
Analyzing the current scenario, privacy might become a luxury in the coming years.
Consumers don’t read the privacy policy and simply agree to all the terms and
conditions posed by the companies. The marketers use this opportunity to exploit
consumer data and in turn use it to influence their buying decisions. In India, there is no
such law that stops this condemnation of data. The only turn in events will come in May
0281 when General Data Protection Regulation (GDPR) Rules will be implemented by
European Union (EU). This rule will be valid in 28 member states of EU (Roy, 2018). It is
a step towards reshaping the approach towards data privacy. According to the
provisions of GDPR, business will have to protect the personal data of all citizens of EU
Based on the expert interviews, it can be concluded that even though these practices
raise privacy concerns in consumers, consumers have not done much about it. They
have not downloaded ad blockers to stop these advertisements from popping up on
their window everytime they use the internet.
This section presents analysis and findings of the study as set out in the research
methodology. The results presented were on implications of consumer privacy breach
due to remarketing activities by marketers. The objectives of the study were; to gain in-
depth knowledge about the term remarketing and to determine its effectiveness on
reach and conversions; to explore the issue of consumer privacy breach and to
determine the extent of this breach and to analyze the impact of remarketing activities
on consumer buying behaviour through recall. The study targeted 200 respondents
between the age group of 18-40 years, both male as well female. The chapter outlines
the demographic information of the respondents and the data findings and analysis
A pilot study was conducted to understand the realms of this research and to evaluate
the feasibility of the research objectives for this project. A total of 89 respondents
participated in the survey to give their unbiased opinion about remarketing. These
respondents were taken from based on the sample that will be picked for the final
questionnaire. To further testify the results of the Pilot study, a reliability test was
conducted.
As the value of Cronbach’s Alpha is 0.82, the data is completely reliable. Some of the
findings of the pilot study are listed below. Graph 4 explores the main concept of
remarketing advertisements. Respondents were asked whether they have seen
advertisements of a particular website after they have visited it? 66% respondents
responded with ‘Yes’ while 24% respondents said that they come across these
advertisements sometimes. Only 9% respondents have never seen these
advertisements.
Delving deeper into the concept of remarketing, the respondents were asked why they
don’t buy the product even after these personalized and targeted advertisements. 18%
respondents found these advertisements cheap or poorly designed. Another 18%
respondents said that these advertisements provide no value to them. Out of the
remaining respondents, 26% respondents didn’t find these advertisements relevant to
them. 37% respondents were irritated due to frequency of the same advertisement
The below graphs are aimed at analyzing consumer perception about remarketing
advertisements. Firstly, an analysis has been done related to how consumers feel about
remarketing advertisements that they all always prone to on their laptop, phone and
tablet. Taking half the share, 50% respondents find these advertisements creepy or
annoying followed by 23% respondents who have no opinion about the concept of
remarketing. Overall, 27% respondents have a positive impact due to these remarketing
activities. Out of these 27% respondents, 13% respondents appreciate the personalized
experience by marketers followed by 13% people who find these ads to be helpful
sometimes.
Demographics
The survey was first aimed at understanding the respondent’s personal profile with
regard to their education, age group and monthly income. The demographic information
points out the suitability of the respondents in finding out the effect of remarketing
activities on consumer buying behavior. Most of the respondents were between the age
group of 18-25 years old and are frequent online shoppers.
H1: Showing the same ad repeatedly (more 10 times) has a negative effect on
consumers
Question 2: On a scale of 1 to 5, how irritated do you feel when you see the same
advertisement more than 10 times?
H1: Showing the same remarketing ad repeatedly (more than 10 times) has a negative
effect on consumers.
H2: Consumers have stopped buying from websites that use their personal
information to show them ads.
Question 1: How often do you see online advertisements of products that you
have left in your cart?
1. Always 2. Sometimes 3.Never
Graph 14: Users have stopped visiting websites that use their information
Interpret Results- The ANOVA test showed a significance value of 0.003. As 0.003 is
less than 0.05, this means the result is significant. Calculation of mean helped to
understand that consumers who see these remarketing advertisements have stopped
buying from websites that show them these remarketing advertisements based on their
personal information.
