• Send Press Release
  • Sponsored Posts
  • Guest Authors
  • Ad and Media Verification
  • Ad Networks and Platforms
  • Ad Products
  • Ad Revenue Optimization
  • Local Advertising
  • ROI Measurement
  • RTB Advertising
  • Ad Targeting
  • Ad Trafficking
  • Audience Measurement
  • How-To’s
  • Ad Viewability
  • Ad Fraud and Spam
  • Ad Inventory Quality
  • User Privacy
  • Ad Blocking
  • Mobile Advertising
  • Native Advertising
  • Programmatic Buying
  • Monetization Strategy

Ad Tech Daily

research papers on ad tech

Adelaide Strengthens Team with Claire Browne as New Head of Research

Creatopy releases digital advertising report with key insights on advertiser sentiment, budgeting, and channel preferences, index exchange accelerates its sustainability initiatives with ad net zero partnership, latest in ad tech news.

Ad Tech Daily

Debunking PR Myths: Understanding the True Scope of Public Relations in...

Ad Tech Daily

Rightpoint, a Genpact Company, Introduces ‘Total Experience’ Approach to Help Enterprises...

photo of assorted items on wooden table

Dailymotion Advertising Finds Only 9% of U.S. Travelers Select Their Destination...

space gray iPhone X on blue surface

Mobile App Research Reveals 1st and 2nd Impressions Are Everything

Our group on LinkedIn is over 24,000-strong! We’re welcoming anyone with an interest in the Ad Tech to join us for conversations, news and insights. Meet us here .

Click here for newsletter details and policies.

Ad Tech Daily

AppsFlyer Taps Leading Anti-Fraud Expert Andreas Naumann Amid Rise of Mobile...

Ad Tech Daily

Adtelligent Joins IAB Canada’s Transparency and Consent Framework

black iphone 5 beside brown framed eyeglasses and black iphone 5 c

InMobi Advances Apple’s Privacy-First Vision, Launching New Capabilities for Driving iOS...

Ad Tech Daily

Sourcepoint Announces Launch of Solution to Pinpoint Source of Third-Party Scripts...

research papers on ad tech

Terminus Maximizes Ad Spend for Marketers with Less Than 3% Fraud...

research papers on ad tech

DoubleVerify Named First Corporate Partner of SeeHer Education

Focus: mobile ad tech.

Ad Tech Daily

AppsFlyer Taps Leading Anti-Fraud Expert Andreas Naumann Amid Rise of Mobile Fraud

black iphone 5 beside brown framed eyeglasses and black iphone 5 c

Nativex Wins Best Partnership for Third Straight Year at Ocean Engine’s 2022 China Inbound Award

Inmobi advances apple’s privacy-first vision, launching new capabilities for driving ios app growth, leveraging skadnetwork attribution.

Ad Tech Daily

Nativex Becomes a Certified Partner of Petal Ads, Bolstering its One-stop Advertising Solution for Global Growth

Focus: covid-19 impact.

gray and blue Open signage

Sports Related Spending to Soar This Summer as Pre-Pandemic Life Resumes

Ad Tech Daily

Loud Mouth Media Announces Company Growth as COVID-19 Brings Increasing Demand for Ecommerce Marketing

research papers on ad tech

Lockdown Lifting to Signal Surge in Spending, Finds eBay Ads

photo of Elizabeth Tower, London

HM Government Becomes UK’s Biggest Advertiser in 2020, Nielsen Data Reveals

Ad Tech Daily

Brands Matter: US$22 Trillion Wiped off Company Values in q1 2020, but Global Study Shows Brands Can Fuel Post-COVID Economic Recovery

research papers on ad tech

  • Browse All Articles
  • Newsletter Sign-Up

Advertising →

research papers on ad tech

  • 20 Jun 2023
  • Cold Call Podcast

Elon Musk’s Twitter Takeover: Lessons in Strategic Change

In late October 2022, Elon Musk officially took Twitter private and became the company’s majority shareholder, finally ending a months-long acquisition saga. He appointed himself CEO and brought in his own team to clean house. Musk needed to take decisive steps to succeed against the major opposition to his leadership from both inside and outside the company. Twitter employees circulated an open letter protesting expected layoffs, advertising agencies advised their clients to pause spending on Twitter, and EU officials considered a broader Twitter ban. What short-term actions should Musk take to stabilize the situation, and how should he approach long-term strategy to turn around Twitter? Harvard Business School assistant professor Andy Wu and co-author Goran Calic, associate professor at McMaster University’s DeGroote School of Business, discuss Twitter as a microcosm for the future of media and information in their case, “Twitter Turnaround and Elon Musk.”

research papers on ad tech

  • 06 Jan 2021
  • Working Paper Summaries

Aggregate Advertising Expenditure in the US Economy: What's Up? Is It Real?

We analyze total United States advertising spending from 1960 to 2018. In nominal terms, the elasticity of annual advertising outlays with respect to gross domestic product appears to have increased substantially beginning in the late 1990s, roughly coinciding with the dramatic growth of internet-based advertising.

  • 15 Sep 2020

Time and the Value of Data

This paper studies the impact of time-dependency and data perishability on a dataset's effectiveness in creating value for a business, and shows the value of data in the search engine and advertisement businesses perishes quickly.

research papers on ad tech

  • 19 May 2020
  • Research & Ideas

Why Privacy Protection Notices Turn Off Shoppers

It seems counterintuitive, but website privacy protection notices appear to discourage shoppers from buying, according to Leslie John. Open for comment; 0 Comments.

  • 02 Mar 2020
  • What Do You Think?

Are Candor, Humility, and Trust Making a Comeback?

SUMMING UP: Have core leadership values been declining in recent years? If so, how do we get them back? James Heskett's readers provide answers. Open for comment; 0 Comments.

research papers on ad tech

  • 06 Aug 2019

Super Bowl Ads Sell Products, but Do They Sell Brands?

Super Bowl advertising is increasingly about using storytelling to sell corporate brands rather than products. Shelle Santana discusses why stories win (or fumble) on game day. Open for comment; 0 Comments.

research papers on ad tech

  • 27 Jul 2019

Does Facebook's Business Model Threaten Our Elections?

America's 2016 presidential election was the target of voter manipulation via social media, particularly on Facebook. George Riedel thinks history is about to repeat itself. Open for comment; 0 Comments.

research papers on ad tech

  • 10 Oct 2018

The Legacy of Boaty McBoatface: Beware of Customers Who Vote

Companies that encourage consumers to vote online should be forewarned—they may expect more than you promise, according to research by Michael Norton, Leslie John, and colleagues. Open for comment; 0 Comments.

  • 27 Sep 2018

Large-Scale Demand Estimation with Search Data

Online retailers face the challenge of leveraging the rich data they collect on their websites to uncover insights about consumer behavior. This study proposes a practical and tractable model of economic behavior that can reveal helpful patterns of cross-product substitution. The model can be used to simulate optimal prices.

research papers on ad tech

  • 18 Jun 2018

Warning: Scary Warning Labels Work!

If you want to convince consumers to stay away from unhealthy diet choices, don't be subtle about possible consequences, says Leslie John. These graphically graphic warning labels seem to do the trick. Open for comment; 0 Comments.

research papers on ad tech

  • 18 Sep 2017

'Likes' Lead to Nothing—and Other Hard-Learned Lessons of Social Media Marketing

A decade-and-a-half after the dawn of social media marketing, brands are still learning what works and what doesn't with consumers. Open for comment; 0 Comments.

research papers on ad tech

  • 26 Jul 2017

The Revolution in Advertising: From Don Draper to Big Data

The Mad Men of advertising are being replaced by data scientists and analysts. In this podcast, marketing professor John Deighton and advertising legend Sir Martin Sorrell discuss the positives and negatives of digital marketing. Open for comment; 0 Comments.

  • 13 Mar 2017

Hiding Products From Customers May Ultimately Boost Sales

Is it smart for retailers to display their wares to customers a few at a time or all at once? The answer depends largely on the product category, according to research by Kris Johnson Ferreira and Joel Goh. Open for comment; 0 Comments.

  • 06 Mar 2017

Why Comparing Apples to Apples Online Leads To More Fruitful Sales

The items displayed next to a product in online marketing displays may determine whether customers buy that product, according to a new study by Uma R. Karmarkar. Open for comment; 0 Comments.

  • 13 Feb 2017

Paid Search Ads Pay Off for Lesser-Known Restaurants

Researchers Michael Luca and Weijia Dai wanted to know if paid search ads pay off for small businesses such as restaurants. The answer: Yes, but not for long. Open for comment; 0 Comments.

research papers on ad tech

  • 08 Dec 2016

How Wayfair Built a Furniture Brand from Scratch

What was once a collection of 240 home furnishing sites is now a single, successful brand, Wayfair.com. How that brand developed over time and the challenges and opportunities presented by search engine marketing are discussed by Thales Teixeira. Open for comment; 0 Comments.

  • 04 May 2016

What Does Boaty McBoatface Tell Us About Brand Control on the Internet?

SUMMING UP. Boaty McBoatface may have been shot down as the social-media sourced name of a research vessel, but James Heskett's readers are up to their hip-boots in opinions on the matter. Open for comment; 0 Comments.

  • 02 May 2016

Why People Don’t Vote--and How a Good Ground Game Helps

Recent research by Vincent Pons shows that campaigners knocking on the doors of potential voters not only improves overall turnout but helps individual candidates win more of those votes. Open for comment; 0 Comments.

  • 21 Mar 2016

Can Customer Reviews Be 'Managed?'

Consumers increasingly rely on peer reviews on TripAdvisor and other sites to make purchase decisions, so it makes sense that companies have a stake in wanting to shape those opinions. But can they? Thales Teixeira says a good product trumps all. Open for comment; 0 Comments.

  • 28 Oct 2015

A Dedication to Creation: India's Ad Man Ranjan Kapur

How do you build a brand amid the uncertainties and opportunities of a developing market? Harvard Business School Professor Sunil Gupta shares lessons learned from Ranjan Kapur, an iconic figure in the Indian advertising industry. Open for comment; 0 Comments.

Digital technologies: tensions in privacy and data

  • Original Empirical Research
  • Open access
  • Published: 05 March 2022
  • Volume 50 , pages 1299–1323, ( 2022 )

Cite this article

You have full access to this open access article

research papers on ad tech

  • Sara Quach   ORCID: orcid.org/0000-0002-0976-5179 1 ,
  • Park Thaichon 1 ,
  • Kelly D. Martin 2 ,
  • Scott Weaven 1 &
  • Robert W. Palmatier 3  

110k Accesses

132 Citations

15 Altmetric

Explore all metrics

Driven by data proliferation, digital technologies have transformed the marketing landscape. In parallel, significant privacy concerns have shaken consumer–firm relationships, prompting changes in both regulatory interventions and people’s own privacy-protective behaviors. With a comprehensive analysis of digital technologies and data strategy informed by structuration theory and privacy literature, the authors consider privacy tensions as the product of firm–consumer interactions, facilitated by digital technologies. This perspective in turn implies distinct consumer, regulatory, and firm responses related to data protection. By consolidating various perspectives, the authors propose three tenets and seven propositions, supported by interview insights from senior managers and consumer informants, that create a foundation for understanding the digital technology implications for firm performance in contexts marked by growing privacy worries and legal ramifications. On the basis of this conceptual framework, they also propose a data strategy typology across two main strategic functions of digital technologies: data monetization and data sharing. The result is four distinct types of firms, which engage in disparate behaviors in the broader ecosystem pertaining to privacy issues. This article also provides directions for research, according to a synthesis of findings from both academic and practical perspectives.

Similar content being viewed by others

research papers on ad tech

Privacy as Enabler of Innovation

The role of data privacy in marketing.

research papers on ad tech

Digital Breadcrumbs: A Lack of Data Privacy and What People Are Doing About It

Explore related subjects.

  • Artificial Intelligence

Avoid common mistakes on your manuscript.

Modern marketing practice requires the use of digital technologies, and the customer data they generate, to create value (Quach et al., 2020 ). Yet such reliance prompts increasing privacy concerns about firms’ data behaviors and actions among both consumers and regulators. Consumers thus take action to protect their data; for example, people who switch service providers frequently cite privacy worries as a key reason (Cisco, 2020 ). However, many consumer respondents to a recent Australian survey (58%) admitted they do not understand what firms do with the data they collect, and 49% feel unable to protect their data due to a lack of knowledge or time, as well as the complexity of the processes involved (OAIC, 2020 ). Stronger regulations at global, national, and state levels (e.g., Australian Privacy Act, General Data Protection Regulation [GDPR], California Privacy Right Act [CPRA]) may help consumers, but they are costly for firms to comply with (e.g., up to US$55 billion for CPRA, according to estimates by the California state attorney general’s office) and also establish strict penalties for noncompliance (e.g., 10–20 million euros or 2%–4% of global firm revenues for specific GDPR infringements). Thus, privacy concerns create tensions among consumers, firms, and regulators, and effective privacy protection likely requires cooperation among these interconnected groups.

Extensive research details consumers’ privacy concerns (for a comprehensive review, see Okazaki et al., 2020 ) and regulatory interventions of varying effectiveness (Jia et al., 2021 ), as well as the consequences for firms’ performance (e.g., Martin et al., 2017 ). However, we still lack a systematic, integrative, research-based view of privacy tensions across all three involved entities, specifically in relation to digital technologies and the unique customer data they generate (Pomfret et al., 2020 ). That is, existing research effectively outlines privacy tensions from consumers’ and firms’ perspectives (Bornschein et al., 2020 ) but without addressing the complex, interrelated positions of firms, consumers, and regulators simultaneously (Martin &; Palmatier, 2020 ). Research into internal privacy mechanisms such as privacy paradoxes (Kaaniche et al., 2020 ) or dyadic views of privacy between consumers and firms (Rasoulian et al., 2017 ) or between firms and regulators (Johnson et al., 2020 ) cannot establish a triadic view of the privacy tensions created by digital technologies that link all these groups.

Therefore, to develop new marketing insights into digital technologies and privacy, we explicitly consider this firm–consumer–regulatory intersection and work to disentangle the data strategies and embedded technologies that firms use to create mutual value for themselves and their customers. With a comprehensive review of digital technologies, we examine four categories: (1) data capturing; (2) data aggregation, processing, and storage; (3) data modeling and programming; and (4) data visualization and interaction design. Each category can enable data monetization and sharing in distinct ways and with unique implications for consumers’ (information, communication, and individual) privacy outcomes. Accordingly, we investigate the consumer implications of firms’ digital technology use, with a particular focus on their privacy responses. As consumers gain knowledge about digital technologies, they may be more likely to adopt a proactive strategy and take preemptive, protective measures when interacting with firms. Finally, we examine how various regulatory interventions enter into these consumer–firm interactions, by exploring both proactive and reactive regulatory enforcement mechanisms. In pursuing these three research objectives, we establish an integrated framework with relevant implications for consumers, firms, and regulators.

