1. Trang chủ
  2. » Luận Văn - Báo Cáo

Impact of security and privacy issues in internet marketinga study

11 3 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Impact of Security and Privacy Issues in Internet Marketing-a Study
Tác giả Koppisetti Durgabhavani
Người hướng dẫn Dr. A. R Krishnan
Trường học Bharathiar University
Chuyên ngành Management
Thể loại journal article
Năm xuất bản 2019
Thành phố Chennai
Định dạng
Số trang 11
Dung lượng 1,1 MB

Nội dung

Purpose of the study is to analyze security issues which have an impact on the online shopping buying behavior of the customer. Also highlights the factors which helps in retaining the online customer. Đề tài Hoàn thiện công tác quản trị nhân sự tại Công ty TNHH Mộc Khải Tuyên được nghiên cứu nhằm giúp công ty TNHH Mộc Khải Tuyên làm rõ được thực trạng công tác quản trị nhân sự trong công ty như thế nào từ đó đề ra các giải pháp giúp công ty hoàn thiện công tác quản trị nhân sự tốt hơn trong thời gian tới.

c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 International Journal of Management (IJM) Volume 10, Issue 4, July–August 2019, pp.36–43, Article ID: IJM_10_04_005 Available online at http://www.iaeme.com/ijm/issues.asp?JType=IJM&VType=10&IType=4 Journal Impact Factor (2019): 9.6780 (Calculated by GISI) www.jifactor.com ISSN Print: 0976-6502 and ISSN Online: 0976-6510 © IAEME Publication IMPACT OF SECURITY AND PRIVACY ISSUES IN INTERNET MARKETING-A STUDY Koppisetti Durgabhavani Research Scholar, Bharathiar University, Tamilnadu, India Dr A R Krishnan Faculty of Management, SRM IST, Chennai, India ABSTRACT Purpose of the study is to analyze security issues which have an impact on the online shopping buying behavior of the customer Also highlights the factors which helps in retaining the online customer The survey is conducted with 175 consumers A Questionnaire was designed with points Likert scale (Strongly agree - to strongly disagree – 5) and ranking The article also focuses on the relationship and the significance between securities versus online purchasing For effective analysis, statistical tools like factors analysis and correlation test are performed Keywords: Digital market – privacy – security – risk – risk reduction Cite this Article: Koppisetti Durgabhavani and Dr A R Krishnan, Impact of Security and Privacy Issues in Internet Marketing-a Study, International Journal of Management, 10 (4), 2019, pp 36–43 http://www.iaeme.com/IJM/issues.asp?JType=IJM&VType=10&IType=4 INTRODUCTION The term privacy includes both ethical and legal aspects Privacy was coined in twentieth century The reason for the emergence of this term in online business is due to the increase in the usage and adoption of internet in public life as well as in developing businesses has led to a phenomenal rise in online shopping Even though there is a increase in the population of online customers it always accompanied with a threat of personal information being shared and it seems to be one of the hindrance, which prevents customers from shopping online This article mainly focuses on the security and the privacy related issues of the customer shopping online LITERATURE REVIEW 2.1 Introduction to e - commerce Electronic business generally interpreted as e-business or internet business, it can also be defined [1] as a support to all activities carried in a business E-business was initially coined by IBM’s marketing and internet team in 1996 These methods are efficient and flexible in linking company’s internal and external data processing systems Also ensures a better working http://www.iaeme.com/IJM/index.asp 36 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 Koppisetti Durgabhavani and Dr A R Krishnan 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 condition with suppliers and partners to meet the needs and expectation of the customers ecommerce has become the iconic word of today’s business world A Types of E-commerce: An organization with its trade partners organizes to conduct e-commerce businesses with the consumers It can be any form of the business ranging from Business – to Business (B2B), Business – to – Consumer (B2C), Consumer – to – consumer (C2C) Table Types of e–commerce Types Government G2G Example: Center & State Business G2B e-tenders Business B2G Procurement B2B EDI, EFT Consumer C2G Online filling of tax returns C2B Job portals like naukri.com, monster.com Government Consumer G2C Information to citizens, online forms B2C Flipkart.com, Amazon.com C2C Facebook.com, ebay.com B Online Privacy Problem: The concept of privacy revolves around information