Consumer Vulnerability in the Digital Age

Consumer Vulnerability in the Digital Age

Author:

Publisher:

Published: 2023

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK

Protecting consumers when they are most vulnerable has long been a core focus of consumer policy. This report first discusses the nature and scale of consumer vulnerability in the digital age, including its evolving conceptualisation, the role of emerging digital trends, and implications for consumer policy. It finds that in the digital age, vulnerability may be experienced not only by some consumers, but increasingly by most, if not all, consumers. Accordingly, it sets out several measures to address the vulnerability of specific consumer groups and all consumers, and concludes with avenues for more research on the topic.


Vulnerable Consumers and the Law

Vulnerable Consumers and the Law

Author: Christine Riefa

Publisher: Routledge

Published: 2020-10-27

Total Pages: 250

ISBN-13: 1000209741

DOWNLOAD EBOOK

This book charts the difficulties encountered by vulnerable consumers in their access to justice, through the contributions of prominent authors (academic, practitioners and consultants) in the field of consumer law and access to justice. It demonstrates that despite the development of ADR, access to justice is still severely lacking for the vulnerable consumer. The book highlights that a broad understanding of access to justice, which encompasses good regulation and its public enforcement, is an essential ingredient alongside access to the mechanisms of traditional private justice (courts and ADR) to protect the vulnerable consumer. Indeed, many of the difficulties are linked to normative obstacles and lack of access to justice is primarily a vulnerability in itself that can exacerbate existing ones. In addition, because it may contribute to ‘pushing’ already vulnerable consumers into social exclusion it is not simply about economic justice but also about social justice. The book shows that lack of access to justice is not irreversible nor is it necessarily linked to consumer apathy. New technologies could provide solutions. The book concludes with a plea for developing ‘inclusive’ justice systems with more emphasis on public enforcement alongside effective courts systems to offer the vulnerable with adequate means to defend themselves. This book will be suitable for both students and practitioners, and all those with an interest in the justice system.


Consumer Vulnerability

Consumer Vulnerability

Author: Susan Dunnett

Publisher: Routledge

Published: 2018-10-18

Total Pages: 280

ISBN-13: 1351386514

DOWNLOAD EBOOK

This book demonstrates that marketing scholarship has much to contribute to our understanding of consumer vulnerability and potential solutions. It brings to the fore ways in which so‐called vulnerable consumers navigate various marketplace and service interactions and develop specific consumer skills in order to empower themselves in such exchanges. It does so by exploring how consumer vulnerability is experienced across a range of different contexts such as poverty and disability, and the potential impact of vulnerability from childhood to old age. Other chapters extend focus from the consumer to the organisational perspective or consider more macro issues such as socio-spatial disadvantages. The fundamental aim of many of the contributors is to produce work that can benefit individual and societal well-being. They draw on various methodological approaches that generate both marketing management and policy-focused implications. A series of commentaries are also included to stimulate critical reflection and new insights into consumer vulnerability. This book was originally published as a special issue of the Journal of Marketing Management.


The Vulnerable Consumer

The Vulnerable Consumer

Author: Angela Y. Lee

Publisher: Emerald Group Publishing

Published: 2024-06-24

Total Pages: 201

ISBN-13: 1802629556

DOWNLOAD EBOOK

Review of Marketing Research pushes the boundaries of marketing—broadening the marketing concept to make the world a better place. Here, leading scholars provide new insights, approaches and directions to set out for research on consumer vulnerabilities.


Consumer Policy Toolkit

Consumer Policy Toolkit

Author: OECD

Publisher: OECD Publishing

Published: 2010-07-09

Total Pages: 126

ISBN-13: 9264079661

DOWNLOAD EBOOK

This book examines how markets have evolved and provides insights for improved consumer policy making. It explores, for the first time, how what we have learned through the study of behavioural economics is changing the way policy makers are addressing problems.


Cryptography's Role in Securing the Information Society

Cryptography's Role in Securing the Information Society

Author: National Research Council

Publisher: National Academies Press

Published: 1996-11-29

Total Pages: 721

ISBN-13: 0309054753

DOWNLOAD EBOOK

For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptographyâ€"the representation of messages in codeâ€"and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examplesâ€"some alarming and all instructiveâ€"from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.


The Digital Person

The Digital Person

Author: Daniel J Solove

Publisher: NYU Press

Published: 2004

Total Pages: 295

ISBN-13: 0814740375

DOWNLOAD EBOOK

Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.


OECD Recommendation of the Council on Consumer Protection in E-Commerce

OECD Recommendation of the Council on Consumer Protection in E-Commerce

Author: OECD

Publisher: OECD Publishing

Published: 2016-05-12

Total Pages: 24

ISBN-13: 9264255257

DOWNLOAD EBOOK

The OECD has revised its Recommendation on Consumer Protection in E-commerce in order to adapt consumer protection to the current environment and reinforce fair business practices, information disclosures, payment protections, dispute resolution and education.


Vulnerable Consumers and the Law

Vulnerable Consumers and the Law

Author: Christine Riefa

Publisher: Routledge

Published: 2020-10-27

Total Pages: 264

ISBN-13: 1000209709

DOWNLOAD EBOOK

This book charts the difficulties encountered by vulnerable consumers in their access to justice, through the contributions of prominent authors (academic, practitioners and consultants) in the field of consumer law and access to justice. It demonstrates that despite the development of ADR, access to justice is still severely lacking for the vulnerable consumer. The book highlights that a broad understanding of access to justice, which encompasses good regulation and its public enforcement, is an essential ingredient alongside access to the mechanisms of traditional private justice (courts and ADR) to protect the vulnerable consumer. Indeed, many of the difficulties are linked to normative obstacles and lack of access to justice is primarily a vulnerability in itself that can exacerbate existing ones. In addition, because it may contribute to ‘pushing’ already vulnerable consumers into social exclusion it is not simply about economic justice but also about social justice. The book shows that lack of access to justice is not irreversible nor is it necessarily linked to consumer apathy. New technologies could provide solutions. The book concludes with a plea for developing ‘inclusive’ justice systems with more emphasis on public enforcement alongside effective courts systems to offer the vulnerable with adequate means to defend themselves. This book will be suitable for both students and practitioners, and all those with an interest in the justice system.


Emerging Cyber Threats and Cognitive Vulnerabilities

Emerging Cyber Threats and Cognitive Vulnerabilities

Author: Vladlena Benson

Publisher: Academic Press

Published: 2019-09-20

Total Pages: 252

ISBN-13: 0128165944

DOWNLOAD EBOOK

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. Explains psychological factors inherent in machine learning and artificial intelligence Discusses the social psychology of online radicalism and terrorist recruitment Examines the motivation and decision-making of hackers and "hacktivists" Investigates the use of personality psychology to extract secure information from individuals