We augment the analyses with case studies (i.e., Apple, Facebook, and BMW) and interview data, gathered from senior managers and consumer informants, which enhance the external validity of the integrated digital strategy framework. In particular, we use informants’ insights to understand people’s growing privacy concerns and the legal ramifications linked to digital technology strategies. Because our findings extend knowledge by blending the perspectives of firms, consumers, and regulators, they also provide meaningful research directions and actionable insights for academics and practitioners. Accordingly, we offer suggestions for research, reflecting the synthesis of the academic and practical perspectives that inform our findings.

This research contributes to marketing theory by applying a structuration theoretical approach to a marketing data privacy context. Structuration theory (Giddens, 1984 ) overcomes some limitations of prior systems theories that overemphasize the role of either structure or action in social processes and interactions; its theoretical insights instead reflect their interplay. Therefore, it can help us explain how data privacy regulatory frameworks impose structure on consumer–firm–policymaker interactions, then predict reactive and proactive responses by each key actor. The presence (absence) of a regulatory framework provides rules and norms that can mitigate (exacerbate) privacy tensions. In addition to relying on effective regulations for data protection, consumers exhibit other privacy protection behaviors and demands, which then intensify the pressure on firms to respond to privacy tensions.

The findings of this study also help inform marketing practice by delineating firm responses that can offset consumer privacy risks. For example, in some contexts, firm responses to consumer privacy risks are stipulated by a well-defined regulatory mandate, though even in this case, they may be subject to multiple, conflicting regulations (Lavelle, 2019 ). In unregulated settings, firms must self-police to meet privacy expectations, despite a lack of insights into how to mitigate the threats and risks of privacy failures (e.g., data breaches, data misuse scandals). Another option would be to exceed regulatory stipulations and use privacy as a source of competitive advantage (Palmatier & Martin, 2019 ), in which case firms need specialized knowledge of how to infuse privacy proactively into all their structures and processes. Noting these options, we provide practical advice for how firms can adopt a reactive stance and respond to privacy mandates on an as-needed basis or else become more proactive by exhibiting privacy-by-design, zero-party data collection, or ecosystem innovation, among other approaches.

In the next section, we begin with a description of the consumer privacy tensions that emerge from firms’ digital technology uses in four areas: data capture; data aggregation, processing, and storage; data modeling and programming; and data visualization and interaction design. We then review these conceptualizations from a structuration theory perspective, from which we derive some suggested proactive and reactive responses for regulators, firms, and consumers. Using this discussion as a foundation for our integrative framework, we offer three thematic tenets and seven research propositions, which can inform a comprehensive firm data strategy typology, as well as an extensive research agenda.

Firms’ digital technology use and consumer privacy tensions

Digital technologies allow firms to access vast amounts of data, which they might leverage to increase their profitability (i.e., data monetization) or improve the performance of their broader business networks (i.e., data sharing). Specifically, data monetization means the firm exploits data for their direct or indirect economic benefits. These practices might include applying data analytics–based insights to develop new products and services for the customers whom the data represent (i.e., data wrapping). For example, Coca-Cola collects data to improve customer service and performance, such as development of a Cherry Sprite flavor, based on data collected from self-service vending machines and social monitoring empowered by AI-driven image recognition technology. Data monetization also involves harnessing insights to create value-added features for other clients (i.e., extended data wrapping). Facebook, for example, makes money by providing data analytics features to advertisers based on user data on its social network platform. Finally, a direct approach to data monetization is for firms simply to sell their data to other firms (Najjar & Kettinger, 2013 ). Comscore is a digital analytics organization that provides marketing data and information to advertisers, media and marketing agencies, publishers, and other firms, selling these data to more than 3200 clients in 75 countries.

Data sharing instead refers to resource exchanges in which firms provide data they have gathered to various network partners (e.g., suppliers, distributors, horizontal partners with complementary offerings), to facilitate collaboration in the broader ecosystem (Sydow & Windeler, 1998 ). For instance, Coca-Cola shares information with third parties such as hosting firms, IT service providers, or consultants that support its service provision. Coca-Cola’s EU website ( https://www.coca-cola.eu/privacy-notice/ ) lists 18 third parties with which it shares data. PayPal, by contrast, lists 600 such parties. Other tech firms such as Apple work with complex networks of suppliers and application developers that constantly exchange information to develop better products and services. In 2018, a New York Times investigation revealed that Facebook shared data with more than 150 companies. Such data-based collaborations improve the performance of its entire digital ecosystem. Thus, data monetization increases firm profitability more directly, whereas data sharing improves profitability via network performance.

Levels of data sharing and data monetization vary across firms (see Web Appendix 1 ). For example, data harvesters are mostly firms in non-technical industries that engage in very limited data sharing and data monetization. Few harvesters engage in data wrapping, which would demand significant investments in digital technologies. Many of them are small firms with low to moderate levels of digital competence, though others are huge firms that recognize their own data insights are more valuable than any data they might purchase from outside sources (e.g., Coca-Cola, adidas, McDonald’s). Data patrons (e.g. Apple, Paypal) often possess moderate to high levels of digital technology and invest in sharing data across networks of partners, such as suppliers and distributors, to improve the overall functioning of the ecosystem. Even if they share data extensively, they also impose strict limits on how those data can be used and if (whether) they may be monetized. On the other hand, data informants’ business models rely on extensive data monetization and include data brokers, app developers, and content creators (e.g., Comscore, Weather Bug, OnAudience). With vast digital technologies, they generally engage in little sharing but monetize data through extended data wrapping (e.g., game development services) or sales of information or analytics (e.g., data brokering services). Data experts (e.g. Facebook, Google) engage in high levels of both data sharing and data monetization. Due to their significant digital technology resources, they own a lot of data and also control most of the data flows in the digital ecosystem. They predominantly perform extended data wrapping to attract new customers. That is, data experts offer their customers’ data to other clients, such as advertisers, that use the insights to reach their own target customers.

Data sharing and monetization practices generally involve a diverse portfolio of digital technologies, each of which can create benefits but also trigger privacy tensions, as we describe next and summarize in Table 1 .

Privacy tensions

Digital technologies offer data monetization and sharing benefits to firms but have concomitant costs for consumers, especially with respect to privacy. Westin ( 1967 ) defines privacy as a person’s right “to decide what information about himself should be communicated to others and under what condition” (p. 10), whereas Altman ( 1975 ) regards it as “the selective control of access to the self” through social interactions and personal space (p. 24). Adopting these definitional premises of autonomy, access, and control, we conceive of three types of consumer privacy: information, communication, and individual (see also Hung & Wong, 2009 ). The simultaneous consideration of all three types offers an expansion of extant marketing studies of privacy that tend to focus solely on information privacy (Bornschein et al., 2020 ). In detail, information privacy refers to a consumer’s right to control the access to, use, and dissemination of her or his personal data (Westin, 1967 ). Thus people may decide for themselves when, how, and to what extent their information will be known by others. Communication privacy protects personal messages or interactions from eavesdropping, scanning, or interception. People generally prefer to keep their interpersonal communications confidential and safe from third-party surveillance, which would not be possible if conversations with friends were recorded by social media and messaging apps or their in-person discussions were captured by smart devices equipped with integrated microphones. Finally, individual privacy is being left alone without disruption (Westin, 1967 ). Threats to individual privacy involve personal space intrusions, emotional manipulation, and physical interference, including spam emails and retargeting practices. Such violations are on the rise, due to the presence of IoT and smart home devices installed in consumers’ personal, physical spaces. In turn, firms’ data strategies, enabled by digital technologies, have implications for each type of consumer privacy.

Extensive research details consumers’ privacy concerns (e.g., Okazaki et al., 2020 ), as well as some of the consequences for firm performance or regulatory interventions. However, we still lack a systematic understanding of how privacy issues arise from firms’ data strategies and their uses of various digital technologies to support such strategies. To articulate the critical tensions between firms’ technology uses for data sharing and data monetization purposes, and consumers’ privacy risks, we combine the three forms of privacy with the data sharing and data monetization strategies related to four digital technology classifications: (1) data capturing; (2) data aggregation, processing, and storage; (3) data modeling and programming; and (4) data visualization and interaction design (Table 1 ). It would be impossible to discuss all technologies; rather, we attend specifically to six broad groups of emerging technologies: SMAC (social media, mobile, analytics, cloud), digital surveillance, robotics, AI, IoT, and mixed (virtual, augmented) realities (VR, AR). Each of these is characterized by consumer-marketer interactions and is central to firms’ data monetization and sharing strategies (Poels, 2019 ). Digital technologies such as blockchain, digital fabrication (e.g., 3D printing), 5G, and quantum computing are beyond the scope of this study, because they mainly support operations and digital infrastructure functions.

Data capture privacy tensions

Data capture technologies, including various sources and methods of data extraction, fuel data sharing and data monetization practices. In this respect, instead of technologies that collect transactional data such as point-of-sale systems, we focus on social media , geospatial , biometrics , and web tracking technologies. To facilitate data sharing, the data gathered via these technologies can be shared readily with business partners and networks, such as between manufacturers and suppliers or across subsidiaries (e.g., WhatsApp shares phone numbers, device specifications, and usage data with other Facebook [recently rebranded to Meta] companies). The data collected from social media, geospatial, biometrics, and web tracking technologies can also be monetized in various ways. With user-generated social media content, location insights from geospatial technologies, biometric data, and web tracking technologies such as cookies, firms can improve marketing and business performance by developing market segmentation and (re)targeting strategies, by crafting personalized content, products, and experiences, and by building and strengthening customer relationships (de Oliveira Santini et al., 2020 ). They also can conduct data wrapping, for example, through customization and optimization practices such as facial recognition and medical alerts (e.g., Apple watch). Firms also can apply extended data wrapping or sell data to other entities. Facebook, as noted, sells in-depth insights and analytics based on its users’ personal data (Appel et al., 2020 ), and Twitter sells third-party subscriptions to its API that allow other firms to explore users’ behaviors.

These practices threaten information privacy because consumers lose control over who has access to their personal information and communicative exchanges (e.g., tweet, review on a public Facebook page). Geospatial data enable firms to identify customers’ positions; by monitoring consumers’ digital footprints, companies also can follow them across different platforms, raising concerns about individual privacy . Soft biometric data, about moods or emotions, raise security and ethical concerns, because they reflect personal feelings that can be manipulated for commercial purposes, which would represent individual privacy violations . Each user’s information might also include details about other users, due to the networked nature of social media. If a user tags a friend on a public Facebook post, their conversations get exposed, which violates both friends’ communication privacy if firms review and exploit these exchanges.

Data aggregation, processing, and storing privacy tensions

Firms often combine data sets from multiple novel sources, which allows them to effectively share and monetize such data. Key technologies in data aggregation, processing, and storing technologies are IoT, big data, and cloud computing , with capacities to process and manage massive amounts of information (Kobusińska et al., 2018 ). The convergence of IoT, big data, and cloud computing is central to data sharing as it enables firms to share applications and analytics with multiple parties in real-time and at reduced technology costs. Data can be shared via IOT-enabled devices in machine-to-machine communications. Insights and analytics based on big data can be exchanged with partners, whereas cloud technologies offer a cost-effective information storage cyber-infrastructure that is broadly available across time and space and accessible by multiple users simultaneously (Alsmadi & Prybutok, 2018 ). Data aggregation, processing, and storing technologies empower data monetization practices by establishing novel insights about customers from IoT-enabled devices and big data, facilitated by cloud technologies, which can inform consumer profiling, behavior prediction, and targeting efforts. In turn, these efforts can optimize marketing and business performance, supply chain management, and (extended) data wrapping (i.e., development of analytical functions). Accordingly, these technologies have been widely adopted by many businesses, such as Netflix (Izrailevsky et al., 2016 ) and Woolworths (Crozier, 2019 ), to improve their performance and profitability.

Both data sharing and monetization practices in this domain can result in significant privacy tensions. Data collected from IoT devices such as CCTV cameras that track people using facial recognition technology and wearable devices that gather real-time information about users’ medical conditions or physical activity are very sensitive and highly personal. A comprehensive personal picture created through data aggregation and algorithmic profiling using big data analytics increases information privacy concerns, because it can reveal identifiable attributes such as sexual orientation, religious and political views, and personality (Kshetri, 2014 ). Moreover, when their behavior can be predicted more accurately, consumers become more susceptible to marketing efforts. For example, gambling companies might pinpoint addicts and entice them with free bets (Cox, 2017 ). Less purposefully, cloud services rely on virtual storage, but such remote processing can compromize system security (Alsmadi & Prybutok, 2018 ), especially at the transition moment, when firms shift internal applications and data to the cloud, which risks information exposure to fourth parties, including unethical actors that seek to steal consumers’ personal data (Yun et al., 2019 ). The sheer volume of information, historical and real-time, that links connected consumers, especially those proximal to one another through IoT devices, heightens security risks involving stolen identities, personal violations, and intellectual property losses (Kshetri, 2014 ). These practices together threaten communication privacy and individual privacy because they are intrusive, invisible, and extraordinarily difficult to control.

Data modeling and programming privacy tensions

Automation enabled by data modeling and programming technologies plays a key role in data sharing and data monetization. Considering our focus on privacy tensions, we discuss AI/machine learning and service robots as relevant amalgamations of engineering and computer science that produce intelligent automation, capable of learning and adaptation (Xiao & Kumar, 2019 ). These technologies facilitate data sharing as AI generally enables automated sharing of real-time data, and embodied AIs such as robots can exchange information in physical interactions. Moreover, AI-based systems enable data monetization by improving marketing and operational performance (e.g., personalized recommendations, smart content, programmatic media buys, chatbots, and predictive modeling) (Davenport et al., 2020 ). Modern robots, such as humanoid, programmable Pepper (Musa, 2020 ), can understand verbal instructions, interpret human emotions, and exhibit social intelligence to improve customer experiences and optimize performance. AI and service robots also enable data wrapping/extended wrapping by automating tasks and services; in addition, their data analytics–based features can adapt automatically to the real-time, physical environment.

However, optimizing machine learning requires enormous amounts of data, collected from consumer interactions, often without their knowledge. In general, AI might extract sensitive information such as people’s political opinions, sexual orientation, and medical conditions from less sensitive information (Davenport et al., 2020 ), then manipulate users through predictive analytics or create deception such as deep fakes (Kietzmann et al., 2020 ), which threaten information privacy . Robots equipped with computer vision and machine learning both see and sense the environment, implying greater penetration into consumers’ private, physical, and emotional spaces and threats to individual and communication privacy .

Data visualization and interaction design privacy tensions

Finally, data sharing and monetization activities rely on data visualization and interaction design technologies, as each enables connected realities known as the “metaverse,” predicted to become an important part of digitial future (Kim, 2021 ). Data can be visualized through display technologies, such as mixed, augmented (AR), and virtual (VR) realities , which deliver realistic virtual experiences involving synthetic worlds in which users become immersed through interactions and sensory stimulation (Roesner et al., 2014 ). In terms of data sharing, these technologies allow immersive data presentations and experiences, especially data storytelling, that can be shared virtually, visually, and seamlessly among different groups of users (customers). In addition, these technologies enable firms to monetize data because they enhance customer interactive experiences (Hilken et al., 2017 ); they allow marketers to build increasingly intimate customer relationships, as in the examples of Sephora’s virtual product try-on or Facebook’s social VR platform Horizon (Appel et al., 2020 ), thereby improving marketing and operational performance. Both VR and AR technologies offer great potential for data wrapping/extended wrapping by realistically depicting analytics-based features.

