Search results

1 – 10 of 680
Article
Publication date: 1 January 1993

Katherine Fraccastero, Scot Burton and Abhijit Biswas

Draws from various theoretical bases and empirical research tooffer managerial recommendations concerning the communication of saleprice information in advertisements. Addresses…

Abstract

Draws from various theoretical bases and empirical research to offer managerial recommendations concerning the communication of sale price information in advertisements. Addresses the manner in which the manipulation of price cues, semantic cues and product cues in an advertisement can enhanceperceptions of utility via increases in the internal reference price, the perceived value implied by the offering price, and perceptions of product quality.

Details

Journal of Consumer Marketing, vol. 10 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 1 February 1995

Fred J. Hay

Anthropology was a late‐comer to the Caribbean and only after World War II did the study of Caribbean culture and societies become less exceptional. Early in this century when…

Abstract

Anthropology was a late‐comer to the Caribbean and only after World War II did the study of Caribbean culture and societies become less exceptional. Early in this century when anthropology was first making itself over as an ethnographic science, anthropologists concentrated on tribal peoples. For most of the post‐Columbian era, the Caribbean region, with a few minor exceptions, was without indigenous tribal societies. Even after anthropology turned its attention to the study of peasantries, Caribbean peasantries were ignored in favor of more stable and tradition‐oriented peasant societies in other parts of Latin America. When anthropologists began to study Caribbean peoples in a more serious and systematic fashion, they found that they had to develop new concepts to explain the variation, flexibility, and heterogeneity that characterized regional culture. These concepts have had a significant impact on social and cultural theory and on the broader contemporary dialogue about cultural diversity and multiculturalism.

Details

Reference Services Review, vol. 23 no. 2
Type: Research Article
ISSN: 0090-7324

Book part
Publication date: 11 August 2014

Justin A. Martin

Using the perspectives of dramaturgy and symbolic interactionists like George Herbert Mead and Carl Couch this study focuses on paid sex work in the hypermodern, virtual world of…

Abstract

Using the perspectives of dramaturgy and symbolic interactionists like George Herbert Mead and Carl Couch this study focuses on paid sex work in the hypermodern, virtual world of Second Life. Using seventeen semi-structured interviews and six months of ethnographic fieldwork, I find that the employment of sexual scripts, carrying off a successful erotic scene, and the creative use of communication and embodiment are highly valued in escorts’ performance of Second Life sex work. Escorts craft an online persona that is a digital representation of the self, which is manifested in the embodiment of their digital body or avatar. In addition to digital representations of the physical self, Second Life allows for multiple methods of computer-mediated communication, and escorts are able to re-embody the first life body through the trading of first life pictures, voice cybersex, and web cam cybersex. The data allow the conclusion that most escorts are unwilling to re-embody the first life body for reasons of personal safety and the desire to restrict access to the first life self. I find, however, that there is a porous boundary between first life and Second Life in which the first life self comes through in the Second Life persona. In the concluding remarks, I explore the implications this study has for the negotiation of privacy for new social media actors who are reluctant to fully disclose their lives yet perform a persistent, archived persona for friends and followers on the Internet. This study contributes to a small, but growing, body of literature on Second Life and expands the existing work on embodiment and privacy in the digital realm.

Details

Symbolic Interaction and New Social Media
Type: Book
ISBN: 978-1-78350-933-1

Keywords

Article
Publication date: 11 August 2014

Sertan Kabadayi and Katherine Price

The purpose of this paper is to study factors affecting consumers’ liking and commenting behavior on Facebook brand pages, and to analyze the mediating role of mode of interaction…

13972

Abstract

Purpose

The purpose of this paper is to study factors affecting consumers’ liking and commenting behavior on Facebook brand pages, and to analyze the mediating role of mode of interaction on relationships between personality traits and liking/commenting behavior.

Design/methodology/approach

Data were collected using an online national survey from 269 respondents, ages between 18 and 32. The hypotheses were tested using structural equation modeling.

Findings

Results support nine of ten hypotheses with significant relationships between analyzed constructs. It was found that two different modes of interaction acted as mediators between three personality traits and liking/commenting behavior on Facebook.

Research limitations/implications

This study only included liking and commenting behavior on Facebook. Future studies could extend the conceptual model by including sharing behavior and other personality traits that were not included in this conceptual model.

Practical implications

The findings have several implications for brand managers with respect to their social media strategies and give them guidance in achieving better customer engagement on Facebook. This research is an important step in understanding the factors affecting consumers’ Facebook behavior and useful for practitioners intending to use Facebook as part of their marketing strategy.

Originality/value

The study provides a comprehensive framework to understand consumer engagement on Facebook by including specific types of Facebook behavior, three personality traits and two modes of interaction that consumers have in social media.

Details

Journal of Research in Interactive Marketing, vol. 8 no. 3
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 1 March 1911

THE earliest catalogue of Cambridge University documents was compiled by Mr. William Rysley, in 1420. Most of the documents enumerated in this list are still extant. An…

Abstract

THE earliest catalogue of Cambridge University documents was compiled by Mr. William Rysley, in 1420. Most of the documents enumerated in this list are still extant. An interesting List of the Documents in the University Registry, from the year 1266 to the year 1544, was communicated to the Cambridge Antiquarian Society by the Rev. H. R. Luard, B.D., then University Registrar, on March 6th, 1876. From this, it appears that “The earliest document which the University possesses is so late as the year 1266. The earliest in the Record office is dated 16th July, 13 Hen. III., i.e. 1229. This is a permission to scholars of the University of Paris to come to England, and remain for purposes of study.”

