The rapid growth of mobile technology (MT), along with rising concerns related to privacy and security, has drawn increasing attention from both academics and business community. This interest spans multiple disciplines, including computer science, engineering, data science, cybersecurity, management, and marketing. Over the past decade, numerous studies have addressed privacy and security issues in the field of MT, covering related constructs such as trust, confidentiality, anonymity, identity, and authentication.
In software engineering, researchers such as Ebrahimi et al. (2021) and Buck and Burster (2017) have investigated mobile application privacy, focusing on topics like data leakage detection and user concerns about app-related privacy. In the field of blockchain, Dhar and Bose (2020) developed a comprehensive mobile Internet of Things (IoT) security framework that uses a risk-scoring methodology to manage IoT security risks. Likewise, in the emerging field of 6G network edge technologies, Mao et al. (2023) introduced novel approaches to mitigate privacy and security threats inherent to the evolving 6G ecosystem.
In marketing, prior research shows the growing role of MT in different contexts such as mobile commerce (Thakur & Srivastava, 2013), mobile marketing (Narang & Shankar, 2019; Thangavel & Chandra, 2023), mobile applications (Sakas & Giannakopoulos, 2021), and mobile advertising (Bakar & Bidin, 2014; Gao & Zang, 2016; Serrano-Malebran et al., 2023). As a result, privacy and security concerns have become central to developing effective marketing strategies. A recent bibliometric study by Koubaa et al. (2024) identified trust and privacy as core elements in mobile commerce and marketing. From a practical perspective, marketers increasingly struggle to leverage MT while addressing consumer concerns related to privacy, trust, personalization, and data security (Hentati & Jallouli, 2024).
Within this context, the present study explores how MT can be strategically utilized to improve marketing practices while addressing privacy and security challenges. It aims to synthesize the existing body of knowledge and underscore the role of MT in shaping marketing strategies, particularly in relation to segmentation, targeting, and positioning (STP). Although a substantial body of literature exists, it remains fragmented due to the multidisciplinary nature of the field and rapidly evolving technological trends.
To address this gap, we performed a bibliometric analysis using Bibliometrix software and complementary tools such as Biblioshiny and PlantUML. Bibliometric methodology has proven rigorous for exploring and analyzing large volumes of scientific data (Donthu et al., 2021), effective in revealing the structure and dynamics of research fields (Ozturk, 2021), particularly in business strategy and marketing (Hu et al., 2019).
This study addresses the following Research Questions (RQs):
-
RQ1: What is the current state of research on MT related to privacy and security within marketing strategies?
-
RQ2: What are the key research gaps and future directions regarding the role of MT in addressing privacy and security concerns in marketing contexts?
The remainder of this article is organized as follows: Section 2 presents a literature review, beginning with privacy and security issues in MT and then exploring marketing responses to these concerns. Section 3 outlines the bibliometric approach used, including performance analysis. Section 4 provides the findings of the science mapping. Finally, Section 5 interprets the results, highlights limitations, and offers recommendations for future research at the intersection of MT, privacy/security, and marketing.
This section gives a closer examination of related works contributed in MT focusing on privacy and security concerns in association with marketing strategies. Two sub-sections are presented to lay an overview of the literature in this research. The first one provides insights into the concept of MT focusing on privacy and security concerns. The second sub-section identifies marketing strategies, mainly STP strategies related to MT, privacy, and security concerns.
“The significance of research in the realms of privacy and security cannot be overstated, as these areas necessitate continuous advancements and innovative solutions” (Lakshmi & Kumar, 2017). In the field of Software Engineering, Ebrahimi et al. (2021) conducted a study on mobile application privacy between 2008 and 2018. Their findings revealed that most current research emphasizes the creation of tools for detecting privacy leaks, while there remains a notable scarcity of studies addressing key aspects such as “privacy requirements,” “privacy policies,” and “user perspectives.”
Dhar and Bose (2020) examined the security challenges inherent in the deployment of IoT devices, including mobile IoT, and proposed an integrated security framework that leverages Zero Trust principles and blockchain technology to enhance identity verification and access control within IoT ecosystems. Various cybersecurity approaches have also been developed to safeguard autonomous vehicles from cyberattacks. Poddar et al. (2024) explored the application of machine learning (ML) and deep learning methods to bolster defense mechanisms in autonomous vehicles, which rely on easily manipulated technologies such as cameras, ultrasonic sensors, and infrared sensors. Similarly, Wang et al. (2021) introduced a model-based framework using multi-sensor data to detect and isolate sensor-based attacks within transportation systems.