pertaining to marketing as well as electronic commerce Which leads to the conflicts about the data usage and collected this discussion was initiated by the AMA code of Ethics for Marketing They state that the information collected from the customers must not be misused and confidentiality must be maintained The principle is precise and straight forward Measures has to be taken to ensure that these principles are used in all information gathering resources The data are misused through cookies Based on the user request from the web pages the data are stored in form of a packets, these are referred to as Cookies It can be used later The stored data which is in user computer will be transferred to the relevant web site Many purposes are solved with the cookies Example, they are used for gathering information, in shopping websites to hold previous transactions, reminder of upcoming products, offers, to inform about the items which are in transit or to suggest of alternative products In addition to these cookies collect complete information regarding the customer address, email address, postal address, contact number IP address of their devices, geographic location of the customers and so on Unethical practice of misusing the customer information can be done with these cookies The data in these cookies can be transmitted to other device and can be used misused for any purpose Tracking of the users occurs when cookies are examined during a user’s tenure in online It results in identifying the online behavior of the consumer With the integration of the off-line data, to find out whether there is a correlation between sites requesting for personal information and the percentage of information revealed by the customer These forms of tracking results in identifying more troubling dimension http://www.iaeme.com/IJM/index.asp 37 editor@iaeme.com Impact of Security and Privacy Issues in Internet Marketing-a Study c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 C Trust As per Moorman, Deshpande and Zaltman (1993, p82) “The willingness to rely on an exchange partner in whom one has confidence” Berry (1995) mentions, for a successful relationship trust must be maintained throughout According to Geyskens and Steenkamp (1995), to obtain the cooperation from the customers, one has to main the trust with the partner Thus, to improvise the business the strength of the partners and the customer can be accomplished by trust Ruyter et al (2004) proved that through trust one can stay for a longer time and thus paves way for a positive business Thus, strength plays a important role in business OBJECTIVES OF THE STUDY To identify the location in which the customers are connected to the internet To find out the correlation between the usage of interest and their purpose of surfing the internet To analyze the importance of the consent of the customer towards security factors To find out consumer overall satisfaction level towards security in websites METHODOLOGY AND DATA COLLECTION 4.1 Sample size and Population determination Respondents who uses digital markets are the respondents for the study and they are limited to south Chennai The study involves a non-probability convenient sample 4.2 Research instrument The study is conducted with a structured questionnaire and the questionnaire is completed with personal interviews Questionnaire structure comprises of a closed-ended question Five- point Likert-type statements are asked to respondents to identity their choices on the numerous digital marketing drive Statistical method is used for the study 4.3 Data collection Data are collected through primary source and secondary source Questionnaire were used to collect the primary source of data Books, journals, academic papers are used to collect the secondary data 4.4 Analysis of data The data which is collected through questionnaire must undergo a series of analysis to ensure the efficiency and correctness of the collected data As per the current study, analysis of data is carried out in different phases They are mentioned below; Preliminary analysis: This study involves visual examination of the data which is collected through various resources This analysis is carried out to ensure the reliability of the data Primary analysis: The researcher reviews he data to ensure that the collected data is sufficient to answer the objectives of the research Statistical Analysis: It is considered as the last phase of analysis In this phase the data collected, reviewed are analyzed using statistical tools In view of the goal and the information gathered the