Details

New Library World, vol. 13 no. 9
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 18 October 2018

Katherine Taken Smith, Amie Jones, Leigh Johnson and Lawrence Murphy Smith

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology…

2272

Abstract

Purpose

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.

Design/methodology/approach

Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.

Findings

Stock prices were negatively affected in all time periods examined, significantly so in one period.

Practical implications

This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.

Originality/value

This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Case study
Publication date: 20 January 2017

Rajkumar Venkatesan, Randle D. Raggio and Katherine Noel

This case is used in Darden's core Marketing course and in the Pricing elective. It would work well in course modules covering the topics of branding or product line management. A…

Abstract

This case is used in Darden's core Marketing course and in the Pricing elective. It would work well in course modules covering the topics of branding or product line management. A teaching note is available for instructors. Soon after Pernod Ricard acquires Absolut vodka and other brands, the economic downturn results in changes in purchasing behavior away from premium to standard products. Brand managers consider whether to introduce a “basic” Absolut, promote a lower-priced alternative, or rebrand other vodkas under the Absolut brand to trade on its considerable brand equity.

Details

Darden Business Publishing Cases, vol. no.
Type: Case Study
ISSN: 2474-7890
Published by: University of Virginia Darden School Foundation

Keywords

Article
Publication date: 2 February 2023

Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger and Erik S. Boyle

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…

Abstract

Purpose

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information systems, carried out to coerce people or governments to further the social or political objectives of the attacker. Cyber terrorism is costly in terms of impaired operations and damaged assets. Cyber terrorism harms a firm’s reputation, thereby negatively affecting a firm’s stock market valuation. This poses grave worries to company management, financial analysts, creditors and investors. This study aims to evaluate the effect of cyber terrorism on the market value of publicly traded firms.

Design/methodology/approach

Financial information was obtained on business firms that were featured in news stories as targets of cyber terrorism. The firm’s stock price was recorded for 1, 3 and 7 days before and after the news article. Percentage changes in the firm’s stock price were compared to percentage changes in the Dow Jones Index to ascertain whether the firm’s stock price went up or down matching the market overall.

Findings

Results indicate that stock prices are significantly negatively affected by news of cyber terrorist attacks on companies. In all three time periods after the cyber terrorist attack, there was a significant negative decline in the stock value relative to the Dow Jones Index. Thus, the market valuation of the firm is damaged. As a result, the shareholders and institutions are financially damaged. Furthermore, exposed system vulnerability may lead to loss of business from consumers who have reduced confidence in the firm’s operations.

Practical implications

This paper examines the risks posed by cyber terrorism, including its impact on individual business firms, which in turn affect entire national economic systems. This makes clear the high value of cybersecurity in safeguarding computer systems. Taking steps to avoid being a victim of cyber terrorism is an important aspect of cybersecurity. Preventative steps are normally far less costly than rebuilding an information system after a cyber terrorist attack.

Originality/value

This study is original in examining the effect of cyber terrorism on the stock value of a company.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Case study
Publication date: 1 November 2018

Rodney Thomas, Stephen Rutner and Christopher Boone

This case study addresses a number of common transportation management issues. It provides an opportunity to analyse historical freight payment data in order to reduce…

Abstract

This case study addresses a number of common transportation management issues. It provides an opportunity to analyse historical freight payment data in order to reduce transportation costs and improve customer service, allowing students to utilise real freight payment data and order shipment history data to make recommendations that have strategic implications for both cost and service performance.

Details

Council of Supply Chain Management Professionals Cases, vol. no.
Type: Case Study
ISSN: 2631-598X
Published by: Council for Supply Chain Management Professionals

Keywords

Case study
Publication date: 20 January 2017

Jeanne Brett, Katherine Nelson and Nicole Tilzer

One Acre Fund (OAF) was founded by Andrew Youn in 2005 for the purpose of helping to solve the chronic hunger problem in Africa. The idea is to provide the resources (seed…

Abstract

One Acre Fund (OAF) was founded by Andrew Youn in 2005 for the purpose of helping to solve the chronic hunger problem in Africa. The idea is to provide the resources (seed, fertilizer, and education) necessary for African farm families to feed themselves when their land holdings are one acre or less. The business model of OAF is that of a cooperative: OAF buys resources like seeds and fertilizer in bulk at reduced prices and distributes them to small farmers who otherwise could not afford them. This case concerns the negotiation that OAF's manager of external relations and research, Moises Postigo, conducted to buy fertilizer in the last quarter of 2007. The case provides an opportunity for students to analyze a real-world deal-making negotiation in a developing economy. A number of aspects of the context of the negotiation and the negotiation process itself make for good class discussion. Postigo did a good job preparing for the negotiation, making the case one that emphasizes proper use of negotiation planning and sensitive understanding of the negotiation environment. Some of the elements that make for good discussion include the following: OAF was a new organization, unknown to the five major providers of fertilizer in Kenya. The negotiations were entirely conducted by cell phone. Negotiations went through stages of request for a bid, discussion with multiple bidders, selection of a provider, and negotiation. There were multiple issues, including price delivery and form of payment. Postigo was negotiating in the shadow of the possibility that the Kenyan government would start selling subsidized fertilizer to small farmers.

Analyze the fundamentals of a real-world negotiation; Consider cultural implications for negotiation strategy; Consider negotiation strategy decisions particular to the context: commodity purchase, developing country, etc. Understand how the economic and political context affects negotiations; Understand the importance of relationships in negotiations.

Details

Kellogg School of Management Cases, vol. no.
Type: Case Study
ISSN: 2474-6568
Published by: Kellogg School of Management

Keywords

1 – 10 of 680