Skip to main content

An Analysis of Email Marketing Practices of International Hotel Chains: Compliance with Legislative Requirements?

  • Conference paper
  • 4676 Accesses

Abstract

The utility of email as a marketing medium is being limited by the growth in spam — unsolicited commercial bulk messages. Given the access that hotels companies have to personal data, and the potential that this resource has for promotional purposes, this study sets out to establish if hotel companies conform to legislative guidelines (specifically the United States CAN-SPAM Act 2003) with regard to their use of this data for commercial email marketing purposes. By monitoring multiple email accounts over a one year period, the study establishes that not only are hotel companies highly ethical with regards to their use of their customer’s personal data, but in fact may serve as an example of best practise for many other industries.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Baumer, D Earp, J & Poindexter, J (2004) Internet privacy law: a comparison between the United States and the European Union, Computers & Security, 23, pp 400–412.

    Article  Google Scholar 

  • Burns, E (2005) The Deadly Duo: Spam and Viruses, May 11, 2005, http://www.clickz.com/stats/sectors/email/articlc.php/3504441#tablel(Accessed 2/9/05)

    Google Scholar 

  • Chen, K & Rea, A (2004) Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems, Summer, pp 85–92

    Google Scholar 

  • Cheng, T (2004) Recent International attempts to an spam, Computer Law & Security Report, 20(6), p 472–479

    Article  Google Scholar 

  • Clarke, I, Flaherty, T & Zugelder, M (2005) The CAN-SPAM Act: New rules for sending commercial e-mail messages and implications for the sales force, Industrial Marketing Management, (34), pp399–405

    Article  Google Scholar 

  • Commission Nationale L’informatique et des Libertés (1999) Le Publipostage Electronique et la Protection Donnes Personnelles, 14 October

    Google Scholar 

  • DuFrene, D, Engelland, B, Lehman, C & Pearson, R (2005) Changes in Consumer Attitudes Resulting from Participation in a Permission E-mail Campaign, Journal of Current Issues and Research in Advertising, 27(1), Spring, pp 65–77

    Google Scholar 

  • Grimes, G. (2004) Issues with SPAM, Computer Fraud & Security, (5) p 12–16

    Article  Google Scholar 

  • Han, P & Maclaurin, A (2002) Do Consumers Really Care About Online Privacy?, Marketing Management, January/February, pp 35–38

    Google Scholar 

  • Hoffman, D, Noval, T & Peralta, M (1999) Building Consumer Trust Online, Communications of the ACM, 42(4), pp 80–85

    Article  Google Scholar 

  • IDA Singapore (2004) Proposed Legislative Framework for the Control of E-Mail Spam (Joint 1DA-AGC Consultation Paper), Infocomm Development Authority, Singapore, March

    Google Scholar 

  • IDC (2004) Worldwide Email Usage 2004–2008 Forecast: Spam Today, Other Content Tomorrow, IDC, Framingham, MA

    Google Scholar 

  • Kerner, S (2005) Deadly Duo, April 13, 2005, http://www.clickz.com /stats/sectors/cmail/article.php/3497256#tablel (Accessed 2/9/05)

    Google Scholar 

  • Krishnamurthy, S (2001) A Comprehensive Analysis of Permission Marketing, Journal of Computer Mediated Communication, 6(2), (electronic)

    Google Scholar 

  • Marinova, A, Murphy, J & Massey B (2002) Permission E-mail Marketing as a Means of Targeted Promotion, Cornell Hotel & Restaurant Administration Quarterly, February, pp 61–69

    Google Scholar 

  • McGann, R (2005) The Deadly Duo: Spam and Viruses, March 22, 2005, http://www.clickz.com/stats/sectors/email/article.php/3491796#table2 (Accessed 2/9/05)

    Google Scholar 

  • Miller, R (2004) First Can Spam Suit Filed, www.internetnews.com /xSP/article.php/3322311 (Accessed 1/9/05)

    Google Scholar 

  • O’Connor, P (2003) Privacy and the Online Hotel Customer: An Analysis of the Use of Fair Information Practices by International Hotel Companies, Proceedings of the ENTER Information and Communications Technology in Tourism Conference, Helsinki, Finland, Frew, A., Hitz, M., O’Connor, P. (eds.), Springer Computer Science, New York, pp 382–392.

    Google Scholar 

  • Perry, M (2004) Pre and Post CAN SPAM: An in-depth Comparison of Unsolicited and Deceptive versus Unsolicited Email, Proceedings of the DMEF 16th Annual Robert B. Clarke Direct/Interactive Marketing Educators’ Conference, New Orleans

    Google Scholar 

  • PhoCusWright (2004) From Property to Screen: Managing Online Hotel & Lodging Distribution, PhoCusWright, Sherman, CT

    Google Scholar 

  • Piccoli, G, O’Connor, P, Capaccioli, C and Alvarez R (2003) Customer Relationship Management — A Driver for Change in the Structure of the U.S. Lodging Industry, Cornell Hotel & Restaurant Administration Quarterly, August, pp 61–73

    Google Scholar 

  • Rainie, L & Fallws, D (2004) The Impact of CAN-SPAM Legislation, Pew Internet Project Data Memo, March, www.pewinternet.org

    Google Scholar 

  • Silvey L (2004) Could you be a spammer? Aftermarket Business, 114(7), pp 15

    Google Scholar 

  • Spring, T (2005) Spam Law Test, PC World, January, pp 20–22

    Google Scholar 

  • TACD (2003) Consumer Attitudes Regarding Unsolicited Commercial E-mail (SPAM), October–December, Trans-Atlantic Consumer Dialogue

    Google Scholar 

  • TMCnet (2004) MX Logic finds nearly 100 percent of SPAM not compliant with new CAN-SPAM law, http://www.tmcnet.com/usubmit/2004/Jan/1022594.htm (Accessed 2/9/05)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Wien

About this paper

Cite this paper

O’Connor, P. (2006). An Analysis of Email Marketing Practices of International Hotel Chains: Compliance with Legislative Requirements?. In: Hitz, M., Sigala, M., Murphy, J. (eds) Information and Communication Technologies in Tourism 2006. Springer, Vienna. https://doi.org/10.1007/3-211-32710-X_61

Download citation

  • DOI: https://doi.org/10.1007/3-211-32710-X_61

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-30987-2

  • Online ISBN: 978-3-211-32710-4

Publish with us

Policies and ethics