devices are utilized to break down the dependability of the information so gathered In this examination SPSS (Statistical Package for Social Sciences) The factual programming bundle SPSS, Version 21 was utilized for examination http://www.iaeme.com/IJM/index.asp 38 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 Koppisetti Durgabhavani and Dr A R Krishnan 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 4.5 Reliability and validity As per Yin (2009), any research is considered as reliable and vibrant to ensures the various measures to validate the data Golafshani (2003), insist that based on the researcher and the research methods the reliability and validity of the research can be obtained Golafshani (2003) Also specifies that the manner in in which the data gathered, collected, analyzed and interpreted also plays an vital role in the obtaining the reliability and validity of the research Before the actual analysis is conducted a preliminary analysis were performed to the data collected The results of this study can be relied 4.6 Ethical considerations As per Elliot (2005), researchers must emphasis on the ethical issues and ensure that they address various ethical issues There are many ethical issues involved in the research It ranges from collection of data from the respondent to preparation of analysis report to the customer The data collected form the respondents are kept confidential and will not be disclosed with any one These are measures are taken to maintain the code of ethics DATA ANALYSIS AND RESULT The reliability of the data is tested using the Cronbach’s Alpha test, the Value of the Cronbach’s Alpha test is 787 The value of Cronbach’s Alpha founded on Standardized items is 806 which is greater than 0.7, hence the internal consistency of the items is Acceptable Table 5.1 Reliability Statistics Cronbach's Alpha Cronbach's Alpha Based on Standardized Items N of Items 787 806 13 To find out the location in which the customers are connecting to the internet Figure 5.1 Diagram of internet usage As per the study the customers prefer to connect from home rather than their work location They prefer to connect with their network than any other internet sources If it’s for some official purpose customers would prefer for connecting to a work location network else the frequency of connecting to other network is minimal This ensures a customer feel comfortable and secured while connecting with their personal network connection Which they feel it is more secured and safe http://www.iaeme.com/IJM/index.asp 39 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 Impact of Security and Privacy Issues in Internet Marketing-a Study 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 5.1 To find the correlation between the usage of interest and their purpose of surfing internet H0: Null Hypothesis: There is no significance difference between the usage of interest and their purpose of surfing internet H1: Alternative Hypothesis: There is a significance difference between the usage of interest and their purpose of surfing internet Table Communalities Entertainment Purpose Education purpose Work related Financial Trading Current Events Travel related Product info Online Shopping Communication with others Utility bill payment Initial Extraction 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 1.000 955 939 894 859 729 916 813 930 935 854 Extraction Method: Principal Component Analysis Initial communalities are appraisals of the change in every factor represented by all segments or factors Extraction communities are evaluations of the change in every factor represented by the elements in the factor arrangement Small values demonstrate factors that don't fit well with the factor arrangement and ought to potentially be dropped from the investigation As we not have any small values in the communalities Extraction All the factors should be included for analysis Table 5.3 Rotated Component Matrix Component Financial Trading 892 Travel related 854 Work related 775 Utility bill payment 706 Entertainment Purpose 107 Communication with others 068 Education purpose -.303 Current Events 080 Online Shopping 106 Product info 292 Extraction Method: Principal Component Analysis Rotation Method: Varimax with Kaiser Normalization a Rotation converged in iterations http://www.iaeme.com/IJM/index.asp 40 -.057 158 111 408 931 922 -.191 -.030 191 454 242 215 -.530 382 232 -.128 -.875 749 012 112 038 340 014 207 152 253 213 401 939 713 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 Koppisetti Durgabhavani and Dr A R Krishnan 