Zhang et al. (2022) addressed data privacy and security concerns in agricultural IoT by incorporating cryptographic and blockchain solutions to ensure secure management of agricultural data. Mao et al. (2023) investigated 6G edge network technologies, emphasizing their potential for advanced service delivery while identifying critical unresolved security issues.
A comprehensive reading of the literature suggests that privacy and security concerns are multifaceted and continuously evolving across various technological ecosystems, including mobile applications, IoT devices, autonomous vehicles, and next-generation networks. Despite notable technological advancements, much of the existing work approaches these issues from a predominantly technical perspective, often overlooking critical dimensions such as user expectations, regulatory frameworks, and the strategic implications for marketing. Foundational elements like privacy policies and the alignment of security measures with trust-building strategies remain underexplored. Additionally, while innovations span diverse sectors, limited cross-sectoral synthesis hampers a holistic understanding of how such technologies can be deployed securely and responsibly in consumer-facing contexts. By integrating insights from these disparate domains and linking them to marketing-oriented concerns, this study puts forward an interdisciplinary framework that identifies concrete directions for future research and meaningful guidance for practitioners.
Marketers face significant challenges in adopting technological innovations while addressing key concerns such as consumer privacy, data security, personalization, loyalty, confidentiality, and the detection of data breaches.
Varnali and Toker (2010) emphasized the importance of ensuring mobile user privacy and security. Within consumer policy, mobile marketing raises critical issues due to the unique capabilities of mobile communication technologies, which allow for the identification of individual users. This characteristic introduces considerable risks to the privacy and security of personal information – risks that are further intensified by the increased adoption of mobile marketing among younger consumers (Purwanto et al., 2020).
Sinha et al. (2019) investigated privacy concerns and provided insights into enhancing both security mechanisms and user experience. Similarly, Ullah et al. (2023) analyzed privacy risks associated with targeted mobile advertising and proposed solutions to mitigate these concerns.
This body of research highlights the need for future work focused on the development of user-centered privacy protection tools that promote transparency in data usage and empower individuals to safeguard their personal information in mobile advertising contexts.
Rafieian and Yoganarasimhan (2021) investigated the relationship between mobile in-app advertising, regarded as the leading form of digital marketing, and targeting efficiency associated with privacy concerns and economic results. Considering social media marketing as a segmentation tool, Serrano-Malebran et al. (2023) explore relationship between consumer classifications and variables such as privacy concerns, trust and age. In the field of mobile social networks, Lakshmi and Kumar (2017) consider the privacy protection and security as critical issues requiring constant updates and solution development. The convergence of these studies reveals a growing strategic imperative for marketers to integrate privacy and security considerations into the design of MT and personalized marketing tools. The literature underscores not only the operational risks associated with data misuse and breaches, but also the reputational and trust-related consequences that directly influence consumer engagement and brand loyalty. While multiple technological and behavioral insights are offered, there remains a gap in cohesive frameworks that align privacy-by-design principles with STP strategies. Furthermore, few studies provide actionable models that reconcile personalization with ethical data practices across platforms and demographics. This fragmented landscape suggests a need for more integrative approaches to ensure that MT contribute meaningfully and responsibly to long-term strategic objectives.
In this regard, the study aims to synthesize core insights from the existing body of literature and to highlight the role of MT in shaping marketing strategies, particularly through the lens of STP.
This study meticulously explores the evolution of research on MT, privacy and security related to marketing strategies by conducting a comprehensive bibliometric analysis, utilizing data from the WoS, recognized for its reliable and comprehensive metadata (Pranckutė, 2021; Zhu & Liu, 2020). According to AlRyalat et al. (2019), the WoS database has several distinctive advantages that make it a reference database for bibliometric research. First, its universal disciplinary coverage encompasses all academic disciplines. Second, with historical coverage dating back to 1900, WoS allows in-depth longitudinal bibliometric analyses. Third, its advanced features, in particular the search, distinguish this database for data associated with publications, and sophisticated tools for producing figures. The study analyzed 1,057 documents covering the period from 1996 to 2023. The analysis employed a multifaceted approach, examining the temporal distribution of publications, assessing key contributors and influential works to chart the field’s historical trajectory, and creating a thematic map through a science mapping technique based on keyword co-occurrences. This thematic map unveiled basic themes, core and niche research areas, emerging trends, and potential gaps within the literature.
The process of selecting documents from the WoS database is presented in Table A1.
This search query aims to identify articles in English that discuss the intersection of marketing strategies with MT, privacy and security concerns. It combines three separate searches: the first focuses on marketing strategies (including STP strategies), the second explores MT (including ML, IoT, blockchain, recommender systems, and tracking technologies), and the third examines privacy and security. The final search combines these three, filtering for articles only, ensuring the results focus on scholarly research.
