Firms increasingly use social network sites to reach out to customers and proactively intervene with observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service, sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to theorize how proactive customer service interventions with consumer messages on social network sites may evoke feelings of privacy infringement. Subsequently we use privacy calculus theory to propose how these perceptions of privacy infringement, together with the perceived usefulness of the intervention, in turn drive customer satisfaction. In two experiments, we find that feelings of privacy infringement associated with proactive interventions may explain why only reactive interventions enhance customer satisfaction. Moreover, we find that customer satisfaction can be modeled through the calculus of the perceived usefulness and feelings of privacy infringement associated with an intervention. These findings contribute to a better understanding of the impact of privacy concerns on consumer behavior in the context of firm–consumer interactions on social network sites, extend the applicability of privacy calculus theory, and contribute to complaint and compliment management literature. To practitioners, our findings demonstrate that feelings of privacy are an element to consider when handling consumer messages on social media, but also that privacy concerns may be overcome if an intervention is perceived as useful enough.
MULTIFILE
Firms increasingly use social network sites to reach out to customers and proactively intervene with observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service, sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to theorize how proactive customer service interventions with consumer messages on social network sites may evoke feelings of privacy infringement. Subsequently we use privacy calculus theory to propose how these perceptions of privacy infringement, together with the perceived usefulness of the intervention, in turn drive customer satisfaction. In two experiments, we find that feelings of privacy infringement associated with proactive interventions may explain why only reactive interventions enhance customer satisfaction. Moreover, we find that customer satisfaction can be modeled through the calculus of the perceived usefulness and feelings of privacy infringement associated with an intervention. These findings contribute to a better understanding of the impact of privacy concerns on consumer behavior in the context of firm–consumer interactions on social network sites, extend the applicability of privacy calculus theory, and contribute to complaint and compliment management literature. To practitioners, our findings demonstrate that feelings of privacy are an element to consider when handling consumer messages on social media, but also that privacy concerns may be overcome if an intervention is perceived as useful enough.
MULTIFILE
The focus of this chapter is the customer journey, a concept which has emerged from business practice and which now commands the attention of practitioners and academics alike. The customer journey is defined as the sum total of all customer interactions with a product, brand or organization across multiple channels and touchpoints. The customer journey is still primarily a concept from business practice and is an immature field for academics. As a result, we draw upon existing literature streams which are not directly focused on the customer journey, but which deliver key insights and enable us to build understanding. Specifically, we draw upon multichannel management and services management research and demonstrate how these knowledge streams help to build understanding of the dynamics of the customer as they move along their journey. We present a detailed examination of one specific form of customer journey, the shopper journey, and assess the drivers of shopping channel choice and journey configuration. The evolution of the shopper journey from single channel, through multichannel, to omnichannel is discussed. The chapter then moves on to discuss the service journey, broadening the journey perspective from the act of shopping to the holistic experience of service consumption. The key role of the customer in co-creating value along the service journey is identified, and we note the importance of personalization and of understanding customers’ relational needs to service journey optimization. Next, we examine the role that customer journey mapping can play in helping organizations to understand and improve their customers’ current journey configurations, and in informing future service journey design. The challenges inherent in measuring the customer experience along the journey are discussed, and alternative customer journey metrics are evaluated. The chapter concludes with our reflections on the current state of knowledge and we identify future directions for customer journey research and also future challenges for business practice.
In the Netherlands approximately 2 million inhabitants have one or more disabilities. However, just like most people they like to travel and go on holiday.In this project we have explored the customer journey of people with disabilities and their families to understand their challenges and solutions (in preparing) to travel. To get an understanding what ‘all-inclusive’ tourism would mean, this included an analysis of information needs and booking behavior; traveling by train, airplane, boat or car; organizing medical care and; the design of hotels and other accommodations. The outcomes were presented to members of ANVR and NBAV to help them design tourism and hospitality experiences or all.
Many companies struggle with their workplace strategy and corporate real-estate strategy, especially when they have a high percentage of knowledge workers. How to balance employee satisfaction and productivity with the cost of offices.This project focused on developing methods and tools to design customer journeys and predict the impact of investments and changes on user satisfaction with the work environment. The tools, including a game and simulation tool, allowed to focus on the needs of particular subgroups of employees while at the same time keeping an overview on the satisfaction and perceived productivity of all employees and guests. We applied Quality Function Deployment techniques to understand how needs of different types of users of (activity-based) office environments can catered for in smart customer-centric office design.
Over the past decade, the trend in both the public sector and industry has been to outsource ICT to the cloud. While cost savings are often used as a rationale for outsourcing, another argument that is frequently used is that the cloud improves security. The reasoning behind this is twofold. First, cloud service providers are typically thought to have skilled staff trained in good security practices. Second, cloud providers often have a vastly distributed, highly connected network infrastructure, making them more resilient in the face of outages and denial-of-service attacks. Yet many examples of cloud outages, often due to attacks, call into question whether outsourcing to the cloud does improve security. In this project our goal therefore is to answer two questions: 1) did the cloud make use more secure?and 2) can we provide specific security guidance to support cloud outsourcing strategies? We will approach these questions in a multi-disciplinary fashion from a technical angle and from a business and management perspective. On the technical side, the project will focus on providing comprehensive insight into the attack surface at the network level of cloud providers and their users. We will use a measurement-based approach, leveraging large scale datasets about the Internet, both our own data (e.g. OpenINTEL, a large- scale dataset of active DNS measurements) and datasets from our long-term collaborators, such as CAIDA in the US (BGPStream, Network Telescope) and Saarland University in Germany (AmpPot). We will use this data to study the network infrastructure outside and within cloud environments to structurally map vulnerabilities to attacks as well as to identify security anti-patterns, where the way cloud services are managed or used introduce a weak point that attackers can target. From a business point of view, we will investigate outsourcing strategies for both the cloud providers and their customers. For guaranteeing 100% availability, cloud service providers have to maintain additional capacity at all times. They also need to forecast capacity requirements continuously for financially profitable decisions. If the forecast is lower than the capacity needed, then the cloud is not able to deliver 100% availability in case of an attack. Conversely, if the forecast is substantially higher, the cloud service provider might not be able to make desired profits. We therefore propose to assess the risk profiles of cloud providers (how likely it is a cloud provider is under attack at a given time given the nature of its customers) using available attack data to improve the provider resilience to future attacks. From the costumer perspective, we will investigate how we can support cloud outsourcing by taking into consideration business and technical constraints. Decision to choose a cloud service provider is typically based on multiple criteria depending upon the company’s needs (security and operational). We will develop decision support systems that will help in mapping companies’ needs to cloud service providers’ offers.