Search results

1 – 10 of 104
Article
Publication date: 1 August 2016

Chih-Ta Yen and Guan-Jie Huang

The purpose of this paper is to propose a new optical steganography framework that can be applied to public optical binary phase-shift keying (BPSK) systems by transmitting a…

Abstract

Purpose

The purpose of this paper is to propose a new optical steganography framework that can be applied to public optical binary phase-shift keying (BPSK) systems by transmitting a stealth spectrum-amplitude-coded optical code-division multiple-access signal through a BPSK link.

Design/methodology/approach

By using high-dispersion elements, the stealth data pulses temporally stretch and the amplitude of the signal decreases after stretching. Thus, the signal can be hidden underneath the public signal and system noise. At the receiver end, a polarizer is used for removing the public BPSK signal and the stealth signal is successfully recovered by a balanced detector.

Findings

In a simulation, the bit-error rate (BER) performance improved when the stealth power increased.

Research limitations/implications

The BER performance worsens when the noise power become large. Future work will consider increasing the system performance during high-noise power situation.

Practical implications

By properly adjusting the power of the amplified spontaneous emission noise, the stealth signal can be hidden well in the public channel while producing minimal influence on the public BPSK signal.

Originality/value

In conclusion, the proposed optical steganography framework makes it more difficult for eavesdroppers to detect and intercept the hidden stealth channel under public transmission, even when using a dispersion compensation scheme.

Details

Engineering Computations, vol. 33 no. 6
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 1 February 2001

Howard Smith

Describes preliminary structural design work on a notional uninhabited tactical aircraft (UTA), carried out at Cranfield University. UTAs are seen as an important future element…

1168

Abstract

Describes preliminary structural design work on a notional uninhabited tactical aircraft (UTA), carried out at Cranfield University. UTAs are seen as an important future element of military fleets. A notional baseline requirement was derived, leading to the evolution of a design solution. The basic requirements for such a UTA are naturally highly classified but, although industry has been hesitant to comment, the baseline requirements and design solution developed herein are believed to be reasonable.

Details

Aircraft Engineering and Aerospace Technology, vol. 73 no. 1
Type: Research Article
ISSN: 0002-2667

Keywords

Book part
Publication date: 15 September 2022

Gözde Baycur, Ezgi Delen and Doğu Kayişkan

The rapid digital transformation is driving businesses to reexamine their marketing plans and practices. Marketers face new conflicts while they are implementing digital marketing…

Abstract

The rapid digital transformation is driving businesses to reexamine their marketing plans and practices. Marketers face new conflicts while they are implementing digital marketing strategies. The main objective of this chapter is to deeply understand these conflicts and to provide appropriate solutions. This chapter addresses six digital conflicts that challenge marketers most: (1) online versus offline channel conflicts, (2) conflicts stemming from digitalization gap, (3) conflicts in influencer marketing context, (4) conflicts in artificial intelligence (AI) context, (5) environmental conflicts and digital marketing, and (6) ethical conflicts and digital marketing. Finally, we discuss conflict management strategies for the most challenging digital marketing conflicts.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Article
Publication date: 16 March 2012

David Lingelbach, Anthony Patino and Dennis A. Pitta

The purpose of this paper is to develop a conceptual framework, based in entrepreneurship theory, which explains how marketing emerges in startups founded by members of the…

16304

Abstract

Purpose

The purpose of this paper is to develop a conceptual framework, based in entrepreneurship theory, which explains how marketing emerges in startups founded by members of the Millennial generation.

Design/methodology/approach

Following a literature review, from which propositions are derived, an earlier process model of organizational speciation is adapted to marketing by Millennial entrepreneurs.

Findings

A four‐stage cycle model of entrepreneurial marketing by Millennials is developed, consisting of enabling through resource scarcity, bonding through social media, new product introduction through incremental stealth, and replicating through variation, selection, and retention.

Research limitations/implications

Model development would be enhanced through empirical data.

Practical implications

Marketers in entrepreneurial firms founded by Millennials can follow a few simple rules to enhance market penetration. Resource scarcity is something to be sought, not avoided. A thoughtful social media strategy can accelerate new product introduction: stealthiness and its close relation small size should be embraced; avoid getting too big too quickly; use furtiveness to drive social media‐based bonding.

Originality/value

Previous theoretical models at the marketing/entrepreneurship interface have not focused on the unique characteristics of Millennial‐led new ventures. This study develops the most comprehensive model of entrepreneurial marketing by Millennials to date.

Details

Journal of Consumer Marketing, vol. 29 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

A Circular Argument
Type: Book
ISBN: 978-1-80071-385-7

Article
Publication date: 26 November 2020

Muhammad Al-Abdullah, Izzat Alsmadi, Ruwaida AlAbdullah and Bernie Farkas

The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a…

Abstract

Purpose

The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a trusted, decentralized data repository. Blockchain is a technology that provides such a data repository. However, the European Union’s General Data Protection Regulation (GDPR) assumed a centralized data repository, and it is commonly argued that blockchain technology is not usable. This paper aims to posit a framework for adopting a blockchain that follows the GDPR.

Design/methodology/approach

The paper uses the Levy and Ellis’ narrative review of literature methodology, which is based on constructivist theory posited by Lincoln and Guba. Using five information systems and computer science databases, the researchers searched for studies using the keywords GDPR and blockchain, using a forward and backward search technique. The search identified a corpus of 416 candidate studies, from which the researchers applied pre-established criteria to select 39 studies. The researchers mined this corpus for concepts, which they clustered into themes. Using the accepted computer science practice of privacy by design, the researchers combined the clustered themes into the paper’s posited framework.