In this comprehensive bibliometric analysis, the study strives to map the literature’s temporal evolution and delineate its developmental phases. Furthermore, it identifies and evaluates the most influential journals, pinpointing those that have significantly shaped the discourse in this domain. This research will highlight the most impactful authors, recognizing their contributions to advancing knowledge in the field. Additionally, this analysis uncovers the most cited documents and references, thereby illuminating the seminal works that have laid the foundation for current research and that continue to drive scholarly discussions.
This study employed a bibliometric analysis approach supported by multiple tools. The primary analysis was conducted using Bibliometrix, an R package integrated into R version 4.4.0 and executed within the RStudio environment (Aria & Cuccurullo, 2017). To facilitate accessibility and enhance the visualization of results, the study utilized Biblioshiny, a web-based interface that enables interactive, user-friendly bibliometric analysis and graphical output. For concept maps creation, the study made use of PlantUML (https://plantuml.com/en/), an online diagramming tool. PlantUML allows for the generation of thematic concept maps from simple text-based inputs, offering a clear and visually appealing representation of the study’s conceptual framework.
Table A2 provides a snapshot of the research landscape surrounding MT, privacy, and security, highlighting the field’s rapid growth and international collaboration.
The dataset spans 28 years, from 1996 to 2023, and includes over 1,000 documents from 502 sources. The 21.79% annual growth rate indicates a significant increase in research activity. The average of 18.22 citations per document echoes high impact and relevance of the research within the field. The high percentage of international co-authorships (33.77%) evinces a global collaboration in tackling these complex issues. This suggests an expanding field with considerable international interest.
Figure 1 depicts the annual evolution of publications on MT, privacy, and security for marketing strategies from 1996 to 2023, revealing a noteworthy trend over time. Initially, from 1996 to 2008, the number of articles published each year was minimal, indicating limited academic interest in this intersection. However, a gradual increase starting in 2009 marks the onset of a growing recognition of privacy issues in MT. This period of steady growth, which continued until 2018, reflects a more sustained academic focus. A dramatic surge in publications is evident from 2019 onwards, with the number of articles exceeding 200 annually in 2021 and 2022, showcasing an intensified focus, likely driven by advancements in MT, elevated device usage, and rising privacy concerns. Although 2023 reveals a slight decrease, the publication numbers remain high, suggesting a stabilization or a possible shift in research focus.

Temporal publication evolution.
Scientific production in the field of MT, in relation to privacy, security, and marketing strategies, has grown remarkably since 2017, stimulated by the emergence and convergence of innovative technological concepts such as wireless sensor networks (WSN), IoT, ML, deep learning, and blockchain technology.
Table 1 presents key indicators of journal influence and impact within the research area of MT, privacy, and security. These indicators, including h-index (Hirsch, 2005), g-index, m-index, total citations (TC), number of publications (NP), and the starting year of publication (PY_start), allow researchers to assess the relative influence of these journals within the field.
Most impactful journals with h-index equal or upper than seven.
| Journal | h_index | g_index* | m_index** | TC | NP | PY_start |
|---|---|---|---|---|---|---|
| IEEE Access | 24 | 45 | 2.667 | 2,178 | 83 | 2016 |
| IEEE Internet of Things Journal | 15 | 27 | 2.143 | 887 | 27 | 2018 |
| Sensors | 15 | 24 | 1.25 | 702 | 51 | 2013 |
| IEEE Communications Surveys & Tutorials | 10 | 10 | 1.25 | 1,736 | 10 | 2017 |
| Future Generation Computer Systems | 9 | 12 | 1.125 | 339 | 12 | 2017 |
| IEEE Sensors Journal | 9 | 17 | 0.9 | 489 | 17 | 2015 |
| Computers & Security | 8 | 11 | 1.143 | 226 | 11 | 2018 |
| IEEE Transactions on Intelligent Transportation Systems | 8 | 15 | 0.444 | 380 | 15 | 2007 |
| Wireless Personal Communications | 7 | 13 | 0.318 | 198 | 17 | 2003 |
*g-index: calculated based on the distribution of citations received by a given researcher’s publications (Egghe, 2006).
**m-index: calculated by dividing h-index value by number of years since the author is active (Srivastava et al., 2021).
The journals IEEE Access, IEEE Internet of Things Journal, and Sensors are currently leading the field in terms of impact and research output. Their high h-index, g-index, and total citations demonstrate their significant contributions to the field. Interestingly, the table also highlights the emergence of newer journals like IEEE Communications Surveys & Tutorials and Future Generation Computer Systems, which are quickly gaining traction. This implies a dynamic research landscape where established journals are complemented by rising publications shaping a diverse and evolving research environment.
