04.01.2013 Views

Personal Data Use and Morality in the E-Business Environment

Personal Data Use and Morality in the E-Business Environment

Personal Data Use and Morality in the E-Business Environment

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sep. 2004 Journal of Electronic Science <strong>and</strong> Technology of Ch<strong>in</strong>a Vol.2 No.3<br />

<strong>Personal</strong> <strong>Data</strong> <strong>Use</strong> <strong>and</strong> <strong>Morality</strong> <strong>in</strong> <strong>the</strong> E-Bus<strong>in</strong>ess<br />

<strong>Environment</strong> *<br />

MURATA Kiyoshi 1,2 , ORITO Yohko 3<br />

(1. Centre for Comput<strong>in</strong>g <strong>and</strong> Social Responsibility, De Montfort University Leicester LE1 9BH UK; 2. School of Commerce, Meiji University Tokyo<br />

101-8301 Japan; 3. Graduate School of Commerce, Meiji University Tokyo 101-8301 Japan)<br />

Abstract This paper deals with personal data use by firms <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment from <strong>the</strong><br />

viewpo<strong>in</strong>t of bus<strong>in</strong>ess adm<strong>in</strong>istration <strong>and</strong> <strong>in</strong>formation ethics. Whereas <strong>the</strong> tremendous development of<br />

<strong>in</strong>formation <strong>and</strong> communication technology (ICT) has made it easier for firms to acquire, store, share,<br />

<strong>and</strong> utilise personal data on <strong>the</strong>ir customers, firms that use personal data are exposed to risks related to<br />

privacy issues. S<strong>in</strong>ce <strong>in</strong>dividuals fear <strong>the</strong> <strong>in</strong>vasion of <strong>the</strong>ir privacy, <strong>the</strong> failure of a firm to appear or<br />

rema<strong>in</strong> trustworthy would make it difficult for it to ma<strong>in</strong>ta<strong>in</strong> accurate, up-to-date databases <strong>and</strong> to<br />

construct desirable bus<strong>in</strong>ess processes, which would affect <strong>the</strong> bottom l<strong>in</strong>e. Therefore, modern firms<br />

should do what <strong>the</strong>y can to ensure that <strong>the</strong>ir customers trust <strong>the</strong>m. For <strong>the</strong>m, one promis<strong>in</strong>g way to<br />

rema<strong>in</strong> trustworthy is to behave as a moral agent. Although it is difficult for any firm to meet <strong>the</strong><br />

conditions necessary to be a moral agent, competence <strong>in</strong> behav<strong>in</strong>g as a moral agent is a hard-to-imitate<br />

capability of firms for which personal data use is vital for enjoy<strong>in</strong>g <strong>the</strong> benefits of bus<strong>in</strong>ess relationships<br />

<strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment.<br />

Key words personal data use; privacy; relationship management; trustworth<strong>in</strong>ess; moral agent<br />

Thanks to <strong>the</strong> tremendous development of<br />

<strong>in</strong>formation <strong>and</strong> communication technology (ICT),<br />

especially database <strong>and</strong> network technologies, <strong>and</strong> <strong>the</strong><br />

explosive spread of <strong>the</strong> Internet, <strong>the</strong> e-bus<strong>in</strong>ess<br />

environment has emerged. ICT has become a<br />

ubiquitous technology that makes it easier for firms to<br />

establish communication l<strong>in</strong>kages, or to be “wired”,<br />

with <strong>the</strong>ir stakeholders. ICT enables firms <strong>in</strong> developed<br />

countries to construct desirable bus<strong>in</strong>ess processes,<br />

which streaml<strong>in</strong>e bus<strong>in</strong>ess operations <strong>and</strong><br />

communication, establish favourable, long-term<br />

relationships with <strong>the</strong>ir partners <strong>and</strong> customers, <strong>and</strong><br />

improve customer satisfaction. The appropriate<br />

application of ICT is critical for modern firms, s<strong>in</strong>ce<br />

<strong>the</strong> focus of competition has shifted from products to<br />

bus<strong>in</strong>ess processes with <strong>the</strong> maturity of economy.<br />

Moreover, <strong>the</strong> agile construction of bus<strong>in</strong>ess processes<br />

is essential for firms, because time has become a<br />

significant criterion of bus<strong>in</strong>ess performance <strong>in</strong> <strong>the</strong><br />

fragmented, uncerta<strong>in</strong> market conditions that firms<br />

confront today. Sett<strong>in</strong>g up a bus<strong>in</strong>ess partnership or<br />

collaboration is an efficacious way to construct<br />

processes agilely. The development <strong>and</strong> ma<strong>in</strong>tenance<br />

of hard-to-imitate capabilities that underp<strong>in</strong> bus<strong>in</strong>ess<br />

resources, coupled with <strong>the</strong> adoption of st<strong>and</strong>ard ICT<br />

to ensure connectivity with bus<strong>in</strong>ess partners <strong>and</strong><br />

customers, is necessary to allow modern firms to<br />

develop partnerships <strong>and</strong> rema<strong>in</strong> competitive.<br />

In this e-bus<strong>in</strong>ess environment, bus<strong>in</strong>ess process<br />

