0% found this document useful (0 votes)
91 views12 pages

Creepy Marketing - Three Dimensions of Perceived Excessive Online Privacy Violation

Uploaded by

malalady10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views12 pages

Creepy Marketing - Three Dimensions of Perceived Excessive Online Privacy Violation

Uploaded by

malalady10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Creepy Marketing:. . . .

Moore, Moore, Shanahan, Horky and Mack

CREEPY MARKETING: THREE DIMENSIONS OF


PERCEIVED EXCESSIVE ONLINE PRIVACY VIOLATION
ROBERT S. MOORE, Mississippi State University
MELISSA L. MOORE, Mississippi State University
KEVIN J. SHANAHAN, Mississippi State University
ALISHA HORKY, Elon University
BRITNEY MACK, Mississippi State University

In this explorative paper we develop three dimensions of a new construct, Creepy Marketing
(hereafter CM). First we discuss the impact of online personalized marketing on consumers. Based
on this discussion a qualitative study examines both annoying marketing and creepy marketing from
a consumer’s perceptive. Results distinguish annoying marketing, defined primarily as tactics, from
CM, defined predominately as feelings. Based on the study, CM consists of three dimensions:
invasion of privacy, stalking behavior and violation of social norms. Each of these dimensions is
discussed and directions for future research are provided.

INTRODUCTION new personal space (Felipe & Sommer, 1966)


occurs. As a strategy, retreat reestablishes
For more than fifty years, social scientists have privacy for individuals.
studied the concept of personal space in the
corporeal world. Studies on violations of this The social sciences provide much explanation
personal space include both public and private of violations of personal space in the corporeal
settings. These settings vary widely from 1) world however a paucity of research on
public settings where one would assume violations of virtual space exists. The purpose
reduced personal space such as crowded of this study is to investigate the concept of
subway cars (Evans & Wener, 2007) to 2) virtual space, which is the space individuals
public spaces where one expects no violation of consider to be their own virtual environment.
personal space such as men’s urinals Our study begins with a discussion of more
(Middelmist, Knowles, & Matter, 1978) and 3) familiar corporeal or non-virtual invasion of
private spaces where one assumes additional personal space. Next, we discuss online
personal space such as an ATM (Kaya and personalized marketing, the impact of this type
Erkip, 1999). of marketing on consumers and then conduct a
qualitative study to identify types of marketing
Personal space, an area that individuals that pierces this veil of online virtual space
maintain around themselves (Hayduk, 1978), based on perceptions of what Internet users
consists of a culturally accepted normative consider creepy marketing (hereafter CM). The
distance and a known predictable behavior results of this study are then discussed in a
(Evans and Wener, 2007; Burgoon, 1978). broader sense offering a multi-dimensional
Both the distance property and known interpretation of CM. We conclude with
predictability of that property help to regulate suggestions for future research as well as
privacy (Evans & Wener, 2007). The violation implications for firms.
of expected behavior (Burgoon, 1978) or an
involuntary invasion of personal space elevates PERSONAL SPACE
physiological stress (Middlemist, Knowles, & VERSUS VIRTUAL SPACE
Matter, 1976) and generates discomfort
(Hayduk, 1978). If an invasion of personal To illustrate the relative differences in personal
space takes place, retreat and establishment of a versus virtual space violation, consider the
The Marketing Management Journal
following situation. It’s a weekend afternoon
Volume 25, Issue 1, Pages 42-53 and you decide to go shopping for a new jacket.
Copyright © 2015, The Marketing Management Association
All rights of reproduction in any form reserved You enter a store and casually browse a few
items before selecting a jacket and try it on.
Marketing Management Journal, Spring 2015 42
Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

