Search results

1 – 10 of 84
Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Content available

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Open Access
Article
Publication date: 6 August 2021

Salim Moussa

Predatory publishing is a growing and global issue infecting all scientific domains. Predatory publishers create counterfeit, not (properly) peer-reviewed journals to exploit the…

16955

Abstract

Purpose

Predatory publishing is a growing and global issue infecting all scientific domains. Predatory publishers create counterfeit, not (properly) peer-reviewed journals to exploit the open access (OA) model in which the author pays. The plethora of predatory marketing journals along with the sophisticated deceptive practices of their publishers may create total confusion. One of the many highly likely risks of that bewilderment is when peer-reviewed, prestigious marketing journals cite these pseudo-marketing journals. This phenomenon is called citation contamination. This study aims to investigate the extent of citation contamination in the peer-reviewed marketing literature.

Design/methodology/approach

Using Google Scholar as a citation gathering tool, this study investigates references to four predatory marketing journals in 68 peer-reviewed marketing journals listed in the 2018 version of the Academic Journal Guide by the Chartered Association of Business Schools (CABSs).

Findings

Results indicate that 59 of the 68 CABS-ranked peer-reviewed marketing journals were, up to late January 2021, contaminated by at least one of the four sampled predatory journals. Together, these four pseudo-journals received (at least) 605 citations. Findings from nonparametric statistical procedures show that citation contamination occurred irrespective of the age of a journal or its 2019 Journal Impact Factor (JIF). They also point out that citation contamination happened independently from the fact that a journal is recognized by Clarivate Analytics or not.

Research limitations/implications

This study investigated citations to only four predatory marketing journals in only 68 CABS-listed peer-reviewed marketing journals.

Practical implications

These findings should sound an alarm to the entire marketing community (including academics and practitioners). To counteract citation contamination, recommendations are provided for researchers, practitioners, journal editors and academic and professional associations.

Originality/value

This study is the first to offer a systematic assessment of references to predatory journals in the peer-reviewed marketing literature.

Details

South Asian Journal of Marketing, vol. 2 no. 1
Type: Research Article
ISSN: 2719-2377

Keywords

Open Access
Article
Publication date: 4 August 2021

Khaoula Akdim

This study, first, reviews the existing literature on electronic word-of-mouth (eWOM) and, using communication theory, examines its impact on its readers’ decision-making…

6764

Abstract

Purpose

This study, first, reviews the existing literature on electronic word-of-mouth (eWOM) and, using communication theory, examines its impact on its readers’ decision-making processes. Second, this paper aims to propose some elements of eWOM communications that might be further researched.

Design/methodology/approach

A literature review of relevant academic articles produced 97 works related to social communication theory, eWOM and new artificial intelligence trends in hospitality. Thereafter, potential avenues for future research were explored.

Findings

The study results showed: valence, relevance, understandability and visual cues are the most important antecedents of message usefulness and the reader’s behavioral intentions; source credibility is the sender characteristic that most affects the reader’s behavioral intentions and consumer susceptibility to interpersonal influence is the receiver characteristic that most influences their attitudes and behavioral intentions. In addition, the study highlights four relevant aspects for future research. First, more research into online fake reviews is needed to better understand sender motivations. Second, companies should actively manage negative reviews. Then, the careful choice of platforms on which companies promote their products/services. Finally, the role of artificial intelligence in increasing the effectiveness of eWOM in the hospitality industry.

Originality/value

This paper integrates – grounded on communication theory – results from previous studies about the central elements of communication (message, sender and receiver) and discusses the main trends in hospitality-related eWOM. In addition, the paper examines the potential of specific eWOM elements as future lines of research, in particular: fake reviews, strategies for dealing with negative reviews, the eWOM platform used and artificial intelligence applications.

Propósito

Este estudio, en primer lugar, revisa la literatura existente sobre el boca-oído electrónico (eWOM) y, utilizando la teoría de la comunicación, examina su impacto en los procesos de toma de decisiones de sus lectores. En segundo lugar, proponemos algunos elementos de las comunicaciones eWOM que podrían investigarse más adelante.

Metodología

Una revisión de la literatura de artículos académicos relevantes produjo 97 trabajos relacionados con la teoría de la comunicación social, eWOM y nuevas tendencias de inteligencia artificial en hotelería. A partir de entonces, se exploraron posibles vías de investigación futura.