IEEE Access journal explores the crucial intersection of MT, privacy, and security in the context of IoT, 5G, and Industry 5.0. It covers advanced topics like blockchain, federated learning, and ML, focusing on their applications in enhancing mobile privacy and security. By investigating practical applications in areas like smart healthcare and social distancing, the journal demonstrates the relevance of these technologies to marketing and consumer behavior.
Table 2 presents a detailed analysis of the scholarly performance metrics for three authors: Kim-Kwang Raymond Choo, Enrico Cambiaso, and Ivan Vaccari. Each author’s performance is quantified using several indices: the h-index, g-index, m-index, total citations (TC), number of publications (NP), and the year they started publishing (PY_start).
Most impactful authors with h-index up or equal to four.
| Author | h_index | g_index | m_index | TC | NP | PY_start |
|---|---|---|---|---|---|---|
| Kim-Kwang Raymond Choo | 5 | 5 | 0.833 | 218 | 5 | 2019 |
| Enrico Cambiaso | 4 | 4 | 0.5 | 69 | 4 | 2017 |
| Ivan Vaccari | 4 | 4 | 0.5 | 69 | 4 | 2017 |
Kim-Kwang Raymond Choo is a leading researcher in the field of cybersecurity, particularly focusing on the privacy and security issues posed by emerging technologies like IoT and autonomous vehicles. His research explores both theoretical and practical aspects of these challenges. He has developed solutions for cross-domain authentication in drone networks using blockchain, proposed security methodologies for self-driving vehicles, and conducted large-scale analyses of IoT vulnerabilities.
Enrico Cambiaso is a researcher specializing in IoT security, focusing on vulnerabilities in protocols like message queuing telemetry transport (MQTT), and developing novel attack methods. He has demonstrated the effectiveness of a low-rate Denial of Service (DoS) attack, SlowITe, which exploits a weakness in MQTT to disrupt service. His research highlights the importance of understanding and mitigating security risks in IoT environments, particularly for critical infrastructure and sensitive data transmission.
Ivan Vaccari is focusing on security vulnerabilities in IoT networks, precisely targeting the MQTT protocol. He has identified weaknesses in MQTT that allow clients to manipulate server behavior and has developed innovative low-rate DoS attacks, like SlowITe and SlowTT that exploit these weaknesses. His research sheds light on the need for robust security measures in IoT environments to mitigate these vulnerabilities and ensure reliable operation.
Table 3 presents a comprehensive overview of the most impactful documents, offering an essential foundation for a bibliometric analysis.
Most cited papers.
| Paper | Title | Year | Local citations | Global citations |
|---|---|---|---|---|
| Capkun and Hubaux (2006) | Secure positioning in wireless networks | 2006 | 7 | 191 |
| Chaabouni et al. (2019) | Network Intrusion Detection for IoT Security Based on Learning Techniques | 2019 | 7 | 379 |
| Kalnis et al. (2007) | Preventing Location-Based Identity Inference in Anonymous Spatial Queries | 2007 | 6 | 358 |
| Song et al. (2020) | Blockchain-Enabled Internet of Vehicles with Cooperative Positioning: A Deep Neural Network Approach | 2020 | 5 | 51 |
| Li et al. (2021) | Vehicle Position Correction: A Vehicular Blockchain Networks-Based GPS Error Sharing Framework | 2021 | 5 | 62 |
| Kumar et al., (2021) | Blockchain-Federated-Learning and Deep Learning Models for COVID-19 Detection Using CT Imaging | 2021 | 5 | 180 |
These most cited studies explore various aspects of privacy and security in emerging technologies, from wireless networks to the IoT and even medical applications. Capkun and Hubaux (2006) address vulnerabilities in positioning techniques to spoofing attacks, proposing a mechanism called “verifiable multilateration” to secure location data in wireless networks. Chaabouni et al. (2019) delve into the security challenges of IoT networks, analyzing existing intrusion detection systems and advocating for ML techniques to enhance detection capabilities. Kalnis et al. (2007) tackle the issue of privacy in location-based services, proposing methods for anonymizing spatial queries while preserving result accuracy. Song et al. (2020) introduce a framework that leverages blockchain and deep learning to improve vehicular positioning accuracy and security in the Internet of Vehicles. Li et al. (2020) suggest a blockchain-based system for secure and efficient global positioning system (GPS) error sharing among vehicles, contributing to more accurate positioning in autonomous driving. Finally, Kumar et al. (2021) explore the use of blockchain and federated learning in medical applications, presenting a framework for collaborative training of deep learning models for COVID-19 detection and ensuring data privacy.