Interpret Results- Many respondents have opted for rating 1 and 2 when they were
asked whether they are happy to provide their information for a personalized
experience. From Graph 17, it can concluded that not many users are happy to provide
their personal information for a personalized experience.
Interpret Results- Many respondents have opted for rating 4 and 5 when they were
asked whether they want to delete their data available online. From Graph 18, it can
concluded that users are keen to delete their information from a marketer’s database.
SUMMARY: The secondary and primary data gathered has helped in gaining meaningful
insights relevant to this study. Each of the research objectives undertaken for the purpose
of this research, have been studied in details to identify issues in current remarketing ads.
Based on these results, the researcher has drafted a summary, recommendations and
conclusion in the last chapter of this research report.
5.1 CONCLUSION
There are many websites which inform the consumers about their usage of cookie, but
to what extent, is something that is hidden from the consumer. There are other
companies as well which gather a consumer’s personal data without their knowledge.
Clearly, web browsing and shopping history is the data that is in abundance when these
cookies are activated but it doesn’t stop there. Marketers and Advertisers utilize a mix
of non-web conduct and information to concoct well-strategized advertisement
Besides this breach of trust, every trace of information available online can be accessed
by any random individual sitting in any country. Due to the current Aadhaar and
Facebook Fiasco, consumers are more aware and concerned about their online data
privacy than ever. Consumers are concerned about their privacy when it comes to
remarketing but if the marketers are able to instill confidence in the consumers about
safety of their personal data, their conversions can increase by many folds.
Based on expert interviews, it can be concluded that there are certain marketers who
are using consumer’s personal information without informing them and they do not
consider this practice a breach of their privacy. However, there is a sign of hope as some
marketers still believe in fair practices and inform their consumers about usage of their
personal data.
The study established that the impact of consumer buying behavior is determined by
how consumers perceive these remarketing advertisements. Consumers want these
remarketing advertisements only if they provide value to them and enhance their
shopping experience. The effect of these remarketing advertisements can be further
increased if the marketers take care of their consumers concern related to privacy and
other issues.
H1 Showing the same ad repeatedly (more than 10 times) has a negative effect on
consumers was tested with the help of Bivariate correlation and the result can neither
be accepted nor rejected. The correlation value is -0.10 which is a very weak correlation
but based on the primary(personal interviews with customers) and the secondary
research, we cannot completely reject this hypothesis. H2 Consumers have stopped
buying from websites that use their personal information to show them ads. Was testes
with the help of Anova and the result was significant with a value of 0.003 which is less
than 0.05 that means advertisements based on a consumer’s personal information such
as remarketing advertisements probe a user to stop buying from that particular
website. This shows that consumers have privacy concerns related to remarketing
advertisements.
5.2 RECOMMENDATIONS
Today, consumers are demanding for personalized advertisements but not at the cost of
their privacy invasion. Marketers should keep this thought in mind while planning
One of the core questions behind this research was to find out the implications of
consumer privacy breach due to remarketing. The ability to provide personalized
experience through remarketing advertisements is a boon for the marketers but like all
other things, it has also has a negative side attached to it. On one side of this thread are
consumers and on the other side are marketers. A balance should be made so that both
entities enjoy the benefits of remarketing equally. There are consumers who appreciate
marketer’s efforts for providing them with well targeted advertisements but for others,
frequency and timing of the advertisements becomes a challenge. In conclusion, with
remarketing, marketers can reach out to 96% of site visitors who leave the website
without making a purchase and if targeted properly, these percent of visitors can easily
be regained. For this to happen, a well planned and a coherent remarketing strategy is
required which does not exploit a consumer’s privacy while at the same time it reaches
the required objective of getting conversions.
In today’s fast-paced world, consumers more aware about their data usage than ever.
For consumers who have little knowledge about this scenario are eager to learn what all
information is being used and for what activity. Facebook and Google have changed
their privacy settings to allow users to view their personal information that is being
stored by these social giants. This personal information includes the advertisements
seen by a user, ads that he has interacted with, his preference, interests, social activity,
geo-location, shopping and browsing history. Google is not selling this personal
information to marketing and advertising companies, but Facebook sure is.
