982 resultados para Internet advertising
Resumo:
Given that both academics and marketers are dissatisfied with the current state of advertising research (Kerr and Schultz, 2010; Neff, 2011), the objective of this exploratory paper is to determine the position of world-leading advertising professionals on the use of social media to test, track and evaluate campaigns. Using Delphi methodology, an international panel of Cannes Gold Lion winners acknowledged that social media research has both strengths and weaknesses, the same as any research. Its strengths are its intimacy and spontaneity, bringing the brand and consumer closer. The real risk is the loss of control in this research environment.
Resumo:
The importance of language for Internet and Society: developing a language-intelligent approach
Resumo:
This text explores the area of advertising and promotion practice. It shows how real organisations coordinate the various elements of the promotional mix with other marketing activities."--Provided by publisher
Resumo:
Pro-anorexia Internet sites aim to promote, support and discuss anorexia nervosa. Media coverage has raised concerns that sites may increase the level of eating disorders. This research examines the meaning of participation in a pro-anorexia Internet site and its relationship with disordered eating by using an interpretative phenomenological analysis of fifteen separate message ‘threads’ followed over a six-week period. Four themes were identified: (1) tips and techniques; (2) ‘ana’ v. anorexia nervosa; (3) social support; and (4) need for anorexia. Findings suggest participation was multi-purpose, providing a coping function in relation to weight loss, and the contribution of sites to increased levels of eating disorders is not inevitable.
Resumo:
Technological growth in the 21st century is exponential. Simultaneously, development of the associated risk, uncertainty and user acceptance are scattered. This required appropriate study to establish people accepting controversial technology (PACT). The Internet and services around it, such as World Wide Web, e-mail, instant messaging and social networking are increasingly becoming important in many aspects of our lives. Information related to medical and personal health sharing using the Internet is controversial and demand validity, usability and acceptance. Whilst literature suggest, Internet enhances patients and physicians’ positive interactions some studies establish opposite of such interaction in particular the associated risk. In recent years Internet has attracted considerable attention as a means to improve health and health care delivery. However, it is not clear how widespread the use of Internet for health care really is or what impact it has on health care utilisation. Estimated impact of Internet usage varies widely from the locations locally and globally. As a result, an estimate (or predication) of Internet use and their effects in Medical Informatics related decision-making is impractical. This open up research issues on validating and accepting Internet usage when designing and developing appropriate policy and processes activities for Medical Informatics, Health Informatics and/or e-Health related protocols. Access and/or availability of data on Internet usage for Medical Informatics related activities are unfeasible. This paper presents a trend analysis of the growth of Internet usage in medical informatics related activities. In order to perform the analysis, data was extracted from ERA (Excellence Research in Australia) ranked “A” and “A*” Journal publications and reports from the authenticated public domain. The study is limited to the analyses of Internet usage trends in United States, Italy, France and Japan. Projected trends and their influence to the field of medical informatics is reviewed and discussed. The study clearly indicates a trend of patients becoming active consumers of health information rather than passive recipients.
Resumo:
As a decentralised communication technology, the Internet has offered much autonomy and unprecedented communication freedom to the Chinese public. Yet the Chinese government has imposed different forms of censorship over cyberspace. However, the Hong Kong erotic photo scandal reshuffles the traditional understanding of censorship in China as it points to a different territory. The paper takes the Hong Kong erotic photo scandal in 2008 as a case study and aims to examine the social and generational conflicts hidden in China. When thousands of photos containing sexually explicit images of Hong Kong celebrities were released on the Internet, gossip, controversies and eroticism fuelled the public discussion and threatened traditional values in China. The Internet provides an alternative space for the young Chinese who have been excluded from mainstream social discourse to engage in public debates. This, however, creates concerns, fear and even anger among the older generations in China, because they can no longer control, monitor and educate their children in the way that their predecessors have done for centuries. The photo scandal illustrates the internal social conflicts and distrust between generations in China and the generational conflict has a far-reaching political ramification as it creates a new concept of censorship.
