Search results

1 – 10 of over 23000
To view the access options for this content please click here
Article
Publication date: 22 February 2020

Vinita Bhatia

This paper aims to investigate the motivating and dissuading factors, which develop consumers’ attitude towards permission based marketing.

Abstract

Purpose

This paper aims to investigate the motivating and dissuading factors, which develop consumers’ attitude towards permission based marketing.

Design/methodology/approach

A conceptual model is proposed and validated by following the various studies on mobile and email marketing. A survey of 325 respondents was conducted in the Mumbai city, out of which 271 survey questionnaires were deemed fit for analysis, representing 83.38 per cent response rate. The researcher has used structural equation modelling to test the causal relationships among the constructs.

Findings

The results of the study indicate that increase in personal relevant messages, perceived monetary incentives and perceived entertainment increases consumers’ attitude towards permission based marketing, whereas increase in perceived registration effort decreases consumers’ attitude towards permission based marketing. Furthermore, contrary to the existing literature, perceived consumer empowerment, perceived intrusiveness and perceived privacy issues have no significant relationship with the attitude towards permission marketing. The findings are based on a particular region in India, so it may be different from previous studies.

Research limitations/implications

The study uses a self-reported measure to collect the data through email, and a printed copy of the questionnaire was circulated. Also, the method of sample selection was not random. These two aspects could limit the generalizability of the results.

Practical implications

The research can assist the companies going for promotions through mobile and internet. It provides important findings, which can help them to formulate better promotional strategies.

Originality/value

Fewer research studies have been done to examine the motivating and dissuading factors developing consumers’ attitude towards permission based marketing, therefore, the present research is conducted. After intensely reviewing the available literature, the factors were carefully chosen.

Details

Journal of Research in Interactive Marketing, vol. 14 no. 1
Type: Research Article
ISSN: 2040-7122

Keywords

To view the access options for this content please click here
Article
Publication date: 13 November 2007

Fatim Bamba and Stuart J. Barnes

This study aims to examine the phenomenon of consumers' willingness to give permission to receive short message service (SMS) advertisements. The purpose of this research…

Abstract

Purpose

This study aims to examine the phenomenon of consumers' willingness to give permission to receive short message service (SMS) advertisements. The purpose of this research is threefold: to better understand the phenomenon of consumers' willingness to give permission to receive text message (SMS) advertisements, to provide empirical data that supports our understanding, and to develop and test a basic model of consumers' willingness to give permission to receive SMS advertisements.

Design/methodology/approach

The study utilised a multi‐method research approach with both qualitative and quantitative data – via focus group and scenario‐based survey.

Findings

The results show that even if the relevance of the advertisement is high it does not on its own make consumers give permission; it needs to be combined with the control over opt‐in conditions to assure consumers and gain permission. Regarding brand familiarity, this appears to have little impact on consumers' willingness to give permission to receive SMS advertisements. The opt‐in conditions valued the most are: the possibility to withdraw at any time, personal data disclosure only with consent, and mobile phone operators as a primary advertising filter.

Originality/value

The principal contribution of the paper is in furthering our understanding of the concept of permission as related to the emerging topic of SMS advertising. The paper provides evidence and data triangulation in an area that so far has had little empirical investigation.

Details

Business Process Management Journal, vol. 13 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

To view the access options for this content please click here
Article
Publication date: 28 September 2012

Goran Sladić, Branko Milosavljević, Dušan Surla and Zora Konjović

The goal of this paper is to propose a data access control framework that is used for editing MARC‐based bibliographic databases. In cases where the bibliographic record…

Abstract

Purpose

The goal of this paper is to propose a data access control framework that is used for editing MARC‐based bibliographic databases. In cases where the bibliographic record editing activities carried out in libraries are complex and involve many people with different skills and expertise, a way of managing the workflow and data quality is needed. Enforcing access control can contribute to these goals.