Science mapping analysis provides a comprehensive bibliometric approach to visualizing and analyzing the intellectual structure and knowledge dynamics within a specific research domain. This section comprises two key analytical components: references co-citation network analysis and thematic map exploration.
The co-citation network analysis in this study employs a visual representation to illustrate the interconnectedness of different research articles based on their shared citations. This network highlights which papers are frequently cited together, indicating their potential conceptual or methodological connections. This analysis helps identify clusters of research themes and understand how knowledge within a field evolves (Zhang et al., 2021). Figure 2 illustrates the references co-citation network. A threshold of seven citations has been used so that only references that have been cited at least seven times in the study corpus will be represented in the network map. Out of 4,747 references cited, only 115 reach this minimum threshold, which makes it possible to filter and focus only on the most influential and frequently referenced works in the field. It identifies three distinct clusters, represented in red, green, and blue, respectively, titled IoT devices, privacy-preserving techniques, and neural network architectures. Together, these clusters offer a comprehensive view of the technological innovations, ethical imperatives, and strategic opportunities that drive the evolution of MT marketing, ensuring that practices remain both cutting-edge and responsible.

References co-citation network.
This cluster provides a valuable overview of the research surrounding the proliferation of IoT devices. It highlights the rapid growth of this technology and its potential to revolutionize various industries and aspects of our lives. The studies by Al-Fuqaha et al. (2015) provide a foundational overview of IoT technologies and applications, setting the stage for subsequent research. Raza et al. (2013) address early security concerns by introducing SVELTE, an intrusion detection system for resource-constrained IoT devices. As threats evolved, Meidan et al. (2018) proposed N-BaIoT, an advanced network-based anomaly detection method using deep autoencoders to identify compromised IoT devices. To support ongoing research and development, Koroniotis et al. (2019) developed the Bot-IoT dataset, incorporating legitimate and simulated IoT network traffic with various attack types.
This cluster encompasses studies that showcase significant advancements in privacy-preserving techniques across diverse data types and applications. Dwork et al. (2006) introduced the concept of differential privacy, proposing a method to add calibrated noise to statistical database queries to preserve individual privacy while maintaining data utility. Gruteser and Grunwald (2003) developed a middleware architecture for location-based services that adjusts the spatial and temporal resolution of location data to meet anonymity constraints. Sweeney (2002) presented the k-anonymity model for protecting privacy in released datasets, ensuring that each individual’s information is indistinguishable from at least k − 1 others. Finally, Beresford and Stajano (2004) introduced the concept of mix zones for location privacy in pervasive computing, along with metrics for assessing user anonymity in frequently changing pseudonyms.
The studies in this cluster highlight significant advancements in neural network architectures and datasets, driving progress in the field of computer vision. Krizhevsky et al. (2017) introduced AlexNet, a breakthrough convolutional neural network that significantly improved ImageNet classification. Moreover, He et al. (2016) presented ResNet, introducing residual learning for training very deep networks. Simonyan and Zisserman (2014) proposed VGGNet, demonstrating the importance of network depth with small convolutional filters. Finally, Deng et al. (2009) introduced ImageNet, a large-scale image database that became crucial for training and evaluating deep learning models.
The thematic map in bibliometric analysis organizes research themes based on centrality (importance) and density (development level) (Callon et al., 1991; Cobo et al., 2011; Meyer et al., 2023). This visualization helps researchers identify research gaps, emerging trends, and the overall landscape of a field, highlighting potential areas for investigation. Figure 3 presents the thematic map for this study. The parameters used to construct this thematic map include a selection of the 250 most frequent words, with a minimum threshold of five occurrences per thousand documents for the formation of clusters. Each cluster is limited to a maximum of three labels with a size of 0.3 to optimize readability. The Louvain algorithm has been applied for the detection of thematic communities, while a community repulsion parameter of 0.1 ensures an appropriate visual separation between the different groups of concepts on the map.

Thematic map.
The conceptual maps in this section are derived from keyword clusters, with their visual representations generated using the PlantUML website. These maps are constructed based on the frequency and co-occurrence of keywords within the literature.
This cluster examines the transformative impact of AI and ML on marketing practices, focusing on customer segmentation, predictive analytics, and customer behavior analysis. The studies reveal how AI is being used to optimize audience targeting by going beyond traditional optimal distinctiveness and tailoring strategies to different revenue models (Majzoubi & Zhao, 2023; Van Angeren et al., 2022). Predictive models are being implemented to remedy crucial challenges like food security, crop yield estimation, and financial risk assessment (Gambetti et al., 2022). AI is additionally empowering personalized recommendations and driving strategic decision-making in areas like advertising and IoT adoption (Shi et al., 2022). However, the review highlights the need to address privacy concerns, ensure explainability, and foster continuous learning to promote accountable and effective AI deployment in the ever-evolving marketing landscape.
