6,225 research outputs found

    Sustainability Badges and Their Impact on Purchase Intention in the Context of Green Travel Choices

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Marketing IntelligenceTravelling is subject to a constant change dictated by the different challenges and development over the centuries. Nowadays, travellers prefer to adopt a more sustainable approach to travelling, despite the difficulty in finding environmentally friendly options in the market. On the other side, holiday and accommodation providers have started to roll out solutions to fulfil consumers’ needs. The study analysed the impact of adding sustainability labels on accommodation provider listings (conventional vs. peer-to-peer ones) to assess their impact on purchase intention, business credibility and trust. Results demonstrated that the presence of sustainability labels didn’t trigger a more favourable purchase intention. Despite the outcome, the impact of relationship norms (communal vs. exchange) in the relation showed that exchange norms were proven to have a detrimental effect on buying. Finally, no mediation effects were found to be significant for trust and credibility. Those findings have important implications for shaping communication based on the type of relationship established between accommodation providers and the end consumers, other than underlining the importance of visual cues and their impact on customers and their decision-making process

    Consent and the Construction of the Volunteer: Institutional Settings of Experimental Research on Human Beings in Britain during the Cold War

    Get PDF
    This study challenges the primacy of consent in the history of human experimentation and argues that privileging the cultural frameworks adds nuance to our understanding of the construction of the volunteer in the period 1945 to 1970. Historians and bio-ethicists have argued that medical ethics codes have marked out the parameters of using people as subjects in medical scientific research and that the consent of the subjects was fundamental to their status as volunteers. However, the temporality of the creation of medical ethics codes means that they need to be understood within their historical context. That medical ethics codes arose from a specific historical context rather than a concerted and conscious determination to safeguard the well-being of subjects needs to be acknowledged. The British context of human experimentation is under-researched and there has been even less focus on the cultural frameworks within which experiments took place. This study demonstrates, through a close analysis of the Medical Research Council's Common Cold Research Unit (CCRU) and the government's military research facility, the Chemical Defence Experimental Establishment, Porton Down (Porton), that the `volunteer' in human experiments was a subjective entity whose identity was specific to the institution which recruited and made use of the subject. By examining representations of volunteers in the British press, the rhetoric of the government's collectivist agenda becomes evident and this fed into the institutional construction of the volunteer at the CCRU. In contrast, discussions between Porton scientists, staff members, and government officials demonstrate that the use of military personnel in secret chemical warfare experiments was far more complex. Conflicting interests of the military, the government and the scientific imperative affected how the military volunteer was perceived

    Brand logos versus brand names: A comparison of the memory effects of textual and pictorial brand elements placed in computer games

    Get PDF
    While a plethora of studies on gamification of advertising exists, little is known about how consumers process different types of brand elements (logos and names) placed in computer games, and whether differences in information processing lead to variations in brand memory. This gap is addressed by conducting three rigorous experiments. In Study 2 we find that, in general, brand logos lead to stronger memory than brand names – something known as the picture superiority effect. Study 3 examines the condition where the picture superiority effect is neutralized. We find that when the speed of a computer game is reduced, names and logos develop similar memory. Finally, in Study 4, we examine whether the picture superiority effect can be neutralized also in the context of high-speed games. We find that in fast games if the physical distinctiveness of the brand elements is increased, both logos and names yield in similar memory

    Towards a sociology of conspiracy theories: An investigation into conspiratorial thinking on Dönmes

    Get PDF
    This thesis investigates the social and political significance of conspiracy theories, which has been an academically neglected topic despite its historical relevance. The academic literature focuses on the methodology, social significance and political impacts of these theories in a secluded manner and lacks empirical analyses. In response, this research provides a comprehensive theoretical framework for conspiracy theories by considering their methodology, political impacts and social significance in the light of empirical data. Theoretically, the thesis uses Adorno's semi-erudition theory along with Girardian approach. It proposes that conspiracy theories are methodologically semi-erudite narratives, i.e. they are biased in favour of a belief and use reason only to prove it. It suggests that conspiracy theories appear in times of power vacuum and provide semi-erudite cognitive maps that relieve alienation and ontological insecurities of people and groups. In so doing, they enforce social control over their audience due to their essentialist, closed-to-interpretation narratives. In order to verify the theory, the study analyses empirically the social and political significance of conspiracy theories about the Dönme community in Turkey. The analysis comprises interviews with conspiracy theorists, conspiracy theory readers and political parties, alongside a frame analysis of the popular conspiracy theory books on Dönmes. These confirm the theoretical framework by showing that the conspiracy theories are fed by the ontological insecurities of Turkish society. Hence, conspiracy theorists, most readers and some political parties respond to their own ontological insecurities and political frustrations through scapegoating Dönmes. Consequently, this work shows that conspiracy theories are important symptoms of society, which, while relieving ontological insecurities, do not provide politically prolific narratives

