989 resultados para Yvonne Bennett


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the past twenty years brand loyalty has been an important topic for both marketing practitioners and academics. While practitioners have produced proprietary brand loyalty audit models, there has been little academic research to make transparent the methodology that underpins these audits and to enable practitioners to understand, develop and conduct their own audits. In this paper, we propose a framework for a brand loyalty audit that uses a tri-dimensional approach to brand loyalty, which includes behavioural loyalty and the two components of attitudinal loyalty: emotional and cognitive loyalty. In allowing for different levels and intensity of brand loyalty, this tri-dimensional approach is important from a managerial perspective. It means that loyalty strategies that arise from a brand audit can be made more effective by targeting the market segments that demonstrate the most appropriate combination of brand loyalty components. We propose a matrix with three dimensions (emotional, cognitive and behavioural loyalty) and two levels (high and low loyalty) to facilitate a brand loyalty audit. To demonstrate this matrix, we use the example of financial services, in particular a rewards-based credit card.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the use of randomness extraction and expansion in key agreement (KA) pro- tocols to generate uniformly random keys in the standard model. Although existing works provide the basic theorems necessary, they lack details or examples of appropriate cryptographic primitives and/or parameter sizes. This has lead to the large amount of min-entropy needed in the (non-uniform) shared secret being overlooked in proposals and efficiency comparisons of KA protocols. We therefore summa- rize existing work in the area and examine the security levels achieved with the use of various extractors and expanders for particular parameter sizes. The tables presented herein show that the shared secret needs a min-entropy of at least 292 bits (and even more with more realistic assumptions) to achieve an overall security level of 80 bits using the extractors and expanders we consider. The tables may be used to �nd the min-entropy required for various security levels and assumptions. We also �nd that when using the short exponent theorems of Gennaro et al., the short exponents may need to be much longer than they suggested.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the variance in binge-drinking attitudes and behaviours between university student cohorts from Western and Eastern countries who reside in Australia. In particular, we investigate the impact of social influence on these consumer responses. An online survey resulted in 190 useable responses from university students at three different Australian universities. The results show that students from Western countries consume alcohol at higher levels and demonstrate more ‘approach’ behaviours towards binge-drinking, whereas students from Eastern countries demonstrate more ‘avoid’ behaviours. Social distancing from drunk or story-telling people is evident as students from Eastern countries while students from Western countries were more likely to indulge in story-telling and either ignored or encouraged surrounding people who were drunk.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian and international governments are increasingly adopting social marketing as a social change management tool to deal with complex social problems. Government decision makers typically need to balance the use of business models and management theories whilst maintaining the integrity of government policy. In taking this approach, decision makers experience management tensions between a social mission to equitably deliver social services and the accountability and affordability of providing quality social and health services to citizens. This is a significant challenge as the nature of the ‘social product’ in government is often more service-oriented than goods-based. In this paper the authors examine value creation in government social marketing services. The contribution of this paper is a value creation process model, which considers the nature of governments to create social good. This is particularly important for governments where consumers still expect value and quality in the service delivered, despite that offering being ‘free’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the possibility of including human factoring in a business process model. The importance of doing so is twofold: (1) The organization becomes transparent in its processes as all participants (human, activities and events) are identifiable. (2) Including human factoring allows organizations to hire accordingly to the process needs. (3) Human factoring alleviates the current work related stress that is being encountered. (4) Enable quicker transition for newer employees into job scope. This was made possible by including a human behaviour layer in between pools within a process to depict human behaviour and feeling. Future work includes having a human thought symbol and a human interaction symbol included into the Business Process Modelling Notation (BPMN).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this paper is to provide a contemporary summary of statistical and non-statistical meta-analytic procedures that have relevance to the type of experimental designs often used by sport scientists when examining differences/change in dependent measure(s) as a result of one or more independent manipulation(s). Using worked examples from studies on observational learning in the motor behaviour literature, we adopt a random effects model and give a detailed explanation of the statistical procedures for the three types of raw score difference-based analyses applicable to between-participant, within-participant, and mixed-participant designs. Major merits and concerns associated with these quantitative procedures are identified and agreed methods are reported for minimizing biased outcomes, such as those for dealing with multiple dependent measures from single studies, design variation across studies, different metrics (i.e. raw scores and difference scores), and variations in sample size. To complement the worked examples, we summarize the general considerations required when conducting and reporting a meta-analysis, including how to deal with publication bias, what information to present regarding the primary studies, and approaches for dealing with outliers. By bringing together these statistical and non-statistical meta-analytic procedures, we provide the tools required to clarify understanding of key concepts and principles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Brand loyalty is a concept that has garnered considerable interest over recent years from both marketing practitioners and academics alike. While marketers are primarily interested in ways they can generate and increase brand loyalty from their customers, academics strive to conducts research which investigates the antecedents and consequences of customer loyalty (See DeWitt, Nguyen and Marshall 2008; Russell-Bennett, McColl-Kennedy and Coote 2007).