Clark et al. (2023) address the issue of “user disambiguation,” which aims to identify individual viewership within multi-person households. Their ML approach provides accurate insights for television ad targeting and audience analysis, a valuable tool for marketers in the entertainment industry. Additionally, Peng and Xin (2019) propose a social trust and preference segmentation-based recommendation algorithm to improve personalized suggestions. By incorporating trust relationships and preference domains, this algorithm enhances the effectiveness of recommendation systems in e-commerce platforms. Furthermore, an AI-based real-time positioning advertising system leveraging 5G base station data enhances the efficiency of audience targeting and personalized advertisement delivery, unlocking new opportunities for location-based marketing strategies (Cheng & Wang, 2021).
This cluster examines the complex relationship between privacy technologies, data handling, learning and modelling, positioning and navigation, advanced technologies, and finally ethics and safety.
The explosive growth of data, particularly location data from GPS-enabled devices, offers unprecedented opportunities for personalized marketing. AI-powered algorithms perform accurate analyses of these data to predict consumer behavior, segment customers, and tailor marketing messages (Benslama & Jallouli, 2020, 2022, 2024; De Sousa et al., 2023). However, this level of personalization comes at a cost: consumer privacy. The studies reviewed highlight several key concerns and trends related to positioning and navigation, advanced technologies, ethical and safety-privacy technologies, data handling learning and modelling. Results show, for example, that location data from GPS-enabled devices, such as smartphones, are incredibly valuable for understanding consumer behavior and creating highly personalized marketing campaigns (Nanni et al., 2016; Stachl et al., 2020). However, location data are also highly sensitive and can reveal a vast amount of personal information (Michael & Clarke, 2013; Simpson, 2014). Consequently, there is an urgent need for robust privacy-preserving techniques to anonymize or obfuscate location data before it is used for marketing purposes (Kalnis et al., 2007; Peng et al., 2014). Studies demonstrate that even anonymized location data can be re-identified, requiring advanced privacy-enhancing solutions (Hoh et al., 2010).
As a result, consumers are increasingly aware of and concerned about the collection and use of their personal data, particularly location data (Banerjee, 2019; Milne & Bahl, 2010). This awareness is leading to a demand for more transparency and control over data usage (Yang & Kels, 2016). Public trust in data service providers varies depending on their familiarity and the type of data collected (Banerjee, 2019). Therefore, there is an expanding need for ethical considerations and regulatory frameworks to address these concerns (Milne & Bahl, 2010; Teodorescu et al. 2025; Yang & Kels, 2016). Federated learning is emerging as a promising solution for balancing the needs for personalization and privacy (Cheng et al., 2022; Huo et al., 2023). Several studies showcase the potential of federated learning for privacy-preserving marketing applications, including user profile construction (Huo et al., 2023) and travel time prediction (Zhu et al., 2021).
The niche cluster of sensors identifies a critical research gap in the literature concerning the integration of sensors, global navigation satellite system, and various data security techniques within emerging technologies such as smart cities and cyber-physical systems. Zakroum et al. (2022) and Orouji and Mosavi (2020) demonstrate the vulnerabilities of network telescopes and IoT devices to attacks, emphasizing the need for robust security measures. Simultaneously, research on privacy-preserving techniques, such as differential privacy and anonymization, explored by Liu et al. (2023), remains critical to protecting user data in increasingly sensor-rich environments. Researchers like Kong et al. (2022) and Wu (2022) are tackling these challenges by incorporating federated learning and blockchain technologies within 6G networks and intelligent transportation systems. However, the integration of sensor phenomena and characterization, along with the complex dynamics of cyber-physical systems, requires further investigation to ensure responsible and secure deployment of these advanced technologies.
Results illustrate the multifaceted nature of security, structured around six main dimensions: Data Security, Enabling Technologies, Marketing Security, Trust and Reputation, MT Security, and Network Security. Data Security encompasses privacy measures, Encryption, and Cybersecurity to protect sensitive information. Enabling Technologies include blockchain, 5G, cyber-security, and authentication to enhance security across various platforms. Results show that Marketing security was studied mainly concerning the concept of cyber-security. The branch of Trust and reputation focuses on the authentication concerns. MT Security focuses on IoT, device protection, and GPS security. Finally, Network Security involves intrusion and anomaly detection to safeguard against unauthorized access and cyber-attacks.