<strong>in</strong>novation methodologies that use personal data about<br />

customers, such as customer relationship management<br />

(CRM) <strong>and</strong> supply cha<strong>in</strong> management (SCM), are<br />

promis<strong>in</strong>g ways for firms to perform better. <strong>Personal</strong><br />

data are vital for construct<strong>in</strong>g efficient, effective<br />

bus<strong>in</strong>ess processes. However, <strong>the</strong> use of such data also<br />

has its risks. The salient risk factor is privacy. As <strong>the</strong><br />

right to privacy is considered important nowadays, an<br />

<strong>in</strong>vasion of privacy can become a serious concern, not<br />

only for <strong>the</strong> <strong>in</strong>dividuals whose privacy is at risk, but<br />

also for firms, whose reputation for trustworth<strong>in</strong>ess <strong>in</strong><br />

Received 2004-06-19<br />

* Supported by <strong>the</strong> MEXT Research Project “Global Bus<strong>in</strong>ess <strong>and</strong> IT Management: Global eSCM” at <strong>the</strong> Research Institute of Commerce, Meiji University.


No.3 MURATA Kiyoshi et al: <strong>Personal</strong> <strong>Data</strong> <strong>Use</strong> <strong>and</strong> <strong>Morality</strong> <strong>in</strong> <strong>the</strong> E-Bus<strong>in</strong>ess <strong>Environment</strong> 117<br />

<strong>the</strong> e-bus<strong>in</strong>ess environment can be jeopardized.<br />

This paper deals with personal data use by firms<br />

<strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment from <strong>the</strong> viewpo<strong>in</strong>t of<br />

bus<strong>in</strong>ess adm<strong>in</strong>istration <strong>and</strong> <strong>in</strong>formation ethics. In our<br />

discussion, we emphasise that ethical behaviour,<br />

<strong>in</strong>clud<strong>in</strong>g <strong>the</strong> protection of privacy, has practical or<br />

strategic value, as well as ethical or human value, for<br />

modern firms.<br />

1 <strong>Personal</strong> <strong>Data</strong> <strong>Use</strong> <strong>and</strong> Privacy<br />

1.1 Relationship Management <strong>and</strong> Privacy Risk<br />

In bus<strong>in</strong>ess, personal data use first became<br />

important <strong>in</strong> market<strong>in</strong>g. Instead of mass market<strong>in</strong>g,<br />

which aims at maximis<strong>in</strong>g market share, personal<br />

market<strong>in</strong>g held <strong>the</strong> spotlight as <strong>the</strong> market fragmented<br />

<strong>and</strong> uncerta<strong>in</strong>ty <strong>in</strong>creased. The development of<br />

database technology <strong>and</strong> <strong>the</strong> vast growth of comput<strong>in</strong>g<br />

power has made it possible for many firms to<br />

undertake personal market<strong>in</strong>g, which aims to maximise<br />

<strong>the</strong> lifetime value of each customer or customer share<br />

by us<strong>in</strong>g stored data to differentiate customers <strong>and</strong> to<br />

enhance <strong>the</strong>ir loyalty to <strong>the</strong> firm [1,2] .<br />

The ultimate goal of personal market<strong>in</strong>g is<br />

relationship management, that is, to establish<br />

favourable, long-term relationships with <strong>in</strong>dividual<br />

customers by provid<strong>in</strong>g <strong>the</strong>m with useful <strong>in</strong>formation<br />

produced by analys<strong>in</strong>g <strong>the</strong>ir consumption profile. The<br />

idea of relationship management has been extended to<br />

o<strong>the</strong>r bus<strong>in</strong>ess regions. For example, one of <strong>the</strong> ma<strong>in</strong><br />

objectives of SCM <strong>and</strong> CRM is to optimise <strong>the</strong><br />

relationship of a firm with its bus<strong>in</strong>ess partners <strong>and</strong><br />

customers. A firm <strong>and</strong> its bus<strong>in</strong>ess partners that jo<strong>in</strong>tly<br />

<strong>in</strong>troduce SCM systems would enjoy <strong>the</strong> benefits of<br />

efficient, effective merch<strong>and</strong>is<strong>in</strong>g <strong>and</strong> logistics,<br />

realised by <strong>the</strong> precise analysis of shared data on<br />

<strong>in</strong>dividual customers. Conversely, <strong>in</strong>dividual<br />

customers would benefit from <strong>the</strong> timely provision of<br />

goods <strong>and</strong> services that <strong>the</strong>y need from <strong>the</strong> firms, at<br />

lower prices. Needless to say, <strong>the</strong> development <strong>and</strong><br />

ma<strong>in</strong>tenance of accurate databases that store large<br />

amounts of correct personal data are essential to<br />

successful relationship management.<br />

In order to keep databases accurate, it is necessary<br />

for firms to acquire correct, up-to-date data on a<br />

cont<strong>in</strong>uous basis. These data are acquired ma<strong>in</strong>ly by<br />

obta<strong>in</strong><strong>in</strong>g consumption data on <strong>in</strong>dividuals, sometimes<br />

with <strong>the</strong>ir attribute data, through loyalty programmes,<br />

which are called po<strong>in</strong>t card schemes <strong>in</strong> Japan, <strong>the</strong><br />

utilisation of <strong>in</strong>formation systems, such as <strong>the</strong> POS<br />

system, <strong>and</strong> so on. The <strong>in</strong>tegration of data on one<br />

person from various databases, some of which may be<br />

purchased from third party organisations, is usually<br />

useful for determ<strong>in</strong><strong>in</strong>g his or her consumption profile<br />