You then return it to the rack and leave the personal space that are based on the expected
store. You move on to a few other stores but distance of the violator as well as the personal
aren’t satisfied with the options and return relationship. A key finding of EVT is that the
home. The next day as you enter your favorite perceived valence of the violation will drive
bagel shop you notice someone just inside the subsequent reaction. McLaughlin and Vitak
door; he calls out your name. You turn and (2012) extend EVT to the virtual world and find
notice he is holding a jacket, pinned to it is a negative violations from friends result in
partially completed order slip with your name. confrontation while such violations from non-
In his other hand, circled on a map, is your friends results in posts being ignored, in a best-
current location. It is the same jacket you had case scenario. However, in every case,
tried on the day before. How did he know you violations of etiquette, such as stalking like
looked at that jacket? How did he know it was behavior and unwelcome communication are
you? Why does he have your location circled? always negative valance. This has potentially
For most, this situation would at a minimum be damaging implications for marketers employing
annoying and more likely, result in a rather personal information laden advertising.
unsettling feeling. However, online tools allow
marketers to virtually engage in the behavior As illustrated in our earlier scenario, the use of
described above. GPS technology as well as advances in
behavioral tracking software entices marketers
The situation described above might even feel who can more easily identify, track and
like stalking which is “conduct directed at intercept our activities as we consume digital
individuals that involves repeated physical information and interact in our online lives.
proximity, unwanted communication, threats, Though much of behavioral marketing seems
fear, or a combination of these events” (Tjaden, benign, there are instances in which marketing
1997; p. 1). One of the conditions of stalking can create an unsettling feeling. For example,
requires the communication to be non- consider the following as reported in Hill
consensual (Tjaden & Thoennes, 1998) where (2011); a woman in California receives an
“more than one overt act of unwanted pursuit of email from an English soccer hooligan,
the ‘victim’ is perceived as being purporting to be an acquaintance. He notes he
harassing” (Meloy & Gothard, 1995; p. 259). is on the run from the law and he was on the
way to see her. She had no idea either who he
To warrant classification as stalking, invasion was nor how he knew facts about her. Over the
of space and privacy need not be overtly course of his trek across the US, she receives
threatening. Pathe and Mullen (1997) describe updates on his antics-including an email from a
stalking as behaviors inflicted on others in the hotel manager with a bill for damages he had
form of unwanted intrusions and caused. She was terrified. On the 5th day she
communications. In fact, they need not be received notice it was a prank, initiated when
corporeal in nature but do violate an she agreed to a personality test that had been
individual’s sense of social norms. Social sent to her by a friend, aka the prankster. It
norms exist in both the corporeal and virtual turns out to be an elaborate ad campaign for the
worlds. Further, social norms regulating real Toyota Matrix, the automobile the soccer
world behavior seem to parallel those in virtual hooligan used to cross the country.
environments including expectations of
personal virtual space (Preece, 2004; Consider the coping mechanism used when
McLaughlin & Vitak, 2012). In an online personal space is violated. Online consumers
environment such as Facebook, personal space cannot retreat when faced with personalized
extends to users’ news feeds and walls with unsolicited advertising, potentially leading to a
norm violations including unacceptable posting sense of helplessness and stress. Individuals
habits on said feeds and walls (McLaughlin & may simply elect to cease interaction with the
Vitak, 2012). website; an option that for some would be
difficult when the offense occurs on social
Burgoon (1978) introduced Expectancy media sites such as Facebook or Twitter.
Violation Theory (EVT) to explain why Online marketing practices employ tools and
individuals react to negative violations of

43 Marketing Management Journal, Spring 2015


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

techniques that would be somewhat impossible due to the increased ability of a firm to know
in the non-virtual world. their preferences and to make recommendations
uniquely suitable to them (Kramer, Spolter-
PERSONALIZED MARKETING Weisfeld, & Thakker, 2007). However others
believe it represents a paradox for individuals
Personalization in marketing is not a new as their privacy is potentially invaded and they
concept. With its origins in segmentation, lose control over the use of their information
marketers have long used information such as (Christiansen, 2011; Milne, Rohm, & Bahl,
demographics, psychographics, and geographic 2009).
locations to develop and offer products to
satisfy customer needs (i.e., Smith, 1956). The paradox becomes apparent due to an
Increases in technology accompanied by organizations obtaining, or using, information
decreases in costs have enabled firms to reduce involuntarily (from the consumer’s
broad segments to markets of one (i.e., perspective). A firm can utilize tools such as
Perkowitz & Oren, 2000). These efforts can cookies and web bugs to track behavior and
range from broad personalization offerings such then use that information to change their
as a firm promoting makeup using ethnic cues offerings based on behavior. Consumers can
(Forehand & Deshpande, 2001) to very narrow identify those companies tracking their online
one to one communications such as surfing behavior using a browser add-on called
personalized custom web site landing pages to Collusion. After visiting just two websites
prospective college students. (Fox News and The Weather Channel)
Collusion generated more than thirty-five 3rd
In terms of online personalization, recent party sites that were notified of our surfing
studies have indicated that this medium offers a destinations with several sharing information
unique opportunity for organizations to between each other and other firms to which we
implement high degrees of near instantaneous had not even visited. More sophisticated
personalization (Ho & Tam, 2005; Zhang & software allows the combination of not just
Wedel, 2009). Unlike offline personalized online behavior but multiple data sources online
marketing which can introduce delays in and offline to make product recommendations
delivery (e.g., direct mail), interruption as illustrated in the below comment.
characteristics (e.g., telemarketing), or lack of “I was looking at home warranty
customer knowledge (e.g., retail staff), online companies on the Internet, but did not
personalized marketing uses real time fill in any forms with my information.
information and behavior to reach the consumer Two days later, in the regular, US snail
at the time in which they are engaged in need mail, I get an ad mailed to me from a
satisfying activities. Personalization in this home warranty company.
context refers to the ability to change online Coincidence?” Michele (theweek.com)
content as the user is experiencing it.
This form of personalization, based on behavior
Information for personalization, needed from profiling, occurs in real time as individuals surf
consumers, can be either voluntarily or the Internet. The end game is the movement of
involuntarily provided. Individuals voluntarily site visitors through the purchase cycle.
provide information (i.e., name and address) However there is also the belief that as this
through order processing and creating user personalization becomes perceived as
accounts. The willingness of customers to excessive, consumers will cope through
provide information is related to the trust an avoidance and negative attitudes (Baek &
individual has with the firm (Schoenbachler & Morimoto, 2012; Wei, Fischer, & Main, 2008).
Gordon, 2002), the perceived benefit (Akçura We believe that this second form of information
& Srinivasan, 2005) and perceived control over acquisition and use is more likely to lead to
further dissemination (Phelps, Nowak, & instances in which individuals feel that CM has
Ferrell, 2000). occurred.

