60,679 research outputs found

    The Usage of Personal Data as Content in Integrated Marketing Communications

    Get PDF
    Personal user data has proven extremely valuable for firms in the digital age. The wealth of data available to firms has provided unprecedented access into the world of the consumer. Companies hoping to capitalize on their user's data have turned to several interesting outlets. This research addresses the repurposing of user data as content in marketing. By analyzing four cases of data presented as marketing communications across two companies, this research provides new insights into the public release of private user data for marketing purposes. Four cases of personal data used in marketing communications were chosen specifically for their time proximity, characteristics of the sending firms, and their disparate outcomes. These instances of marketing communications, two by Spotify and two by Netflix, were released during November and December of 2017 and each resulted in a diverse range of public opinion. An analysis of these cases was conducted using the comprehensive framework of integrated marketing communications (Tafesse & Kitchen, 2017). There is a significant difference in the perceptual outcomes of integrated marketing communication campaigns which display user data as content. This analysis provides insights into the characteristics of marketing communications and how their outcomes fit into broader marketing strategies. These case studies provide opportunities for marketers to improve their campaigns in line with their desired audience outcome. Patterns of scope, strategy, mode, and outcome do not suggest success or failure in the context of marketing communications, but rather a set of insights marketers should keep in mind when pursuing communication strategies which harness personal user data.No embargoAcademic Major: Marketin

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Climate of Opportunity: Gender and Movement Building at the Intersection of Reproductive Justice and Environmental Justice

    Get PDF
    Women's reproductive health and rights are inextricably linked to environmental health and justice issues. Women's bodies and reproductive health are often the markers of environmental contamination through diminished fertility, fetal developmental disabilities and increased rates of cancers. Beginning in 2008, the Foundation brought together grant partners working in these two movements to form the Environmental Justice/Reproductive Justice (EJ/RJ) Collaborative. The Foundation has seen firsthand how joint advocacy generates more inclusive movements and stronger outcomes for communities. This report summarizes the EJ/RJ Collaborative as a reference for funders, policymakers, organizations and others interested in joint advocacy work

    “This is the way ‘I’ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?

    Get PDF
    The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines
    • …
    corecore