824 resultados para Advertising effort
Resumo:
The system of self regulation of advertising in mass-media was a dream scenario. If stakeholders complained and the advertisement was deemed offensive by an expert panel, it was an easy matter to withdraw the advertisement from mass media and from public attention. This was done locally, according to the cultural values and aesthetics of the population and the mandate of the self regulation board. To advertising regulators, the internet became their worst nightmare. The system of self regulation was no longer closed, and could be circumvented by placing the offending advertisements online. The system of self regulation was also no longer local, but global. All internet users had access to the same advertisements, regardless of cultural considerations. The awakening of global advertising self regulation is something that demands discussion. It is of value to all conference goers of AAA 2010 Europe, as it affects all advertising academics and all stakeholders in the advertising process. As the leading advertising body seeking to bring global advertising issues to a new venue in Europe, the AAA 2010 European Conference seems ripe for a special session on advertising self regulation. This is especially true as the panel contributes a European, US and Asia-Pacific viewpoint.
Resumo:
Given that both academics and marketers are dissatisfied with the current state of advertising research (Kerr and Schultz, 2010; Neff, 2011), the objective of this exploratory paper is to determine the position of world-leading advertising professionals on the use of social media to test, track and evaluate campaigns. Using Delphi methodology, an international panel of Cannes Gold Lion winners acknowledged that social media research has both strengths and weaknesses, the same as any research. Its strengths are its intimacy and spontaneity, bringing the brand and consumer closer. The real risk is the loss of control in this research environment.
Resumo:
This text explores the area of advertising and promotion practice. It shows how real organisations coordinate the various elements of the promotional mix with other marketing activities."--Provided by publisher
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
Queensland University of Technology (QUT) Library offers a range of resources and services to researchers as part of their research support portfolio. This poster will present key features of two of the data management services offered by research support staff at QUT Library. The first service is QUT Research Data Finder (RDF), a product of the Australian National Data Service (ANDS) funded Metadata Stores project. RDF is a data registry (metadata repository) that aims to publicise datasets that are research outputs arising from completed QUT research projects. The second is a software and code registry, which is currently under development with the sole purpose of improving discovery of source code and software as QUT research outputs. RESEARCH DATA FINDER As an integrated metadata repository, Research Data Finder aligns with institutional sources of truth, such as QUT’s research administration system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. The repository and its workflows are designed to foster better data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximise the impact of existing research data sets. SOFTWARE AND CODE REGISTRY The QUT Library software and code registry project stems from concerns amongst researchers with regards to development activities, storage, accessibility, discoverability and impact, sharing, copyright and IP ownership of software and code. As a result, the Library is developing a registry for code and software research outputs, which will use existing Research Data Finder architecture. The underpinning software for both registries is VIVO, open source software developed by Cornell University. The registry will use the Research Data Finder service instance of VIVO and will include a searchable interface, links to code/software locations and metadata feeds to Research Data Australia. Key benefits of the project include:improving the discoverability and reuse of QUT researchers’ code and software amongst QUT and the QUT research community; increasing the profile of QUT research outputs on a national level by providing a metadata feed to Research Data Australia, and; improving the metrics for access and reuse of code and software in the repository.