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Diagnosis and treatment of cancer can contribute to psychological distress and anxiety amongst patients. Evidence indicates that information giving can be beneficial in reducing patient anxiety, so oncology specific information may have a major impact on this patient group. This study investigates the effects of an orientation program on levels of anxiety and self-efficacy amongst newly registered cancer patients who are about to undergo chemotherapy and/or radiation therapy in the cancer care centre of a large tertiary Australian hospital. Methods The concept of interventions for orienting new cancer patients needs revisiting due to the dynamic health care system. Historically, most orientation programs at this cancer centre were conducted by one nurse. A randomised controlled trial has been designed to test the effectiveness of an orientation program with bundled interventions; a face-to-face program which includes introduction to the hospital facilities, introduction to the multi-disciplinary team and an overview of treatment side effects and self care strategies. The aim is to orientate patients to the cancer centre and to meet the health care team. We hypothesize that patients who receive this orientation will experience lower levels of anxiety and distress, and a higher level of self-efficacy. Discussion An orientation program is a common health care service provided by cancer care centres for new cancer patients. Such programs aim to give information to patients at the beginning of their encounter at a cancer care centre. It is clear in the literature that interventions that aim to improve self-efficacy in patients may demonstrate potential improvement in health outcomes. Yet, evidence on the effects of orientation programs for cancer patients on self-efficacy remains scarce, particularly with respect to the use of multidisciplinary team members. This paper presents the design of a randomised controlled trial that will evaluate the effects and feasibility of a multidisciplinary orientation program for new cancer patients.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social marketing has successfully adopted many of the techniques of commercial marketing; however, a key commercial marketing theory that does not appear to be utilised in social marketing theory is brand equity. Given that a key outcome of brand equity is loyalty, which is also a desired outcome of many social marketing programs, brand equity appears to be a relevant theoretical framework. This study presents descriptive results of the brand equity levels of 296 Gen Y Australians for the social product of breastfeeding. Breastfeeding is a desirable health behaviour with significant health and wellbeing outcomes for infants, mothers and communities. It was selected as the focus of this paper because loyalty to the behaviour is not increasing, according to the targets set by national government authorities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research on social networking sites like Facebook is emerging but sparse. The exploratory study investigates the value users derive from self-described ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend application to their friends. Thus the concepts of value and cool are explored in a social networking setting. Our qualitative data shows that consumers derive a combination of functional value along with either social or emotional value from the applications. Female Facebook users indicated self-expression as important, while mates then to use Facebook application to socially compete. Three broad categories emerged for application features; symmetrical features can both encourage or discourage recommendation, asymmetrical features one encourage or discourage but not both, and polar features where different levels of the same feature encourage or discourage. Recommending or not recommending an application tends to be the result of a combination of features rather than one feature in isolation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Value creation is an area with long-standing importance in the marketing field, yet little is known about the value construct itself. In social marketing, value can be regarded as an incentive for consumers to perform desirable behaviours that lead to bother greater social good and individual benefit. An understanding of customer value in the consumption of social products is an important aspect of designing social marketing interventions that can effectively change social behaviours. This paper uses qualitative data, gathered during depth interviews, to explore the value dimensions women experience from using government-provided breast screening services every two years. Thematic analysis was used in discovering that emotional functional, social and altruistic dimensions of value were present in womens’ experiences with these services as well as in the outcomes from using them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current approaches to managing and supporting staff and addressing turnover in child protection predominantly rely on deficit-based models that focus on limitations, shortcomings, and psychopathology. This article explores an alternative approach, drawing on models of resilience, which is an emerging field linked to trauma and adversity. To date, the concept of resilience has seen limited application to staff and employment issues. In child protection, staff typically face a range of adverse and traumatic experiences that have flow-on implications, creating difficulties for staff recruitment and retention and reduced service quality. This article commences with discussion of the multifactorial influences of the troubled state of contemporary child protection systems on staffing problems. Links between these and difficulties with the predominant deficit models are then considered. The article concludes with a discussion of the relevance and utility of resilience models in developing alternative approaches to child protection staffing issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.