Design/methodology/approach

The proposed solution for data access control enforcement is based on the well‐studied standard role‐based access control (RBAC) model. The bibliographic data, for the purpose of this system, is represented using the XML language. The software architecture of the access control system is modelled using the Unified Modelling Language (UML).

Findings

The access control framework presented in this paper represents a successful application of concepts of role‐based access control to bibliographic databases. The use of XML language for bibliographic data representation provides the means to integrate this solution into many different library information systems, facilitates data exchange and simplifies the software implementation because of the abundance of available XML tools. The solution presented is not dependent on any particular XML schema for bibliographic records and may be used in different library environments. Its flexibility stems from the fact that access control rules can be defined at different levels of granularity and for different XML schemas.

Research limitations/implications

This access control framework is designed to handle XML documents. Library systems that utilise bibliographic databases in other formats not easily convertible to XML would hardly integrate the framework into their environment.

Practical implications

The use of an access control enforcement framework in a bibliographic database can significantly improve the quality of data in organisations where record editing is performed by a large number of people with different skills. The examples of access control enforcement presented in this paper are extracted from the actual workflow for editing bibliographic records in the Belgrade City Library, the largest public city library in Serbia. The software implementation of the proposed framework and its integration in the BISIS library information system prove the practical usability of the framework. BISIS is currently deployed in over 40 university, public, and specialized libraries in Serbia.

Originality/value

A proposal for enforcing access control in bibliographic databases is given, and a software implementation and its integration in a library information system are presented. The proposed framework can be used in library information systems that use MARC‐based cataloguing.

Details

The Electronic Library, vol. 30 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

To view the access options for this content please click here
Article
Publication date: 3 April 2009

Chanaka Jayawardhena, Andreas Kuckertz, Heikki Karjaluoto and Teemu Kautonen

This paper's aim is to develop a conceptual model to examine the influence of four antecedent factors (personal trust, institutional trust, perceived control and…

Abstract

Purpose

This paper's aim is to develop a conceptual model to examine the influence of four antecedent factors (personal trust, institutional trust, perceived control and experience) on consumers' willingness to participate in permission‐based mobile marketing. The model is to be tested empirically across three European countries and gender.

Design/methodology/approach

Data are collected from surveys of consumers in Finland, Germany and the UK. The partial least squares (PLS) approach is utilised to test the model fit.

Findings

The main factor affecting the consumers' decision to participate in mobile marketing is institutional trust, which is a significant factor in all three countries and across gender. The influence of other antecedent factors are less pronounced. On the whole, it is found that the more experienced consumers become with mobile marketing, the less influence perceived control will have on permission. There are notable variations across gender, with perceived control being an important determinant of permission for men, while it is not so for women.

Research implications/limitations

The results indicate the relative importance of four antecedents in the likelihood of consumers giving their permission to companies to send mobile marketing messages.

Practical implications

As institutional trust is the most important determinant of permission based mobile marketing, mobile marketers should focus on building a strong and positive media presence and image, and thereby influence consumers' likelihood of giving permission to mobile‐based marketing.

Originality/value

This is the first international empirical investigation of the different antecedents of permission‐based mobile marketing.

Details

European Journal of Marketing, vol. 43 no. 3/4
Type: Research Article
ISSN: 0309-0566

Keywords

To view the access options for this content please click here
Article
Publication date: 14 November 2016

Mark A. Harris and Amita G. Chin

This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated…

Abstract

Purpose

This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by Google.

Design/methodology/approach

Risky app permissions and in-app purchases (IAP) from Google’s top developers and traditional developers were investigated in several Google Play top app categories, including Editor’s Choice apps. Analysis was performed between categories and developer types.

Findings

Overall, Google’s top developers’ apps request more risky permissions and IAP than do traditional developers. Other results indicate that free apps are more dangerous than paid apps and star ratings do not signify safe apps.

Research limitations/implications

Because of a limited number of Google’s top developers and Editor’s Choice apps, conclusions are drawn from a small sample of apps and not the entire market.

