93,234 research outputs found

    Mapping and analysis of the current self- and co- regulatory framework of commercial communication aimed at minors

    Get PDF
    As the advertising sector has been very active in self-regulating commercial communication aimed at children, a patchwork of different rules and instruments exist, drafted by different self-regulatory organisations at international, European and national level. In order to determine the scope and contents of these rules, and hence, the actual level of protection of children, a structured mapping of these rules is needed. As such, this report aims to provide an overview of different categories of Alternative Regulatory Instruments(ARIs,such as self- and co-regulation regarding (new) advertising formats aimed at children. This report complements the first legal AdLit research report, which provided an overview of the legislative provisions in this domain.status: publishe

    An Examination of Privacy Policies of Global University Web Sites

    Get PDF
    Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning. However, adding online services requires that personal data is kept within computerized systems, thus putting personal private information at risk. Online consumers express concern about the risk of their personal private data and demand to know how organizations will protect their records. It is imperative that firms have mechanisms to guard their data and publish protection information within online privacy policies to mitigate user distrust. However, although industry privacy groups may recommend better protection and some countries may legislate its use; this is not universal in all university sites. This study analyzes 90 universities site throughout the world to determine the use of privacy protection. The results show a lack of use of certain privacy mechanisms. The research suggests methods for improving protection

    Tourism in Iran: central control and indigeneity

    Get PDF
    Iran has a long history and tradition of accommodating visitors and travellers, as well as having a great number of minority cultures within its borders, reflecting its geographic location astride some of the major trade routes in the Middle East. Despite what could be seen as great advantages in the competition for tourism, the present powers in Iran have downplayed the potential role of indigenous groups in tourism, just as they have downplayed the role that tourism could have in the country at large. By exercising strong central and religious power and control and putting forward a strong national image, Iran has discouraged tourism development among its indigenous communities. The dominant centralised power structure of the country is in sharp contrast to that in Nepal for example, described in the previous section, and community-based tourism is hard to find, although there are examples of good individual operations, normally at a small scale. Iran symbolises, perhaps, the dominance of a central uniform control over tourism compared to a local indigenous variety of developments

    From physical marketing to web marketing

    Get PDF
    Reviews the criticism of the 4P marketing mix framework as the basis of traditional and virtual marketing planning. Argues that the customary marketing management approach, based on the popular marketing mix 4Ps paradigm, is inadequate in the case of virtual marketing. Identifies two main limitations of the marketing mix when applied in online environments namely the role of the Ps in a virtual commercial setting and the lack of any strategic elements in the model. Identifies the critical factors of the Web marketing and argues that the basis for successful e-commerce is the full integration of virtual activities into the company's physical strategy, marketing plan and organisational processes. The 4S elements of the Web marketing mix framework offer the basis for developing and commercialising business to consumer online projects. The model was originally developed for educational purposes and has been tested and refined by means of three case studies

    Intangible trust requirements - how to fill the requirements trust "gap"?

    Get PDF
    Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements
    • …
    corecore