Analysis generated from the science mapping highlights how MT is increasingly intertwined with concerns of privacy and security. These concerns are strategic enablers of trust in marketing. Security forms a foundational layer, encompassing not only the protection of network and data but also the trust that facilitates consumer acceptance of data-driven marketing. Privacy, in turn, emerges as core theme that links technical safeguards with consumer-facing issues such as transparency, consent, and the ethical use of data.
The co-citation network analysis (Figure 2) identified three clusters relevant to MT marketing: (1) IoT devices, which collect real-time, context-based consumer data; (2) privacy-preserving techniques, which ensure the responsible and ethical use of such data; and (3) neural network architectures, which generate deeper insights to enhance STP.
IoT enables dynamic segmentation by capturing consumer behaviors such as shopping habits and social interactions (Parwekar & Gupta, 2019). This granular behavioral data support personalized targeting strategies (Vittala et al., 2024) and strengthen customer engagement, brand loyalty, and product positioning (Gawshinde et al., 2024; Taylor et al., 2020). Privacy-preserving techniques, including anonymization methods like k-anonymity, help maintain consumer trust while still allowing marketers to derive actionable insights (Gangrade, 2024). Neural network architectures further enhance marketing by analyzing complex datasets to refine segmentation and support data-driven decision-making.
In summary, these clusters show how technological innovations, ethical safeguards, and strategic opportunities transform STP from a static, survey-based model into a dynamic, AI-enabled, and privacy-conscious framework (Shastri & Pandit, 2021).
According to thematic structure (Figure 3), the analysis of the research corpus also highlights a critical convergence between marketing technologies (MT), security imperatives and privacy protection. Emerging technologies such as blockchain and artificial intelligence (AI) are fundamental pillars for building a secure and transparent marketing ecosystem. On the one hand, blockchain technology offers a decentralized and tamper-proof register that improves security and transparency, thus promoting trust between brands and consumers (Alkahtani et al., 2021; Boukis, 2020; Dionysis et al., 2022). Blockchain is increasingly used to secure supply chains, verify the origin of products, authenticate customer identities, and manage digital assets, strengthening the reliability of marketing ecosystems (Ali & Sofi, 2022; Chen et al., 2021; Zhang et al., 2022). In addition, smart contracts, which are self-executing agreements stored on the blockchain, make it possible to streamline processes, ensure transparency, and reduce the risks of fraud (Bodorik et al., 2023).
On the other hand, as marketing becomes more and more data-driven, AI plays a central role in protecting customer information and maintaining the integrity of marketing operations (Alhitmi et al., 2024; Cheng et al., 2023). AI-based systems are already being deployed to detect fraud, identify malicious activities, and strengthen security in various applications, such as online advertising, e-commerce, and customer relationship management (Li et al., 2021; Nagaraj et al., 2023). ML algorithms, in particular, excel at analyzing large datasets to recognize fraudulent patterns and predict security threats, allowing proactive risk mitigation (Pour et al., 2020; Sukhoparov & Lebedev, 2023). Future research should also prioritize the development of robust ML algorithms, like those explored by Hammedi et al. (2022), that can efficiently manage noisy sensor data, detect anomalies, and protect against cyber threats.
However, the successful integration of these technologies fundamentally depends on transparency, trust, and adaptability. Public concerns about the use of data, highlighted by Ford et al. (2019) and Piao and Cui (2021), require transparent and user-centered approaches to build trust. Ayaz et al. (2024) emphasize the need for AI systems to maintain transparency and interpretability to facilitate data-based decision-making in customer relationship management. In addition, adaptability and continuous learning are crucial for AI-based marketing strategies to remain effective, a principle whose broader applicability is demonstrated in malware detection (Budiarto et al., 2022; O’Mahony et al., 2021; Uysal et al., 2022). Mishandling of large amounts of customer data can lead to privacy violations (Cooper et al., 2023; Lopes et al., 2020). To mitigate these risks, marketing strategies must integrate privacy preservation techniques including data anonymization, differential privacy, and federated learning (Senavirathne & Torra, 2020; Yadav & Kumar, 2025), thus making it possible to take advantage of the advantages of AI and blockchain while protecting consumer information (Radanliev et al. 2024).