    Influence of message appeal on attention. An eye-tracking study

    Get PDF
    El presente estudio analiza la efectividad publicitaria utilizando una metodología de seguimiento ocular. La investigación analiza las diferencias en la atención según el tipo de apelación del mensaje (agradable, neutral y desagradable), evalúa el papel moderador de la preocupación por el problema medioambiental y el enfoque regulatorio. Los resultados muestran que, los estímulos textuales negativos son los que mayor atención reciben, además en participantes con baja preocupación medioambiental, los estímulos de baja elaboración captan antes la atención. En general, los participantes más preocupados por el medioambiente, se fijan más rápidamente en términos de tiempo y frecuencia en estímulos que requieren mayor grado de elaboración. El trabajo también presenta recomendaciones en materia de elaboración de campañas de difusión de energías renovables (EERR) a través de medios que utilicen publicidad digital.This study analyses advertising effectiveness using an eye-tracking methodology. The research analyses differences in attention according to the type of message appeal (pleasant, neutral and unpleasant), assesses the moderating role of environmental concern and regulatory focus. The results show that negative textual stimuli receive the most attention, and that in participants with low environmental concern, low-elaboration stimuli are more attention-grabbing. In general, participants who are more concerned about the environment focus more quickly in terms of time and frequency on stimuli that require a higher degree of elaboration. The paper also presents recommendations for the development of renewable energy (RE) media campaigns using digital advertising.O presente estudo analisa a eficácia da publicidade usando uma metodologia de rastreamento ocular. A pesquisa analisa as diferenças de atenção de acordo com o tipo de apelo da mensagem (agradável, neutro e desagradável), avalia o papel moderador da preocupação com o problema ambiental e a abordagem regulatória. Os resultados mostram que estímulos textuais negativos recebem mais atenção, além de participantes com baixa preocupação ambiental, estímulos de baixa elaboração chamam a atenção mais cedo. Em geral, os participantes mais preocupados com o meio ambiente fixam mais rapidamente em termos de tempo e frequência os estímulos que requerem um maior grau de elaboração.O trabalho também apresenta recomendações sobre o desenvolvimento de campanhas de difusão de energias renováveis (FER) por meio de mídias que utilizem publicidade digital

    Interpersonal Model of Online Textual Persuasion

    Get PDF
    As with other forms of human communication, text-based computer-mediated communication (CMC) media, such as email, instant messaging, and online texting, are often used as a means to persuade others. However, unlike most other media, which feature structural bias in their support for either interpersonal or broadcast communication modes, text- based CMC supports both modes. As a result, CMC text messages frequently have ambiguous origins. We argue that individuals respond to this ambiguity by categorizing these messages based on characteristics that distinguish interpersonal messages from broadcast messages, and receivers tend to comply to a greater extent with those messages that they perceive as interpersonal. Based on these arguments, we present a fundamentally new online textual persuasion model. In empirically testing the model in an online experiment that we assessed with structural equation modeling, we found that it exhibited strong explanatory power and additional utility in augmenting existing online persuasion models. The results offer important theoretical contributions to human-computer interaction research generally and provide practical specific insights for improving persuasive communication via text-based CMC

    Educating Sub-Saharan Africa:Assessing Mobile Application Use in a Higher Learning Engineering Programme

    Get PDF
    In the institution where I teach, insufficient laboratory equipment for engineering education pushed students to learn via mobile phones or devices. Using mobile technologies to learn and practice is not the issue, but the more important question lies in finding out where and how they use mobile tools for learning. Through the lens of Kearney et al.’s (2012) pedagogical model, using authenticity, personalisation, and collaboration as constructs, this case study adopts a mixed-method approach to investigate the mobile learning activities of students and find out their experiences of what works and what does not work. Four questions are borne out of the over-arching research question, ‘How do students studying at a University in Nigeria perceive mobile learning in electrical and electronic engineering education?’ The first three questions are answered from qualitative, interview data analysed using thematic analysis. The fourth question investigates their collaborations on two mobile social networks using social network and message analysis. The study found how students’ mobile learning relates to the real-world practice of engineering and explained ways of adapting and overcoming the mobile tools’ limitations, and the nature of the collaborations that the students adopted, naturally, when they learn in mobile social networks. It found that mobile engineering learning can be possibly located in an offline mobile zone. It also demonstrates that investigating the effectiveness of mobile learning in the mobile social environment is possible by examining users’ interactions. The study shows how mobile learning personalisation that leads to impactful engineering learning can be achieved. The study shows how to manage most interface and technical challenges associated with mobile engineering learning and provides a new guide for educators on where and how mobile learning can be harnessed. And it revealed how engineering education can be successfully implemented through mobile tools

    From wallet to mobile: exploring how mobile payments create customer value in the service experience

    Get PDF
    This study explores how mobile proximity payments (MPP) (e.g., Apple Pay) create customer value in the service experience compared to traditional payment methods (e.g. cash and card). The main objectives were firstly to understand how customer value manifests as an outcome in the MPP service experience, and secondly to understand how the customer activities in the process of using MPP create customer value. To achieve these objectives a conceptual framework is built upon the Grönroos-Voima Value Model (Grönroos and Voima, 2013), and uses the Theory of Consumption Value (Sheth et al., 1991) to determine the customer value constructs for MPP, which is complimented with Script theory (Abelson, 1981) to determine the value creating activities the consumer does in the process of paying with MPP. The study uses a sequential exploratory mixed methods design, wherein the first qualitative stage uses two methods, self-observations (n=200) and semi-structured interviews (n=18). The subsequent second quantitative stage uses an online survey (n=441) and Structural Equation Modelling analysis to further examine the relationships and effect between the value creating activities and customer value constructs identified in stage one. The academic contributions include the development of a model of mobile payment services value creation in the service experience, introducing the concept of in-use barriers which occur after adoption and constrains the consumers existing use of MPP, and revealing the importance of the mobile in-hand momentary condition as an antecedent state. Additionally, the customer value perspective of this thesis demonstrates an alternative to the dominant Information Technology approaches to researching mobile payments and broadens the view of technology from purely an object a user interacts with to an object that is immersed in consumers’ daily life

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance
    • …
    corecore