<strong>and</strong>, <strong>the</strong>refore, may be helpful <strong>in</strong> effective relationship<br />

management. Integrated <strong>and</strong> analysed data on<br />

<strong>in</strong>dividual customers are shared among bus<strong>in</strong>ess<br />

partners to optimise <strong>the</strong> activities of <strong>the</strong> collaborative<br />

body that <strong>the</strong>y form.<br />

However, <strong>the</strong>se methods of collect<strong>in</strong>g <strong>and</strong> us<strong>in</strong>g<br />

personal data entail serious concerns related to <strong>the</strong><br />

<strong>in</strong>vasions of privacy of <strong>in</strong>dividual customers. Kotler<br />

believes that ignorance of ethical problems, such as<br />

privacy, might reduce <strong>the</strong> effectiveness of market<strong>in</strong>g<br />

because consumers will develop a distrust of market<strong>in</strong>g,<br />

<strong>and</strong> <strong>the</strong>n dem<strong>and</strong> <strong>the</strong> regulation of market<strong>in</strong>g<br />

activities [3] . This is also true for relationship<br />

management. In addition to <strong>the</strong> risk of regulation,<br />

consumer distrust <strong>in</strong> <strong>the</strong> market<strong>in</strong>g <strong>and</strong> o<strong>the</strong>r bus<strong>in</strong>ess<br />

activities of a firm may result <strong>in</strong> customers’ refus<strong>in</strong>g to<br />

provide personal data to <strong>the</strong> firm <strong>and</strong> may affect how<br />

much stakeholders trust <strong>the</strong> firm. Without personal<br />

data use <strong>and</strong> trust, a firm cannot survive <strong>in</strong> <strong>the</strong><br />

e-bus<strong>in</strong>ess environment, because it is difficult for <strong>the</strong><br />

firm to construct efficient, effective bus<strong>in</strong>ess processes<br />

<strong>and</strong> to become a partner with o<strong>the</strong>r firms.<br />

Consequently, <strong>the</strong> protection of privacy has a practical<br />

or strategic value for modern firms <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess<br />

environment.<br />

1.2 Privacy as a Matter of Bus<strong>in</strong>ess<br />

The right to privacy is not a very old concept. In<br />

1890, Warren <strong>and</strong> Br<strong>and</strong>eis def<strong>in</strong>ed it as “<strong>the</strong> right to<br />

be let alone” [4] . This “classic” def<strong>in</strong>ition was due to <strong>the</strong><br />

rampant journalism of that time, which featured gossip<br />

items. The advent of <strong>the</strong> <strong>in</strong>formation society has<br />

changed <strong>the</strong> <strong>in</strong>terpretation of <strong>the</strong> right to privacy from<br />

<strong>the</strong> classic one to “<strong>the</strong> <strong>in</strong>dividual’s right to control <strong>the</strong><br />

circulation of <strong>in</strong>formation concern<strong>in</strong>g him or her” [5] .<br />

It is alleged that with <strong>the</strong> maturation of society,


118<br />

people <strong>in</strong> developed countries are aware of <strong>the</strong>ir rights<br />

<strong>and</strong> <strong>the</strong> right to privacy is now universally accepted. In<br />

fact, any bus<strong>in</strong>ess behaviour that arouses suspicion of a<br />

violation of <strong>the</strong> right to privacy may result <strong>in</strong> wi<strong>the</strong>r<strong>in</strong>g<br />

criticism of <strong>the</strong> firm, not only from privacy advocates,<br />

but also from <strong>the</strong> mass media <strong>and</strong> public. The fuss over<br />

“Lotus Market Place: Household” <strong>in</strong> 1990 clearly<br />

showed that privacy was a matter of bus<strong>in</strong>ess [6] . In<br />

2003, Benetton <strong>and</strong> Wal-Mart ab<strong>and</strong>oned <strong>the</strong>ir plans to<br />

deploy radio frequency identification (RFID) to<br />

manage commodities because of <strong>the</strong> <strong>in</strong>tense opposition<br />

to it. It was <strong>the</strong> fear of a violation of <strong>the</strong> right to<br />

privacy that was implicit <strong>in</strong> utilisation of RFID that<br />

triggered opposition to it.<br />

However, <strong>the</strong> right to privacy is an elusive<br />

concept. Several languages, <strong>in</strong>clud<strong>in</strong>g Japanese, lack a<br />

word correspond<strong>in</strong>g to privacy exactly. Enforcement of<br />

this right often appears arbitrary; eventually, <strong>the</strong> right<br />

to privacy will be understood as a subjective,<br />

timeserv<strong>in</strong>g concept. Ironically, whereas loyalty<br />

programmes have rarely been harshly criticised as<br />

threats to <strong>the</strong> right to privacy, RFID is frequently<br />

treated as a serious <strong>in</strong>fr<strong>in</strong>gement upon privacy. Often,<br />