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 Each number represents the correlation between the items As all the items fall within the range of -1 to +1.The alternative hypothesis is accepted and the null hypothesis is rejected Thus, there is a significance difference between the usage of interest and their purpose of surfing internet 5.2 To analyze the importance of the consent of the customer towards security factors From this study it shows, based on the necessity of the site (fig.2.) customer are willing to share 17 % personal information, 16% has an neutral opinion on sharing data, 54 % disagree and 13% strongly disagree on sharing personal data If the online websites compensate for the data which is shared then, 47 % customer are not willing to share i.e they strongly disagree for the compensation, 33% disagree, 20% of the customer agree for the compensation When it comes to awareness (fig 3) about the security and the information regarding safe usage of websites, 46% customers strongly disagree that awareness regarding the security measures was not advised to them, 18% customers disagree, 34 % has an neutral opinion on it and only 2% agree that security awareness regarding the safe use of internet was advised to them by the owners of the website Customer preference towards sharing of personal data Agree Neutral Disagree Strongly Disagree 13 47 46 54 18 33 16 17 20 34 SECURITY AWARNES S COMPENS ATION FOR SHARING PERSONAL DATA WILLINGN ESS TO SHARE PERSONAL INFORMAT ION Figure Diagram on customer preference towards sharing of personal data http://www.iaeme.com/IJM/index.asp 41 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 Impact of Security and Privacy Issues in Internet Marketing-a Study 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 Customer consent regarding their personal data 14 22 7 15 33 51 64 53 31 69 Important Neutral Somewhat Important GATHERING PERSONAL INFO FROM OTHER SITES TACKING OF LOCATION SHARING PERSONAL INFORMATION Very Important TRACK OF PREVIOUS PURCHASE 20 Not Important Figure.3 Customer consent regarding their personal data The study shows that the consent of the customer is highly important for the data to share, track and to retrieve the data from other sites For 64% of customers it is very important that their consent for sharing of personal information is required, 22% its important, 14% has a neutral opinion in express their consent towards willingness in sharing of personal information in websites For 53% of customer it’s very important that their consent is required for tracking the customer location, 33% it’s important, 5% neutral, 2% somewhat important and 7% not important Customer consent regarding tracking of previous purchase shows that, 20% of customers feels it’s very important to express their consent, for 51% it’s important, 7% has a neutral opinion, 15% somewhat important and 7% feels it is not important This study also reveals the consent of the customer if their personal data are gathered from other websites 69% very important and their consent is required when information is gathered from other websites and 31% feels it is important that their consent is required, but none has a neutral opinion neither, somewhat important nor not important to express their consent 5.3 To find consumer overall satisfaction level towards security in websites Highly Insecured Highly Secured 7% In Secured 13% 7% Overall satisfaction of the customers Netural 20% Secured 53% Figure.4 Overall satisfaction of the customers Despite various hardships and factors affecting the trust and worthiness of the web sites 53% feel secured, 13% are highly secured, 20%has neutral opinion, 7% are in secured and 7% are highly in secured http://www.iaeme.com/IJM/index.asp 42 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 Koppisetti Durgabhavani and Dr A R Krishnan 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 CONCLUSION AND RECOMMENDATIONS According to the study it is obvious that security towards personal information is more important, irrespective of the age, the reason for surfing the internet, the usage frequency and purpose Even though there are few pitfalls customers prefer internet shopping It is recommended that the customers are educated about the awareness and safe usage of internet As most of the transactions are carried through the internet the privacy of customer information must be maintained Without the consent of the customer information must not be shared Strict privacy policies must be maintained Violating of these policies should have some serious