Practical implications

Google’s top developers’ apps are suited well for increasing revenue for Google and developers at the consumer’s expense. Consumers should be wary of top developer trust badges.

Social implications

As the lure for “top free” and “top developer” software is strong among consumers, this research contributes to societal welfare in that it makes consumers aware that Google top developer app trust badges and free apps are more dangerous than traditional developer and paid apps, as they request risky permissions at a much higher frequency. Therefore, consumers should be very careful when downloading apps that are advertised as “top free” or “top developer”.

Originality/value

Google’s top developers’ apps and Editors’ Choice apps have not been investigated from the perspective of permissions and IAP before.

Details

Information & Computer Security, vol. 24 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 31 August 2012

Phumisak Smutkupt, Donyaprueth Krairit and Do Ba Khang

The purpose of this paper is to investigate the impact of SMS (Short Message Service) advertising on consumer perceptions of Au Bon Pain's brand equity in Thailand.

Abstract

Purpose

The purpose of this paper is to investigate the impact of SMS (Short Message Service) advertising on consumer perceptions of Au Bon Pain's brand equity in Thailand.

Design/methodology/approach

The experimental study was based on a 4×2 between‐subjects design, with four levels of message types (personalization, interactivity, general, and no message control) and two levels of permission (with and without permission). Structural equation modeling was utilized to test the hypotheses.

Findings

SMS marketing is found to have a significant positive impact on brand awareness and perceived quality. Personalized, interactive, and general messages are effective for building brand awareness, and general and personalized messages positively influence perceived quality. With the right choice of message, explicit permission enhances the effects of SMS marketing on brand association.

Research limitations/implications

The experiment was conducted over a period of one month, with three SMS ads sent to each subject. Future research could extend the trial period and increase the number and variation of ads to confirm validity of the results.

Practical implications

As text message ads have a strong impact on brand awareness, marketers should focus on using text messages as reminders or updates rather than for complete marketing campaigns. They should also focus on offering permission‐based customers personalized information.

Originality/value

This is among the first mobile marketing experiments in a real‐life setting. Real text‐based promotions from an existing brand (Au Bon Pain) were tested on consumers. This approach creates a natural ad‐processing situation for participants, thus increasing the internal validity of the experiment.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 24 no. 4
Type: Research Article
ISSN: 1355-5855

Keywords

To view the access options for this content please click here
Article
Publication date: 31 May 2013

Hsin Hsin Chang, Hamid Rizal and Hanudin Amin

The aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By…

Abstract

Purpose

The aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By examining different types of email (i.e. permission‐based email and spamming), the present study empirically tested the theoretical linkage between email advertising values, perceived instrusiveness, and the attitudinal‐behavioural dispositions towards email advertising.

Design/methodology/approach

A survey was conducted using 221 respondents from Taiwan. Two scenarios were designed for the present study. The questionnaires were equally divided into two sets, with the first half containing a scenario depicting permission‐based email, and the other half containing a scenario describing a spamming email. Each respondent only received one set of the survey.

Findings

Results from a survey of 221 Internet users in Taiwan indicate that values and attitudes toward, and the perceived intrusiveness of, email advertising significantly affect consumers’ behavioral dispositions toward email advertising. The results suggest that permission‐based email is more effective as compared to spam email advertising. For solicited email, consumers perceived less intrusiveness if the email advertisement offered them financial incentives.

Research limitations/implications

The authors acknowledge four limitations in this study. These limitations however provide further direction for future studies in the discipline. The discussion of these limitations is provided.

Practical implications

Importantly, this study yields significant theoretical and managerial implications. Concerned with the context of email advertising, the authors’ work provides theoretical support for both constructs of advertising values and perceived intrusiveness as important. Concerned with the advertisers, this study renders important implications for better planning of marketing mix strategy using email.