<strong>the</strong> same sales promotion <strong>in</strong>formation provided by a<br />

firm causes diametrically opposite responses from<br />

those who receive it: some welcome <strong>the</strong> provision of<br />

<strong>in</strong>formation because <strong>the</strong>y f<strong>in</strong>d it useful; o<strong>the</strong>rs claim<br />

that <strong>the</strong> provision of “junk” <strong>in</strong>formation <strong>in</strong>fr<strong>in</strong>ges <strong>the</strong>ir<br />

right to privacy. Moreover, <strong>the</strong> present e-bus<strong>in</strong>ess<br />

environment, where massive amounts of personal data,<br />

<strong>in</strong>clud<strong>in</strong>g personal identifiable <strong>in</strong>formation (PII), are<br />

already stored <strong>in</strong> bus<strong>in</strong>ess databases <strong>and</strong> circulated<br />

among firms, makes <strong>the</strong> practical efficacy of <strong>the</strong><br />

def<strong>in</strong>ition of <strong>the</strong> right to privacy as <strong>the</strong> right to control<br />

personal <strong>in</strong>formation dubious.<br />

The elusiveness of <strong>the</strong> right to privacy suggests<br />

that proper h<strong>and</strong>l<strong>in</strong>g of this bus<strong>in</strong>ess matter, as well as<br />

predict<strong>in</strong>g <strong>and</strong> controll<strong>in</strong>g emergence of <strong>the</strong> privacy<br />

problem, is never easy for any firm. Although<br />

legislation has made great efforts to protect <strong>the</strong> privacy<br />

of <strong>in</strong>dividual consumers, <strong>in</strong> step with <strong>the</strong> development<br />

of <strong>the</strong> <strong>in</strong>formation society, mere compliance with <strong>the</strong><br />

regulations, which is sufficient to avoid accusations<br />

<strong>and</strong> <strong>in</strong>demnity risk, is <strong>in</strong>sufficient if firms are to h<strong>and</strong>le<br />

Journal of Electronic Science <strong>and</strong> Technology of Ch<strong>in</strong>a Vol.2<br />

privacy problems properly. For example, <strong>in</strong> July 2001,<br />

Ma<strong>in</strong>ichi Newspapers reported that Toppan Insatsu<br />

sold a mail<strong>in</strong>g list made <strong>and</strong> held by a bankrupt<br />

catalogue shipper, to which Toppan attached a security<br />

warranty, to ano<strong>the</strong>r catalogue shipper. This sale might<br />

be legal, but was questionable <strong>in</strong> <strong>the</strong> light of <strong>the</strong><br />

protection of privacy <strong>and</strong> fraught with risks related to<br />

trust <strong>and</strong> reputation.<br />

2 Firms as Moral Agents<br />

2.1 Cooperation between Firms <strong>and</strong> Individual<br />

Customers: A Game Analysis<br />

Effective personal data use at firms is dependent<br />

on <strong>the</strong> quality of data that <strong>the</strong>y acquire, store, <strong>and</strong> share<br />

with <strong>the</strong>ir bus<strong>in</strong>ess partners. Firms need accurate data<br />

on many <strong>in</strong>dividual customers or consumers to conduct<br />

e-bus<strong>in</strong>ess successfully. However, <strong>in</strong>dividual<br />

customers who hate to have <strong>the</strong>ir right to privacy<br />

<strong>in</strong>fr<strong>in</strong>ged can provide firms with false data without<br />

penalty <strong>and</strong> sometimes even with no qualms. Can firms<br />

motivate <strong>in</strong>dividual customers to stop short of<br />

behav<strong>in</strong>g dishonestly <strong>and</strong> prompt <strong>the</strong>m to provide true<br />

data? Moreover, is <strong>the</strong>re an <strong>in</strong>centive for firms to<br />

ma<strong>in</strong>ta<strong>in</strong> a favourable relationship with <strong>the</strong>ir<br />

customers?<br />

Customer<br />

Dishonest<br />

(Provide <strong>in</strong>correct data)<br />

Honest<br />

(Provide correct data)<br />

Tab.1 Prisoner’s dilemma<br />

Dishonest<br />

(<strong>Use</strong> data <strong>in</strong> an<br />

improper way)<br />

Firm<br />

Honest<br />

(<strong>Use</strong> data <strong>in</strong> a<br />

proper way)<br />

4, 4 10, 2<br />

2, 10 8, 8<br />

To answer <strong>the</strong>se questions, let us consider <strong>the</strong><br />

situation represented <strong>in</strong> <strong>the</strong> well-known game shown <strong>in</strong><br />

Tab.1. In Prisoner’s Dilemma, <strong>the</strong>re are two players, an<br />

<strong>in</strong>dividual customer <strong>and</strong> a firm, <strong>and</strong> each has two<br />

strategies: honest <strong>and</strong> dishonest. For <strong>the</strong> consumer<br />

(dis)honest means provid<strong>in</strong>g <strong>the</strong> firm with (<strong>in</strong>)correct<br />

personal data, while for <strong>the</strong> firm (dis)honest means<br />

us<strong>in</strong>g data acquired from <strong>the</strong> customer <strong>in</strong> a(n)<br />