Instead of just viewing what data is available with a particular marketer, users should
be allowed to delete to delete their personal information whenever they want. Each
marketing firm should clearly mention their privacy policies and have a platform where
in the users can access their personal information and delete sensitive information.
Many marketing companies just notify the consumes that their website uses cookies,
however there is a huge chunk of online audience who do not understand the hidden
structure of cookies. A marketer should promptly mention the meaning of cookie, what
all information is gathered, what all information is used and the user should be notified
whenever his information is being used. The marketers and advertisers should work
towards making this a transparent process.
Even if marketers follow the above steps, protecting one’s personal information greatly
depends on the efforts of the consumer as well. We all have a habit to ‘Agree and
Continue’ on all websites without understanding the repercussions. This was one of the
SUMMARY: A synopsis of all the data collected, analyzed and discussed as a part of the
research – this chapter provides summary for future progress in terms of the topic chosen
to study the implications of consumer privacy breach in terms of remarketing. This
chapter also provides recommendations that can be followed to eliminate consumer
privacy breach in today’s digital world.
Q6. How often do you provide your information online while browsing online?
● Always
● Sometimes
● Never
Q7. How often do you visit a website, add products to the cart and leave without making
a purchase?
● 2-3 times a week
● Once a week
Q8. How often do you see online advertisements of the products that you have left in
your cart?
● Always
● Sometimes
● Never
Q10. After clicking on personalised advertisements, how often do you leave the website
without buying the product?
● Always
● Often
● Sometimes
● Never
Q11. What is the major reason for not buying the product even after you see these
personalised advertisements?
● Product/ad looks cheap
● Provides no value to me
● Not relevant to my purchase
● Irritated due to the frequency of the advertisements
● Not interested in these advertisements
● I do click on these advertisements to complete my purchase
● Other
Q12. On a scale of 1 to 5, how irritated do you feel when you see the same
advertisement more than 8 times?
Least 1 2 3 4 5 Most
Least 1 2 3 4 5 Most
Q15. What do you feel about personalised advertisements that follow you on every
device?
● Appreciate the personalised experience
● Find them irritating
● Helpful sometimes
● Needs to stop
● Find them creepy/intrusive
Q16. On a scale of 1 to 5, where 1 means strongly disagree and 5 means strongly agree,
rate the following questions-
1
S.n 5 (Strongly
Parameters (Strongly 2 3 4
o Agree)
Disagree)
I am aware that my
1 personal data is being
used by marketers
I should be informed
when and how my
2
information is being
used
It concerns me when
3 a marketer uses my
personal information
I should be allowed to
delete my
4
information from a
marketer's database
I have stopped buying
from websites that
5
use my personal
information
I am happy to provide
my information for a
6
personalised and
better experience
Q17. On a scale of 1 to 5, would you be interested in such personalised ads and do you
think it is a good practice?
Least Highly
1 2 3 4 5
Interested Interested
Details of Expert Interviews conducted for Primary Research are mentioned below.
Ishan Bansal
CEO, Inklik.com
15 years of experience
Jaya Sharma
CEO, I Love Free Software
15 years of experience
Jaya Sharma has over 15 years of IT, SEO, SMO, and Content
Writing Experience. With tremendous experience in team
management, she is able to coordinate day to day activities of
her entire organization. She is the CEO of I Love Free Software,
a website which presents the best free softwares available
online. She started this website 10 years ago, when she was in
Dallas, USA and has carried her passion for writing even after
moving back to New Delhi, India.
Manoj Negi
Digital Marketing & Lead Gen. Specialist, MDIS Singapore
9 years of experience
A joint conference ‘ICTETB 18’ organised by ARSEAM Foundation, New Delhi, India and
School of Education, Noida International University, G.B. Nagar, U.P. India with the
theme “Technology for Education, Training and Business”. The event provided a
common platform to the Academicians, Research Scholars, Students, Industrialists,
Professionals and Practitioners for the exchange of ideas, practical experiences and
insights into the evolution, formulation and implementation of technological
advancement in education, training and learning to meet the changing environment of
academics and business. It paved the way to conduct more significant and fruitful
research. The objective of the conference was to encourage and foster discussions
among teachers, practitioners, policymakers, and those who are interested in the
application of technology for education, training and business.