Privacy tensions created are similar to those created by the IoT. Notably, alternate realities require sophisticated input from cameras, GPS, and microphones to enable the simultaneous functioning of various applications (Roesner et al., 2014 ). Blending mixed reality also requires sensitive information, such as personal communications, images captured by cameras, and movements captured by sensors, posing a risk to information and communication privacy . Some of the latest privacy concerns involve bystanders in social AR in public spaces, because the data of passers-by, such as their faces or behaviors, can be captured by AR devices without their realization (Nijholt, 2021 ). The processed data then could be transferred to other applications for display or rendering too, such that their personal information is exposed to an unknown system that might access and manipulate the data without users’ consent. “Clickjacking” tricks people into clicking on sensitive features by using transparent or deceptive interfaces, which then allows the illegitimate actor to extract their data (Roesner et al., 2014 ). Finally, an extensive range of sensitive sensors can capture rich information, as when visual data produce spatial mapping information also validate spatial elements, such as exteriors or physical articles. Such exposures of physical space threaten individual privacy .

A structuration approach to digital technology–privacy tensions

Data monetizing and data sharing, achieved through firms’ use of digital technologies, can exacerbate technology–privacy tensions among consumers, regulators, and firms. Underpinned by structuration theory, we advance a framework for understanding their unique approaches to managing such tensions in Table 2 .

As noted previously, structuration theory highlights the interaction of structure and action (agency) rather than remaining limited, as some previous social theories had been, to the exclusive role of just structure or action (Giddens, 1984 ). It thus advances a structural duality account, involving the mutual interdependence and recursivity of actions and structures. Structures, which represent both the context and the outcomes of social practices (Luo, 2006 ), include rules, laws, social norms, roles, and resources (e.g., digital technology), such that they might constrain or enable (group and individual) agents’ behavior (Jones & Karsten, 2008 ). Structuration theory also predicts the production and reproduction of a social system through interactions by actors bound by the structure. These actors rely on rules and resources to define meaningful action (reactive approach) and also might extend or transform rules and resources (proactive approach) through their actions (Sydow & Windeler, 1998 ). Firms and consumers inherently belong to social systems that establish structures, such as regulatory frameworks or strongly held social norms about privacy. Privacy tensions also stem from social practices that evoke responses from consumers and firms. Therefore, even as consumers and firms are influenced by regulatory frameworks and privacy norms, their actions inform and shape those regulatory frameworks and norms. This iterative, dynamic interplay establishes the rules that govern subsequent interactions, forming and refining policies and constraints (Park et al., 2018 ).

For analytical purposes, Giddens ( 1984 ) characterizes structure according to three dimensions: signification (meaning), legitimation (norms), and domination (power). Then interactions consist of three corresponding characteristic forms: communication, (exercise of) power, and (application of) sanctions. Separate modalities connect structure and action. In practice, these elements often are interconnected and function simultaneously (Giddens, 1984 ). Considering the novelty of this structuration theory application to privacy topics, as well as the complexity of our proposed model, which involves interplays of institutions (regulators), groups (firms), and individuals (consumers), we focus here on the duality of structure and social practices in an effort to clarify privacy tensions among firms, consumers, and regulators, rather than test the original analytical dimensions of structuration theory.

When considering digital technologies and privacy tensions, the structure–actor relationship also might be described according to the service-dominant logic (SDL), which indicates that actors do not function in isolation but are part of wider networks (Vargo & Lusch, 2016 ). A firm ecosystem comprises a web of strategic networks, in which actors are connected and exchange resources to cocreate value, within the constraints of relevant institutions or institutional arrangements (regulatory authorities, frameworks) (Roggeveen et al., 2012 ). Firms operate within ecosystems and continuously interact with other entities such as supply chain partners. Because data constitute a type of currency in the digital economy, they represent important elements in any firm’s value chain and the broader marketing ecosystem. By integrating structuration theory with the SDL, we can derive a framework of relationships among actors (regulators, consumers, firms) and relevant structures or institutions (Vargo & Lusch, 2016 ). This blended perspective implies that the actors exist and interact within a system of relationships (Giddens, 1984 ; Roggeveen et al., 2012 ). Accordingly, we can explain the regulatory framework associated with privacy (i.e., structure) and predict both reactive and proactive responses by consumers and firms (i.e., actors). As we noted previously, the presence (or absence) of a regulatory framework implies rules or norms that in turn affect privacy tensions. In addition to relying on effective data protection though, consumers engage in further protective behaviors and demand data protection, forcing firms to respond to the privacy tensions.

Data privacy regulation

According to structuration theory, structures such as regulatory frameworks (i.e., rules) can both constrain and enable consumer and firm actions in the digital landscape, exacerbating or offsetting privacy tensions. Privacy regulatory frameworks or policies seek to provide fairness, trust, and accountability in consumer–firm data exchanges. Similar to other consumer-focused public policies, major privacy frameworks attempt to improve overall societal well-being and protect people’s rights, in balance with countervailing societal goals such as firm profitability and economic prosperity (Davis et al., 2021 ; Kopalle & Lehmann, 2021 ). Digital technologies have evolved significantly, smoothing processes that allow firms to monetize and share customer data while simultaneously adding complexity to consumer-side privacy prevention. Therefore, it is critical for regulators to address privacy tensions that arise from digital technology use.

The three broad classes of privacy risks created by firms’ data monetization and sharing strategies are addressed to varying degrees by global data protection laws such as the GDPR, Australian Privacy Act, and CPRA, each of which attempts to limit the collection, use, storage, and transmission of personal information. Although data privacy regulations differ from country to country, the GDPR has become a global standard (Rustad & Koenig, 2019 ). New privacy laws tend to reflect its foundations (Bennett, 2018 ), and the global nature of business implies that many international firms must comply with its rules. Most U.S. state-based and global data protection frameworks share three common principles as their foundation (Helberger et al., 2020 ), which also align with structuration theory themes. First, consumers are both content receivers and data producers, making consent and ownership critical. Second, transparency is paramount to balance power discrepancies between consumers and firms. Third, data move throughout marketing ecosystems and across multiple parties, making access and control of data streams and consumer education about data collection, uses, and potential consequences critical.

Data protection laws also tend to involve two main enforcement methods, related to firms’ privacy policies and managerial practices, which might be categorized as more reactive or more proactive. Reactive conditions imply minimal changes and less impact on existing firm structures and performance; proactive conditions require more expansive changes. In relation to a firm’s privacy policy, for example, a reactive requirement might stipulate its availability and visibility on the firm’s website. For example, CPRA requires a privacy policy hyperlink on the firm’s home page that is noticeable and clearly identifiable (e.g., larger font, different design than surrounding text). A proactive version might require firms to disclose consumers’ rights and information access, use, and storage rules as important elements of their privacy policy. Through either enforcement mechanism, the regulatory goal is that consumers learn easily about data security, data control, and governance measures enacted by the firm.

In terms of managerial practices, a reactive approach would mandate notice of data breaches. Most data protection laws also set penalties for noncompliance; under GDPR, firms convicted of privacy violations face fines of up to 20 million euros or 4% of their global revenue. A proactive version might require firms to obtain consumer consent for information collection and usage. For example, websites often use a pop-up window that details the different types of cookies used for tracking and parties with which data may be shared. Consumers may review this information, then opt-out or request that the firm delete their information or stop sharing it with third parties. Both GDPR and CPRA enforce these consumer protections. Other regulations address firm profiling practices, facilitated by AI, to prevent harmful consumer alienation or exclusion practices. However, such laws differ in notable ways. For example, under the GDPR, firms must conduct a regular privacy impact assessment, which is not required by CPRA.

Consumer privacy protection behavior

Structuration theory suggests that as consumers grow more aware of various privacy tensions during interactions with firms, their sense of worry or fear might evoke protective actions (Walker, 2016 ). The level of fear or worry depends on the nature of the rules and resources available in their relationships with firms. Assessments of relationship structures likely refer to the severity of the privacy risks, their perceived likelihood , and felt vulnerability or agency to cope with privacy risks (Lwin et al., 2007 ). For example, if consumers realize greater privacy risks due to the nature of the data being collected or increased breach likelihood in a firm relationship, they become more likely to engage in privacy protective behaviors, manifested as future responses to the structures and resources available within that relationship.

Some privacy-protecting strategies increase consumers’ control over personal information (e.g., decrease disclosures, minimize their digital footprint) or establish requirements for explicit permission for uses of their personal data (information access and use) (Walker, 2016 ). Thus, we again can identify reactive and proactive protection strategies. With a proactive strategy, consumers preemptively address privacy threats; with a reactive strategy, they act as explicitly advised by a firm or in response to an immediate threat. Therefore, we propose a two-dimensional categorization of consumer privacy protection behavior that spans reactive/proactive and information control/permission control dimensions and produces four groups (see Table 2 ): (1) reactive information strategy, (2) proactive information strategy, (3) reactive permission strategy, and (4) proactive permission strategy.

Reactive information strategy

By correcting their digital footprint, in response to privacy tensions, consumers can manage immediate privacy threats. For example, they might self-censor or filter content after it has been published, by deleting content from blog entries or Facebook posts, “untagging” themselves in photos or posts, “unfriending” contacts, or requesting that a firm or social media platform remove their information. Consumers also might avoid disclosure by intentionally refusing to provide certain elements of information in response to initial requests (Martin & Murphy, 2017 ) or else falsify the information they do provide, such as using a fake name, address, date of birth, and profile picture. This strategy reduces their digital footprint by removing or altering content that previously has been available.

Proactive information strategy

Rather than managing content that already has been published, a proactive information strategy uses restraint as a protective mechanism that defines consumers’ ongoing practices of withholding information (Lwin et al., 2007 ). Consumers reduce the amount of personal content shared, minimize digital interactions, and limit activities such as online check-ins, which can reveal personal information. They also might use encrypted communications such as Pretty Good Privacy software, S/MIME standards (Kaaniche et al., 2020 ), or anonymous re-mailers to reduce data availability. Some people seek non-digital alternatives for their communications, information search, and purchases (Martin & Palmatier, 2020 ). Since this strategy restricts information prior to sharing, it limits content and sociability. It also generally involves more effort, complexity, and inconvenience for consumers than a reactive information strategy, because it demands continuous monitoring of the digital footprint.

Reactive permission strategy

In a reactive permission strategy, consumers limit access to their personal information when service providers ask for it or respond to an instant threat such as a data breach that makes the risk salient. Consumers generally might agree to provide access to their information, but with a reactive strategy, they engage in a withdrawal tactic to remove themselves from risky situations, such as deleting apps that ask for access to their location, rejecting or removing cookies from their computers, and blocking advertisements (Yap et al., 2012 ). A fortification of identification effort might include changing passwords after data breaches or threats. They also can minimize risk by communication termination, or opting out of firm communications to avoid intrusion and prevent third-party information access.

Proactive permission strategy

Among consumers who are more aware of privacy tensions and knowledgeable about digital privacy technologies, we note more sophisticated efforts to protect personal information (Martin et al., 2017 ). With screening , they monitor their own digital activities by verifying firms’ privacy policies and securing transactions (e.g., using https protocols). Restriction involves limiting information access by adjusting privacy settings, such as turning off location-based access or changing cookie settings. Identity masking is another popular strategy to prevent tracking, using a security feature that stops a browser from storing cookies and the search history. Even more sophisticated tools include virtual private networks and The Onion Router, which work through encryption and create networks of virtual tunnels, designed to anonymize internet communications (Kaaniche et al., 2020 ). Finally, if they adopt security consolidation , consumers install privacy-enhancing technologies, such as blockers and firewalls for third-party trackers, along with internet security programs (Zarouali et al., 2020 ). These strategies offer strong protection but also require substantial technological savvy that is unlikely to be possessed by all consumers.

Firm privacy responses

According to structuration theory, augmented by the SDL, firms as actors operate in broader systems that affect their behaviors (Vargo & Lusch, 2016 ). Firms are influenced by structure (e.g., regulations) and by their relationships with other actors (e.g., consumers) (Park et al., 2018 ). In response to regulatory and consumer actions, firms might comply with privacy rules (reactive response) or go beyond them to engage in privacy innovation (proactive response), which potentially shapes new structures (Luo, 2006 ).

Reactive response (privacy compliance)

Structuration theory (e.g., Luo, 2006 ; Park et al., 2018 ) suggests the presence of some structurally embedded constraints on actors. Due to increased scrutiny of data practices, firms are expected to comply with what is sometimes a patchwork of local, national, and international privacy regulations. A reactive response corresponds to the minimum expectation for a company, namely, to follow existing, immediate structures in the regulatory framework. With this local approach to privacy regulation, firms only aim to meet specific, local privacy rules. This type of response is common among small, local businesses, but it also might be adopted by big corporations, to take advantage of variances in legal systems across specific markets.

Furthermore, this approach is in line with a privacy process that emphasizes privacy as a feature. That is, privacy constitutes added value, generally included as an afterthought in product and service development efforts. The main goal underlying this approach is to stay within legal boundaries and general expectations related to privacy. For example, by strengthening their cybersecurity, companies can address consumers’ reactive information strategies by minimizing negative events such as data breaches that threaten to trigger consumers’ falsification, avoidance, withdrawal, or communication termination actions. In addition, these firms likely focus on technologies that enable them to adhere to regulations. When the GDPR came into force and required firms to ensure consumers’ right to be forgotten, they faced technological challenges and thus committed to developing automated and standardized procedures for the removal, transfer, or recovery of data, upon consumers’ request, which also might dissuade consumers from adopting self-censorship behaviors.

Proactive response (privacy innovation)

In a volatile business environment marked by constantly changing structural parameters, structuration theory suggests that firms can influence structural forces. For example, Xerox, Cisco, Nokia, and Motorola persistently and efficaciously convinced the Chinese government to update and require all firms to conform with a new set of industry technical standards, thereby changing industry norms as a key structural parameter (Luo, 2006 ). Privacy innovations are new or enhanced firm privacy management practices designed to benefit consumers, appease the government, or otherwise appeal to relevant stakeholders. They arise when firms actively integrate compliance as a business pillar and attempt to address privacy regulations collectively, through a universal approach to privacy . Instead of dealing with each law and policy separately, firms identify key compliance issues across regulatory frameworks and adopt a streamlined, uniform strategic plan that can guide all aspects of their behavior, as well as current and future standards.

Furthermore, privacy innovation encompasses a privacy by design paradigm , which embeds privacy in all business processes, products, and services, from their initial development to their final consumption and disposition stages (Bu et al., 2020 ). Privacy by design stresses proactive, user-centric, and user-friendly protection, and it requires substantial investments and changes. For example, data collection strategies would aim to gather zero-party data, which refer to consumers’ voluntary provision of their information, are completely consent-based, and can be collected from polls, quizzes, or website widgets (Martin & Palmatier, 2020 ). By engaging in data discovery, categorization, and flow mapping, innovative firms might minimize their information collection and only collect what they actually need. Privacy might be integrated into customer-facing applications too, such as automatic timed logouts, notifications for unrecognized access, and setting security and privacy as default options. Finally, privacy innovation encompasses accountable business practices that require firms to involve their partners in data governance to ensure end-to-end security, such as by auditing third parties that manage data on a firm’s behalf (Merrick & Ryan, 2019 ). Pursuing privacy innovation can address the proactive privacy responses of even highly skeptical consumers and instill trust, by creating a safe ecosystem, so it should minimize restraint and restriction behavior. In this sense, privacy innovation offers an effective way to address both proactive consumer responses and regulations. However, it also tends to be costly and requires both long-term commitments and extensive transformations of the business structure and practices.

