Viability of Fee-Based Email Service for Retail Customers

Unsecure free email services face possible threats from spam, phishing, and hacking. Secure email eliminates most of these risks. The primary objective of this study was to understand the market for fee-based secure email service. A Web-based survey was designed using secondary research and inputs from focus group interviews and administered to a random sample of individuals living in the US. Analysis of data gathered from 189 responses revealed that although people are concerned about email security, they may be unwilling to purchase fee-based secure email service. Market for fee-based secure email service is small and dispersed throughout the US. Results also indicate that pricing drives individual intention to purchase fee-based email service. A scale to measure effectiveness of email service was developed. The study concludes the lack of a profitable market for the fee-based secure email service and discusses the challenges of marketing this service in a B-2-(2C) environment.

[1]  Gilbert A. Churchill A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .

[2]  John R. Hauser,et al.  Design and marketing of new products , 1980 .

[3]  Cynthia M. Webster Hispanic and Anglo Interviewer and Respondent Ethnicity and Gender: The Impact on Survey Response Quality , 1996 .

[4]  Albert Levi,et al.  Risks in email security. , 2001 .

[5]  James E. Bartlett,et al.  Organizational research: Determining appropriate sample size in survey research , 2001 .

[6]  Sang M. Lee,et al.  An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..

[7]  Dat-Dao Nguyen,et al.  FEE -BASED ONLINE SERVICES : EXPLORING CONSUMERS’ WILLINGNESS TO PAY , 2004, Journal of International Technology and Information Management.

[8]  J. Horrigan BROADBAND ADOPTION AT HOME IN THE UNITED STATES: GROWING BUT SLOWING , 2005 .

[9]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[10]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[11]  Miroslav Bača,et al.  Researching and Structuring e-mail Security Criteria , 2007 .

[12]  Mo Adam Mahmood,et al.  Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[13]  S. E. Kruck,et al.  Empiracal Study of Students' Computer Security Practices/Perceptions , 2007, J. Comput. Inf. Syst..

[14]  Chris Wargo,et al.  An Introduction to Insider Threat Management , 2007, Inf. Secur. J. A Glob. Perspect..

[15]  Chih-Chien Wang,et al.  Using header session messages to anti-spamming , 2007, Comput. Secur..

[16]  Simon Heron Parasitic Malware: Parasitic malware: The resurgence of an old threat , 2008 .

[17]  Lein Harn,et al.  Design of Fully Deniable Authentication Service for E-mail Applications , 2008, IEEE Communications Letters.

[18]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[19]  Dario Forte,et al.  Phishing Attacks: Anatomy of a phishing attack: A high-level overview , 2009 .

[20]  Merrill Warkentin,et al.  Behavioral and policy issues in information systems security: the insider threat , 2009, Eur. J. Inf. Syst..

[21]  Kang Li,et al.  Privacy-Aware Collaborative Spam Filtering , 2009, IEEE Transactions on Parallel and Distributed Systems.

[22]  Eugenia Y. Huang,et al.  Do Knowledge Workers Use E-Mail Wisely? , 2009, J. Comput. Inf. Syst..

[23]  Tero Vartiainen,et al.  What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..

[24]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[25]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[26]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..