It is commonly believed that over time


consumers will benefit from personalization

Marketing Management Journal, Spring 2015 44


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

QUALITATIVE STUDY creepy marketing) to 266 (for how annoying


marketing might make one feel). The responses
A student sample was utilized to discover provided show that while the two types of
thoughts and feelings regarding both creepy and marketing may overlap in the minds of some
annoying marketing tactics. College students consumers, there are distinct differences
are appropriate for this type of study as they between the two in terms of definitions,
represent a homogenous population and they examples, and feelings. Of the six questions we
frequently interact with sites in which they focus on the definitions that were provided by
provide personal information that may be used respondents and use the examples and feelings
for marketing communications (i.e., as ancillary support for the development of
Facebook.com). Students in an introductory dimensions of creepy marketing. Our focus on
marketing course in a large public university the definitions allows us to understand what
located in the southern United States were subjects believe these constructs represent.
offered an opportunity to earn course credit by
responding to questions regarding annoying and Two judges sorted the responses regarding the
creepy marketing. Of the 276 students, 273 definitions of annoying and creepy marketing to
agreed to participate in the study. Subjects uncover major themes. In a process similar to
were asked six open-ended questions; three for one used by Bitner, Booms, and Tetreault
creepy marketing, three for annoying (1990), responses were read, reread, and then
marketing. Respondents were asked to grouped into categories. First, one judge used
separately define; provide examples and note open coding to create categories of responses
how annoying marketing and creepy marketing by grouping similar responses. These categories
make them feel. were then combined, when appropriate, with
other categories sharing similar characteristics.
The number of usable responses varied by These categories were then provided to the
question and ranged from 153 (for examples of

TABLE 1:
Categorization of Verbatim Responses
Q1a: Annoying Included Illustrative Quotes Percentage
Marketing Def. Subcategories
(n=287*)
Aggressive tactics “Marketing that keeps trying to influence a customer to buy a 41%
certain product even when they already turned the product
down”
Repetition “When companies use the same commercials over and over” 23%

Obnoxious Tactics 15%


Garish/loud “Any marketing that is loud, persistent, or vulgar, or things that 8%
ads are spelled incorrectly”
Irritating “Marketing that is irritating to any of the 5 senses of a target 4%
customer”
Distracting “Ads before youtube videos, Pandora, etc. Any ad that keeps you 1%
from doing what you are trying to do”
Low quality “Marketing that does not meet today’s standards” ~1%
ads
Unsolicited “When you get excessive commercials/ phone calls about a 9%
product or service that you are not interested in”
Irrelevant Content 7.3%
Nonsensical “Ads that seem to have no plan” 4%
Uninformative “Marketing that tells nothing about the product. It just tries to 2%
be funny or flashy to sell me something”
Product “Only concentrating on selling the product, not caring about the 1%
Focused customer”
Tactics Which “Bugging a customer to the point that they want nothing to do 5%
Cause Avoidance with your product”
* Some respondents provided complex definitions which were broken into distinct elements.

45 Marketing Management Journal, Spring 2015


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

TABLE 1: (Continued)
Q1b: Creepy Mar- Included Illustrative Quotes Percentage
keting Def. (n=204) Subcategories
Invasive Tactics 41%
Using/ Gath- “Marketing that knows your interests or things about you that 27.5%
ering Personal you did not provide. For example, they suggest items that you
Information would be interested in based off of other purchases”
Invasion of “Using methods that may be too personal or constant” 8%
personal space

Tracking “Cookie tracking on a computer is sometimes kind of creepy 5%


when you start getting ads for things you have been looking at”
Consumer 32%
Discomfort
Consumer “An approach to marketing that makes the consumer feel uneasy 24.5%
emotion dis- and leaves them questioning the motives of the company adver-
comfort tising the product”
Consumer “Marketing that doesn’t make you feel safe like someone is 4%
emotion fear/ watching you”
uncertainty
Use of fear “Selling products in a way that it scares the customer into not 4%
appeals buying it or using a scare tactic to get the customer to use the
product”
Violates social 14%
norms
Inappropriate “Marketing or advertising with seductive girls or guys talking 5%
examples about the products in a seductive way”
Unusual “Usually happens when advertisers are willing to touch on sub- 8%
Content jects that are socially considered out-of-bounds or off-limits”

Content “Marketing that speaks to a person’s inner life, thoughts, and ~1%
feelings feelings”
Out of the Ordinary “Marketing that uses techniques that we think are odd or unusu- 13%
Tactics (creates al to get our attention”
weird feeling)

second judge, who sorted each response into described below. Examples of both corporeal
one of the established categories. Minor and virtual creepy and annoying tactics are
disagreements in coding were resolved by discussed to show how non-virtual examples
discussion between the judges. Both the inter- often parallel virtual marketing examples.
rater reliability and Perreault and Leigh’s
(1989) Index (Ir) were calculated and both ANNOYING MARKETING
exceeded .80, supporting the consistency of the
coding process. Category 1: Aggressive tactics

DEFINITIONS A large percentage of respondents chose to


define annoying marketing in terms of the level
The respondent-provided definitions of both of aggression or persistence they perceived to
creepy and annoying marketing were separated be present in marketers’ strategies. Aggressive
into twenty-four distinct categories. These tactics include persistent selling measures after
categories were then combined by common a consumer has refused a product or service,
themes when possible and resulted in 11 pressuring the customer to make a purchase, or
abstract definitional categories. Four primary using excessive promotions. This category also
categories of definitions emerged for creepy includes instances in which a consumer feels
marketing while six categories emerged for overwhelmed by marketing efforts. For
annoying marketing. The primary definitional example, respondents defined annoying
categories for both annoying and creepy marketing as “overkill,” “over the top,”
marketing are noted in Table 1 and are “pushy”, and “in your face.”