In summary, structuration theory purports that a privacy-related structure must include regulations that require firms to provide notice and gain consent from consumers to collect, parse, and store their data. They greatly enhance consumer-initiated strategies to address technology–privacy tensions. Consumers’ behaviors also depend on their resources, such as knowledge and self-efficacy (Walker, 2016 ). In general, reactive strategies require less expertise, and proactive ones demand greater technological savvy. Yet firms remain bound by the structure and can employ either a reactive response that treats privacy as a compliance issue or a proactive response that views it as a core business value. These trade-offs and tensions characterize regulatory–consumer–firm interactions, and we rely on them to propose an integrated framework to inform theory, practice, and policy.

Integrated framework of the structuration of privacy

The preceding review offers key insights and implications for firms, consumers, and regulators. Informed by structuration theory, and augmented by elements of SDL, we draw from these insights to develop an integrated framework (Fig.  1 ), in which privacy and its preservation emerges from interactions across structures (i.e., digital technologies as resources and data privacy regulations as rules) and actors (i.e., firms’ and consumers’ actions). On this basis, we propose a series of tenets related to themes of (1) data monetization and firm performance, (2) data sharing and firm performance, and (3) firms’ data privacy actions. We also introduce associated propositions. This synthesis of extant literature reveals practical insights to clarify the future of digital technologies in contexts marked by changing consumer behaviors and regulatory parameters. Depth interviews and case studies (Table 3 ) provide additional, conceptual scaffolding to proposed tenets and propositions, in support of our framework.

figure 1

Integrated framework of privacy structuration

To verify our propositions relative to firms’ and consumers’ experiences with digital technologies and data exchanges, we conducted in-depth interviews with ten senior managers in various industries, with 4 to 31 years of experience in their respective areas. We also interviewed five consumer informants from 27 to 41 years of age who are heavy users of digital technologies (see Web Appendix 2 for informant profiles). We identified participants from our contacts in a research cluster. Interviews were conducted either face-to-face or via a video conference platform, and they were recorded and transcribed. The interview protocol includes 18 questions related to digital technologies, data collection and use, and privacy issues (see Web Appendix 3 ).

Tenet 1: Data monetization and firm performance

We propose that digital technologies function as resources that enable firms’ data monetization and data sharing strategies. Using digital technologies such as big data, IoT, and AI in the ways previously described, firms can convert data and analytics into value for their customers and increase their profitability (Najjar & Kettinger, 2013 ). For example, a recent estimate of the value of Facebook users’ personal information is $35.2 billion, or 63% of Facebook’s revenues (Shapiro, 2019 ). As a shared general consensus, the interviewed senior managers agreed that data analytics boost firms’ performance. Internal data monetization practices can enhance firm performance, because the data collected from digital platforms represent consumer insights that firms can use to tailor solutions to meet consumers’ preferences and also make better business decisions (Bleier et al., 2020 ). As the head of product marketing in an electronics firm noted: “By using data we can offer the right product, right value at the right touchpoint to the end-user [using the] right approach.” An informant who performs customer analytics in the banking and finance sector also provided an example of data wrapping practices, such that the organization packaged its products with data insights as value-added features:

[Some of the data] that we capture [from individual customers] can be used to provide insights to our B2B customers…. With what we have today we could provide insights into their business based on their data to help them grow their business.

Similarly, external monetization, such as selling data to clients for marketing and targeting purposes, offers significant economic benefits for sellers. These three approaches are not mutually exclusive; firms can use more than one to generate revenue. Such data monetization practices increase the profitability of a firm and thereby enhance its performance.

Privacy tensions can stem from consumer–firm interactions through digital technologies (Park et al., 2018 ). Drawing from the notion in structuration theory that structure can both shape and be shaped by social practices, we note that the inherent privacy tensions of data monetizing practices provoke consumer and regulatory privacy responses, which have direct implications for firm performance. Data monetization thus may lead to privacy tensions and open firms to legal challenges, especially as data privacy regulations grow stronger. After the Cambridge Analytica scandal, heated debates about consumers’ privacy rights arose, and policymakers sought to increase the stringency of data regulations, such that Facebook’s CEO was called to testify before Congress and the company was fined US$5 billion by the U.S. Federal Trade Commission for deceiving users about their ability to control the privacy of their personal information (Lapowsky, 2019 ). In addition, trust in Facebook plunged by 66% (Weisbaum, 2018 ) and customers, including influential figures such as Elon Musk, joined the #DeleteFacebook movement in response. As this example shows, monetizing data may spark consumers’ privacy protection behaviors, which can jeopardize firms’ relationships with them. Even requests for data or perceptions that firms profit from consumer data can trigger reactive and proactive privacy protection behaviors, such as information falsification or outright refusal (Table 2 ). One consumer informant recalled an experience that felt like “an invasion, like I visited a website once because we got a new kitchen and now I get ads constantly for kitchen stuff. And it’s like, I might need that, but I don’t want you to know that I need it, but I want to find it myself.” A senior manager, head of digital marketing for an apparel firm, echoed this sentiment by acknowledging that “society is a lot more worried about data.” The inherent privacy tensions of data monetization can increase regulatory scrutiny, damage customer–firm relationships, and spark consumer privacy protection behaviors. We propose the following tenet and propositions:

Tenet 1 (Data Monetization Trade-Off)

Enabled by digital technologies, data monetization creates a trade-off between firm profitability and privacy tensions (information, communication, and individual privacy). When they result from consumer–firm interactions, privacy tensions lead to changes in both regulatory and customer responses.

Proposition 1

Data monetization positively influences firm performance through profitability.

Proposition 2

Data monetization negatively influences firm performance through increased privacy tensions (information, communication, and individual privacy), which trigger consumer data protection behaviors and privacy regulations.

Tenet 2: Data sharing and firm performance

From the integration of structuration theory and the SDL, we determine that digital technologies enable data sharing among actors within a business network, so multiple parties can access the data, anytime and from anywhere, which increases efficiency, in line with the prediction that value is co-created by multiple actors in an ecosystem (Vargo & Lusch, 2016 ). Data sharing also strengthens relationships among supply chain partners and fuels network effectiveness, which refers to the “viability and acceptability of inter-organizational practices and outcomes” (Sydow & Windeler, 1998 , p. 273). Firms might collectively improve their performance by complementing their data with others’ information, thus generating second-party data (Schneider et al., 2017 ). Manufacturers gather market analytics from distributors for new product design, demand forecasts, and the development of marketing strategies. Take the automobile industry as an example. Data sharing enables carmakers, including BMW and its suppliers, to pinpoint production bottlenecks or parts shortages, then formulate effective responses to potential supply chain problems and boost the performance of all firms involved (BMW, 2021 ). A chief financial officer of a manufacturing firm affirms the value of data sharing:

Definitely, you know, for us as a supplier when we receive our clients’ market data, that’s entirely valuable for us. [Data sharing] is a critical part of making sure that we do the best job that we can.

Yet similar to data monetization, the multiple-actor, collaborative nature of data sharing can result in privacy tensions. The more data a firm shares, the more control it must surrender to other parties, creating vast uncertainty. Therefore, data sharing may jeopardize consumer information privacy and trigger both consumer and regulatory responses. These responses may imply performance losses for the focal firm, especially if requisite security measures are missing (Schneider et al., 2017 ). Considering the interactions between structure and social practices of data sharing, we offer the following tenet and propositions:

Tenet 2 (Data Sharing Trade-Off)

Enabled by digital technologies, data sharing creates a trade-off between network effectiveness and privacy tensions (information, communication, and individual privacy).

Proposition 3

Data sharing positively influences firm performance through network effectiveness.

Proposition 4

Data sharing negatively influences firm performance through increased privacy tensions (information, communication, and individual privacy), which trigger consumer data protection behaviors and data privacy regulations.

Tenet 3: Firm privacy responses

The dynamic interplay of structures and actors, again, guides our theorizing. Privacy tensions that occur from data monetization and data sharing (i.e., social practices) tend to alert policymakers, who often respond by strengthening regulatory frameworks. This change in structure (i.e., data regulation), together with objections from consumers that result in privacy-protective behaviors, requires firms to develop data privacy actions to reduce privacy tensions. Firms that aspire to address privacy tensions proactively must devote resources and create processes for updating their digital technologies, which is a particular challenge for small firms: “I think we would like to focus more on innovation. But we’re probably not that big a company at the moment that we can put a lot of resources towards it” (head of digital marketing, apparel).

A common centerpiece of privacy legislative frameworks is an emphasis on consumer consent. Adhering to such practices may reduce the collection and use of data and limit the number of parties with which data can be shared, which can engender diminished firm performance due to the constraints on personalization, customization, targeting, and prediction efforts. In addition, privacy laws might restrict firms’ ability to sell data and analytics and increase legal expenses, causing a significant disadvantage for businesses that are unable to collect data on their own. However, the effects of data privacy regulation can be mitigated by proactive privacy responses. Technology innovations might be exploited to circumvent regulatory limitations. For example, Airbnb and Uber personalize predictive models without compromising consumer privacy by using smart pricing algorithms based on anonymized, aggregated, or market-oriented (event- or object-based) data, rather than personally identifiable information (Greene et al., 2019 ). Whether they enhance privacy practices or technological processes, privacy innovations allow firms to reap critical data benefits, meet or exceed legal and regulatory obligations, accommodate consumer expectations, reduce privacy tensions, and, ultimately, mitigate the impacts of consumer responses and regulation stringency. Even though they involve data monetizing for marketing, operational efficiency, and data wrapping practices, Apple’s privacy initiatives (e.g., App Tracking Transparency, Privacy Nutrition Labels) have boosted customers’ loyalty to the brand even higher, such that 92.6% of Apple users claim they would never switch to an Android (O'Flaherty, 2021 ). The initiatives also alter industry norms and impose greater pressure on competitive firms, such that Google has announced plans to consider an anti-tracking feature for Android devices (Statt, 2021 ). As a chief executive officer of a telecommunication service provider explained:

You certainly got to comply, ticking that box, but I do think that if you were going that extra mile and looking at ways [of] being innovative, then you’re going to be servicing your customers even better.

We offer the following tenet and propositions:

Tenet 3 (Firm Privacy Responses)

Enabled by digital technologies, firms develop privacy responses to address regulatory and consumer privacy responses.

Proposition 5

Data privacy regulation can both positively and negatively influence firm privacy responses.

Proposition 6

Consumer privacy protection behaviors positively influence firm privacy responses.

Proposition 7

Compared with reactive privacy responses, firm proactive privacy responses reduce consumer privacy protection behavior by mitigating the negative effects of data monetization and data sharing strategies on privacy tensions.

Implications for firms with different data strategies

Our novel framework explains that digital technologies empower firms’ data monetization or data sharing strategies, while also creating privacy tensions. Although most firms seek vast customer data and employ various means to leverage them, not every firm requires the same amount of data or has the necessary digital technology capabilities (see Web Appendix 1 ). The effect of data privacy regulation on data sharing and monetization thus should vary across firms which rely on data to varying levels. The more firms rely on data monetization and data sharing, the more pronounced the effects of regulatory changes and consumer data protection behaviors become. For such companies, data privacy responses have heightened implications; a proactive response might mitigate the restrictions. We apply our framework to provide implications to firms with various data strategies as depicted in Web Appendix 1 , in which we assign firms to one of four groups, according to their levels of both data monetization and data sharing practices.

Data harvester

Data harvesters engage in limited, internal data monetization and data sharing practices, leaving them less exposed to consumer privacy behaviors and regulations. Many of them seek to “harvest” their own data to create customer value. The head of digital marketing of an apparel firm shared:

We don’t have as much access to that sort of [third-party] data but yet we do have first-party data, which will be those [data] of those people within our leads database in our customer base.

However, if restrictions were imposed on their internal consumer data collection and use, they would have to rely on third-party data providers or brokers. Therefore, data harvesters likely comply closely with government regulations and tend to adopt reactive privacy strategies to protect consumer privacy.

Data patron

Data patrons’ monetization approaches resemble those of data harvesters, such as developing customer intelligence for better internal marketing efforts. However, data patrons such as Apple, Microsoft, and PayPal are more likely to undertake data wrapping to create customer value, because they have greater digital technology capabilities. In addition, they are cautious about the many partners involved in their business networks which can create significant risks for sharing practices. Echoing this view, the head of customer analytics of a banking and finance firm stated:

We do have some partnerships that we share [our data with], but again it depends on our terms and conditions on what we share and what it is related to, especially if it has to do with the customer experience and if it is in the right interest of our customer.

These firms are moderately affected by consumer privacy behaviors and regulatory frameworks. Innovative patrons can navigate sophisticated regulatory frameworks and consumer privacy protection behaviors; for example, Apple’s App Tracking Transparency promotes its image as a responsible tech firm.

Data informant

Data is the bloodline of data informants’ business models, as described by the president of a software development firm: “We don’t produce any physical goods. We operate only in the informational space. That means data is everything.” To maximize profits, some data informants use questionable methods to identify people’s interests in sensitive topics. These firms face substantial scrutiny; some regulators suggest they should be listed in public registries and allow consumers to request clarifications about data ownership. Their size and scope also make these firms prime targets for cyberattacks (Bleier et al., 2020 ). Finally, their privacy innovation tends to be low, because few incentives (or punishments) limit their data exploitation.

Data expert

Data experts are active members of the digital technology ecosystem and work with any third parties, engaging in very high levels of both data sharing and data monetization. Other firms rely on data experts for advertising insights and customer analytics, so in turn, they have significant power and influence over the nature and amount of data collected. Only a few firms (e.g., Google, Facebook, Twitter) fit this description, and each of them is subject to ongoing regulatory scrutiny. In general, stronger regulations, competitive maneuvers (i.e., Apple’s iOS 14 privacy updates affecting Facebook, Twitter, and others), and increasing consumer criticism may threaten their business model. Accordingly, data experts may need to adopt more extensive, transparent, and proactive privacy practices to address these challenges.

Recommendations for policymakers

Privacy regulations attempt to empower consumers by ensuring their ability to share, capably monitor, and protect their personal data. Regulations also provide guardrails to constrain firms’ interactions with consumers by mandating responsible data use and fair exchange. On the basis of our integrative framework and typology of data strategy, which establish a comprehensive view of privacy tensions linked to emerging digital technologies, we offer policymakers several recommendations for drafting, implementing, and monitoring effectively such regulations.

