600 resultados para misleading advertising
Resumo:
In a knowledge economy where technologically mediated information plays an important role, greater understanding is required of its impact on organisational sustainability. This paper examines the link between mediated information within a global economy and its relationship to a key to long-term organisational success– legitimacy. Aligning organisational legitimacy and the demands of a range of internal and external stakeholders is a central concern for managers when challenges to legitimacy continue to arise. Particularly during times of internally or environmentally driven change, challenges are created for managers seeking to ensure their organisation avoids questioning about its legitimacy. This paper presents the proposition that the perceptions of collective opinion derived from mass media provide a lens to a global world upon which managers base decisions to protect and repair organisational legitimacy. Legitimacy is determined from a broad social arena that can cross national and international boundaries (Lomi, 2000). Experience of legitimacy concerns, therefore, are often outside the traditional realms of managerial knowledge, and experience and of local business association networks (Aldrich, 1999). While the organisational landscape has been changing, at the same time, mass media have increased the focus on bringing news about events, and interpretations of events, from a broad and even global social area (Mutz, 1998). In addition, electronically facilitated media have exposed both organisational stakeholders and managers to views and interpretations of the world more quickly and more explicitly than in previous times. This paper proposes a relationship between perceptions of collective opinion derived from mass media and organisational legitimacy in such an environment.
Resumo:
Non-Western practitioners across the globe instinctively attempt to implement Western-based public relations models and theories, often unsuccessfully, regardless of their surrounding environment. This paper reviews business practices and reveals that in Europe, company interests are a main priority, while in Asia, the line between business and personal relationships is extremely blurred. Cultural dimensions and topois were even more varied between the three regions. Implications for the adoption of Western models of public relations practice are discussed.
Resumo:
The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.
Resumo:
Research has shown that while some people favor foreign- sourced products, others prefer to purchase goods made in their own country. From the perspective of the Australian wine market, consumption of wine has been consistently increasing in recent years. While sales of Australian made wine is booming, sales of imported sources is also increasing in terms of dollar value. This paper examines the effect of consumer ethnocentrism and animosity on willingness to buy foreign wine products, in an effort to better understand the factors involved in the consumer decision making process when purchasing wine products.
Towards a generic skills learning model in public relations: student perspectives on self evaluation
Resumo:
This study addresses calls in the literature for the external validation of Western-based marketing concepts and theory in the East. Using DINESERV, the relationships between service quality, overall service quality perceptions, customer satisfaction, and repurchase intentions in the Malaysian fast food industry are examined. A questionnaire was administered to Malaysian fast food consumers at a large university, resulting in findings that support the five-dimensional nature of DINESERV and three of four proposed hypotheses. This study contributes to knowledge of service quality in developing countries and is the first to examine DINESERV in the Malaysian fast food industry.
Resumo:
We present algorithms, systems, and experimental results for underwater data muling. In data muling a mobile agent interacts with static agents to upload, download, or transport data to a different physical location. We consider a system comprising an Autonomous Underwater Vehicle (AUV) and many static Underwater Sensor Nodes (USN) networked together optically and acoustically. The AUV can locate the static nodes using vision and hover above the static nodes for data upload. We describe the hardware and software architecture of this underwater system, as well as experimental data. © 2006 IEEE.
Resumo:
This paper considers the question of designing a fully image based visual servo control for a dynamic system. The work is motivated by the ongoing development of image based visual servo control of small aerial robotic vehicles. The observed targets considered are coloured blobs on a flat surface to which the normal direction is known. The theoretical framework is directly applicable to the case of markings on a horizontal floor or landing field. The image features used are a first order spherical moment for position and an image flow measurement for velocity. A fully non-linear adaptive control design is provided that ensures global stability of the closed-loop system. © 2005 IEEE.
Resumo:
The development of autonomous air vehicles can be an expensive research pursuit. To alleviate some of the financial burden of this process, we have constructed a system consisting of four winches each attached to a central pod (the simulated air vehicle) via cables - a cable-array robot. The system is capable of precisely controlling the three dimensional position of the pod allowing effective testing of sensing and control strategies before experimentation on a free-flying vehicle. In this paper, we present a brief overview of the system and provide a practical control strategy for such a system. ©2005 IEEE.
Resumo:
While sensor networks have now become very popular on land, the underwater environment still poses some difficult problems. Communication is one of the difficult challenges under water. There are two options: optical and acoustic. We have designed an optical communication board that allows the Fleck’s to communicate optically. We have tested the resulting underwater sensor nodes in two different applications.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.