8,627 research outputs found

    The Usage of Personal Data as Content in Integrated Marketing Communications

    Get PDF
    Personal user data has proven extremely valuable for firms in the digital age. The wealth of data available to firms has provided unprecedented access into the world of the consumer. Companies hoping to capitalize on their user's data have turned to several interesting outlets. This research addresses the repurposing of user data as content in marketing. By analyzing four cases of data presented as marketing communications across two companies, this research provides new insights into the public release of private user data for marketing purposes. Four cases of personal data used in marketing communications were chosen specifically for their time proximity, characteristics of the sending firms, and their disparate outcomes. These instances of marketing communications, two by Spotify and two by Netflix, were released during November and December of 2017 and each resulted in a diverse range of public opinion. An analysis of these cases was conducted using the comprehensive framework of integrated marketing communications (Tafesse & Kitchen, 2017). There is a significant difference in the perceptual outcomes of integrated marketing communication campaigns which display user data as content. This analysis provides insights into the characteristics of marketing communications and how their outcomes fit into broader marketing strategies. These case studies provide opportunities for marketers to improve their campaigns in line with their desired audience outcome. Patterns of scope, strategy, mode, and outcome do not suggest success or failure in the context of marketing communications, but rather a set of insights marketers should keep in mind when pursuing communication strategies which harness personal user data.No embargoAcademic Major: Marketin

    An Agent-based Modelling Framework for Driving Policy Learning in Connected and Autonomous Vehicles

    Get PDF
    Due to the complexity of the natural world, a programmer cannot foresee all possible situations, a connected and autonomous vehicle (CAV) will face during its operation, and hence, CAVs will need to learn to make decisions autonomously. Due to the sensing of its surroundings and information exchanged with other vehicles and road infrastructure, a CAV will have access to large amounts of useful data. While different control algorithms have been proposed for CAVs, the benefits brought about by connectedness of autonomous vehicles to other vehicles and to the infrastructure, and its implications on policy learning has not been investigated in literature. This paper investigates a data driven driving policy learning framework through an agent-based modelling approaches. The contributions of the paper are two-fold. A dynamic programming framework is proposed for in-vehicle policy learning with and without connectivity to neighboring vehicles. The simulation results indicate that while a CAV can learn to make autonomous decisions, vehicle-to-vehicle (V2V) communication of information improves this capability. Furthermore, to overcome the limitations of sensing in a CAV, the paper proposes a novel concept for infrastructure-led policy learning and communication with autonomous vehicles. In infrastructure-led policy learning, road-side infrastructure senses and captures successful vehicle maneuvers and learns an optimal policy from those temporal sequences, and when a vehicle approaches the road-side unit, the policy is communicated to the CAV. Deep-imitation learning methodology is proposed to develop such an infrastructure-led policy learning framework

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Get PDF
    The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture

    Marketing of Library Services and Products through Social Media: An Evaluation

    Get PDF
    Social media has a great impact on information promotional activities by bringing tremendous changes in the field of marketing. Social networking applications help the users to possess interconnections among the community members and remix the library services and products to brand them visible in a broader way. This paper gives an overview of the concept of marketing of library services and products in the pretext of handiness of social networking technologies (SNT). The paper also discusses various social networking sites (SNS) such as Facebook, Twitter, Delicious, Youtube, Flickr etc. An outline of how the social media may successfully be applied to enhance the effectiveness in marketing library services and products is observed. Relative merits and challenges with adoption of SNS are also examined

    clicktatorship and democrazy: Social media and political campaigning

    Get PDF
    This chapter aims to direct attention to the political dimension of the social media age. Although current events like the Cambridge Analytica data breach managed to raise awareness for the issue, the systematically organized and orchestrated mechanisms at play still remain oblivious to most. Next to dangerous monopoly-tendencies among the powerful players on the market, reliance on automated algorithms in dealing with content seems to enable large-scale manipulation that is applied for economical and political purposes alike. The successful replacement of traditional parties by movements based on personality cults around marketable young faces like Emmanuel Macron or Austria’s Sebastian Kurz is strongly linked to products and services offered by an industry that simply provides likes and followers for cash. Inspired by Trump’s monopolization of the Twitter-channel, these new political acteurs use the potential of social media for effective message control, allowing them to avoid confrontations with professional journalists. In addition, an extremely active minority of organized agitators relies on the viral potential of the web to strongly influence and dictate public discourse – suggesting a shift from the Spiral of Silence to the dangerous illusion of a Nexus of Noise

    Online consumer’s acceptance of social networking sites as potential shopping’s guide

    Get PDF
    The emergence of social media has significantly altered the strategies that companies use to communicate with customers ( Lee, Xiong, & Hu, 2011). As social media moves from “buzz word” status to strategic tool, more practitioners are developing skills related to this online communication technology (Eyrich, Padman, & Sweetser, 2008). With the development of networks, especially electronic commerce’s appearance, consumers enter a new environment of trade, therefore, with the high degree of price dispersion in the online market, for example, customer information, search behaviour also changes (Guan & Cheng, 2009). In fact, with the rapid development of Web 2.0 technologies, such as Ajax and XML, a great number of social networking sites (e.g., Facebook, Renren, MySpace, Kaixin, and LinkedIn) are emerging, which makes mass users interactions easier and more convenient (Yanli, Yi, & Yuli, 2010). These social media tools allow users to search, organize, share, annotate and contribute to contents in a collaborative way. For example, Curtis et al. (2010) found that social media techniques are becoming more abundant as public relations practitioners become mindful of their effectiveness in respect of reaching target audiences, promoting a specific cause, and further developing communication strategies. More than half of America’s teens and young adults send instant messages and use social networking sites, and more than one-third of all Internet users engage in these activities (Correa, Hinsley, & de Zúñiga, 2010)
    • …
    corecore