Addressing digital technology evolution

Digital technologies evolve rapidly, and privacy regulations must account for that rapid evolution. Although future-proofing privacy regulations is untenable, regulatory parameters that govern fundamental data exchanges, rather than specific technological techniques for gathering or processing data, can protect consumers more broadly, even as technologies change. In addition, such regulations would prevent firms from applying technologically advanced workarounds to subvert the restrictions. Both the GDPR and CPRA are designed to be technology neutral, governing the data exchanged between a customer and a firm rather than the technology through which the data are exchanged. Nevertheless, emerging digital applications such as deep fakes, the rampant spread of misinformation, and the growth of advertising ecosystems can challenge even the most technologically broad regulatory mechanisms. It is thus imperative that regulatory frameworks adequately protect consumer data, regardless of technological advances, with legal and protective parameters drafted with a technology-neutral approach that avoids regulatory obsolescence and prevents innovative subversion by firms.

Beyond imposing constraints though, we also recommend that regulators work closely with firms to learn how the regulations they propose are likely to play out in practice. For example, novel technologies can make the enforcement of various privacy regulatory dimensions more or less effective; requiring customer consent is a cornerstone of the GDPR framework, but its operationalization and enactment in practice has led to increased consumer annoyance with the required pop-ups (Fazzini, 2019 ). Monitoring efforts also should go beyond identifying violations or demanding strict, high-level compliance. In summary, even if technology advances too quickly to be subject to specific regulation, it strongly influences the implementation and effectiveness of regulation in practice, such that it can support or hinder intended regulatory purposes, so policymakers need to pursue and maintain an up-to-date, clear understanding of recent technology developments.

Appreciating variability across firms

The GDPR may have had the unintended consequence of empowering the big technology companies (Facebook, Google) that it originally sought to constrain (Lomas, 2020 ). Large companies with many resources (financial, legal, personnel) are better poised to accommodate vast regulatory changes, including privacy regulatory mandates. In particular, firms that already house vast troves of customer data easily can reduce their reliance on external or third-party data providers. Their in-house data capabilities enable them to conform with regulatory parameters, even if their data use might seem ethically questionable. We recommend that regulators examine firms’ specific data sharing and data monetization practices closely, with particular monitoring efforts focused on firms with extensive engagement in data monetization, such as data informants and data experts. This targeted means to privacy regulation avoids some of the weaknesses of a “one-size-fits-all” approach. For example, many data informants are developers that offer free apps in exchange for customer data, and their external monetization practices are largely unknown to consumers. By applying the proposed data strategy typology, policymakers can detect areas of data concentration with the potential for misuse, such as among data experts and data patrons. Such considerations also could help limit the dominance of major tech firms. Regulators might apply the typology to understand the adverse effects of privacy regulation, such as data portability on data harvesters, that might harm small businesses or start-ups. If they cannot acquire large troves of data on their own, these smaller competitors must rely on larger actors to obtain data-based insights.

Promoting proactive regulatory enforcement

To the extent possible, regulatory frameworks should impose proactive enforcement of both privacy policy requirements and managerial practices, including privacy by design and privacy by default principles. Monitoring a firm’s data protection behavior can indicate the effectiveness of the regulatory framework, beyond just capturing violation occurrences or noncompliance. Even with comprehensive data protection regulations in force, multinational corporations appear to adopt reactive privacy strategies for the most part, while continuing to engage in behaviors and practices that put them and their customers at risk for data breaches (Norwegian Consumer Council, 2020 ). By recognizing and rewarding proactive firm responses (data innovation), perhaps in collaboration with industry bodies or aspirational firms, regulators also could encourage the reproduction of best practices.

Finally, transnational cooperation among enforcement authorities is necessary to deal with the many multinational firms and online businesses whose operations transcend national borders. Harmonization efforts proposed by the United Nations provide a potentially useful platform; its Personal Data Protection and Privacy Principles can help member organizations navigate the diverse patchwork of regulatory coverage, given their business scope and reach, by developing a coherent set of widely applicable rules that embody strong, proactive standards. Effective enforcement of privacy regulation and true protection of consumer privacy can be realized only if globally cooperative mechanisms are in place.

Conclusion and research directions

Adapting to ever-changing business environments and developing long-term relationships with key stakeholders requires extensive investments in digital technologies. Enabled by digital technologies, modern firms have access to massive amounts of data, which they use to pursue various advantages. This research provides new insights into the role of digital technologies by adopting a multidimensional approach and synthesizing current research and practical insights from the perspectives of firms, consumers, and regulators—each of which is critical to developing an integrated, comprehensive framework.

We begin by identifying the pressing tensions between firms’ data monetization and sharing practices enabled by digital technologies, as well as their implications for consumer privacy. By leveraging structuration theory, infused with elements of the SDL, we delineate responses to these tensions exhibited by regulators, consumers, and firms. The intersection of the firm, consumer, and regulatory perspectives produces an integrated framework of three tenets and seven corresponding propositions with the potential to advance understanding of privacy as a central product of the interactions across structure (i.e., digital technologies and regulatory frameworks) and social practices (i.e., firms’ and consumers’ actions). We overlay these predictions with a typology of firm strategies for data monetization and data sharing to highlight how firms’ privacy responses are influenced by resources (i.e., digital technology), rules (i.e., regulations), and other actors’ actions (i.e., consumers’ privacy protection behaviors).

To stimulate further research, we propose an agenda across three broad areas: firm data and privacy strategies, regulatory impacts on firms and ecosystems, and consumer responses to the digital technologies. Each area comprises multiple research questions and avenues for marketing researchers and practitioners, which we summarize in Table 4 .

Firm data and privacy strategies

Data strategy.

Our proposed framework acknowledges the reality of growing data monetization and data sharing practices, as focal strategies that determine firm performance. Data are the new currency in the digital era, and firms that can create unique, sought-after data, business intelligence, and responsible data-generating technologies will wield increasing power. To maximize the value of data, firms should seek balanced, responsible data monetization and data sharing. Such efforts would benefit from an optimal data valuation model that promises to maximize value and minimize risks through responsible data monetization and sharing. Firms should carefully consider their dynamic inventory of information assets, the features of their data that are central to realizing their potential, and metrics for assessing the value of data and returns on their investments (Deloitte, 2020 ).

Data sharing poses unique challenges, especially across platforms and organizations. A key question is how to improve data sharing through interoperability on secure, permission-based platforms. In addition, changing work cultures, such as the increased use of home networks, personal and shared computers, and access to office systems from external work venues, increase threats of cyberattacks and data breaches. Such developments represent new obstacles to data sharing, and they offer a fruitful research area.

Privacy innovation

Regardless of firm size or data strategy type, data privacy innovations extend beyond mere compliance and can lead to competitive advantages. The benefits of data privacy innovations across all firm data strategy types require further investigation. In particular, data privacy innovation should gain momentum as a positive catalyst for the firm and ecosystem performance. We need research that details effective implementations of privacy innovation practices and their long-term effects.

Research also is needed to identify effective data privacy innovations that might enhance the outcomes of data sharing and data monetization. In particular, research might determine sustainable levels of investment in privacy innovation, required for firms of different sizes, business models, and data strategies (i.e., data harvesters, data informants, data patrons, and data experts). A key question is whether the benefits of privacy innovation justify the cost of its adoption and implementation. For example, state-of-the-art security schemes and privacy-preserving technologies (e.g., blockchain-based approaches) still suffer disadvantages regarding scalability and data storage limitations (Jin et al., 2019 ), and they remain costly to implement, despite the data protection improvements they provide.

Moreover, privacy innovation might create ripple effects, due to the interconnected nature of firms in an ecosystem. For example, privacy changes among data experts and informants might influence data harvesters, who rely on the services of those data experts and informants. Therefore, a potential research consideration might be the ripple effects of privacy innovation, including the positive inspiration of an ecosystem revolution but the simultaneous strain they put on the relationship between firms and other actors.

Regulatory effects on firms and ecosystems

Effect of privacy regulation on firms.

We anticipate that as regulatory frameworks and consumer responses to privacy issues evolve, firms will face more restrictions on their strategies and practices. Continued research should examine the risks if firms fail to adhere to reactive and proactive privacy requirements. The outcomes might be subject to contextual factors, because regulation stringency varies across countries and industries. Privacy regulations restrict firm actions related to data monetization and sharing, but as we have outlined, structuration theory also predicts that actors’ behaviors shape the structures. Therefore, it would be interesting to identify the extent to which firm responses to regulatory frameworks can change the regulations themselves, which in turn might trigger a different set of firm actions. Uncovering nuanced effects according to firm size, industry, and other firmographics is an important direction to inform regulatory efforts. We thus call for investigations of how the typology of data strategy and firmographic variables moderates the effect of privacy regulations on firm performance.

Effect of privacy regulations on firm networks

Privacy regulations may be increasingly necessary, but they also have the potential to restrict the benefits that both firms and consumers receive from data monetizing and data sharing. That is, greater limits may be warranted, but more stringent regulations can create unintended obstacles to the performance of a firm’s network and ecosystem. Research should continue to address the impact of regulation stringency on network effectiveness. Finally, different, fragmented data access regimes exist in various sectors, such as utilities, automotive, finance, and digital content/services (Graef & van den Boom, 2020 ). It is therefore relevant to test the interactions of sector-specific regimes to predict broader network performance.

Consumer responses to digital technologies

Privacy attitudes.

As digital technologies penetrate consumers’ lives further and become increasingly powerful means for firms’ data collection and use, fresh privacy concerns emerge. Research is needed to understand how new digital technologies such as artificial general intelligence (i.e., AI on a par with human intelligence) threaten consumers’ information, individual, and communication privacy risks. Research thus might investigate consumers’ perceptions of firms’ data strategy (i.e., data harvester, informant, patron, and expert), actual data privacy actions, and regulation stringency, which could help construct long-term, technology-proof outcomes for all parties involved. Notably, all our informants acknowledge data skeptics, who proactively protect their privacy by using encrypted platforms or refusing all personalized services, but they believe most consumers are willing to accept some loss of privacy in exchange for personalization of the right experience. A critical question is how to identify consumer segments and make data trade-offs more acceptable for them.

Privacy protection behavior

Research on privacy in marketing has predominantly focused on privacy concerns, leaving a dearth of evidence about actual privacy behaviors (Pomfret et al., 2020 ). Consumers employ various forms of protection from privacy risks, whether reactive or proactive. Understanding when these responses are triggered and the role of privacy-enhancing technologies in evoking them would help firms devise more effective strategies. Additional research could explore how consumer privacy responses translate into financial impacts for firms.

As our explication of digital technologies highlights, data and their applications continue to transform the marketing landscape. The novel framework we propose can help clarify digital technologies and the future of data for firms, consumers, and regulators. But much work remains. We hope this research offers some compelling directions for further inquiry, along with new insights into the future of digital technologies.

Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85 , 218–226.

Article   Google Scholar  

Altman, I. (1975). Privacy: Definitions and properties. In I. Altman (Ed.), The environment and social behavior: Privacy, personal space, territory, crowding . Brooks/Cole Publishing Company.

Google Scholar  

Appel, G., Grewal, L., Hadi, R., & Stephen, A. T. (2020). The future of social media in marketing. Journal of the Academy of Marketing Science, 48 (1), 79–95.

Apple (2021). Apple Customer Privacy Policy , Apple , viewed 20/05/2021, from https://www.apple.com/legal/privacy/

Bennett, C. J. (2018). The European general data protection regulation: An instrument for the globalization of privacy standards? Information Polity, 23 , 239–246.

Bleier, A., Goldfarb, A., & Tucker, C. (2020). Consumer privacy and the future of data-based innovation and marketing. International Journal of Research in Marketing, 37 (3), 466–480.

BMW (2021). BMW Group Data Ecosystem. BMW , viewed 20/05/2021, from https://www.bmwgroup.com/en/innovation/technologies-and-mobility/bmw-group-data-ecosystem.html

Bornschein, R., Schmidt, L., & Maier, E. (2020). The effect of consumers’ perceived power and risk in digital information privacy: The example of cookie notices. Journal of Public Policy & Marketing, 39 (2), 135–154.

Bu, F., Wang, N., Jiang, B., & Liang, H. (2020). “Privacy by design” implementation: Information system engineers’ perspective. International Journal of Information Management, 53 , 102124.

Cisco (2020). Protecting data privacy to maintain digital trust: The importance of protecting data privacy during the pandemic and beyond, Cisco , viewed 13/10/2020, from https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cybersecurity-series-2020-cps.pdf

Cox, K. (2017). Gambling services use big data to target recovering gamblers, low-income families, Consumerist , viewed 13/10/2020, from https://consumerist.com/2017/08/31/gambling-services-use-big-data-to-target-recovering-gamblers-low-income-families/

Crozier, R. (2019). How Woolworths uses Google to power its massive analytics uplift, itnews , viewed 13/10/2020, from https://www.itnews.com.au/news/woolworths-uses-google-to-power-massive-data-analytics-uplift-523639

Davenport, T., Guha, A., Grewal, D., & Bressgott, T. (2020). How artificial intelligence will change the future of marketing. Journal of the Academy of Marketing Science, 48 (1), 24–42.

Davis, B., Grewal, D., & Hamilton, S. (2021). The future of marketing analytics and public policy. Journal of Public Policy & Marketing, 40 (4), 447–452.

de Oliveira Santini, F., Ladeira, W. J., Pinto, D. C., Herter, M. M., Sampaio, C. H., & Babin, B. (2020). Customer engagement in social media: A framework and meta-analysis. Journal of the Academy of Marketing Science, 48 (6), 1211–1228.

Deloitte (2020). Data valuation: Understanding the value of your data assets, Deloitte, viewed 10/05/21, from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Finance/Valuation-Data-Digital.pdf

Fazzini, K. (2019). Europe’s sweeping privacy rule was supposed to change the internet, but so far it’s mostly created frustration for users, companies, and regulators. CNBC , viewed 22/10/2021, from https://www.cnbc.com/2019/05/04/gdpr-has-frustrated-users-and-regulators.html .

FTC (2019). FTC imposes $5 billion penalty and sweeping new privacy restrictions on Facebook, Federal Trade Commission , viewed 20/08/2020, from https://www.ftc.gov/news-events/press-releases/2019/07/ftc-imposes-5-billion-penalty-sweeping-new-privacy-restrictions

Giddens, A. (1984). The constitution of society: Outline of the theory of structuration . University of California Press.

Graef, I., & van den Boom, J. (2020). Spill-overs in data governance: Uncovering the uneasy relationship between the GDPR’s right to data portability and EU sector-specific data access regimes. Journal of European Consumer and Market Law, 9 (1).

Greene, T., Shmueli, G., Ray, S., & Fell, J. (2019). Adjusting to the GDPR: The impact on data scientists and behavioral researchers. Big Data, 7 (3), 140–162.

Helberger, N., Huh, J., Milne, G., Strycharz, J., & Sundaram, H. (2020). Macro and exogenous factors in computational advertising: Key issues and new research directions. Journal of Advertising, 49 (4), 1–17.

Hilken, T., de Ruyter, K., Chylinski, M., Mahr, D., & Keeling, D. (2017). Augmenting the eye of the beholder: Exploring the strategic potential of augmented reality to enhance online service experiences. Journal of the Academy of Marketing Science, 45 (6), 884–905.

Hung, H., & Wong, Y. H. (2009). Information transparency and digital privacy protection: Are they mutually exclusive in the provision of e-services? Journal of Services Marketing, 23 (3), 154–164.