(im)proper way.<br />

The value of <strong>the</strong> payoff assigned to each outcome


No.3 MURATA Kiyoshi et al: <strong>Personal</strong> <strong>Data</strong> <strong>Use</strong> <strong>and</strong> <strong>Morality</strong> <strong>in</strong> <strong>the</strong> E-Bus<strong>in</strong>ess <strong>Environment</strong> 119<br />

of <strong>the</strong> game is expla<strong>in</strong>ed as follows:<br />

1) When both players choose to be honest, <strong>the</strong><br />

consumer enjoys a high-level payoff by gett<strong>in</strong>g<br />

desirable service provided by <strong>the</strong> firm, which is made<br />

possible by <strong>the</strong> firm’s personal data use, <strong>and</strong> <strong>the</strong> firm<br />

ga<strong>in</strong>s a high-level payoff through its enhanced<br />

efficiency brought about by personal data use.<br />

2) When both players choose to be dishonest, <strong>the</strong>y<br />

ga<strong>in</strong> only a low-level payoff, s<strong>in</strong>ce <strong>the</strong> firm cannot act<br />

effectively to improve <strong>the</strong> status of <strong>the</strong> players as a<br />

consequence of <strong>the</strong> firm’s personal data use.<br />

3) When <strong>the</strong> customer chooses to be dishonest <strong>and</strong><br />

<strong>the</strong> firm is honest, <strong>the</strong> customer gets an outst<strong>and</strong><strong>in</strong>g<br />

payoff, because she receives additional benefit from<br />

<strong>the</strong> firm <strong>in</strong> return for provid<strong>in</strong>g personal data <strong>and</strong> is not<br />

irritated by an <strong>in</strong>vasion of privacy. Conversely, <strong>the</strong> firm<br />

ga<strong>in</strong>s a miserable payoff, s<strong>in</strong>ce it is forced to spend<br />

money acquir<strong>in</strong>g, stor<strong>in</strong>g, <strong>and</strong> utilis<strong>in</strong>g <strong>the</strong> <strong>in</strong>correct<br />

personal data.<br />

4) When <strong>the</strong> customer chooses to be honest <strong>and</strong><br />

<strong>the</strong> firm is dishonest, <strong>the</strong> customer is compelled to bear<br />

a miserable payoff. She is not provided with any<br />

worthwhile personal service, but is exploited by <strong>the</strong><br />

firm. By contrast, <strong>the</strong> firm’s arbitrary utilisation <strong>and</strong><br />

sell<strong>in</strong>g of <strong>the</strong> personal data br<strong>in</strong>gs an outst<strong>and</strong><strong>in</strong>g<br />

payoff to <strong>the</strong> firm.<br />

Obviously, both of <strong>the</strong> rational players ga<strong>in</strong> only<br />

<strong>the</strong> low-level payoff, as a Nash equilibrium, if <strong>the</strong><br />

game is played just once. Tab.2 is <strong>the</strong> payoff matrix of<br />

<strong>the</strong> game when it is repeated <strong>in</strong>f<strong>in</strong>itely under<br />

conditions of perfect monitor<strong>in</strong>g [7,8] . This condition<br />

means that one player can observe <strong>the</strong> o<strong>the</strong>r player’s<br />

play each time <strong>the</strong> game is played. “Inf<strong>in</strong>itely<br />

repeated” means that nei<strong>the</strong>r player knows when <strong>the</strong><br />

game will end. Here, δ is a discount rate, <strong>and</strong> <strong>the</strong><br />

Customer<br />

present value of <strong>the</strong> long-term payoff (multiplied by<br />

1−δ for convenience) is shown <strong>in</strong> Tab.2. In this<br />

<strong>in</strong>f<strong>in</strong>itely repeated game, four strategies are considered.<br />

A player chooses to be (dis)honest at each move of <strong>the</strong><br />

game on adopt<strong>in</strong>g <strong>the</strong> strategy (dis)honest at any time.<br />

Trigger is a strategy such that <strong>the</strong> player cont<strong>in</strong>ues to<br />

choose honest at each move, unless <strong>the</strong> opponent<br />

chooses dishonest; once <strong>the</strong> opponent chooses<br />

dishonest, <strong>the</strong> player cont<strong>in</strong>ues to choose dishonest<br />

from <strong>the</strong>n on. Tit-for-tat is ano<strong>the</strong>r strategy, such that a<br />

player chooses honest on <strong>the</strong> first move <strong>and</strong> makes <strong>the</strong><br />

same choice as <strong>the</strong> opponent’s previous choice from<br />

<strong>the</strong> second move onward.<br />

One Nash equilibrium <strong>in</strong> <strong>the</strong> game is [Dishonest<br />

Anytime, Dishonest Anytime]. However, strategic<br />

profiles [Trigger, Trigger] <strong>and</strong> [Tit-for-Tat, Tit-for-Tat]<br />

become Nash equilibria if δ > 1/3. This means that if<br />

<strong>the</strong> future value of a payoff is sufficiently large<br />

compared with <strong>the</strong> present value, <strong>the</strong> players can<br />

choose cooperative strategies. The implications of <strong>the</strong><br />

result of <strong>the</strong> game for e-bus<strong>in</strong>ess, under <strong>the</strong> condition<br />

of perfect monitor<strong>in</strong>g, are:<br />

1) If an <strong>in</strong>dividual customer believes that it is<br />

beneficial to conduct long-term bus<strong>in</strong>ess transactions<br />

with a firm, she has an <strong>in</strong>centive to cooperate with <strong>the</strong><br />

firm,<br />

2) If a firm believes that long-term transactions<br />

with an <strong>in</strong>dividual customer are more profitable than<br />

short-term or one-time exploitative deals, <strong>the</strong> firm has<br />

an <strong>in</strong>centive to behave cooperatively, <strong>and</strong><br />

