Search results

1 – 10 of over 31000
Content available
Article
Publication date: 1 October 2002

68

Abstract

Details

Anti-Corrosion Methods and Materials, vol. 49 no. 5
Type: Research Article
ISSN: 0003-5599

Keywords

Article
Publication date: 1 May 2004

Andy Lockett and Ian Blackman

The way market research is conducted has changed dramatically over the past 30 years, as a result of both the development of the prevailing view of best practice and the state of…

2033

Abstract

The way market research is conducted has changed dramatically over the past 30 years, as a result of both the development of the prevailing view of best practice and the state of technology available to researchers. While it is clear that the World Wide Web (WWW) will increasingly be used as a medium for conducting market research, the full implications of this new channel are not yet fully understood. This paper examines the potential for an Internet‐based financial services firm (Xenon Laboratories) to analyse conduct market research using the WWW. The case demonstrates that, by employing a novel approach to market research, Xenon Laboratories is in a unique position to understand the charging structures in its market, the market for international payments using credit or charge cards. In doing so, the paper highlights the opportunity to unobtrusively gather market information from an international group of customers by providing Internet‐based value‐added services.

Details

Journal of Business & Industrial Marketing, vol. 19 no. 3
Type: Research Article
ISSN: 0885-8624

Keywords

Abstract

Details

Program, vol. 48 no. 1
Type: Research Article
ISSN: 0033-0337

Keywords

Content available
Article
Publication date: 1 February 2004

98

Abstract

Details

Library Hi Tech News, vol. 21 no. 2
Type: Research Article
ISSN: 0741-9058

Content available
Article
Publication date: 19 April 2013

Robin Yeates

665

Abstract

Details

Program, vol. 47 no. 2
Type: Research Article
ISSN: 0033-0337

Keywords

Article
Publication date: 1 April 1995

In the past few months a new breed of online search facility has made its début, accessible through the World Wide Web using any standard browser such as Netscape. Here is an…

Abstract

In the past few months a new breed of online search facility has made its début, accessible through the World Wide Web using any standard browser such as Netscape. Here is an introduction to three such newcomers: NlightN, NewsPage and Infoseek. We used Netscape to run a test search on each of these, choosing both a current topic (the HotJava browser: see our last issue's News Roundup, p. 174) and one slightly more obscure (the 1994 film Shadowlands, about the romance between C.S. Lewis and Joy Gresham). We will show the results of these searches elsewhere in this article but first, here is more about the services themselves.

Details

Online and CD-Rom Review, vol. 19 no. 4
Type: Research Article
ISSN: 1353-2642

Article
Publication date: 1 October 2006

Eric Kin‐wai Lau

The costs of software piracy are enormous. According to Business Software Alliance, it was estimated that the software industry lost $34 billion globally due to software piracy in…

5341

Abstract

Purpose

The costs of software piracy are enormous. According to Business Software Alliance, it was estimated that the software industry lost $34 billion globally due to software piracy in 2005. The present study was an exploratory attempt to analyze software piracy at individual level, using a qualitative approach.

Design/methodology/approach

A qualitative research study with few, if any, theoretical preconceptions would seem to be justified in the Asian context. An internet online survey and a content analysis of internet newsgroups were conducted. Data were transcribed, coded and interpreted so as to generate main predictors of the reported leniency toward software piracy.

Findings

Using extensive qualitative data from two studies, marketing, individual and situational variables are examined as a set of predictors of respondents' reported leniency towards software piracy. The results of the content analysis suggested that the cost of original software was extremely important in software piracy. Respondents commented that excessive price of original software was the key factor pushing them to commit piracy.

Originality/value

This is the first piece of qualitative research to study software piracy. The results of the content analysis suggested that the cost of original software was extremely important in software piracy. It provides new insights to software companies and government officials who are developing programs to promote the concept of anti‐piracy.

Details

Qualitative Market Research: An International Journal, vol. 9 no. 4
Type: Research Article
ISSN: 1352-2752

Keywords

Article
Publication date: 12 November 2018

Zakarya A. Alzamil

Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of…

Abstract

Purpose

Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of its information assets. The purpose of this paper is to investigate the status of the information security policy at a subset of Saudi’s organizations by understanding the perceptions of their information technology’s employees.

Design/methodology/approach

A descriptive and statistical approach has been used to describe the collected data and characteristics of the IT employees and managers to understand the information security policy at the surveyed organizations. The author believes that understanding the IT employees’ views gives a better understanding of the organization’s status of information security policy.

Findings

It has been found that most of the surveyed organizations have established information security policy and deployed fair technology; however, many of such policies are not enforced and publicized effectively and efficiently which degraded the deployed technology for such protection. In addition, the clarity and the comprehensibility of such policies are questionable as indicated by most of the IT employees’ responses. A comparison with similar studies at Middle Eastern and European countries has shown similar findings and shares the same concerns.

Originality/value

The findings of this research suggest that the Saudi Communications and Information Technology Commission should develop a national framework for information security to guide the governmental and non-governmental organizations as well as the information security practitioners on the good information security practices in terms of policy and procedures to help the organizations to avoid any vulnerability that may lead to violations on the security of their information.

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88455

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

1 – 10 of over 31000