Ioannou, A., Tussyadiah, I., & Lu, Y. (2020). Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54 , 102122.

Izrailevsky, Y., Vlaovic, S., & Meshenberg, R. (2016). Completing the Netflix Cloud Migration, Netflix , viewed 13/10/2020, from https://about.netflix.com/en/news/completing-the-netflix-cloud-migration

Jia, J., Jin, G. Z., & Wagman, L. (2021). The short-run effects of the general data protection regulation on technology venture investment. Marketing Science, 40 (4), 661–684.

Jin, H., Luo, Y., Li, P., & Mathew, J. (2019). A review of secure and privacy-preserving medical data sharing. IEEE Access, 7 , 61656–61669.

Johnson, G A., Shriver, S. K., & Goldberg, S. G. (2020). Privacy and market concentration: intended and unintended consequences of the GDPR. United States Federal Trade Commission , viewed 20/10/2021, from https://www.ftc.gov/system/files/documents/public_events/1548288/ privacycon-2020-garrett_johnson.pdf

Jones, M. R., & Karsten, H. (2008). Giddens's structuration theory and information systems research. MIS Quarterly, 32 , 127–157.

Kaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications, 171 , 102807.

Kamboj, S., Sarmah, B., Gupta, S., & Dwivedi, Y. (2018). Examining branding co-creation in brand communities on social media: Applying the paradigm of stimulus-organism-response. International Journal of Information Management, 39 , 169–185.

Kietzmann, J., Lee, L. W., McCarthy, I. P., & Kietzmann, T. C. (2020). Deepfakes: Trick or treat? Business Horizons, 63 (2), 135–146.

Kim, J. (2021). Advertising in the Metaverse: Research agenda. Journal of Interactive Advertising, 21 , 1–4.

Kobusińska, A., Leung, C., Hsu, C. H., Raghavendra, S., & Chang, V. (2018). Emerging trends, issues and challenges in internet of things, big data and cloud computing, future generation computer systems, volume 87. October, 2018 , 416–419.

Kopalle, P. K., & Lehmann, D. R. (2021). EXPRESS: Big data, marketing analytics, and public policy: Implications for health care. Journal of Public Policy & Marketing, 0743915621999031 , 453–456.

Kshetri, N. (2014). Big data’s impact on privacy, security and consumer welfare. Telecommunications Policy, 38 (11), 1134–1145.

Kwok, A. O., & Koh, S. G. (2020, April). Neural network insights of blockchain technology in manufacturing improvement. In 2020 IEEE 7th international conference on industrial engineering and applications (ICIEA) (pp. 932-936). IEEE.

Lapowsky, I. (2019). How Cambridge Analytica Sparked the Great Privacy Awakening, Wired , viewed 20/08/2020, from https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/

Lavelle, J. (2019), Gartner survey shows accelerating privacy regulation returns as the top emerging risk worrying organizations in 1Q19. Gartner , viewed 20/10/2021, from https://www.gartner.com/en/newsroom/press-releases/2019-04-11-gartner-survey-shows-accelerating-privacy-regulation-returns-as-the-top-emerging-risk-worrying-organizations-in-1q19

Leswing, K. (2021). Apple’s privacy change is poised to increase the power of its app store. CNBC , viewed 20/05/2021, from https://www.cnbc.com/2021/03/19/apples-privacy-change-could-increase-the-power-of-its-app-store.html

Lomas, N. (2020). GDPR enforcement must level up to catch big tech, report warns. TechCrunch , viewed 22/10/2021, from https://techcrunch.com/2020/11/26/gdpr-enforcement-must-level-up-to-catch-big-tech-report-warns/

Luo, Y. (2006). Political behavior, social responsibility, and perceived corruption: A structuration perspective. Journal of International Business Studies, 37 (6), 747–766.

Lwin, M., Wirtz, J., & Williams, J. (2007). Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35 (1), 572–585.

Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45 (2), 135–155.

Martin, K. D., & Palmatier, R. W. (2020). Data privacy in retail: Navigating tensions and directing future research. Journal of Retailing, 96 (4), 449–457.

Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81 (1), 36–58.

McStay, A. (2020). Emotional AI, soft biometrics and the surveillance of emotional life: An unusual consensus on privacy. Big Data & Society, 7 (1), 2053951720904386.

Mende, M., Scott, M. L., van Doorn, J., Grewal, D., & Shanks, I. (2019). Service robots rising: How humanoid robots influence service experiences and elicit compensatory consumer responses. Journal of Marketing Research, 56 (4), 535–556.

Merrick, R., & Ryan, S. (2019). Data privacy governance in the age of GDPR. Risk Management, 66 (3), 38–43.

Musa, J. (2020). Retail, robots, and COVID-19: Trends and how can robots play a role in safe shopping. Soft Bank robotics , viewed 13/10/2020, from https://www.softbankrobotics.com/emea/en/blog/news-trends/retail-robots-and-covid-19-trends-and-how-can-robots-play-role-safe-shopping

Najjar, M. S., & Kettinger, W. J. (2013). Data monetization: Lessons from a retailer's journey. MIS Quarterly Executive, 12 (4), 213–225.

Nica, G. (2020). BMW joins forces with German companies to create auto data alliance, BMWBlog , viewed 20/08/2020, from https://www.bmwblog.com/2020/12/03/bmw-joins-forces-with-german-companies-to-create-auto-data-alliance/

Nijholt, A. (2021). Experiencing social augmented reality in public spaces. In Adjunct proceedings of the 2021 ACM international joint conference on pervasive and ubiquitous computing and proceedings of the 2021 ACM international symposium on wearable computers (pp. 570-574).

Norwegian Consumer Council (2020), Out of Control: How Consumers are Exploited by the Online Advertising Industry , 177–83, viewed 20/09/2021, from https://www.forbrukerradet.no/out-of-control/

OAIC. (2020). Australian Community Attitudes to Privacy Survey 2020. Office of the Australian Information Commissioner, viewed 30/05/2021, from https://www.oaic.gov.au/__data/assets/pdf_file/0015/2373/australian-community-attitudes-to-privacy-survey-2020.pdf

O'Flaherty, K. (2021). iPhone Users’ Favorite iOS 14.5 Feature Is A Rip-Roaring Success. Forbes , viewed 20/05/2021, from https://www.forbes.com/sites/kateoflahertyuk/2021/05/14/iphone-users-favorite-ios-145-feature-is-a-rip-roaring-success/?sh=3f9e327e6e76

Okazaki, S., Eisend, M., Plangger, K., de Ruyter, K., & Grewal, D. (2020). Understanding the strategic consequences of customer privacy concerns: A meta-analytic review. Journal of Retailing, 96 (4), 458–473.

Palmatier, R. W., & Martin, K. D. (2019). Understanding and valuing customer data. In The intelligent Marketer’s guide to data privacy (pp. 133–151). Palgrave Macmillan, .

Park, Y. J., Chung, J. E., & Shin, D. H. (2018). The structuration of digital ecosystem, privacy, and big data intelligence. American Behavioral Scientist, 62 (10), 1319–1337.

Patterson, D. (2020). Facebook data privacy scandal: A cheat sheet. TechRepublic , viewed 20/10/2021, from https://www.techrepublic.com/article/facebook-data-privacy-scandal-a-cheat-sheet/

Poels, G. (2019). Enterprise modelling of digital innovation in strategies, services and processes. In International conference on business process management (pp. 721–732). Springer, .

Pomfret, L., Previte, J., & Coote, L. (2020). Beyond concern: Socio-demographic and attitudinal influences on privacy and disclosure choices. Journal of Marketing Management, 36 (5–6), 519–549.

Quach, S., Thaichon, P., Lee, J. Y., Weaven, S., & Palmatier, R. W. (2020). Toward a theory of outside-in marketing: Past, present, and future. Industrial marketing management . 10.1016/j.indmarman.2019.10.016.

Rasoulian, S., Grégoire, Y., Legoux, R., & Sénécal, S. (2017). Service crisis recovery and firm performance: Insights from information breach announcements. Journal of the Academy of Marketing Science, 45 (6), 789–806.

Roesner, F., Kohno, T., & Molnar, D. (2014). Security and privacy for augmented reality systems. Communications of the ACM, 57 (4), 88–96.

Roggeveen, A. L., Tsiros, M., & Grewal, D. (2012). Understanding the co-creation effect: When does collaborating with customers provide a lift to service recovery? Journal of the Academy of Marketing Science, 40 (6), 771–790.

Rustad, M. L., & Koenig, T. H. (2019). Towards global data privacy standard. Florida Law Review, 71 (2), 365–454.

Sabillon, R., Cano, J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 2016, 4 (6), 165–176.

Schneider, M. J., Jagpal, S., Gupta, S., Li, S., & Yu, Y. (2017). Protecting customer privacy when marketing with second-party data. International Journal of Research in Marketing, 34 (3), 593–603.

Shapiro, R (2019). What Your Data Is Really Worth to Facebook. Washington Monthly , viewed 20/08/2020, from https://washingtonmonthly.com/magazine/july-august-2019/what-your-data-is-really-worth-to-facebook/

Statt, S. 2021, Google is weighing an anti-tracking feature for android, following Apple’s lead, The Verge, https://www.theverge.com/2021/2/4/22266823/google-anti-tracking-feature-android-privacy-apple-ios-app-tracking-transparency

Sun, Y., Wang, N., Shen, X. L., & Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52 , 278–292.

Sydow, J., & Windeler, A. (1998). Organizing and evaluating interfirm networks: A structurationist perspective on network processes and effectiveness. Organization Science, 9 (3), 265–284.

Vargo, S. L., & Lusch, R. F. (2016). Institutions and axioms: An extension and update of service-dominant logic. Journal of the Academy of Marketing Science, 44 (1), 5–23.

Walker, K. L. (2016). Surrendering information through the looking glass: Transparency, trust, and protection. Journal of Public Policy & Marketing, 35 (1), 144–158.

Weisbaum, H. (2018). Trust in Facebook has dropped by 66 percent since the Cambridge Analytica scandal, NBC news , viewed 20/08/2020, from https://www.nbcnews.com/business/consumer/trust-facebook-has-dropped-51-percent-cambridge-analytica-scandal-n867011

Westin, A. F. (1967). Privacy and freedom . Atheneum.

Wilkie, W. (2020) Hyperdrive BMW and SAP Join Forces to Build German Auto Data Alliance, Bloomberg, viewed 20/08/2020, from https://www.bloomberg.com/news/articles/2020-12-01/bmw-and-sap-join-forces-to-build-german-auto-data-alliance

Wong, J. (2018). Elon Musk joins #DeleteFacebook effort as Tesla and SpaceX pages vanish, The Guardian , viewed 20/08/2020, from https://www.theguardian.com/technology/2018/mar/23/elon-musk-delete-facebook-spacex-tesla-mark-zuckerberg

Xiao, L., & Kumar, V. (2019). Robotics for customer service: A useful complement or an ultimate substitute? Journal of Service Research, 1094670519878881 , 9–29.

Yap, J. E., Beverland, M. B., & Bove, L. L. (2012). Doing privacy: Consumers’ search for sovereignty through privacy management practices. Research in Consumer Behavior, 14 , 171–190.

Yun, H., Lee, G., & Kim, D. J. (2019). A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information & Management, 56 (4), 570–601.

Zarouali, B., Ponnet, K., Walrave, M., & Poels, K. (2017). “Do you like cookies?” Adolescents' skeptical processing of retargeted Facebook-ads and the moderating role of privacy concern and a textual debriefing. Computers in Human Behavior, 69 , 157–165.

Zarouali, B., Poels, K., Ponnet, K., & Walrave, M. (2020). The influence of a descriptive norm label on adolescents’ persuasion knowledge and privacy-protective behavior on social networking sites. Communication Monographs , 1–21.

Zubcsek, P. P., Katona, Z., & Sarvary, M. (2017). Predicting mobile advertising response using consumer colocation networks. Journal of Marketing, 81 (4), 109–126.

Download references

Open Access funding enabled and organized by CAUL and its Member Institutions.

Author information

Authors and affiliations.

Department of Marketing, Griffith Business School, Griffith University, Gold Coast campus, Southport, Queensland, 4222, Australia

Sara Quach, Park Thaichon & Scott Weaven

College of Business, Colorado State University, Fort Collins, CO, 80523-1201, USA

Kelly D. Martin

Foster School of Business, University of Washington, Box: 353226, Seattle, WA, 98195-3226, USA

Robert W. Palmatier

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Sara Quach .

Ethics declarations

Conflict of interest.

The authors declare that they have no confict of interest.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Dhruv Grewal served as Guest Editor for this article.

Supplementary Information

(DOCX 104 kb)

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Quach, S., Thaichon, P., Martin, K.D. et al. Digital technologies: tensions in privacy and data. J. of the Acad. Mark. Sci. 50 , 1299–1323 (2022). https://doi.org/10.1007/s11747-022-00845-y

Download citation

Received : 31 December 2020

Accepted : 25 January 2022

Published : 05 March 2022

Issue Date : November 2022

DOI : https://doi.org/10.1007/s11747-022-00845-y

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Digital technology
  • Data monetization
  • Data sharing
  • Social media
  • Artificial intelligence
  • Internet of things
  • Structuration theory
  • Privacy regulation
  • Find a journal
  • Publish with us
  • Track your research

Ad-Blockers and Limited Ad-Blocking

58 Pages Posted: 25 Oct 2019 Last revised: 1 Apr 2021

Upender Subramanian

University of Texas at Dallas - Naveen Jindal School of Management

Mohammad Zia

Chapman University

Date Written: April 1, 2021

Ad-blockers enable consumers to block ads on websites. While ad-blockers began as user-oriented initiatives promising to block all ads, many now allow limited display of ads. Much of the ensuing debate has questioned the role and intent of the ad-blocker, viewing ad-blocking as a zero-sum game between consumers and the website publisher. We show limited ad-blocking (LAB) can transform ad-blocking to a win-win for all. In fact, even a user-oriented ad-blocker may offer LAB, while also benefiting the publisher and leading to better website content than in the absence of ad-blocking. Specifically, LAB can be used to incentivize content provision in two distinct ways: not just by enabling a publisher monetize website visits from ad-blocker users, but also by limiting the publisher’s ability to attract ad-blocker users if website content quality is low; since, by not blocking all ads, LAB can make a low-quality website less attractive for ad-blocker users. From the publisher’s perspective, although the publisher faces pressure to lower its website ad intensity to counter ad-blocking, LAB can emerge as an indirect means to discriminate ad intensity across consumers since they sort themselves according to their tolerance for ads through adopting the ad-blocker. We show beneficial discrimination can occur if consumers with higher valuation of content quality also find ads more disruptive and are less tolerant of ads. Interestingly, the ad-blocker may be more widely adopted when it employs LAB than when it does not. Furthermore, even a user-oriented ad-blocker may charge its users a fee.

Keywords: Ad-blockers, Limited Ad-blocking, Online Advertising, Game Theory

Suggested Citation: Suggested Citation

Upender Subramanian (Contact Author)

University of texas at dallas - naveen jindal school of management ( email ).

Dallas, TX United States

Chapman University ( email )

1 University Drive Orange, CA United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, marketing science ejournal.

Subscribe to this fee journal for more curated articles on this topic

Quantitative Marketing eJournal

Information systems & economics ejournal, managerial marketing ejournal.