Marketing Management Journal, Spring 2015 46


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

Category 2: Repetition example, annoying marketing may be


“unsolicited emails, telephone calls, surveys,
Annoying marketing may be synonymous with etc,” “giving customers unwanted promotional
repetition in the minds of some respondents. items,” or “ when you get see excessive
The second largest definitional category for commercials or receive excessive phone calls
annoying ads centered on the reappearance of about a product or service that you are not
the same promotional tools or repeated selling interested in.” In the virtual world, this
efforts by a single firm. For example, annoying includes cookies based ads that simply mine the
marketing is defined as “when companies use cookies placed by companies such as double-
the same commercials over and over,” but also click to expose consumers to ads for products
as “when telemarketers constantly call from the related to search terms or other webpages
same company,” and “getting asked to buy the visited previously. As an example, one of the
same product multiple times.” Online current study’s authors visited the ASPCA
examples include the same pop up ads or webpage. Until cookies were cleared, ads for
banner ads repeating from page to page. the ASPCA, World Wildlife Fund and Pet
Rescue (an online game by Zynga) appeared,
Category 3: Obnoxious often three or more ads on the same page until
cookies were cleared.
The timing and design of marketing efforts can
also contribute to perceptions of annoying Category 5: Irrelevant Content
marketing. Many respondents note that
obnoxious marketing efforts are the definition Another emergent category for the definition of
of annoying marketing. These efforts that are annoying marketing involves the content of
annoying to respondents include garish, loud, or marketing communications. Some respondents
low quality ads ”Annoying marketing is any noted that annoying marketing includes
marketing that is loud, persistent, or vulgar,” or communications that contain irrelevant,
“cheaply made advertisements“. For example, nonsensical, or unfocused content. For
many online ads for insurance rely on example, annoying marketing is identified as
gimmicks such as animated gifs of girls having no plan or appearing to not be well
dancing in bikinis to gain attention; all the thought out. This type of marketing can also be
while annoying those who they target. This type perceived as including communications that are
of marketing efforts can also be included in a uninformative. As one respondent notes,
definition of annoying marketing. Several “Annoying marketing is marketing that tells
respondents note that annoying marketing is nothing about the product. It just tries to be
distracting marketing and that this can include flashy or funny to sell the customer something.”
“…ads before YouTube videos, Pandora ads, As previously mentioned, animated gifs with
etc…anything that keeps you from what you scantily clad females to sell insurance or
are doing.” Ultimately, it seems that these headlines promising a “weird way” to achieve
marketing efforts can also be irritating to the some benefit.
consumer, as many respondents stated that the
definition of annoying marketing is “marketing While uninformative and irrelevant
that is irksome,” or “marketing that is irritating communications may be annoying,
to any of the five senses of a consumer.” communication that includes only product
related content was also perceived to be
Category 4: Unsolicited annoying marketing. For example, respondents
state that annoying marketing “… is marketing
Another category that emerged in the that concentrates only on selling the product
definitions of annoying marketing was and doesn’t care about the customer.” So it
concerned with unsolicited promotional efforts. seems that annoying marketing can also be
In the corporeal world this includes customers defined as marketing efforts that either focus
receiving emails, telephone calls, or even exclusively on the product or exclusively on
promotional items from an organization when entertaining the consumer.
they have not initiated contact or requested
information from that organization. For