This conflict between personalization and confidentiality manifests acutely in specific applications like customer segmentation and positioning. AI-based segmentation makes it possible to offer more relevant experiences, whether in e-commerce, tourism, or smart building management (Naser et al., 2020; Penagos-Londoño et al., 2021; Peng & Xin, 2019). However, this practice raises crucial privacy issues. Solutions are emerging to manage this tension, notably integrating the notion of trust directly into algorithms, exemplified by the SPMF algorithm which segments users according to their preferences and their trust relationships (Peng & Xin, 2019). Another approach consists in segmenting individuals according to their perception of trust (Penagos-Londoño et al., 2021), or using privacy-friendly equipment as soon as data are collected, including thermal sensor networks that allow segmentation without visually identifying people (Naser et al., 2020). Likewise, the link between positioning and security is inherently complex. On the one hand, the collection of precise location data is confronted with fundamental confidentiality barriers, illustrated by the reluctance of companies to share GPS data deemed confidential (Greaves & Figliozzi, 2008). On the other hand, the security of positioning is actively threatened by attacks, a particularly critical threat in vehicle-to-vehicle communications (Nguyen et al., 2019) and WSN. To meet this challenge, strategic approaches based on game theory are proposed in order to balance the level of security and resource consumption (Esposito & Choi, 2017).
In conclusion, the interaction of AI, blockchain, and other advanced technologies shape the future of security in marketing. While these innovations offer unprecedented opportunities, their ethical deployment requires a commitment to transparency, privacy protection, and continuous adaptation (Manda et al., 2024; Sachdev, 2020; Thomaz et al., 2019). The constraints and risks linked to positioning, in particular, have direct implications for segmentation and targeting strategies. It is therefore imperative for marketing managers to integrate data governance and cyber-security considerations into their STP processes to strengthen consumer confidence and ensure regulatory compliance.
This article examines the intersection of MT, privacy, security, and marketing, with a particular emphasis on studies illustrating how these technologies are transforming marketing strategies while addressing security risks and safeguarding consumer data privacy. Privacy and security have become pivotal concerns in the domain of MT, drawing increasing interest from both academic and industry stakeholders. Despite their relevance across fields such as computer science, engineering, and marketing, the literature on these topics remains fragmented.
To address this gap, the present study offers a bibliometric analysis focused on privacy and security challenges within STP strategies. Analyzing 1,057 publications retrieved from the WoS database spanning 1996–2023, this research identifies notable gaps, particularly the need for further inquiry into ethical AI implementation, data transparency, and adaptive security frameworks.
A key limitation of this study lies in its exclusive reliance on the WoS database. Broader inclusion of repositories such as Scopus, IEEE Xplore, and SpringerLink could enrich the analysis and yield a more comprehensive understanding of the field.
The co-citation network analysis reveals three primary research clusters – IoT devices, privacy-preserving techniques, and neural network architectures – underscoring the interdisciplinary nature of MT-related marketing scholarship. These clusters demonstrate how technological innovation, ethical imperatives, and strategic design converge to shape the development of privacy-conscious marketing strategies.
The thematic map analysis, grounded in keyword frequency and co-occurrence patterns, reveals four principal clusters: (1) basic themes, primarily centered on security; (2) core themes, with privacy as a central focus; (3) niche themes, highlighting the role of sensors and related technologies in addressing privacy and security concerns; and (4) emerging themes, emphasizing the intersection of ML and privacy-focused marketing strategies. This structured classification offers a comprehensive view of how privacy and security issues are evolving within mobile marketing research.
The findings indicate that the effective integration of MT into marketing strategies depends on fostering transparency, building consumer trust, and maintaining adaptability. AI and blockchain technologies are expected to assume increasingly critical roles in securing marketing ecosystems; however, their ethical implementation necessitates robust privacy protections and the capacity for continuous adaptation.
Based on the studies that built the identified clusters, this article outlines research gaps and proposes a series of concrete and testable proposals that guide marketing managers and researchers. In today’s data-intensive marketing landscape, it is increasingly important for managers and marketing researchers to integrate robust data governance and cybersecurity considerations into every stage of the STP process. This integration helps build consumer trust in location-based and personalized campaigns, while ensuring alignment with current privacy regulations. To achieve this, marketers should actively collaborate with IT and data governance teams. Such interdisciplinary cooperation enables the design of customer journeys that are both context-aware and compliant with privacy standards, while maintaining high levels of security. Aligning technological safeguards with marketing strategies contributes to a more resilient and trustworthy brand-consumer relationship.
Finally, future research should focus on bridging the identified gaps by developing innovative approaches to MT that enhance data security and consumer trust. As digital marketing continues to evolve, addressing these challenges will be essential to ensuring the sustainable and ethical use of mobile and AI-driven technologies in marketing.
Authors state no funding involved.
All authors jointly contributed to all aspects of the research and manuscript preparation, including conceptualization, methodology, analysis, and writing. All authors reviewed and approved the final version of the manuscript.
Authors state no conflict of interest.