3) If both of <strong>the</strong> players believe that <strong>the</strong> opponent<br />

favours <strong>the</strong> larger benefit of long-term transactions<br />

versus short-term transactions, <strong>the</strong>y are strongly<br />

motivated to act cooperatively.<br />

Tab.2 Payoff matrix of <strong>in</strong>f<strong>in</strong>itely repeated prisoner’s dilemma (multiplied by 1−δ)<br />

Firm<br />

Dishonest Anytime Honest Anytime Trigger Tit for Tat<br />

Dishonest Anytime 4,4 10,2 10−6δ, 2+2δ 10−6δ, 2+2δ<br />

Honest Anytime 2,10 8,8 8,8 8,8<br />

Trigger 2+2δ, 10−6δ 8,8 8,8 8,8<br />

Tit for Tat 2+2δ, 10−6δ 8,8 8,8 8,8


120<br />

In this game analysis, <strong>the</strong> assumption that <strong>the</strong><br />

game is repeated <strong>in</strong>f<strong>in</strong>itely is acceptable because it<br />

corresponds to <strong>the</strong> go<strong>in</strong>g concern assumption. In reality,<br />

<strong>the</strong> condition of perfect monitor<strong>in</strong>g may seem too<br />

strong. Indeed, it can never be true <strong>in</strong> <strong>the</strong> real world.<br />

However, <strong>the</strong> shift <strong>in</strong> <strong>the</strong> social expectation of bus<strong>in</strong>ess<br />

behaviour from amoral to moral has enhanced social<br />

sensitivity to immoral behaviour by firms. In addition,<br />

<strong>in</strong> <strong>the</strong> age of <strong>the</strong> control revolution [9] , <strong>the</strong> capacity of<br />

<strong>in</strong>dividuals to control <strong>in</strong>formation has been<br />

significantly improved by ICT, especially <strong>the</strong> Internet<br />

<strong>and</strong> mobile phones. These circumstances place modern<br />

firms under <strong>the</strong> surveillance of “little bro<strong>the</strong>rs” or <strong>the</strong><br />

voluntarily participative Panopticon [10] . Actually, many<br />

bus<strong>in</strong>ess sc<strong>and</strong>als were found out by exposure from<br />

with<strong>in</strong> <strong>and</strong> without recently. In <strong>the</strong> meantime, for firms<br />

<strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment, <strong>the</strong> importance of<br />

ensur<strong>in</strong>g <strong>the</strong> accuracy of <strong>the</strong> personal data that <strong>the</strong>y<br />

store <strong>and</strong> use is significant, as we have already<br />

mentioned. This means that firms won’t hesitate to<br />

spend substantial amounts to keep <strong>the</strong>ir databases<br />

accurate. Therefore, it is not improper to assume <strong>the</strong><br />

condition of perfect monitor<strong>in</strong>g <strong>in</strong> our analysis,<br />

although it is still possible that <strong>the</strong> monitor<strong>in</strong>g is<br />

distorted because of cognitive biases.<br />

S<strong>in</strong>ce many researchers <strong>and</strong> practitioners assert<br />

<strong>the</strong> f<strong>in</strong>ancial significance of repeat bus<strong>in</strong>ess based on a<br />

long-term relationship with customers for firms <strong>in</strong> <strong>the</strong><br />

e-bus<strong>in</strong>ess environment [11] , <strong>the</strong> profitability of <strong>the</strong><br />

long-term transaction is quite conv<strong>in</strong>c<strong>in</strong>g for <strong>the</strong> firms.<br />

Therefore, a firm <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment is<br />

likely to have <strong>the</strong> <strong>in</strong>centive to use personal data<br />

properly <strong>and</strong> to let <strong>in</strong>dividual customers believe that<br />

<strong>the</strong> long-term transaction with <strong>the</strong> firm also benefits<br />

<strong>the</strong>m. By contrast, <strong>in</strong>dividual customers can easily see<br />

<strong>the</strong> benefits of <strong>the</strong> timely provision of customised<br />

goods <strong>and</strong> services at lower prices enabled by <strong>the</strong><br />

proper use of personal data on customers by firms. A<br />

major stumbl<strong>in</strong>g block to customers’ decisions to give<br />

a firm <strong>the</strong>ir personal data on a cont<strong>in</strong>uous basis is <strong>the</strong><br />

uncerta<strong>in</strong> trustworth<strong>in</strong>ess of <strong>the</strong> firm or <strong>the</strong> fear that <strong>the</strong><br />

firm will <strong>in</strong>fr<strong>in</strong>ge on <strong>the</strong>ir right to privacy. Mick et al.<br />

states that firms that use personal data on customers<br />

should not be harmful entities but be partners of <strong>the</strong>ir<br />

Journal of Electronic Science <strong>and</strong> Technology of Ch<strong>in</strong>a Vol.2<br />

customers [12] . Then, under what conditions do<br />

<strong>in</strong>dividual customers have <strong>in</strong>centive to trust a firm?<br />

2.2 <strong>Morality</strong> as a Hard-to-Imitate Capability<br />

There is no quick or special remedy by which<br />

firms can ensure that <strong>in</strong>dividual customers trust <strong>the</strong>m.<br />