47 Marketing Management Journal, Spring 2015


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

Category 6: Causes Avoidance leave you alone. When discussing personal


space with students, it is evident that a form of
The final prevalent category of reported violation of virtual personal space exists. For
definitions for annoying marketing includes example, tracking activities can be conducted
definitions regarding the effect of marketing digitally as well as in person. Some
efforts on consumer behaviors. Respondents respondents stated very specifically that creepy
stated that annoying marketing can be defined marketing could be defined as online tracking
as marketing that drives the consumer away, activities. Examples include “cookie tracking
causes them to become uninterested in a on a computer is creepy when you start getting
product or service, or even drives the customer ads for items that you have been looking at”
to desire a competitors’ product or service. and “ads that keep track of your browsing
“Marketing that drives away the customer” and history.”
“bugging a customer to the point that they want
nothing to do with your product” are examples Category 2: Causing Consumer Discomfort
of definitions in this category.
Another large category of definitions for creepy
CREEPY MARKETING marketing include defining creepy marketing as
the discomfort that consumers may feel as a
Category 1: Invasive Tactics result of some marketing strategies.
Respondents note that creepy marketing may
The largest emergent category of definitions for make the consumer feel fearful, uncertain, or
creepy marketing includes invasive tactics used uncomfortable. This includes the use of fear
by marketers, or at least tactics that are appeals by marketers. For example, creepy
perceived by the customer to be invasive. The marketing is defined as “selling products in a
majority of these tactics include gathering or way that it scares that customer into not buying
using personal information from the customer. it or using a scare tactic to get the customer to
Other tactics mentioned by respondents include use the product” and “anything that tries to
the invasion of personal space by marketers and appeal to fear or distress.” Tactics such as
perceived stalking or tracking practices using these may cause the customer to feel uncertain
by marketers. or uncomfortable. Many respondents defined
creepy marketing in these terms. For example,
Many respondents cite the use and gathering of “creepy marketing is an approach to marketing
personal information as being the salient trait of that makes the consumer feel uneasy and leaves
creepy marketing. It seems that this utilization them questioning the motives of the company
of personal information results in marketing advertising the product.” One such example
efforts that are perceived to be “too personal.” involves a firewall security firm. This firm
For example, respondents reported creepy identifies the user by IP address, and provides
marketing is defined as “gathering too much personal information all the while offering a
personal information,” “marketing that knows firewall to stop other companies from doing the
you so well that it is creepy” and “marketing same.
that knows your interests or other information
about yourself that you did not provide.” This Category 3: Violates social norms
type of marketing is particularly effective
online, given the ability to gather and aggregate Content of marketing communications, which
personal information from multiple online violate social norms, may also contribute to the
sources. definition of creepy marketing. Respondents
state that creepy marketing can be defined as
Other definitions in this category include the marketing that uses inappropriate examples,
perceived invasion of one’s “personal space” or content, or salespeople, violates social norms,
“comfort zone” by the marketer as well as or deals with content matter that may be
stalking and tracking behaviors perpetrated by perceived as being personal, such as depression.
the marketer. For example, several respondents Unnecessary sexuality is mentioned in many
noted that creepy marketing could be defined as instances in which respondents state that creepy
being stalked by a salesperson and who won’t marketing can be defined by the use of

Marketing Management Journal, Spring 2015 48


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

inappropriate examples, content, or salespeople. DISCUSSION


This includes such definitions as “creepy
marketing is marketing or advertising with The perceptions of what respondents defined as
seductive men or women talking about products annoying and creepy marketing offers some
in a seductive manner” and “ creepy marketing interesting results. First we will briefly discuss
is using sexuality when it is unnecessary… the annoying marketing results coupled with
adding sexual tension is not needed to sell a previous research examining these perceptions;
hamburger“ or apparently insurance. then we will differentiate this term with creepy
marketing and provide what we feel are the
Respondents state that creepy marketing three dimensions of CM.
“usually happens when advertisers are willing Annoying Marketing
to touch on subjects that are socially considered
out-of-bounds or off-limits.” Creepy marketing The findings for annoying marketing
may also occur when marketers “cross a line” predominately fall into the first three
or mention subjects that are “taboo.” This can categories: aggressive tactics, repetition, and
include topics such as depression. One obnoxious, representing 79% of responses.
respondent states that creepy marketing is Research regarding aggressive tactics is
“marketing that speaks to a person’s inner seemingly captured by hard selling techniques
life… their thoughts, or feelings.” (e.g., Chu, Gerstner, & Hess, 1995) and bait
and switch actions (e.g., Wilkie, Mela, &
Category 4: Out of the Ordinary Tactics Gundlach, 1998). Advertising repetition has
been seen to have negative consequences for
The final category of definitions for creepy both known and unknown brands (Campbell,
marketing includes the use of marketing tactics Keller, Mick, & Hoyer, 2003). Lastly,
that respondent perceived to be abnormal. obnoxious tactics have been examined in both
There were very few specific examples in this traditional and digital marketing (e.g., Chang &
category. It seems that there is some Morimoto, 2011). Taken together, the
indescribable quality to some marketing efforts components of annoying marketing focus on
that strikes consumers as being “weird” or the tactics employed by the marketer and
“unusual.” As one respondent noted, “creepy represent a long history of research in
marketing is when you can sense that marketing.
something is not normal with the marketer” and
gives examples of salespeople who act in an Creepy Marketing
unusual manner and of promotions, both online
and real world, that seem too good to be true. Based on our analysis of the definitions of CM
Several other respondents in this category provided by respondents, we formed the
attempted to explain what constitutes “weird” component categories outlined in Table 1.
tactics. For example, one respondent notes that Unlike annoying marketing, in which the tactics
the use of unrelated salespeople can be weird, employed by marketers was the focus of the
stating, “I find it creepy when companies definition, for CM it appears that the feelings
designate a single random person to become associated with the tactics are more
their spokesperson and they make commercials prominently included as part of identifying the
with them in weird scenarios, like Flo in the concept. The categories noted in Table 1 for
Progressive commercials.” However, many CM fall predominately into three dimensions
others simply stated that creepy marketing is representing 87% of responses: invasive
“marketing that is odd and weird” or actions, consumer discomfort and violates
“marketing that uses unordinary techniques.” social norms. These areas are closely
One example cited as odd given its placement is associated with corporeal research dimensions
one for erectile dysfunction appearing on a composed of invasion of privacy, stalking
news feed for Fox News. The FEMALE behavior and violations of social norms. It is
reporting it lived alone and had never searched these three dimensions that we feel compose
that term. the definition of CM.