Resumo:
In this study we develop a theorization of an Internet dating site as a cultural artifact. The site, Gaydar, is targeted at gay men. We argue that contemporary received representations of their sexuality figure heavily in the site’s focus by providing a cultural logic for the apparent ad hoc development trajectories of its varied commercial and non-‐commercial services. More specifically, we suggest that the growing sets of services related to the website are heavily enmeshed within current social practices and meanings. These practices and meanings are, in turn, shaped by the interactions and preferences of a variety of diverse groups involved in what is routinely seen within the mainstream literature as a singularly specific sexuality and cultural project. Thus, we attend to two areas – the influence of the various social engagements associated with Gaydar together with the further extension of its trajectory ‘beyond the web’. Through the case of Gaydar, we contribute a study that recognizes the need for attention to sexuality in information systems research and one which illustrates sexuality as a pivotal aspect of culture. We also draw from anthropology to theorize ICTs as cultural artifacts and provide insights into the contemporary phenomena of ICT enabled social networking.
Resumo:
Classifier selection is a problem encountered by multi-biometric systems that aim to improve performance through fusion of decisions. A particular decision fusion architecture that combines multiple instances (n classifiers) and multiple samples (m attempts at each classifier) has been proposed in previous work to achieve controlled trade-off between false alarms and false rejects. Although analysis on text-dependent speaker verification has demonstrated better performance for fusion of decisions with favourable dependence compared to statistically independent decisions, the performance is not always optimal. Given a pool of instances, best performance with this architecture is obtained for certain combination of instances. Heuristic rules and diversity measures have been commonly used for classifier selection but it is shown that optimal performance is achieved for the `best combination performance' rule. As the search complexity for this rule increases exponentially with the addition of classifiers, a measure - the sequential error ratio (SER) - is proposed in this work that is specifically adapted to the characteristics of sequential fusion architecture. The proposed measure can be used to select a classifier that is most likely to produce a correct decision at each stage. Error rates for fusion of text-dependent HMM based speaker models using SER are compared with other classifier selection methodologies. SER is shown to achieve near optimal performance for sequential fusion of multiple instances with or without the use of multiple samples. The methodology applies to multiple speech utterances for telephone or internet based access control and to other systems such as multiple finger print and multiple handwriting sample based identity verification systems.
Resumo:
Queensland University of Technology (QUT) Library offers a range of resources and services to researchers as part of their research support portfolio. This poster will present key features of two of the data management services offered by research support staff at QUT Library. The first service is QUT Research Data Finder (RDF), a product of the Australian National Data Service (ANDS) funded Metadata Stores project. RDF is a data registry (metadata repository) that aims to publicise datasets that are research outputs arising from completed QUT research projects. The second is a software and code registry, which is currently under development with the sole purpose of improving discovery of source code and software as QUT research outputs. RESEARCH DATA FINDER As an integrated metadata repository, Research Data Finder aligns with institutional sources of truth, such as QUT’s research administration system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. The repository and its workflows are designed to foster better data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximise the impact of existing research data sets. SOFTWARE AND CODE REGISTRY The QUT Library software and code registry project stems from concerns amongst researchers with regards to development activities, storage, accessibility, discoverability and impact, sharing, copyright and IP ownership of software and code. As a result, the Library is developing a registry for code and software research outputs, which will use existing Research Data Finder architecture. The underpinning software for both registries is VIVO, open source software developed by Cornell University. The registry will use the Research Data Finder service instance of VIVO and will include a searchable interface, links to code/software locations and metadata feeds to Research Data Australia. Key benefits of the project include:improving the discoverability and reuse of QUT researchers’ code and software amongst QUT and the QUT research community; increasing the profile of QUT research outputs on a national level by providing a metadata feed to Research Data Australia, and; improving the metrics for access and reuse of code and software in the repository.