Trustworth<strong>in</strong>ess is generated by appropriate words <strong>and</strong><br />

deeds over a long period, but is easily lost by one-time<br />

misconduct, <strong>and</strong> <strong>the</strong> recovery of trustworth<strong>in</strong>ess takes<br />

a long time. The stakeholders <strong>and</strong> <strong>in</strong>fluencers judge<br />

what is appropriate, not <strong>the</strong> firm. The trustworth<strong>in</strong>ess<br />

reflects <strong>the</strong>ir trust <strong>in</strong> <strong>the</strong> firm, which exists with<strong>in</strong> <strong>the</strong>ir<br />

m<strong>in</strong>ds. Therefore, it is difficult for any firm to control<br />

its trustworth<strong>in</strong>ess <strong>and</strong> reputation or <strong>in</strong>formation on <strong>the</strong><br />

trustworth<strong>in</strong>ess.<br />

For a firm, <strong>the</strong> best way to establish <strong>and</strong> ma<strong>in</strong>ta<strong>in</strong><br />

high trustworth<strong>in</strong>ess is to behave as a moral agent.<br />

Necessary conditions for a firm to be a moral agent are:<br />

1) To be sensitive to ethical problems that its behaviour<br />

may cause, 2) To behave defensively, that is, to be<br />

accountable for all its bus<strong>in</strong>ess behaviour, <strong>and</strong> 3) To be<br />

a rational <strong>in</strong>terlocutor, that is, not to hesitate, when<br />

problems with its behaviour are perceived, to discuss<br />

problems with o<strong>the</strong>rs who hold different values from<br />

<strong>the</strong> firm rationally, <strong>and</strong> to commit to problem-solv<strong>in</strong>g<br />

<strong>in</strong> a serious, positive manner.<br />

Needless to say, a firm doesn’t have a personality.<br />

To fulfil <strong>the</strong> necessary conditions, <strong>in</strong>dividual members<br />

of a firm have to behave autonomously as moral agents<br />

<strong>and</strong> share <strong>the</strong> organisational values. Organisational<br />

measures, such as sett<strong>in</strong>g up an ethics steer<strong>in</strong>g<br />

committee, devis<strong>in</strong>g a privacy policy <strong>and</strong> a code of<br />

ethics <strong>and</strong> conduct, educat<strong>in</strong>g <strong>the</strong> employees on ethics,<br />

<strong>and</strong> carry<strong>in</strong>g out an ethical audit of <strong>the</strong> <strong>in</strong>formation<br />

system, may help to make members of a firm behave<br />

morally <strong>and</strong> to give <strong>the</strong> firm a good reputation as a<br />

moral agent [13] .<br />

Unfortunately, it is not easy for a firm to make its<br />

stakeholders <strong>and</strong> <strong>in</strong>fluencers perceive it as a moral<br />

agent. This means that <strong>the</strong> established reputation of a<br />

firm as a moral agent is a rare resource that will allow<br />

it survive competition <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment<br />

<strong>and</strong> <strong>the</strong> morality of a firm is a hard-to-imitate<br />

capability. Such a reputation will prompt <strong>in</strong>dividual<br />

customers to trust <strong>the</strong> firm, which should make it easy


No.3 MURATA Kiyoshi et al: <strong>Personal</strong> <strong>Data</strong> <strong>Use</strong> <strong>and</strong> <strong>Morality</strong> <strong>in</strong> <strong>the</strong> E-Bus<strong>in</strong>ess <strong>Environment</strong> 121<br />

for <strong>the</strong> firm to acquire <strong>and</strong> use accurate personal data<br />

on its customers cont<strong>in</strong>uously <strong>and</strong> establish long-term<br />

relationships with its customers <strong>and</strong> bus<strong>in</strong>ess partners.<br />

Individual customers who trust <strong>the</strong> firm may agree to<br />

transfer a range of control over <strong>in</strong>formation concern<strong>in</strong>g<br />

<strong>the</strong>m to <strong>the</strong> firm <strong>and</strong> become bus<strong>in</strong>ess partners or<br />

active components of <strong>the</strong> bus<strong>in</strong>ess process who<br />

will<strong>in</strong>gly manage <strong>the</strong>ir relationship with <strong>the</strong> firm.<br />

3 Conclusions<br />

<strong>Personal</strong> data use is <strong>the</strong> key to successful bus<strong>in</strong>ess<br />

for modern firms <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess environment. It<br />

makes it easier for firms to construct efficient,<br />

effective bus<strong>in</strong>ess processes <strong>and</strong> to establish favourable,<br />

long-term relationships with <strong>the</strong>ir customers <strong>and</strong><br />

bus<strong>in</strong>ess partners. However, this key activity is fraught<br />

with risks that centre on privacy issues. Any bus<strong>in</strong>ess<br />

behaviour perceived as an <strong>in</strong>vasion of privacy may<br />

erode <strong>the</strong> trustworth<strong>in</strong>ess of <strong>the</strong> firm, result<strong>in</strong>g <strong>in</strong> a bad<br />

reputation, accusations aga<strong>in</strong>st it, <strong>and</strong> <strong>in</strong>demnities.<br />

Moreover, <strong>the</strong> fear of <strong>in</strong>vasion of privacy by <strong>in</strong>dividual<br />

customers makes it difficult for firms to set up <strong>and</strong><br />

ma<strong>in</strong>ta<strong>in</strong> accurate databases of personal data, which<br />

could seriously affect <strong>the</strong>ir bus<strong>in</strong>ess performance.<br />