49 Marketing Management Journal, Spring 2015


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

Invasion of Privacy aware victims, noted the impact of stalking


included increased anxiety, avoidance of
Of the three dimensions, invasion of privacy locations and changes in behavior including job
represents the most extensively researched of relocation or ceasing employment, moving
these dimensions in marketing. For example, home and eating disorders.
researchers have investigated the development
of online privacy concerns (Ashworth & Free, Violation of Social Norms
2006), dimensions of privacy concern (Sheehan
& Hoy, 2000), as well as how privacy concerns Social norms provide guidance as to what
influence the willingness to provide should or ought to be done in a given situation.
information (Nam, Song, Lee & Park, 2006; In this discussion, social norms refer to the use
Phelps et al., 2000) to build relationships online of information as one expects it to be used.
(Awad & Krishnan, 2006; Franzak, Pitta, & This is analogous to Burgoon (1978) and
Fritsche, 2001) and the resultant tensions violations of personal space. Online, this has
between advertisers use of information and proven to be an issue with minors (e.g., Bryce
consumer concern (Akcura & Srinivasan, 2005; & Klang, 2009) and has resulted in the FTC
Rapp, Hill, Gaines, & Wilson, 2009). Our (2012) development and strengthening of the
respondents reported the use of personal Child Online Privacy Protection Rule. With
information and privacy invasion as part of regard to personal information, consumers do
their understanding of CM. recognize the implicit tradeoff that is necessary
Stalking to complete or engage in meaningful experience
(Utz & Kramer, 2009). It is when information is
First, it is not the authors’ intention to minimize used in a manner that is inconsistent with
the traditional conceptualization of stalking expectations that issues arise. In a study of
which occurs between individuals in a societal relationship marketing efforts, it was found that
context, rather our discussion is grounded in the what marketers felt was the development of
belief that a firm can behave in a manner that customer intimacy, consumers considered
can be perceived as stalking by consumers. As intrusion (O’Malley, Patterson, & Evans,
such, we rely on the extant individual based 1997). Granted that technology has made
literature to inform our discussion. However, tremendous strides in collecting and integrating
in the legislative, academic and practitioner information offline (e.g., Lekakos, 2009) and
arenas stalking has proved difficult to define online (Kachhi & Link, 2009), however a
due to the nature of the actions associated with growing question has become should they
it (Fox, Nobles, & Fisher, 2011). Fox et al. (Baek & Morimoto, 2012)? Marketers have
(2011, p.77), in their review of the stalking begun to recognize that there are limits to this
literature note that typical definitions of integration (Godfrey, Seiders, & Voss, 2011)
stalking include behaviors that are “… and as this level of communication expectations
repetitive, intrusive, unwanted, and frightening, is breached negative responses can result
threatening or harassing.” They also suggest (Alreck & Settle, 2007; White, Zahay,
that stalking is likely a multidimensional Thorbjornsen, & Shavitt, 2008).
construct and that it may still occur when a
subset of these behaviors are present. Our IMPLICATIONS OF CM
respondents noted similar behaviors which AND FUTURE RESEARCH
were not necessarily received positively such
as: making contact with them (through Behavioral profiling has progressed to the point
advertisements) after they left a web site-even in which data integration from multiple stored
after several days, receiving items in the mail sources combined with real time information on
that were associated with a visited website- but behavior and location allows marketers an
were not requested and utilizing information unprecedented ability to offer highly
which they did not disclose. customized and personalized products and
services. However, based on anecdotal
The consequences of stalking behavior on their evidence, our qualitative study and theoretical
victims cannot be ignored. Path and Mullen support- there are limits in which marketers can
(1997), in their study of more distressed and effectively and comfortably use this

Marketing Management Journal, Spring 2015 50


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

information before consumers perceive the consumer activity with 28% of those online
attempt to personalize their experience as going shopping for a product or service (Pew Internet,
too far. 2010) accounting for 7% of retail trade or $80
billion (US Census, 2015). Second, behavior
We find creepy marketing to be a perceptual online is easily tracked within and between web
construct composed of three dimensions: sites (FTC, 2012). Lastly, the continual
invasion of privacy, stalking behavior and improvement in supercomputing capabilities as
violation of social norms. Based on our well as software program development allows
discussion future research regarding CM should for the near instantaneous creation of offerings
be undertaken in a number of areas. First the that are tailored to individual from multiple
development of a scale to assess each of the sources based on their actual behavior in the
three components of CM is needed. Increases very near past as well as over time. Creepy
in CM are likely to be associated with greater marketing is a construct that helps to explain
feelings of uneasiness, anxiety and avoidance how individuals feel as a result of marketing
of the medium. In addition to development of interactions gone wrong.
the scale and associations, the potential impact
of CM on focal brands may prove a worthwhile LIMITATIONS
investigation. Does CM impact brands that are
promoted? Does it lead to negative WOM? A key limitation of this study lies in the sample.
Alreck and Settle (2007) would suggest that it We used a convenience sample of college-aged
would not, however their study looked at macro individuals. A more expansive sample
knowledge, such as browsing time on specific encompassing different age groups such as
websites and dollar totals of purchases, as parents of young children may have provided a
opposed to an intimate single web surfing 3rd party perspective of what creepy marketing
experience. is to them in their protective role as parents. In
addition to age groups, other demographic
For firms, one of the biggest concerns is that characteristics such as household life cycle,
CM is a moving target for each customer gender, geographic location and education may
segment. What will seem unacceptable today all play a role in consumer perceptions of
may be regarded as business as usual tomorrow. creepiness. For our study, the richness of the
However that does not eliminate the firm’s respondents’ definitions of what creepy
need to be sensitive to the limits in which marketing is to them allays much of these
consumers wish their information to be used. potential biases and provides future
As an extreme example of the feeling that opportunities for further refinement to this
consumers may feel when visiting a site that exploratory study. Also limiting our study is the
has met the CM threshold, the authors suggest issue of reliability, validity assessment, and
the reader visit www.takethislollipos.com generalizability; inherent in all qualitative
(Berkowitz, 2011; Note: site does not retain studies. As such, future quantitative studies are
data). On the other side, consumers are not recommended to examine reliability, validity
powerless and can take active control of what and generalizability of creepy marketing.
information is being shared with whom (i.e.,
see www.privacyrights.org for steps). REFERENCES
However, much of the stored information is
beyond the reach and control of end consumers Akçura, M. T. and K. Srinivasanm (2005).
(Hong & Thong, 2013). Research note: customer intimacy and cross-
selling strategy, Management Science, 51(6),
In this paper we focused on corporeal behaviors 1007-1012.
and showed how they are often analogous to Alreck, P. L. and R. B. Settle (2007). Consumer
online activities that contribute to the reactions to online behavioural tracking and
perception of a creepy marketing event. Our targeting, Journal of Database Marketing &
reasoning is based on three aspects of the Customer Strategy Management, 15(1),
Internet that allow for consumers to perceive 11-23.
creepy marketing. First, the Internet has grown
to represent a substantial proportion of