punishments only then customers information will be safe from being misused The overall satisfaction of the customers who feel secured in using the online shopping is more, even though there are a few hindrances in using the internet, the overall percentage has a positive impact Thus, measures must be taken to ensure that the unsecured feeling is increased by strengthening the security levels of the sites and more awareness must be given to educate the customers so that a safe and happy shopping is accomplished REFERENCES: [1] Moorman, C., Zaltman, G., &Deshpande, R, Relationship between Providers and users of marketing research: the dynamics of trust within and between organizations Journal of marketing research, 29, 1992, pp 314-329 [2] Berry, L L, Relationship Marketing of Services Growing Interest, Emerging Perspectives Journal of the Academy of Marketing Science, 23, 1995, pp 236-245 [3] Murad Omarov, Tatyana Tikhaya and Vyacheslav Lyashenko, Internet Marketing Technologies In Civil Engineering, International Journal of Civil Engineering and Technology, 9(7), 2018, pp 1233–1240 [4] Geyskens, I., & Steenkamp, J E M, An investigation into the joint effects of trust and interdependence on relationship commitment In Bergadaa, M (Ed.) Proceedings of the 24th Annual, 1995 [5] Chaffey, D., & Smith, P, E marketing Excellence: planning and optimizing your digital marketing Routledg, 2008 [6] Ami Dilham, Fivi Rahmatus Sofiyah and Iskandar Muda, The Internet Marketing Effect on the Customer Loyalty Level with Brand Awareness as Intervening Variables International Journal of Civil Engineering and Technology, 9(9), 2018, pp 681-695 [7] Moorman, C.; Deshpande, R.; and Zaltman, G Factors affecting trust in marketing research relationships Journal of Marketing, 57 (January 1993), 81–101 [8] Toñita Perea y Monsuwé, Benedict G.C Dellaert, Ko de Ruyter,"What drives consumers to shop online? A literature review", International Journal of Service Industry Management, Vol 15 Iss: 1, 2004, pp.102 – 121 [9] Geyskens, I., & Steenkamp, J E M.an investigation into the joint effects of trust and interdependence on relationship commitment In Bergadaa, M (Ed.) Proceedings of the 24th Annual Conference of the European Marketing Academy, ESSEC, Cergy-Pontoise, 1995, pp35171 [10] Ruyter, K D., Moorman, L., & Lemmink, J, Antecedents of commitment and trust in customersupplier relationship in high technology markets Industrial Marketing Management, 30, 2004, 271 http://www.iaeme.com/IJM/index.asp 43 editor@iaeme.com c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2 c9a417 0b4 d8a11 b80ab1e6 c33b6675 3729 f333 dc77b9 3c2 f6 db4dded bd1 c8 f28 8660a5a6 0b51 e2074 856 f7f04b5 9e1b5b4 c3aa55 0c3 7b25 6d3 2e0d5 d6e2 4fcf3 ce9c3949fb9 4f8 3551 02f711abff4 f67aa 2615a5ff 34f9600 b62ae b9f6156e bf 1da48a c4e16 895e6 6ef5 7c4 7a331 c1d2043 7b5 df1 751d0a68 f6749 433 b18a02 b 44df15cd31 f100 6be8 9685 d2a0bca9b2d4 87129 b85 b3f4392 42457 c8 f9ba 7f4 c f0425 4b78 de97 15f304a0 5e7e3 6e497 429db7 c5d8 499 c8ac13f0dd7 4b7e f3a d0 50e81ad473dd5b0de2 83a00 4f3 3ae686 3e03e 10cb054 df6 9cd4152 d0 f7c9b0a2 91aa1bcdd1d9 f30 dd1b47b7f2 fa1e4 d28e7 1c7 7592 67e74 613e6 ddbd15 7435 c7 54a27b1 3b3 4b19 4ffaf996 f69 7d4a0 7dc719 76d0 f5a5 5a6516 9be6a e0e4 b64c4 c25a4 c369 7927 6f8a9 4e55a 755 f899 bcdbfa3 b118 2c3 8b0a4 f99 c9 cc9 4738 074 a828be5 f8 d6b4 f8 d00aa46 43d3a 0175 c68 22c2a6dd03b49030 1f0 7772 36637a b6d07 c03 8e73 ba4d6a 03d9 d95 c602 50e1a 18912 b038 52c0104 b5e6 195a4 dbb2c b75349 f6 b85e0 03a1e1 ba29 deff6d0 10d86a134 3f9 866 c20d6f0 e1a636 75b1 5b d5978 cc6b96 326d7adbd7e1 f3a5 0bae0 6ac4e e78d5b2a2 99f2b5fbae 77c3 9f9 5cc4a 550 db9 f34a8 7e6e f14 f7877a 9ff80c696 db69 75e17 0b40 d11e f9 f1dc68 f 3f016a f21 862b1055 ffdf59 81cc83 1a0c3 12c6f2fb b26 b2f9faa05 ddad048a4 5a46b1 bf1 1b2 cda1 c22 b97 cfba4f5 fcb89 bdee dff256 ddace98aa49 f85 04aa4 f 1347ba4 c11 9e44 d2db8b4 dd8 0ed1 d98e 9771 c2b7e57 f020 cd6f1e f07 989 c686e eedd49 9ed c46 b45d0dab1f3ff4a 42a03a 02e75 8872 b80e5 2bdc51 b87 d225 fe0a e02c7 f72 25874 2c4 b7ae b8e7 da20a78 54de 7b2 b53 f784a f70 b619 d695 c0a83 d3 84c29 b84ff9 d2e4a 9611 b36b8f9a d7d6e004 b5d71b1 1170 c4a9e 582b8f0 f1 b28 181622 f41 d3df3fb4 f27 c6ab8ec5 89e00 99f2e3a0 f45 b011 1d19 3f8 478d4436 b c9b3 f48 1f4 2eb c2b9 6a46e0 6345 d8dbdbbaa9b50c4b70 f0a5 b8 c7295 8d8 4f7 f0 6c7c31c5c8 e63 f8287 4cd4705 3f0 6e0a9 b2c0fcda12 9c7 81df0c2520 8a725 d6b 7b8ff5b9eeb4 b01a3a 05c76bc35 c92e 3675 f6d883d013d29b58818 65bb049 894 1d6d9 c80 1227ff9 1b95 e6958 28c605e2a e49bb61 770c794a7 4db4782 b0d2 7dc2

Ngày đăng: 02/01/2024, 10:30

w