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • 14 August 2024

Has your paper been used to train an AI model? Almost certainly

  • Elizabeth Gibney

You can also search for this author in PubMed   Google Scholar

Person holding smartphone with logo of US publishing company John Wiley and Sons Inc. in front of their website.

Academic publisher Wiley has sold access to its research papers to firms developing large language models. Credit: Timon Schneider/Alamy

Academic publishers are selling access to research papers to technology firms to train artificial-intelligence (AI) models. Some researchers have reacted with dismay at such deals happening without the consultation of authors. The trend is raising questions about the use of published and sometimes copyrighted work to train the exploding number of AI chatbots in development.

Experts say that, if a research paper hasn’t yet been used to train a large language model (LLM), it probably will be soon. Researchers are exploring technical ways for authors to spot if their content being used.

research papers on ad tech

AI models fed AI-generated data quickly spew nonsense

Last month, it emerged that the UK academic publisher Taylor & Francis, had signed a US$10-million deal with Microsoft, allowing the US technology company to access the publisher’s data to improve its AI systems. And in June, an investor update showed that US publisher Wiley had earned $23 million from allowing an unnamed company to train generative-AI models on its content.

Anything that is available to read online — whether in an open-access repository or not — is “pretty likely” to have been fed into an LLM already, says Lucy Lu Wang, an AI researcher at the University of Washington in Seattle. “And if a paper has already been used as training data in a model, there’s no way to remove that paper after the model has been trained,” she adds.

Massive data sets

LLMs train on huge volumes of data, frequently scraped from the Internet. They derive patterns between the often billions of snippets of language in the training data, known as tokens, that allow them to generate text with uncanny fluency.

Generative-AI models rely on absorbing patterns from these swathes of data to output text, images or computer code. Academic papers are valuable for LLM builders owing to their length and “high information density”, says Stefan Baack, who analyses AI training data sets at the Mozilla Foundation, a global non-profit organization in San Francisco, California that aims to keep the Internet open for all to access.

research papers on ad tech

How does ChatGPT ‘think’? Psychology and neuroscience crack open AI large language models

Training models on a large body of scientific information also give them a much better ability to reason about scientific topics, says Wang, who co-created S2ORC, a data set based on 81.1 million academic papers. The data set was originally developed for text mining — applying analytical techniques to find patterns in data — but has since been used to train LLMs.

The trend of buying high-quality data sets is growing. This year, the Financial Times has offered its content to ChatGPT developer OpenAI in a lucrative deal, as has the online forum Reddit, to Google. And given that scientific publishers probably view the alternative as their work being scraped without an agreement, “I think there will be more of these deals to come,” says Wang.

Information secrets

Some AI developers, such as the Large-scale Artificial Intelligence Network, intentionally keep their data sets open, but many firms developing generative-AI models have kept much of their training data secret, says Baack. “We have no idea what is in there,” he says. Open-source repositories such as arXiv and the scholarly database PubMed of abstracts are thought to be “very popular” sources, he says, although paywalled journal articles probably have their free-to-read abstracts scraped by big technology firms. “They are always on the hunt for that kind of stuff,” he adds.

Proving that an LLM has used any individual paper is difficult, says Yves-Alexandre de Montjoye, a computer scientist at Imperial College London. One way is to prompt the model with an unusual sentence from a text and see whether the output matches the next words in the original. If it does, that is good evidence that the paper is in the training set. But if it doesn’t, that doesn’t mean that the paper wasn’t used — not least because developers can code the LLM to filter responses to ensure they don’t match training data too closely. “It takes a lot for this to work,” he says.

research papers on ad tech

Robo-writers: the rise and risks of language-generating AI

Another method to check whether data are in a training set is known as membership inference attack. This relies on the idea that a model will be more confident about its output when it is seeing something that it has seen before. De Montjoye’s team has developed a version of this, called a copyright trap, for LLMs.

To set the trap, the team generates sentences that look plausible but are nonsense, and hides them in a body of work, for example as white text on a white background or in a field that’s displayed as zero width on a webpage. If an LLM is more ‘surprised’ — a measure known as its perplexity — by an unused control sentence than it is by the one hidden in the text, “that is statistical evidence that the traps were seen before”, he says.

Copyright questions

Even if it were possible to prove that an LLM has been trained on a certain text, it is not clear what happens next. Publishers maintain that, if developers use copyrighted text in training and have not sought a licence, that counts as infringement. But a counter legal argument says that LLMs do not copy anything — they harvest information content from training data, which gets broken up, and use their learning to generate new text.

research papers on ad tech

AI is complicating plagiarism. How should scientists respond?

Litigation might help to resolve this. In an ongoing US copyright case that could be precedent-setting, The New York Times is suing Microsoft and ChatGPT’s developer OpenAI in San Francisco, California. The newspaper accuses the firms of using its journalistic content to train their models without permission.

Many academics are happy to have their work included in LLM training data — especially if the models make them more accurate. “I personally don’t mind if I have a chatbot who writes in the style of me,” says Baack. But he acknowledges that his job is not threatened by LLM outputs in the way that those of other professions, such as artists and writers, are.

Individual scientific authors currently have little power if the publisher of their paper decides to sell access to their copyrighted works. For publicly available articles, there is no established means to apportion credit or know whether a text has been used.

Some researchers, including de Montjoye, are frustrated. “We want LLMs, but we still want something that is fair, and I think we’ve not invented what this looks like yet,” he says.

doi: https://doi.org/10.1038/d41586-024-02599-9

Reprints and permissions

Related Articles

research papers on ad tech

  • Machine learning

Chatbots in science: What can ChatGPT do for you?

Chatbots in science: What can ChatGPT do for you?

Career Column 14 AUG 24

Weather and climate predicted accurately — without using a supercomputer

Weather and climate predicted accurately — without using a supercomputer

News & Views 13 AUG 24

Physics solves a training problem for artificial neural networks

Physics solves a training problem for artificial neural networks

News & Views 07 AUG 24

Estonians gave their DNA to science — now they’re learning their genetic secrets

Estonians gave their DNA to science — now they’re learning their genetic secrets

News 26 JUN 24

Not all ‘open source’ AI models are actually open: here’s a ranking

Not all ‘open source’ AI models are actually open: here’s a ranking

News 19 JUN 24

A guide to the Nature Index

A guide to the Nature Index

Nature Index 05 JUN 24

Editor (Applied and Industrial Microbiology)

We’re seeking a biologist who has a critical eye, a deep understanding of their subject and interests beyond, and who can think on their feet.

London, Madrid or Pune (hybrid working)

Springer Nature Ltd

research papers on ad tech

Research assistant (praedoc) (m/f/d)

Fachbereich Physik - Institut für Theoretische Physik AG Netz Research assistant (praedoc) (m/f/d) full-time job limited to 3 years (end of project...

14195, Berlin (DE)

Freie Universität Berlin

research papers on ad tech

Faculty Positions in Bioscience and Biomedical Engineering (BSBE) Thrust, Systems Hub, HKUST (GZ)

Tenure-track and tenured faculty positions at all ranks (Assistant Professor/Associate Professor/Professor)

Guangzhou, Guangdong, China

The Hong Kong University of Science and Technology (Guangzhou)

research papers on ad tech

Global recruitment of CMO/Senior Director for Clinical Study

Responsible to lead a team run the development of local cancer therapeutics in Latam.

Brazil (BR)

Sinovac Biotech Ltd.

research papers on ad tech

Global recruitment of Principal Investigator

The principal investigators (PI) is responsible to manage research teams focused on innovative drug R&D.

Beijing, China

research papers on ad tech

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

Character.AI CEO Noam Shazeer returns to Google

Noam Shazeer

In a big move, Character.AI co-founder and CEO Noam Shazeer is returning to Google after leaving the company in October 2021 to found the a16z-backed chatbot startup. In his previous stint, Shazeer spearheaded the team of researchers that built  LaMDA  (Language Model for Dialogue Applications), a language model that was used for conversational AI tools .

Character.AI co-founder Daniel De Freitas is also joining Google with some other employees from the startup. Dominic Perella, Character.AI’s general counsel, is becoming an interim CEO at the startup. The company noted that most of the staff is staying at Character.AI.

Google is also signing a non-exclusive agreement with Character.AI to use its tech.

“I am super excited to return to Google and work as part of the Google DeepMind team. I am so proud of everything we built at Character.AI over the last 3 years. I am confident that the funds from the non-exclusive Google licensing agreement, together with the incredible Character.AI team, positions Character.AI for continued success in the future,” Shazeer said in a statement given to TechCrunch.

Google said that Shazeer is joining the DeepMind research team but didn’t specify his or De Freitas’s exact roles.

“We’re particularly thrilled to welcome back Noam, a preeminent researcher in machine learning, who is joining Google DeepMind’s research team, along with a small number of his colleagues,” Google said in a statement. “This agreement will provide increased funding for Character.AI to continue growing and to focus on building personalized AI products for users around the world,” a Google spokesperson said.

Character.AI has raised over $150 million in funding, largely from a16z.

“When Noam and Daniel started  Character.AI , our goal of personalized superintelligence required a full stack approach. We had to pre-train models, post-train them to power the experiences that make  Character.AI  special, and build a product platform with the ability to reach users globally,” Character AI mentioned in its blog announcing the move.

“Over the past two years, however, the landscape has shifted; many more pre-trained models are now available. Given these changes, we see an advantage in making greater use of third-party LLMs alongside our own. This allows us to devote even more resources to post-training and creating new product experiences for our growing user base.”

There is a possibility that different regulatory bodies, such as the Federal Trade Commission (FTC), and the Department of Justice (DoJ) in the U.S. and the EU will scrutinize these reverse acqui-hires closely. Last month. the U.K’s Competition and Markets Authority (CMA) issued a notice saying that it is looking into Microsoft hiring key people from Inflection AI to understand if the tech giant is trying to avoid regulatory oversight. The FTC opened a similar investigation in June to look into Microsoft’s $650 million deal.

You can reach out to this reporter at [email protected] by email and on signal at ivan.42 .

More TechCrunch

Get the industry’s biggest tech news, techcrunch daily news.

Every weekday and Sunday, you can get the best of TechCrunch’s coverage.

Startups Weekly

Startups are the core of TechCrunch, so get our best coverage delivered weekly.

TechCrunch Fintech

The latest Fintech news and analysis, delivered every Tuesday.

TechCrunch Mobility

TechCrunch Mobility is your destination for transportation news and insight.

Apple opens up NFC transactions to developers, but says there will be ‘associated fees’

Facing increasing pressure from regulators, Apple on Wednesday announced it’s opening up NFC transactions to third-party developers. NFC, or Near Field Communication, is the short-range wireless technology that powers Apple…

Apple opens up NFC transactions to developers, but says there will be ‘associated fees’

Stoke Space’s initial launch plans at Cape Canaveral take shape

Stoke Space is nothing if not ambitious. The five-year-old launch startup has generated a lot of hype due to its bold plans to develop the first fully reusable rocket, with…

Stoke Space’s initial launch plans at Cape Canaveral take shape

Telegram adds new ways for creators to earn money on its platform

Telegram announced on Wednesday that it’s adding new ways for creators to make money on its platform. Most notably, the platform is launching monthly paid subscriptions that users can purchase…

Telegram adds new ways for creators to earn money on its  platform

Texas firm says it lost $60M in a bank wire transfer scam

A Texas company says it lost $60 million to a criminal fraud scheme, which the FBI says makes fraudsters billions of dollars every year.

Texas firm says it lost $60M in a bank wire transfer scam

Announcing the final agenda for the SaaS Stage at TechCrunch Disrupt 2024

Software as a service (SaaS) is an ever-evolving industry. We’ll talk to some of the brightest minds and leaders in the industry — executives from early- and late-stage SaaS companies,…

Announcing the final agenda for the SaaS Stage at TechCrunch Disrupt 2024

Parker Conrad says founders have been building software wrong for the last 20 years

What is the right way to build a software business? Many startup advisers say that B2B software should solve one pain point, gain customers, then add features as their company…

Parker Conrad says founders have been building software wrong for the last 20 years

Virtuix’s VR treadmill is finally launching in September

Virtuix’s timeline has coincided with a rise of interest around mixed reality, led by Oculus/Meta, HTC and now Apple, among others.

Virtuix’s VR treadmill is finally launching in September

Check out this $800 rotating VR chair for Meta Quest

London-based Roto VR’s spinning gaming chair is the first of its kind to boast a “Made for Meta” seal of approval.

Check out this $800 rotating VR chair for Meta Quest

EliseAI lands $75M for chatbots that help property managers deal with renters

EliseAI employs an army of chatbots to text with, email, and respond to calls from renters about things such as apartment tours, maintenance requests, lease renewals and delinquencies.

EliseAI lands $75M for chatbots that help property managers deal with renters

MIT researchers release a repository of AI risks

In crafting laws to regulate AI, like the EU AI Act or California’s SB 1047, policymakers have struggled to come to a consensus on which risks the laws should cover.

MIT researchers release a repository of AI risks

Kiteworks captures $456M at a $1B+ valuation to help secure sensitive data

Kiteworks, which builds tools to secure email communications and file sharing, has raised $456 million from Insight Partners and Sixth Street Growth.

Kiteworks captures $456M at a $1B+ valuation to help secure sensitive data

The defense tech acquisition spree has begun: Autonomous factory startup Hadrian acquires Datum Source

Hadrian announced they bought Datum Source, a software company founded by SpaceX alums that uses AI to help hardware companies find manufacturing partners.

The defense tech acquisition spree has begun: Autonomous factory startup Hadrian acquires Datum Source

Apple finally allows Spotify to show pricing info to EU users on iOS

Spotify will be able to display the pricing for things like Spotify subscriptions and digital goods, including Spotify’s more recently added collection of audiobooks.

Apple finally allows Spotify to show pricing info to EU users on iOS

India’s top court clears way for Byju’s insolvency proceedings

India’s Supreme Court has cleared the way for insolvency proceedings to be resumed against Byju’s in a win for U.S. creditors.

India’s top court clears way for Byju’s insolvency proceedings

xAI releases Grok-2, adds image generation on X

Elon Musk-owned launched Grok-2 and Grok-2 mini in beta today with improved reasoning. The new Grok AI model can now generate images on the X social network, though Grok access…

xAI releases Grok-2, adds image generation on X

Google faces headwinds as it brings Pixel 9 to India

Google Pixel 9 series India launch coincides with the expansion of its sales channels and after-sales support in the country.

Google faces headwinds as it brings Pixel 9 to India

Zepto raises $340M at a $5B valuation as India’s quick-commerce market heats up

General Catalyst and Mars Growth Capital are co-leading the Series G round, which will be closed within a few days, sources familiar with the deal told TechCrunch.

Zepto raises $340M at a $5B valuation as India’s quick-commerce market heats up

Made by Google 2024: All of Google’s reveals, from the Pixel 9 lineup to Gemini AI’s addition to everything

Let’s dive right into what the Google Pixel 9 lineup looks like, how Google’s Gemini AI will be incorporated in the devices, and more.