Resumo:
Theoretical Background and research questions/hypothesis: Recently, throughout Australasia, humorous appeals have become implemented increasingly in health advertising despite limited evidence regarding the persuasiveness of different types of humour. Of those studies available which have examined the persuasiveness of humorous messages, the type of humour is often not defined so it is unclear what type of humour is being examined. Speck’s (1991) typology includes five types of humour; comic wit, sentimental humour, satire, sentimental comedy, and full comedy. Each type of humour is based on one or more humour generation processes; namely, incongruity-resolution, disparagement humour, and arousal-safety. It has been acknowledged that more research is needed to determine the relative persuasiveness of these different types of humour and to identify those types which may be most effective for health advertising. The current research explored individuals’ thoughts about, and their responses to some different types of, humorous messages addressing the serious health topic of road safety. Methods: A preliminary qualitative, study was conducted involving discussions with licensed drivers (N = 18) regarding their thoughts and feelings about humorous road safety messages in general as well as in response to some (5 in total) pre-existing advertisements. Men (n = 10) and women of younger and older age groups (17-24 or 25+ years) participated in one of six discussions. Participants were recruited from an existing community-based database held by the authors’ Research Centre or were approached directly on the university campus. Ethical approval was gained for the study. Each participant was offered $AUD40. A semi-structured interview schedule guided the discussion (e.g., was it humorous?, would this ad influence you?). Audio-recordings of the discussions were professionally transcribed and the transcripts were analysed using thematic analysis. Results: The findings revealed that, irrespective of age and gender, humour that was clever, incorporated something unexpected and contrasting with the everyday, was a preferred and relevant approach, thus aligning with incongruity-based theories of humour generation and humour types, such as comic wit and satire. As a persuasive function, humorous messages were considered likely to be talked about (and relatively more so than traditional fear-based approaches). Participants also felt that humorous messages would need to be used cautiously as humour that was considered inappropriate and/or associated with serious occurrences, such as a crash, would be unlikely to persuade. Conclusions: The findings highlight some of the potential benefits of using humour, such as increasing the extent to which an advertisement is talked about as well as the types of humour which may be effective in this context. Implications for research and/or practice: While this research has provided important insight, future research which quantitatively assesses the persuasive effects of different types of humorous road safety messages within a larger, representative sample is needed. This current study has highlighted some humorous approaches which may hold persuasive promise in encouraging individuals to adopt safer attitudes and behaviours not only on the road, but in relation to serious health issues more broadly.
Resumo:
This paper examines the case of the Forgotten Australians as an opportunity to examine the role of the internet in the presentation of testimony. ‘Forgotten Australians’ are a group who suffered abuse and neglect after being removed from their parents – either in Australia or in the UK - and placed in Church and State run institutions in Australia between 1930 and 1970. The campaign by this profoundly marginalised group coincided with the decade in which the opportunities of Web 2.0 were seen to be diffusing throughout different social groups, and were considered a tool for social inclusion. We outline a conceptual framework that positions the role of the internet as an environment in which the difficult relationships between painful past experiences and contemporary injunctions to remember them, are negotiated. We then apply this framework to the analysis of case examples of posts and interaction on websites with web 2.0 functionality: YouTube and the National Museum of Australia. The analysis points to commonalities and differences in the agency of the internet in these two contexts, arguing that in both cases the websites provided support for the development of a testimony-like narrative and the claiming, sharing and acknowledgement of loss.
Resumo:
The thesis is a comparative study of ICTs and Internet use of Australian and Malaysian early childhood teachers in terms of their personal and professional comfort with ICTs, pedagogical beliefs, and their reported classroom practice. The study discovered teachers from both countries as relatively comfortable with digital technologies and the Internet, with most teachers held positive beliefs about ICT usage. The structural barriers in classrooms include lack of Internet access and the wide gap that exists between teachers’ positive beliefs and classroom practice. The study suggests the need for strategic and targeted professional development for teachers.
Resumo:
The travel industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is generally thought that this has led to an increase in consumers' privacy concerns, which may have an adverse impact on their willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized secondary use of data, invasion of privacy, and errors. A study was undertaken to examine the effects of these factors on prior purchase of travel services via the Internet and future purchase probability. No evidence was found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Managerial implications are discussed.
Resumo:
This paper describes the theory and practice for a stable haptic teleoperation of a flying vehicle. It extends passivity-based control framework for haptic teleoperation of aerial vehicles in the longest intercontinental setting that presents great challenges. The practicality of the control architecture has been shown in maneuvering and obstacle-avoidance tasks over the internet with the presence of significant time-varying delays and packet losses. Experimental results are presented for teleoperation of a slave quadrotor in Australia from a master station in the Netherlands. The results show that the remote operator is able to safely maneuver the flying vehicle through a structure using haptic feedback of the state of the slave and the perceived obstacles.