Resumo:
Theoretical Background and research questions/hypothesis: Recently, throughout Australasia, humorous appeals have become implemented increasingly in health advertising despite limited evidence regarding the persuasiveness of different types of humour. Of those studies available which have examined the persuasiveness of humorous messages, the type of humour is often not defined so it is unclear what type of humour is being examined. Speck’s (1991) typology includes five types of humour; comic wit, sentimental humour, satire, sentimental comedy, and full comedy. Each type of humour is based on one or more humour generation processes; namely, incongruity-resolution, disparagement humour, and arousal-safety. It has been acknowledged that more research is needed to determine the relative persuasiveness of these different types of humour and to identify those types which may be most effective for health advertising. The current research explored individuals’ thoughts about, and their responses to some different types of, humorous messages addressing the serious health topic of road safety. Methods: A preliminary qualitative, study was conducted involving discussions with licensed drivers (N = 18) regarding their thoughts and feelings about humorous road safety messages in general as well as in response to some (5 in total) pre-existing advertisements. Men (n = 10) and women of younger and older age groups (17-24 or 25+ years) participated in one of six discussions. Participants were recruited from an existing community-based database held by the authors’ Research Centre or were approached directly on the university campus. Ethical approval was gained for the study. Each participant was offered $AUD40. A semi-structured interview schedule guided the discussion (e.g., was it humorous?, would this ad influence you?). Audio-recordings of the discussions were professionally transcribed and the transcripts were analysed using thematic analysis. Results: The findings revealed that, irrespective of age and gender, humour that was clever, incorporated something unexpected and contrasting with the everyday, was a preferred and relevant approach, thus aligning with incongruity-based theories of humour generation and humour types, such as comic wit and satire. As a persuasive function, humorous messages were considered likely to be talked about (and relatively more so than traditional fear-based approaches). Participants also felt that humorous messages would need to be used cautiously as humour that was considered inappropriate and/or associated with serious occurrences, such as a crash, would be unlikely to persuade. Conclusions: The findings highlight some of the potential benefits of using humour, such as increasing the extent to which an advertisement is talked about as well as the types of humour which may be effective in this context. Implications for research and/or practice: While this research has provided important insight, future research which quantitatively assesses the persuasive effects of different types of humorous road safety messages within a larger, representative sample is needed. This current study has highlighted some humorous approaches which may hold persuasive promise in encouraging individuals to adopt safer attitudes and behaviours not only on the road, but in relation to serious health issues more broadly.
Resumo:
Generating nano-sized materials of a controlled size and chemical composition is essential for the manufacturing of materials with enhanced properties on an industrial scale, as well as for research purposes, such as toxicological studies. Among the generation methods for airborne nanoparticles (also known as aerosolisation methods), liquid-phase techniques have been widely applied due to the simplicity of their use and their high particle production rate. The use of a collison nebulizer is one such technique, in which the atomisation takes place as a result of the liquid being sucked into the air stream and injected toward the inner walls of the nebulizer reservoir via nozzles, before the solution is dispersed. Despite the above-mentioned benefits, this method also falls victim to various sources of impurities (Knight and Petrucci 2003; W. LaFranchi, Knight et al. 2003). Since these impurities can affect the characterization of the generated nanoparticles, it is crucial to understand and minimize their effect.
Resumo:
Concealed texting (CT) while driving involves a conscious effort to hide one’s texting while obvious texting (OT) does not involve such efforts to conceal the behaviour. Young drivers are the most frequent users of mobile phones while driving which is associated with heightened crash risk. This study investigated the extent to which CT and OT may be discrete behaviours to ascertain whether countermeasures would need to utilise distinct approaches. An extended Theory of Planned Behaviour (TPB) including moral norm, mobile phone involvement, and anticipated regret guided the research. Participants (n = 171) were aged 17 to 25 years, owned a mobile phone, had a current driver’s licence, and resided in Queensland. A repeated measures MANOVA found significant differences between CT and OT on all standard and extended TPB constructs. Hierarchical multiple regression analyses showed the standard TPB constructs accounted for 68.7% and 54.6% of the variance in intentions to engage in CT and OT, respectively. The extended predictors contributed additional variance in intentions over and above the standard TPB constructs. Further, in the final regression model, differences emerged in the significant predictors of each type of texting. These findings provide initial evidence that CT and OT are distinct behaviours. This distinction is important to the extent that it may influence the nature of advertising countermeasures aimed at reducing/preventing young drivers’ engagement in these risky behaviours.
Resumo:
Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers’ intentions and subsequent behaviour. Participants (n = 171) were aged 17 to 25 years, owned a mobile phone, and had a current driver’s licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers’ intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers’ self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour.