Hence, modern firms must strive to ga<strong>in</strong> <strong>the</strong>ir<br />

customers’ trust.<br />

To rema<strong>in</strong> trustworthy with a good reputation,<br />

firms should behave as moral agents. Such competence<br />

is a hard-to-imitate capability of firms <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess<br />

environment, although it is difficult for any firm to be<br />

a moral agent. The implementation of organisational<br />

measures to cultivate this capability is def<strong>in</strong>itely<br />

crucial for firms. Through a steady effort to establish<br />

<strong>and</strong> ma<strong>in</strong>ta<strong>in</strong> morality, modern firms can enjoy <strong>the</strong><br />

benefits of favourable, long-term relationships with<br />

<strong>the</strong>ir customers <strong>and</strong> bus<strong>in</strong>ess partners.<br />

References<br />

[1] Newell, F. Loyalty.com: Customer Relationship<br />

Management <strong>in</strong> <strong>the</strong> New Era of Internet Market<strong>in</strong>g[M].<br />

London: McGraw-Hill, 2000<br />

[2] Peppers D, Rogers M. The One to One Future: Build<strong>in</strong>g<br />

Relationships One Customer at a Time[M]. New York:<br />

Currency Doubleday, 1993<br />

[3] Kotler P. Market<strong>in</strong>g Management: Millennium Edition[M].<br />

Upper Saddle River, NJ: Prentice-Hall, 2000<br />

[4] Warren S D, Br<strong>and</strong>eis L D. The right to privacy[J]. Harvard<br />

Law Review, 1890, 4 (5): 193-220<br />

[5] Horibe M. Privacy <strong>and</strong> <strong>the</strong> Advanced Information<br />

Society[M]. Tokyo: Iwanami, 1988 (<strong>in</strong> Japanese)<br />

[6] Pa<strong>in</strong> L S. Cases <strong>in</strong> Leadership, Ethics, <strong>and</strong> Organizational<br />

Integrity: A Strategic Perspective[M]. Boston, MA: Irw<strong>in</strong>,<br />

1996<br />

[7] Axelrod R. The Evolution of Cooperation[M]. New York:<br />

Basic Books, 1984<br />

[8] Okada A. Game Theory[M], Tokyo: Yuhikaku, 1996 (<strong>in</strong><br />

Japanese)<br />

[9] Shapiro A L. The Control Revolution: How <strong>the</strong> Internet is<br />

Putt<strong>in</strong>g Individuals <strong>in</strong> Charge <strong>and</strong> Chang<strong>in</strong>g <strong>the</strong> World We<br />

Know[M]. New York: PublicAffairs, 1999<br />

[10] Whitaker R. The End of Privacy: How Total Surveillance is<br />

Becom<strong>in</strong>g a Reality[M]. New York: The New Press, 1999<br />

[11] Keen P, McDonald M. The E-Process Edge: Creat<strong>in</strong>g<br />

Customer Value <strong>and</strong> Bus<strong>in</strong>ess Wealth <strong>in</strong> <strong>the</strong> Internet<br />

Era[M]. Berkeley, CA: Osborn/McGraw-Hill, 2000<br />

[12] Mick D, Fournier G S, Dobscha S. Prevent<strong>in</strong>g <strong>the</strong><br />

premature death of relationship market<strong>in</strong>g[J]. Harvard<br />

Bus<strong>in</strong>ess Review, 1998, 76 (1): 42-43<br />

[13] Murata K. Trust <strong>and</strong> Reputation as Corporate Assets <strong>and</strong><br />

Information Ethics[M]. Tokyo: Nikka Giren, 2003: 163-185<br />

(<strong>in</strong> Japanese)<br />

Brief Introduction to Author(s)<br />

MURATA Kiyoshi is a visit<strong>in</strong>g scholar at Centre for<br />

Comput<strong>in</strong>g <strong>and</strong> Social Responsibility <strong>and</strong> an honorary visit<strong>in</strong>g<br />

professor at Faculty of Comput<strong>in</strong>g Science <strong>and</strong> Eng<strong>in</strong>eer<strong>in</strong>g, De<br />

Montfort University, Leicester, UK, <strong>and</strong> a professor of MIS at<br />

School of Commerce, Meiji University, Tokyo, Japan. He is a<br />

member of <strong>the</strong> Editorial Board of Journal of Information,<br />

Communication <strong>and</strong> Ethics <strong>in</strong> Society (ICES). His research<br />

<strong>in</strong>terest is <strong>in</strong> bus<strong>in</strong>ess <strong>and</strong> <strong>in</strong>formation ethics <strong>in</strong> <strong>the</strong> e-bus<strong>in</strong>ess<br />

environment.<br />

ORITO Yohko is a doctoral student at Graduate School of<br />

Commerce, Meiji University, Tokyo, Japan. She received her<br />

degrees of Bachelor of Commerce <strong>and</strong> Master of Commerce<br />

from Meiji University <strong>in</strong> 2001 <strong>and</strong> 2003 respectively. Her<br />

research <strong>in</strong>terest is <strong>in</strong> bus<strong>in</strong>ess adm<strong>in</strong>istrative study on personal<br />

data use by firms <strong>and</strong> privacy.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!