5,025 research outputs found

    Ethics of Marketing

    Get PDF

    Ethics of Marketing [Encyclopedia entry]

    Get PDF

    Behavioral Aspects of Pricing

    Get PDF
    Buyers sometimes exhibit seemingly “irrational” behavior with respect to prices and use socially embedded heuristics to simplify their purchase decisions. In some cases small changes in prices can lead to much larger than anticipated changes in sales and profitability. Sellers need to understand the heuristics consumers use, the situations in which they emerge, and recognize how they can respond in markets where information and knowledge of product attributes and competitive prices is increasingly available via the Internet. This chapter explores consumers’ behavioral reactions to price through a review of contemporary literature in the field of pricing. The chapter delineates the nature and scope of these effects based upon a critical review of the most up-to-date empirical research in the field, and concludes by providing implications for innovation in pricing, and guidance for managers to reduce the disconnect between themselves and consumers

    Truth, Lies, and Copyright

    Get PDF
    Fake news may be trending right now, but fake news is not the only source of fake facts that we consume. We encounter fake facts every day in the historical or biographical books we read, the movies we watch, the maps we study, the tele-phone directories and dictionaries we reference, and the religious or spiritual guides we consult. While it is well-established that copyright does not protect facts because facts are discovered rather than created, fake facts are created and can often be as original and creative as fiction. This Article is the first to offer a comprehensive analysis of copyright protection of fake facts contained in fake news and other sources. It details the different categories of fake facts we encounter today and courts’ inconsistent protection of fake facts under copyright law. Even though copyright law may technically protect fake facts as original expression fixed in a tangible medium, this Article argues that the public interest in promoting efficiency, fairness, and production of socially valuable works justify treating fake facts as unprotectable facts under copyright law. Specifically, courts should apply copyright law’s factual estoppel doctrine to treat fake facts as unprotectable facts in infringement cases where an author previously held out fake facts as facts, with the intent that the public rely on the fake facts as facts, if the public could believe the fake facts to be true

    Revisiting the epistemology of fact-checking

    Full text link
    Joseph E. Uscinski and Ryden W. Butler (2013) argue that fact-checking should be condemned to the dustbin of history because the methods fact-checkers use to select statements, consider evidence, and render judgment fail to stand up to the rigors of scientific inquiry and threaten to stifle political debate. However, the premises upon which they build their arguments are flawed. By sampling from multiple “fact-checking agencies” that do not practice fact-checking on a regular basis in a consistent manner, they perpetuate the selection effects they criticize and thus undermine their own position. Furthermore, not only do their arguments suffer from overgeneralization, they fail to offer empirical quantification to support some of their anecdotal criticisms. This rejoinder offers a study demonstrating a high level of consistency in fact-checking and argues that as long as unambiguous practices of deception continue, fact-checking has an important role to play in the United States and around the world

    Checking the fact-checkers in 2008: predicting political ad scrutiny and assessing consistency

    Full text link
    Which types of political ads are most likely to draw criticism from fact-checkers? Are fact-checkers consistent in their evaluations of political ads? Examining general election television ads from the 2008 U.S. presidential race, and based upon the evaluations of FactCheck.org, PolitiFact.com, and the Washington Post's Fact Checker, this study demonstrates it was the attack ads from candidates that were most likely to draw scrutiny from the fact-checkers. Most importantly, a high level of agreement between the fact-checkers indicates their success at selecting political claims that can be consistently evaluated. While political advertisers are increasingly using evidence to support their claims, what may be more critical in drawing evaluations from fact-checkers is the verifiability of a claim. The implications of consistent fact-checking on the public, political actors, journalism and democracy are discussed. With the revelation that fact-checking can be consistently practiced, localized efforts at fact-checking need encouragement, particularly as political TV ads increasingly drown out other potential sources of information for the public and increasingly are used in downballot races, local initiatives, referendums and judicial races

    Mobile Privacy and Business-to-Platform Dependencies: An Analysis of SEC Disclosures

    Get PDF
    This Article systematically examines the dependence of mobile apps on mobile platforms for the collection and use of personal information through an analysis of Securities and Exchange Commission (SEC) filings of mobile app companies. The Article uses these disclosures to find systematic evidence of how app business models are shaped by the governance of user data by mobile platforms, in order to reflect on the role of platforms in privacy regulation more generally. The analysis of SEC filings documented in the Article produces new and unique insights into the data practices and data-related aspects of the business models of popular mobile apps and shows the value of SEC filings for privacy law and policy research more generally. The discussion of SEC filings and privacy builds on regulatory developments in SEC disclosures and cybersecurity of the last decade. The Article also connects to recent regulatory developments in the U.S. and Europe, including the General Data Protection Regulation, the proposals for a new ePrivacy Regulation and a Regulation of fairness in business-to-platform relations

    Lime: Data Lineage in the Malicious Environment

    Full text link
    Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work, we present a generic data lineage framework LIME for data flow across multiple entities that take two characteristic, principal roles (i.e., owner and consumer). We define the exact security guarantees required by such a data lineage mechanism toward identification of a guilty entity, and identify the simplifying non repudiation and honesty assumptions. We then develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol
    • 

    corecore