Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Improving customer retention in e-commerce through a secure and privacy-enhanced loyalty system
Enzmann M., Schneider M. Information Systems Frontiers7 (4-5):359-370,2005.Type:Article
Date Reviewed: Oct 18 2006

Almost 30 percent of adults in the United States are reported to hold a loyalty card. The use of such cards is growing worldwide. There are two main incentives for businesses to encourage the use of loyalty cards: retaining customers and learning more about them. Customers, on the other hand, like the price promotions, discounts, and points redeemable for awards that these cards provide, but do not like the privacy risks that may be involved in businesses building their profiles based on their transaction data. The aim of this paper is to develop a scheme that will not allow a business to link customer transactions through the loyalty program, but will still enable a business to keep an accurate record of the points awarded to each of the customers. In addition to protecting customers’ privacy, the requirements of a privacy-enhanced loyalty program should be unforgeability (points credit cannot be forged), double-spending detection (points cannot be redeemed more than once), and pooling prevention (distinct customers cannot pool their points together).

Loyalty points may be issued as tokens that the customers collect before redeeming them for an award, or a points counter that is increased every time a point is issued to the customer. In both cases, it is desirable that the serial number of the token or the points counter not be linkable to the customer, thereby preventing the business from building customer profiles. The privacy-friendly schemes suggested for both cases, the tokens and points counter approach, are based on Chaum’s blind signature protocol. The details of the protocol for each of the two cases are clearly described in the paper.

Reviewer:  G. K. Gupta Review #: CR133458 (0709-0942)
Bookmark and Share
 
Security (K.4.4 ... )
 
 
Privacy (K.4.1 ... )
 
 
Web-Based Services (H.3.5 ... )
 
 
Online Information Services (H.3.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
Security fundamentals for e-commerce
Hassler V., Artech House, Inc., Norwood, MA, 2000.  409, Type: Book (9781580531085)
May 20 2002
Building firm trust online
Schoder D., Yin P. Communications of the ACM 43(12): 73-79, 2000. Type: Article
Oct 1 2001
Electronic commerce relationships: trust by design
Keen P., Ballance G., Chan S., Schrump S., Prentice Hall PTR, Upper Saddle River, NJ, 2000.  249, Type: Book (9780130170378)
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy