107,463 research outputs found

    How Has The Food Industry Manipulated The Way Consumers Perceive Food And Health?

    Get PDF
    Food is the most advertised commodity in the United States and food corporations spend on average over $36 billion a year on marketing and advertising (Albritton 172). Seventy percent of total advertising goes to market convenience foods, candy, snacks, soft drinks, desserts and alcohol (Albritton 172). As a result of the wide range of marketing on an even wider range of products, consumers have been taught to feel they have a considerable amount of choice. Ironically despite the array of brand-name commodities that give off this impression, only a few giant corporations control much of what is being offered

    The Effect of Human Error on Modern Security Breaches

    Get PDF

    Identity Doesn\u27t Form In a Vacuum: Deconstructing the Role of Hegemony in the Identity Formation of Religiously Diverse People

    Get PDF
    In a post-9/11 world, Muslims and Muslim-looking individuals are perceived as a homogenous group characterized as violent, oppressive, and barbaric. Conflating Islam with negative traits both corroborates and instigates the dominant hegemonic forces, which serve as the filter through which and the context within which identities are formed. In order to destabilize these hegemonic beliefs, this paper builds upon James Paul Gee’s (2001) identity theory, specifically what he terms “new capitalism.” This review finds Gee’s identity theory particularly salient in the current political moment in which Muslims and Muslim-looking individuals feel rejected and Othered in the United States. However, some short-comings were identified. To address them, other scholars such as Jasmine Zine and bell hooks are drawn into the conversation, and a new addition to Gee’s theory is suggested – that of hegemonic perspective, or H-Identity. Through greater focus on and isolation of the hegemonic forces which undergird identity formation, scholars will be better equipped to evaluate the impact of hegemony on religiously diverse individuals and minority groups. Further research on the role of hegemony in the construction of identity among minorities targeted by hegemonic forces is needed. This review may be useful in diverse psychological, political, or educational settings

    Cloned Meat, Voluntary Food Labeling, and Organic Oreos

    Get PDF
    [Excerpt] “In December 2006, the Food and Drug Administration (FDA) announced that it had reviewed all the available evidence and was poised to approve meat and milk from cloned animals and their progeny. I remember telling one of my colleagues, a patent law professor, who should be as comfortable with technology as anyone, about this development, and his response was, “Yuck. I’m not eating it!” To which of course I replied, “Humph. You won’t know the difference.” Meat or milk from a clone or its descendant is virtually identical to meat or milk from a non-clone, said the FDA, as it also announced that it would almost certainly not require food from clones to be labeled. Consumers often want information about where their food came from or about the processes employed in producing it. The food identity approach to labeling cannot take process into account unless the process affects the identity of the food. When the process does not change the food in any material way, process information on a label might suggest a difference that does not exist. The instinctive “yuck” to the thought of cloned meat highlights the tension between consumer preferences, the government’s science-based, food identity approach, and producers’ efforts to differentiate their products. Part I of this article identifies three functions that labels perform, outlines the types of information usually required, and introduces the rule that voluntary label information cannot be misleading. Part II focuses on process information and its implications. I argue that there is no truly voluntary labeling when consumers care about a feature; if some products are labeled, then unlabeled products bear a de facto label by implication. Partly because of the de facto mandatory labeling principle, process labeling has the potential to mislead consumers. In Part III, I examine some relevant characteristics of consumers. I argue that not all consumers can be misled by label information. Consumers who have no preferences or who are very knowledgeable about the labeled feature are not misled by process labeling. Finally, using labeling of genetically modified (GM) ingredients as an example, I suggest that mandatory labeling of some process information could enhance consumer sovereignty and welfare.

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Going native - Brand New China, Advertising, Media and Commercial Culture, Jing Wang (2008) [Book Review]

    Get PDF
    Jing Wang's book is confused about its audience and fails to give an adequate account of either the specific knowledge available to advertising research or the nature of Chinese consumption. In addition its critique of cultural studies is misplaced and misguided

    Privacy-preserving targeted advertising scheme for IPTV using the cloud

    Get PDF
    In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server. To provide high quality directed advertising service, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are published on the cloud server periodically (e.g. weekly) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the cloud, are considered (trade) secrets and therefore are protected as well. The cloud is oblivious to the published data, the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with a so-called {\em trapdoor} by the IPTV, can query the cloud and utilize the query results. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage
    corecore