Findings

The paper posits a framework that provides architectural tactics for designing a blockchain that follows GDPR to enhance privacy. The framework explicitly addresses the challenges of GDPR compliance using the unimagined decentralized storage of personal data. The framework addresses the blockchain–GDPR tension by establishing trust between a business and its customers vis-à-vis storing customers’ data. The trust is established through blockchain’s capability of providing the customer with private keys and control over their data, e.g. processing and access.

Research limitations/implications

The paper provides a framework that demonstrates that blockchain technology can be designed for use in GDPR compliant solutions. In using the framework, a blockchain-based solution provides the ability to audit and monitor privacy measures, demonstrates a legal justification for processing activities, incorporates a data privacy policy, provides a map for data processing and ensures security and privacy awareness among all actors. The research is limited to a focus on blockchain–GDPR compliance; however, future research is needed to investigate the use of the framework in specific domains.

Practical implications

The paper posits a framework that identifies the strategies and tactics necessary for GDPR compliance. Practitioners need to compliment the framework with rigorous privacy risk management, i.e. conducting a privacy risk analysis, identifying strategies and tactics to address such risks and preparing a privacy impact assessment that enhances accountability and transparency of a blockchain.

Originality/value

With the increasingly strategic use of data by businesses and the contravening growth of data privacy regulation, alternative technologies could provide businesses with a means to nurture trust with its customers regarding collected data. However, it is commonly assumed that the decentralized approach of blockchain technology cannot be applied to this business need. This paper posits a framework that enables a blockchain to be designed that follows the GDPR; thereby, providing an alternative for businesses to collect customers’ data while ensuring the customers’ trust.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 5/6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 28 January 2014

Tina Tomažic, Damir Boras, Jelena Jurišic and Dušan Lesjak

The purpose of this paper is to identify and redefine the categories of covert advertising, to demonstrate the covert aspects of advertising in the press, to provide a…

1358

Abstract

Purpose

The purpose of this paper is to identify and redefine the categories of covert advertising, to demonstrate the covert aspects of advertising in the press, to provide a high-quality comparison of three leading Slovenian newspapers and to prepare a model for future researchers.

Design/methodology/approach

In this article, the authors defined, analyzed, and explored covert advertising. In the first part, the authors used descriptive approach and method of compilation. In the empirical part, the authors used content analysis to research texts of covert advertising; the authors used analytical approach. Data were analyzed with the help of the computer programme SPSS.

Findings

The results of the research indicate that covert advertising appears on a daily basis in daily newspapers and these articles are visually more attractive to garner greater attention from readers and offer numerous visual presentations.

Research limitations/implications

The first limitation is presenting a lack of literature in this area, especially very poor knowledge of covert advertising in English, American and German literature. There is not a single word that around the world marked the same phenomenon. This research is limited to print media; it cannot be generalized to all media. This is a survey of ads where the authors cannot rule out subjective assessments.

Originality/value

The significance of this research is that texts with covert advertising in Slovenia were for the first time scientifically investigated. The research approach and methodological instruments could be used as a model, a simplified representation of reality for future researches.

Details

Industrial Management & Data Systems, vol. 114 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 7 August 2017

Fabian Göbel, Anton Meyer, B. Ramaseshan and Silke Bartsch

The purpose of this paper is to contribute to marketing communications literature by exploring consumer responses to covert advertising (CA) in a social media context.

4508

Abstract

Purpose

The purpose of this paper is to contribute to marketing communications literature by exploring consumer responses to covert advertising (CA) in a social media context.

Design/methodology/approach

The persuasion knowledge model was used to explore the impact of CA on brand evaluations. A factorial design experiment was conducted in a social media context (YouTube).

Findings

The results of the study show that triggering knowledge about CA changes the way consumers respond to unfamiliar brands that use such tactics. This implies that for unfamiliar brands, with future development of persuasion knowledge, CA in social media will not only be ineffective but also detrimental with damaging effects on the brand.

Research limitations/implications

An important contribution of this study lies in the application of the persuasion knowledge model to social media context.

Practical implications

The results indicate that firms should desist from covert product and brand communications in social media contexts, and instead employ disclosed brand communications.

Originality/value

Given that the effects of CA have not been investigated in an online context, this study makes a unique contribution to brand communications research by providing valuable insights and better understanding of the effects of CA in social media, specifically YouTube.

Details

Marketing Intelligence & Planning, vol. 35 no. 5
Type: Research Article
ISSN: 0263-4503

Keywords

Book part
Publication date: 14 July 2006

Jamie Morgan

The purpose of this paper is to explain how the current “crisis” in the UK pension system arose. I argue that it is a result of a combination of changes in government policy and…

Abstract

The purpose of this paper is to explain how the current “crisis” in the UK pension system arose. I argue that it is a result of a combination of changes in government policy and basic instabilities always inherent in the financial system. Policy changes increased the vulnerability of the pension system to those instabilities. The background to these changes and also the frame of reference in terms of which the “crisis” itself is now phrased is broadly neoliberal. Its theoretical roots are in ideas of the efficiency of free markets. Its policy roots are expressed in a series of similar neoliberal policy tendencies in other capitalist states. I further argue that neoliberal solutions to the pension crisis simply offer more of the very matters that created the problems in the first place. Moreover, the very terms of debate, based in markets, financialisation of saving and individualisation of risk, disguise a more basic debate about providing a living retirement income for all. This is a debate that New Labour is simply not prepared to constructively engage with in any concrete fashion.

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

1 – 10 of 104