51 Marketing Management Journal, Spring 2015


Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

Ashworth, L. and C. Free (2006). Marketing Forehand, M. R. and R. Deshpandé (2001).


dataveillance and digital privacy: Using What we see makes us who we are: Priming
theories of justice to understand consumers’ ethnic self-awareness and advertising
online privacy concerns. Journal of Business response. Journal of Marketing Research, 38
Ethics, 67(2), 107-123. (3), 336-348
Awad, N. F. and M. S. Krishnan (2006). The Fox, K. A., M. R. Nobles and B. S. Fisher
personalization privacy paradox: an empirical (2011). Method behind the madness: An
evaluation of information transparency and examination of stalking measurements.
the willingness to be profiled online for Aggression & Violent Behavior, 16(1), 74-84.
personalization, MIS Quarterly, 30(1), 13-28. Franzak, F., D. Pitta and S. Fritsche (2001).
Baek, T. H. and M. Morimoto (2012). Stay Online relationships and the consumer's right
away from me. Journal of A dvertising, 41(1), to privacy. Journal of Consumer Marketing,
59-76. 18(7), 631-649.
Berkowitz, J. (2011). Anti-social media: "Take FTC, (2012). FTC strengthens kids’ privacy,
this lollipop" Is your Facebook profile gives parents greater control over their
through a psychopath's eyes. Accessed at information by amending Children’s Online
http://www.fastcompany.com on 4/16/13. Privacy Protection Rule, accessed at http://
Bitner, M. J., Booms, B. H., and M.S. Tetreault www.ftc.gov/opa/2012/12/coppa.shtm on
(1990). The service encounter: Diagnosing 4/16/13.
favorable and unfavorable incidents. Journal Godfrey, A., K. Seiders and G. B. Voss (2011).
of Marketing, 54(1), 71-84. Enough Is enough! The fine line in executing
Bryce, J. and M. Klang (2009). Young people, multichannel relational communication.
disclosure of personal information and online Journal of Marketing, 75(4), 94-109.
privacy: Control, choice and consequences. Hayduk, L. A. (1978). Personal space: An
Information Security Technical Report, 14(3), evaluative and orienting overview.
160-166. Psychological Bulletin, 85(1), 117-134.
Burgoon, J. K. (1978). A communication model Hill, K. (2011). From the terrible idea file:
of personal space violations: Explication and Toyota's ‘cyberstalking' guerrilla ad
an initial test. Human Communication campaign. accessed at http://www.forbes.com
Research, 4(2), 129-142. on 4/16/13.
Campbell, M. C., K. L. Keller, D. G. Mick, and Ho, S. Y. and K. Y. Tam (2005). An empirical
W. D. Hoyer (2003). Brand familiarity and examination of the effects of web
advertising repetition effects. Journal of personalization at different stages of decision
Consumer Research, 30(2), 292-304. making. International Journal of Human-
Chang, S. and M. Morimoto (2011). Electronic Computer Interaction, 19(1), 95-112.
marketing communications: An evolving Hong, W., & L. Thong, J. Y. (2013). Internet
environment, but similar story regarding the privacy concerns: an integrated
perception of unsolicited commercial email conceptualization and four empirical studies.
and postal direct mail. Journal of Promotion MIS Quarterly, 37(1), 275-298.
Management, 17(3), 360-376 Kachhi, D. and M.W. Link (2009). Too much
Christiansen, L. (2011). Personal privacy and information: Does the Internet dig too deep?
Internet marketing: An impossible conflict or Journal of Advertising Research, 49(1),
a marriage made in heaven? Business 74-81.
Horizons, 54(6), 509-514. Kaya, N. and F. Erkip (1999). Invasion of
Chu, W., E. Gerstner and J. D. Hess (1995). personal space under the condition of short-
Costs and benefits of hard-sell. Journal of term crowding: A case study on an automatic
Marketing Research, 32(1), 97-102. teller machine. Journal of Environmental
Deighton, J. (1998). The right to be let alone. Psychology 19(2), 183-189.
Journal of Interactive Marketing, 12(2), 2-4. Kramer, T., S. Spolter-Weisfeld and M.
Evans. G. W. and R. E. Wener (2007). Thakkar (2007). The effect of cultural
Crowding and personal space invasion on the orientation on consumer responses to
train: Please don’t make me sit in the middle. personalization. Marketing Science, 26(2),
Journal of Environmental Psychology 27(1), 246-258.
90-94.
Marketing Management Journal, Spring 2015 52
Creepy Marketing:. . . . Moore, Moore, Shanahan, Horky and Mack