Made by Google 2024: All of Google’s reveals, from the Pixel 9 lineup to Gemini AI’s addition to everything

Made by Google 2024: A few AI features you might’ve missed

We rounded up some of the more intriguing AI-related announcements that didn’t get a ton of play, like Pixel Studio.

Made by Google 2024: A few AI features you might’ve missed

Thiel’s Gawker takedown could be coming to a theater near you

Ben Affleck and Matt Damon have acquired a screenplay called “Killing Gawker,” which presumably delves into billionaire VC Peter Thiel’s campaign to bury the media outfit for posting excerpts from…

Thiel’s Gawker takedown could be coming to a theater near you

Gemini Live first look: Better than talking to Siri, but worse than I’d like

Google launched Gemini Live during its Made by Google event Tuesday. The feature allows you to have a semi-natural spoken conversation, not typed out, with an AI chatbot powered by…

Gemini Live first look: Better than talking to Siri, but worse than I’d like

Texas sues GM, saying it tricked customers into sharing driving data sold to insurers

Texas filed a lawsuit Tuesday against GM over years of alleged abuse of customers’ data and trust. New car owners were presented with a “confusing and highly misleading” process that…

Texas sues GM, saying it tricked customers into sharing driving data sold to insurers

Chinese robotaxi startup WeRide gets approval to carry passengers in California 

Chinese autonomous vehicle company WeRide has received the green light to test its driverless vehicles with passengers in California.  The step comes as WeRide begins the process to go public…

Chinese robotaxi startup WeRide gets approval to carry passengers in California 

Winning a gold medal is a lot like being a VC, according to Olympic champion Kristen Faulkner

Kristen Faulkner astonishing Olympic success of two gold medals stems from lessons learned from her former career as a venture capitalist, she says.

Winning a gold medal is a lot like being a VC, according to Olympic champion Kristen Faulkner

California AI bill SB 1047 aims to prevent AI disasters, but Silicon Valley warns it will cause one

SB 1047 has drawn the ire of Silicon Valley players large and small, including venture capitalists, big tech trade groups, researchers and startup founders.

California AI bill SB 1047 aims to prevent AI disasters, but Silicon Valley warns it will cause one

The first post-quantum cryptography standards are here

For many companies, this also means that now is the time to start implementing these algorithms.

The first post-quantum cryptography standards are here

UAW files federal labor charges against Trump, Musk for intimidating workers at X Spaces event

The United Auto Workers union said Tuesday that it filed federal labor charges against Donald Trump and Elon Musk. The union alleges that Trump and Musk attempted to “threaten and…

UAW files federal labor charges against Trump, Musk for intimidating workers at X Spaces event

Pixel Watch 3 adds a life-saving ‘loss of pulse’ detection feature

With the introduction of the Pixel Watch 3 smartwatches, which now come in two sizes, Google is also introducing a new, potentially life-saving feature: loss of pulse detection. At the…

Pixel Watch 3 adds a life-saving ‘loss of pulse’ detection feature

Google’s Made You Look uses Pixar characters to trick kids into smiling for the camera

Made You Look will be available on the Pixel 9 Pro Fold when it launches next month.

Made by Google 2024: How to watch Google unveil the Pixel 9, a new foldable and more

Made by Google 2024 kicks off at 10 a.m. PT on August 13. Get ready for a slew of new hardware, including the Pixel 9 and a new foldable.

Made by Google 2024: How to watch Google unveil the Pixel 9, a new foldable and more

Advertisement

Trump Returns to X in Victory for Elon Musk

The former president posted a campaign video ahead of a scheduled interview on the platform with Mr. Musk, who reinstated Mr. Trump’s account shortly after buying the site in 2022.

  • Share full article

Mr. Trump is seated with others, in a row of chairs decorated with bunting.

By Kate Conger

  • Aug. 12, 2024

Donald J. Trump posted on X Monday morning, handing a victory to Elon Musk, the social media platform’s owner, who for months has urged the former president to use the site again.

“They want to silence me because I will never let them silence you,” Mr. Trump said in a campaign video posted to his account. “They’re not coming after me. They’re coming after you.”

Mr. Trump shared the video ahead of a scheduled interview with Mr. Musk, which was set to take place on Spaces, a livestreaming feature on X, at 8 p.m. Eastern on Monday. He followed it up with several posts, including one that said, “Are you better off now than you were when I was president? Our economy is shattered. Our border has been erased. We’re a nation in decline.”

Mr. Trump’s return to X after nearly a year of silence could provide a needed boost to the platform, which has faced increased competition from a rash of new social media platforms, including the former president’s Truth Social. X has also struggled to overcome skepticism from advertisers, especially after Mr. Musk sued an influential advertising coalition last week.

But if Mr. Trump returns as a power user of the site, which helped fuel his political rise, it could attract new interest from political advertisers. During his time in the Oval Office, Mr. Trump used the site as a megaphone to issue policy directives and pummel his rivals. At the beginning of his presidency, he posted about nine times a day — but that pace accelerated throughout his time in office.

Mr. Trump was banned from X, then known as Twitter, in 2021 after his supporters stormed the U.S. Capitol in an attempt to halt the certification of the election. Twitter determined that Mr. Trump’s posts to his 88 million followers spurred violence and his account was subsequently shut down.

We are having trouble retrieving the article content.

Please enable JavaScript in your browser settings.

Thank you for your patience while we verify access. If you are in Reader mode please exit and  log into  your Times account, or  subscribe  for all of The Times.

Thank you for your patience while we verify access.

Already a subscriber?  Log in .

Want all of The Times?  Subscribe .

IMAGES

  1. How Deepfakes and Artificial Intelligence Could Reshape the Advertising

    research papers on ad tech

  2. How to write a technical research paper

    research papers on ad tech

  3. Draft For Research Paper Example : How to Write an APA Research Paper

    research papers on ad tech

  4. Analytical Essay on the Advertising Industry

    research papers on ad tech

  5. Ad tech inquiry

    research papers on ad tech

  6. Sample Paper on Advertising Science Free Essay Example

    research papers on ad tech

COMMENTS

  1. Artificial Intelligence in Advertising: Advancements, Challenges, and

    The paper with the most citations is "Setting the future of digital and social media marketing research: Perspectives and research propositions" (Dwivedi, Ismagilova, et al., 2021), published in the "International Journal of Information Management." One possible reason for the extensive citations of this article is its ability to ...

  2. AI advertising: An overview and guidelines

    The AI-enabled programmatic ad market is projected to reach $38.67 billion by 2028, growing at a CAGR of 29.71% from 2021 to 2028 ( Verified Market Research, 2021 ). AI advertising is increasing rapidly and has enormous industry potential and bright research prospects.

  3. Competition in Ad Tech: A Response to Google

    In their paper, the authors attempt to rebut the analysis we made in papers we published in 2019 and 2020 in which we exposed some of the conducts pursued by Google, the dominant provider of ad tech services, which we believe could breach competition rules. As we show in the present response, the Google Report is deficient in multiple respects.

  4. Full article: Mobile Technology and Advertising: Moving the Research

    Unintended Consequences. Mobile advertising has anecdotally been praised to have revolutionized the advertising landscape. While it indeed offers novel applications, such as granular location targeting, in-app and cross-app advertising, synced advertising, and many more, it is also important for advertisers to understand that novel technological innovations can have unintended consequences.

  5. Why Google Dominates Advertising Markets

    At the same time, Google itself is one of the largest sellers of ad space globally. This Paper explains how Google dominates advertising markets by engaging in conduct that lawmakers prohibit in other electronic trading markets: Google's exchange shares superior trading information and speed with the Google-owned intermediaries, Google steers ...

  6. Setting the future of digital and social media marketing research

    A Limited amount of research in general, exists that utilizes objective measures, which can correspond to a lack of real-world relevance. Fourth, it seems that sales and advertising are still pertinent areas of focus while the scholars could also deepen our understanding in other areas of industrial marketing (e.g. buyer-seller relationships ...

  7. The Rise of New Technologies in Marketing: A Framework and Outlook

    As a scholarly field, marketing has a long tradition of studying the adoption of new technologies. This attention is certainly warranted, as studies consistently demonstrate that, compared with firms that do not invest heavily in new technology, those that do are more agile and enjoy a strong competitive advantage (IBM Institute for Business Value 2021).

  8. Artificial intelligence (AI) applications for marketing: A literature

    This paper examined AI and its need in the marketing sector. We briefly cover the various applications of AI in several marketing segments. The paper also looks at other AI-based transformations for the marketing industries. Finally, the study identifies and discusses important uses of AI in marketing. 1.1. Artificial intelligence

  9. The Role of Machine Learning in Digital Marketing

    The existing literature considers machine learning in the field of digital marketing worthy of further research. Companies in digital marketing are seeing new opportunities because of advancements in machine learning (Buganza et al., 2020).This research opens opportunities for customers in services field specifically to digital marketing (Kastalli & Van Looy, 2013).

  10. Antitrust concerns in Ad-Tech: formalizing the combined effect of

    The functioning of the "ad tech stack", which facilitates the display of ads on publisher websites across the open internet, has attracted attention from antitrust enforcers worldwide. ... The authors have worked for parties adverse to Google in multiple jurisdictions and the analysis in this paper builds off submissions made in antitrust ...

  11. Full article: Advertising in the Metaverse: Research Agenda

    Metaverse is a term that has been gaining traction in the tech world since 2020. The term metaverse, a three-dimensional virtual world inhabited by avatars of real people—and coined by Neal Stephenson in his novel Snow Crash (1992)—became one of the hottest tech terms in 2021. In fact, a Google Trends search shows the term has been actively ...

  12. Critical Capabilities for Ad Tech

    We analyze contract terms and conditions to protect you against future price increases and unanticipated costs. Gartner Critical Capabilities for Ad Tech helps leaders gain deeper insights into Ad Tech vendor product and service offerings and understand which Ad Tech products and services are a best fit for common usage scenarios.

  13. Understanding Ad Tech

    This research demystifies ad tech for those who are not well-versed in the topic but seek to support programmatic advertising with data and technology. Marketing leaders are adopting ad tech to take charge of media buying, ad targeting and trafficking operations once managed exclusively by agencies. This research demystifies ad tech for those ...

  14. Market Guide for Ad Tech Platforms

    Digital advertising is the No. 1 channel by spend allocation, and ad tech platforms facilitate a growing portion of this spend. Digital marketing leaders should match their ad tech and media buying vendor needs with market developments in identity, privacy, consent and measurement. Included in Full Research

  15. AdTech: The Complete Guide to Advertising Technology

    The boom for marketing technology has not left behind advertising technology, or adtech, but the digital acceleration wrought by the COVID pandemic has sped things up more. In fact, between the third quarter of 2020 and the third quarter of 2021, there was a 125% increase in M&A activity for adtech platforms, including several high-profile deals in 2021 like Mediaocean's acquisition of ...

  16. Ad Tech Daily

    Ad Tech Daily publishes ad tech news, insights, interviews, reports and other updates from the digital advertising industry. Ad & Media Strategy. Ad and Media Verification; Ad Networks and Platforms ... Mobile App Research Reveals 1st and 2nd Impressions Are Everything May 24, 2023;

  17. Advertising: Articles, Research, & Case Studies on Advertising

    by Ehsan Valavi, Joel Hestness, Newsha Ardalani, and Marco Iansiti. This paper studies the impact of time-dependency and data perishability on a dataset's effectiveness in creating value for a business, and shows the value of data in the search engine and advertisement businesses perishes quickly. 19 May 2020. Research & Ideas.

  18. Digital technologies: tensions in privacy and data

    Driven by data proliferation, digital technologies have transformed the marketing landscape. In parallel, significant privacy concerns have shaken consumer-firm relationships, prompting changes in both regulatory interventions and people's own privacy-protective behaviors. With a comprehensive analysis of digital technologies and data strategy informed by structuration theory and privacy ...

  19. Artificial intelligence in marketing: A systematic literature review

    SUBMIT PAPER. International Journal of Market Research. Impact Factor: 2.4 / 5-Year Impact Factor: 3.0 . JOURNAL HOMEPAGE. SUBMIT PAPER. Close ... World Advertising Research Center. (2019). Nearly three quarters of the world will use just their smartphones to access the internet by 2025.

  20. 01. Introduction

    Advertising Technology (Ad Tech, AdTech, adtech, ad tech, ad technology) refers to the software and tools used to create, run, manage, measure, ... research papers, books and other materials, then please provide the original source, for example "Source: The AdTech Book by Clearcode" and "Source: Chapter 02.

  21. Ad-Blockers and Limited Ad-Blocking

    Ad-blockers enable consumers to block ads on websites. While ad-blockers began as user-oriented initiatives promising to block all ads, many now allow limited display of ads. Much of the ensuing debate has questioned the role and intent of the ad-blocker, viewing ad-blocking as a zero-sum game between consumers and the website publisher.

  22. Zijian (Harrison) Gong

    Top Faculty Paper Award (1st prize) for the paper "Processing Capacity in Visual Search: The Impact of Visual Salience and Involvement on Attention." Advertising Division, 2016 AEJMC Annual Convention, Minneapolis, MN. Doctoral Dissertation Completion Fellowship. 2015 Texas Tech University

  23. The evolution of advertising research through four decades: a

    Itai Himelboim ([email protected]) is an Associate Professor of Advertising, Thomas C. Dowden Professor of Media Analytics and the Founder and Director of the SEE Suite, Social media Engagement & Evaluation lab, at the University of Georgia. His research interests include social media analytics and network analysis of large social media data, with focus on advertising, brand communities and social ...

  24. Has your paper been used to train an AI model? Almost certainly

    Experts say that, if a research paper hasn't yet been used to train a large language model (LLM), it probably will be soon. Researchers are exploring technical ways for authors to spot if their ...

  25. China Battery Tech Reflects Research Boom and Big Spending

    Researchers in China lead the world in publishing widely cited papers in 52 of 64 critical technologies, recent calculations by the Australian Strategic Policy Institute reveal.

  26. Character.AI CEO Noam Shazeer returns to Google

    In a big move, Character.AI co-founder and CEO Noam Shazeer is returning to Google after leaving the company in October 2021 to found the a16z-backed chatbot startup. In his previous stint ...

  27. PDF Global Macro ISSUE 129

    channels of payout—advertising, e-commerce, and subscription fees—will depend on shifting consumer habits. In the Web 1.0 tech cycle, the Netscape web browser debuted in the mid-1990s and the market peaked in March 2000, but the return on capital only turned positive in the late 2000s/early 2010s as consumers were slow to embrace the ...

  28. Editorial: Advertising and small businesses: the need for more research

    A recent survey of U.S. small businesses conducted by Statista ( 2021) found that 45% are already paying for digital advertising and that the average expenditure of these firms was $534 per month. 93% of those who are using digital advertising planned to either keep spending at current levels of increase it (Statista 2021 ).

  29. Alphabet leads in AI research, Samsung stands out among Korean firms

    Alphabet, the parent company of Google, has emerged as the top publisher of highly cited academic papers on artificial intelligence (AI). According to the study by the Georgetown University Center ...

  30. Trump Returns to X in Victory for Elon Musk

    Donald J. Trump posted on X Monday morning, handing a victory to Elon Musk, the social media platform's owner, who for months has urged the former president to use the site again.