Resumo:
The huge amount of CCTV footage available makes it very burdensome to process these videos manually through human operators. This has made automated processing of video footage through computer vision technologies necessary. During the past several years, there has been a large effort to detect abnormal activities through computer vision techniques. Typically, the problem is formulated as a novelty detection task where the system is trained on normal data and is required to detect events which do not fit the learned ‘normal’ model. There is no precise and exact definition for an abnormal activity; it is dependent on the context of the scene. Hence there is a requirement for different feature sets to detect different kinds of abnormal activities. In this work we evaluate the performance of different state of the art features to detect the presence of the abnormal objects in the scene. These include optical flow vectors to detect motion related anomalies, textures of optical flow and image textures to detect the presence of abnormal objects. These extracted features in different combinations are modeled using different state of the art models such as Gaussian mixture model(GMM) and Semi- 2D Hidden Markov model(HMM) to analyse the performances. Further we apply perspective normalization to the extracted features to compensate for perspective distortion due to the distance between the camera and objects of consideration. The proposed approach is evaluated using the publicly available UCSD datasets and we demonstrate improved performance compared to other state of the art methods.
Resumo:
Making a conscious effort to hide the fact that one is texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened crash risk from engaging in this behaviour. First, several small focus group discussions (N = 12) were carried out to elicit the underlying salient beliefs regarding this behaviour, in accordance with the Theory of Planned Behaviour (TPB). Findings from these discussions, in conjunction with available prior evidence regarding general mobile phone use while driving, then informed questionnaire items that assessed young peoples’ beliefs regarding this behaviour, as well as intention to engage in this behaviour in the next week. In the questionnaire phase of the study, participants (N = 171) were aged 17–25 years, owned a mobile phone, and held a current driver’s licence. Results showed that there were significant differences between low and high intenders (to engage in concealed texting while driving) on the behavioural, normative, and control beliefs investigated. Specifically, high intenders were more likely to believe that concealed texting while driving would result in sharing information with others, using time effectively, and were less likely to think that free-flowing traffic would prevent their engagement in this behaviour. By targeting these beliefs, these findings may potentially inform the development of advertising and other public intervention strategies, aimed at ensuring young drivers reconsider their engagement in this risky behaviour.
Resumo:
This chapter approaches integrated advertising as a practice that is continuous with advertising history, rather than a phenomenon associated with new technologies. Competition for technology-enabled audiences in expanding media and entertainment markets is nonetheless an important factor in the turn to integrated advertising and marketing strategies in recent years. While integrated advertising provides solutions for advertisers, it is problematic for media consumers because it is not always distinguishable from surrounding program content and clearly identifiable as advertising. It creates opportunities for advertisers to fly below the radar of citizen and consumer awareness of commercial and political influences in media content, and for this reason has been constrained by regulation. Media regulators have come to play an important role in striking a balance between public and private interests in commercial media by setting and adjudicating the limits of integrated advertising practices. This chapter looks at how broadcasting regulators have responded to the challenges of regulating integrated advertising in commercial radio in three different territories (United States, United Kingdom and Australia). It draws attention to the ways in which integrated advertising simultaneously drives innovation in media genres and forms, as well as de-regulation of the influence exercised by advertisers in commercial media content.
Resumo:
Background Patient satisfaction is influenced by the setting in which patients are treated and the employees providing care. However, to date, limited research has explained how health care organizations or nurses influence patient satisfaction. Objectives The purpose of this study was to test the model that service climate would increase the effort and performance of nursing groups and, in turn, increase patient satisfaction. Method This study incorporated data from 156 nurses, 28 supervisors, and 171 patients. A cross-sectional design was utilized to examine the relationship between service climate, nurse effort, nurse performance and patient satisfaction. Structural equation modeling was conducted to test the proposed relationships. Results Service climate was associated with the effort that nurses directed towards technical care and extra-role behaviors. In turn, the effort that nurses exerted predicted their performance, as rated by their supervisors. Finally, task performance was a significant predictor of patient satisfaction. Conclusions This study suggests that both hospital management and nurses play a role in promoting patient satisfaction. By focusing on creating a climate for service, health care managers can improve nursing performance and patient satisfaction with care.
Resumo:
One of the forces which has indelibly shaped marketing is the internet. It has not only changed the way we communicate, but our marketing practices and our advertising self-regulation process (Kerr, Mortimer, Dickinson and Waller 2012). This special session seeks to build a new global framework to regulate advertising activity in this uncharted online environment. It looks back to how advertising has been traditionally self-regulated and looks forward to identify the key issues for marketers, consumers, regulators and the media. This special session explores and reinforces the fundamental purpose of the conference, as well as addressing the urgent needs of marketers, consumers and regulators.