Originality/value

This study provides new theoretical insights into factors influencing consumers’ acceptance of email advertising by incorporating perceived intrusiveness as a mediator in the relationship between advertising values and attitudinal‐behavioral dispositions. By empirically comparing the different types of email advertisements of permission‐based email and spamming, the present study also offers better understanding and extending of the current literature on email advertising research.

To view the access options for this content please click here
Article
Publication date: 1 December 2003

Mohamed E. Ibrahim and Ahmed Al Amiri

This paper examined engineers’ satisfaction with services of a building permission unit at a local municipality using a focus group, a questionnaire and follow‐up…

Abstract

This paper examined engineers’ satisfaction with services of a building permission unit at a local municipality using a focus group, a questionnaire and follow‐up interviews. Obtained satisfaction indexes are reported. Differences in satisfaction levels were tested using parametric t‐tests and Kruskal‐Wallis non‐parametric tests according to engineer’s specialization, size of office and number of building projects submitted to the building permission unit. The results indicate no significant statistical differences in satisfaction levels based on specialization (civil engineers versus architectural engineers), size of the consulting office, or the number of projects submitted. However, satisfaction indexes were not high. They were about 60 per cent.

Details

Journal of Economic and Administrative Sciences, vol. 19 no. 2
Type: Research Article
ISSN: 1026-4116

Keywords

To view the access options for this content please click here
Article
Publication date: 12 October 2015

Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos and Lilian Mitrou

This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that…

Abstract

Purpose

This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed.

Design/methodology/approach

The impact of the applications’ evolutionary increment of permission requests from both the user’s and the developer’s point of view is studied, and finally, a series of remedies against the erosion of users’ privacy is proposed.

Findings

The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, today’s smartphone operating systems do not provide an adequate level of protection for the user’s personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices.

Research limitations/implications

The proposed approach was evaluated through an examination of the Android’s permission model, although issues arise in other operating systems. The authors’ future intention is to conduct a user study to measure the user’s awareness and concepts surrounding privacy concerns to empirically investigate the above-mentioned suggestions.

Practical implications

The proposed suggestions in this paper, if adopted in practice, could significantly improve the situation and mitigate privacy concerns of users of smart devices.

Social implications

The recommendations proposed in this paper would strongly enhance the control of users over their personal data and improve their ability to distinguish legitimate apps from malware or grayware.

Originality/value

This paper emphasises two shortcomings of the permissions models of mobile operating systems which, in authors’ view, have not been adequately addressed to date and propose an inherent way for apps and other entities of the mobile computing ecosystem to commit to responsible and transparent practices on mobile users’ privacy.

Details

Information & Computer Security, vol. 23 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 1 July 2005

Carole A. George

The aim was to explore the issues related to acquiring copyright permission with the goal of determining effectiveness and efficiency using the least complex process.

Abstract

Purpose

The aim was to explore the issues related to acquiring copyright permission with the goal of determining effectiveness and efficiency using the least complex process.

Design/methodology/approach

A random sample of books was chosen, relevant information was recorded, request letters were sent and tracked, and results (permission received or denied) were analyzed with respect to publisher, publication data, time required, and issues related to the process.

Findings

About 52 percent responded with a yes or no with 24 percent yes responses. Nearly 25 percent never responded, addresses were not found for about 16 percent, approximately 7 percent were too complicated to pursue and response time averaged about three months.

Research limitations/implications

Results were affected by the limited staff time available to work on the project, the many changes in staff, and the sometimes lengthy time between follow‐ups.

Practical implications

The low rate of positive responses indicates the need to focus on publications and publishers most likely to provide permission: older and out‐of‐print materials, non‐commercial publishers, special collections, while using designated staff and personal contact to improve effectiveness.

Originality/value

Few previous studies exist in this area. This study might benefit other libraries with respect to planning, defining procedures, and improving results.

Details

New Library World, vol. 106 no. 7/8
Type: Research Article
ISSN: 0307-4803

Keywords

1 – 10 of over 23000