3 resultados para proposed communications

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Perinteisten markkinointiviestintäkanavien menettäessä jatkuvasti tehoaan mediakentän ja kohderyhmien sirpaloituessa yhä pienempiin yksiköihin markkinointiorganisaatiot etsivät vaihtoehtoisia tapoja tavoittaakseen kohdeyleisönsä. Yksi vaihtoehtoinen markkinointiviestintäkeino on tuotesijoittelu (product placement), jossa (merkki)tuotteita sijoitetaan erilaisten viihdetuotantojen, kuten elokuvien, televisio-ohjelmien ja tietokonepelien, tarinan yhteyteen, jotta yhä medialukutaitoisempi kohdeyleisö ei pystyisi välttämään kaupallista viestiä esimerkiksi vaihtamalla televisiokanavaa tai kääntämällä lehden sivua. Koska tuote on sijoitettu kerrottavan tarinan sisään, markkinointiviestin — eli tuotteen havaitsemisen — välttäminen on huomattavasti vaikeampaa kuin perinteisten markkinointiviestintämenetelmien kohdalla. Lisäksi, sijoitellut tuotteet ovat tavallisesti kiinteässä yhteydessä tarinan juonen ja henkilöhahmojen kanssa siten, että tuote saa näistä yhteyksistä positiivista vahvistusta imagolleen. Pro Gradu-tutkielman tarkoituksena oli selvittää tuotesijoittelun käyttökelpoisuutta markkinointiviestinnässä sekä miten kulutushyödykemarkkinoijat voivat hyödyntää menetelmää markkinointiviestintästrategioissaan. Tuotesijoittelun poikkeava luonne markkinointiviestintävälineenä tuotti kysymyksen miten tuotesijoittelua voitaisiin hyödyntää yhteistyössä muiden markkinointiviestintäkeinojen kanssa. Tätä varten tutkimuksessa tuotesijoittelu yhdistettiin integroidun markkinointiviestinnän (IMC) viitekehykseen. IMC-konsepti syntyi markkinointiviestinnässä vastaamaan samaan tarpeeseen kuin tuotesijoittelukin: pirstaloitunut mediakenttä ja yksittäiset kohderyhmät vaativat kehittyneempää ja yhtenäisempää markkinointiviestinnän suunnittelua ja toteutusta. Tutkimuksen johtopäätöksenä tuotesijoittelu todettiin käyttökelpoiseksi markkinointiviestintäkeinoksi mikäli viestinnän tavoitteena on muu kuin tuotteen myyntiin suorasti vaikuttaminen. Tuotesijoittelu on sen sijaan erittäin tehokas tuotetietoisuuden lisäämisessä, erityisesti tunnistamisen kohdalla. Tuotesijoittelu voi myös tuottaa suoran ostotarpeen mutta tällöin viestin vastaanottajalla täytyy olla vallitseva tarve kyseisen tuoteryhmän osalta ennen altistumista ko. markkinointiviestille. Tuotesijoittelu voidaan sisällyttää IMC-suunnitteluprosessiin markkinointiviestintästrategian kiinteänä osana. Integraatio markkinointiviestinnässä siten, että tuotesijoittelua tuettaisiin muilla viestintäkeinoilla yhtenäisen kampanjan kehittämiseksi on kuitenkin paljon ennakoitua harvinaisempaa, johtuen ehkä eniten tuotesijoittelun poikkeuksellisesta luonteesta ja kyseisen viestintämuodon vaikeasta hallittavuudesta markkinoijan taholta. Tutkimus toteutettiin normatiivisena case-tutkimuksena pääasiassa sekundäärisiä tietolähteitä hyödyntäen. Case-tutkimuksia varten kerättiin primääristä tietoa kyselylomakkeella kahdesta tuotesijoittelua käyttävästä kansainvälisestä yhtiöstä, jonka lisäksi myös sekundäärisiä tietolähteitä hyödynnettiin case-osan tiedonkeruussa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Value chain collaboration has been a prevailing topic for research, and there is a constantly growing interest in developing collaborative models for improved efficiency in logistics. One area of collaboration is demand information management, which enables improved visibility and decrease of inventories in the value chain. Outsourcing of non-core competencies has changed the nature of collaboration from intra-enterprise to cross-enterprise activity, and this together with increasing competition in the globalizing markets have created a need for methods and tools for collaborative work. The retailer part in the value chain of consumer packaged goods (CPG) has been studied relatively widely, proven models have been defined, and there exist several best practice collaboration cases. The information and communications technology has developed rapidly, offering efficient solutions and applications to exchange information between value chain partners. However, the majority of CPG industry still works with traditional business models and practices. This concerns especially companies operating in the upstream of the CPG value chain. Demand information for consumer packaged goods originates at retailers' counters, based on consumers' buying decisions. As this information does not get transferred along the value chain towards the upstream parties, each player needs to optimize their part, causing safety margins for inventories and speculation in purchasing decisions. The safety margins increase with each player, resulting in a phenomenon known as the bullwhip effect. The further the company is from the original demand information source, the more distorted the information is. This thesis concentrates on the upstream parts of the value chain of consumer packaged goods, and more precisely the packaging value chain. Packaging is becoming a part of the product with informative and interactive features, and therefore is not just a cost item needed to protect the product. The upstream part of the CPG value chain is distinctive, as the product changes after each involved party, and therefore the original demand information from the retailers cannot be utilized as such – even if it were transferred seamlessly. The objective of this thesis is to examine the main drivers for collaboration, and barriers causing the moderate adaptation level of collaborative models. Another objective is to define a collaborative demand information management model and test it in a pilot business situation in order to see if the barriers can be eliminated. The empirical part of this thesis contains three parts, all related to the research objective, but involving different target groups, viewpoints and research approaches. The study shows evidence that the main barriers for collaboration are very similar to the barriers in the lower part of the same value chain; lack of trust, lack of business case and lack of senior management commitment. Eliminating one of them – the lack of business case – is not enough to eliminate the two other barriers, as the operational model in this thesis shows. The uncertainty of the future, fear of losing an independent position in purchasing decision making and lack of commitment remain strong enough barriers to prevent the implementation of the proposed collaborative business model. The study proposes a new way of defining the value chain processes: it divides the contracting and planning process into two processes, one managing the commercial parts and the other managing the quantity and specification related issues. This model can reduce the resistance to collaboration, as the commercial part of the contracting process would remain the same as in the traditional model. The quantity/specification-related issues would be managed by the parties with the best capabilities and resources, as well as access to the original demand information. The parties in between would be involved in the planning process as well, as their impact for the next party upstream is significant. The study also highlights the future challenges for companies operating in the CPG value chain. The markets are becoming global, with toughening competition. Also, the technology development will most likely continue with a speed exceeding the adaptation capabilities of the industry. Value chains are also becoming increasingly dynamic, which means shorter and more agile business relationships, and at the same time the predictability of consumer demand is getting more difficult due to shorter product life cycles and trends. These changes will certainly have an effect on companies' operational models, but it is very difficult to estimate when and how the proven methods will gain wide enough adaptation to become standards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.