Lekakos, G. (2009). It's personal. Journal of Schoenbachler, D. D. and G. L. Gordon (2002).


Advertising Research, 49(4), 404-418. Multi-channel shopping: Understanding what
McLaughlin, C. and J. Vitak (2012). Norm drives channel choice. Journal of Consumer
evolution and violation on Facebook. New Marketing, 19(1), 42–53.
Media & Society, 14(2), 299-315. Sheehan, K. B. and M. G. Hoy (2000).
Meloy, J. R. and S. Gothard (1995). Dimensions of privacy concern among online
Demographic and clinical comparison of consumers. Journal of Public Policy &
obsessional followers and offenders with Marketing, 19(1), 62-73.
mental disorders. American Journal of Smith, W. R. (1956). Product differentiation
Psychiatry, 152(2), 258-263. and market segmentation as alternative
Middlemist, R. D., E. S. Knowles and C. F. marketing strategies. Journal of Marketing,
Matter (1976). Personal space invasions in 21(1), 3-8.
the lavatory: Suggestive evidence for arousal. The Week. (2013). (http://theweek.com/article/
Journal of Personality and Social index/226708/digital-shadow-how-companies
Psychology, 33(5), 541-546. -track-you-online)
Milne, G. R., A. J. Rohm and S. Bahl (2004). Tjaden, P. (1997). Crime of stalking: How big
Consumers’ protection of online privacy and is the problem? National Institute of Justice,
identity. Journal of Consumer A ffairs, 38 US Dept Justice; Office of Justice Programs,
(2), 217–232. United States; Washington, D.C. Accessed at
Nam C., C. Song, E. Lee and C. I. Park (2006). http://www.ncjrs.gov/App/publications/
Consumers' privacy concerns and willingness abstract.aspx?ID=163921 on 4/16/13.
to provide marketing-related personal Tjaden, P. and N. Thoennes (1998). Stalking in
information online. Advances in Consumer America: Findings from the National
Research, 33(1), 212-217. Violence Against Women Survey, Center for
O'Malley, L., M. Patterson and M. Evans Policy Research, National Institute of Justice;
(1997). Intimacy or intrusion? The privacy Washington, D.C.
dilemma for relationship marketing in US Census (2013). 4th Quarter 2012 Retail E-
consumer markets. Journal of Marketing Commerce Sales Report, Accessed at http://
Management, 13(6), 541-559. www.census.gov/retail/ on 4/16/13.
Path, M., and P. E. Mullen (1997). The impact Utz S., and N. C. Kramer (2009). The privacy
of stalkers on their victims. The British paradox on social network sites revisited: The
Journal of Psychiatry, 170(1), 12-17. role of individual characteristics and group
Perkowitz, M. and E. Oren (2000). Adaptive norms. Cyberpsychology: Journal of
websites. Communications of the A CM, 43 Psychosocial Research on Cyberspace, 3(2),
(8), 152-158. article 2. Accessed at http://
Perreault, W. D., and L. E. Leigh (1989). cyberpsychology.eu on 4/16/13.
Reliability of nominal data based on Wei, M., E. Fischer, and K. J. Main (2008). An
qualitative judgments. Journal of Marketing examination of the effects of activating
Research, 26(2), 135-148. persuasion knowledge on consumer response
Pew Internet (2010). Here are some of the to brands engaging in covert marketing.
things that Internet users do on a typical day, Journal of Public Policy & Marketing, 27(1),
Accessed at http://pewInternet.org/Trend-Data- 34-44.
(Adults)/Online-Activities-Daily.aspx on White, T., D. Zahay, H. Thorbjørnsen and S.
4/16/13. Shavitt (2008). Getting too personal:
Phelps, J., G. Nowak and E. Ferrell, (2000). Reactance to highly personalized email
Privacy concerns and consumer willingness solicitations. Marketing Letters, 19(1), 39-50.
to provide personal information. Journal of Wilkie, W. L., C. F. Mela, and G. T. Gundlach
Public Policy & Marketing, 19(1), 27-41. (1998). Does "bait and switch" really benefit
Preece, J. (2004). Etiquette online: From nice to consumers? Marketing Science, 17(3),
necessary. Communications of the A CM, 47 273-282.
(4), 56–61. Zhang, J., and M. Wedel (2009). The
Rapp, J., R. P. Hill, J. Gaines and R. M. Wilson effectiveness of customized promotions in
(2009). Advertising and consumer privacy. online and offline stores. Journal of
Journal of Advertising, 38(4), 51-61. Marketing Research, 46(2), 190-206.
53 Marketing Management Journal, Spring 2015

You might also like