Hallazgos

Los resultados del estudio señalaron: 1) la valencia, la relevancia, la comprensibilidad y las señales visuales son los antecedentes más importantes de la utilidad del mensaje y las intenciones de comportamiento del lector; 2) La credibilidad de la fuente es la característica del emisor que más afecta las intenciones de comportamiento del lector; 3) La susceptibilidad del consumidor a la influencia interpersonal es la característica del receptor que más influye en sus actitudes e intenciones de comportamiento. Además, el estudio destaca cuatro aspectos relevantes para futuras investigaciones. Primero, se necesita más investigación sobre las reseñas falsas en línea para comprender mejor las motivaciones del emisor. En segundo lugar, las empresas deben gestionar activamente las críticas negativas. Luego, la cuidadosa elección de las plataformas en las que las empresas promocionan sus productos/servicios. Por último, el papel de la inteligencia artificial en el aumento de la eficacia de eWOM en la industria hotelera.

Originalidad

Este artículo integra –con base en la teoría de la comunicación– resultados de estudios previos sobre los elementos centrales de la comunicación (mensaje, emisor y receptor) y analiza las principales tendencias en eWOM relacionadas con la hostelería. Además, el artículo examina el potencial de elementos específicos de eWOM como líneas futuras de investigación, en particular: revisiones falsas, estrategias para lidiar con críticas negativas, la plataforma eWOM utilizada y aplicaciones de inteligencia artificial.

Palabras clave: eWOM, Teoría de comunicación, Revisiones falsas, Revisiones negativas, Inteligencia artificialTipo de artículo: Revisión de la literatura

目的

本研究, 首先, 回顾了现有的关于电子口碑(eWOM)的文献, 并利用传播理论, 研究了它对读者决策过程的影响。其次, 我们提出了一些可能需要进一步研究的电子口碑传播的要素。

方法。

对相关学术文章的文献回顾产生了97篇与社会传播理论、eWOM和酒店业新的人工智能趋势有关的作品。此后, 对未来研究的潜在途径进行了探讨。

研究结果。

研究结果显示。1)价值、相关性、可理解性和视觉线索是信息有用性和读者行为意图的最重要的前因; 2)来源的可信度是最能影响读者行为意图的发送者特征; 3)消费者对人际影响的易感性是最能影响他们态度和行为意图的接受者特征。此外, 该研究还强调了未来研究的四个相关方面。首先, 需要对网上虚假评论进行更多的研究, 以更好地了解发送者的动机。其次, 公司应该积极管理负面评论。然后, 谨慎选择公司推广其产品/服务的平台。最后, 人工智能在提高酒店业eWOM的有效性方面的作用。

原创性。

本文以传播理论为基础, 整合了以往关于传播中心要素(信息、发送者和接受者)的研究结果, 并讨论了与酒店业相关的电子WOM的主要趋势。此外, 本文还研究了特定的eWOM要素作为未来研究方向的潜力, 特别是:虚假评论、处理负面评论的策略、使用的eWOM平台和人工智能应用。

关键词:eWOM, 传播理论, 虚假评论, 负面评论, 人工智能。

Details

Spanish Journal of Marketing - ESIC, vol. 25 no. 2
Type: Research Article
ISSN: 2444-9709

Keywords

Open Access
Article
Publication date: 24 November 2022

Reijo Savolainen

This article aims to elaborate the context-sensitive nature of credibility assessment by examining how such judgments are made in online discussion in times of uncertainty caused…

1174

Abstract

Purpose

This article aims to elaborate the context-sensitive nature of credibility assessment by examining how such judgments are made in online discussion in times of uncertainty caused by Finland's intent to join the North Atlantic Treaty Organization (NATO) in spring 2022.

Design/methodology/approach

The empirical findings draw on the qualitative content analysis of 3,324 posts submitted to a Finnish online discussion in February–March 2022. It was examined how the participants of online discussion assess the credibility of information sources referred to in debates on the NATO membership. It is assumed that the believability of the author of information is indicative of his or her expert power, for example based on the credentials of a scholar, while the credibility of information content, for example the provision of factual evidence is indicative of the source's informational power.

Findings

Political decision-makers, particularly the President of Finland were assessed as most credible information sources, due to their access to confidential knowledge and long-time experience in politics. The credibility assessments differed more strongly while judging the believability of researchers. On the one hand, their expertise was praised; on the other hand, doubts were presented about their partiality. Fellow participants of online discussion were assessed most negatively because information sources of these types are associated with low expert and informational power.

Research limitations/implications

As the study concentrated on credibility assessments made in a Finnish online discussion group, the findings cannot be extended to concern the credibility judgments occurring information in other contexts.

Originality/value

The study is among the first to characterize the role of expert and informational power in credibility assessment in times of uncertainty.

Details

Journal of Documentation, vol. 79 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 20 June 2022

Kimberly Gleason, Yezen H. Kannan and Christian Rauch

This paper aims to explain the fundraising and valuation processes of startups and discuss the conflicts of interest between entrepreneurs, venture capital (VC) firms and…

7184

Abstract

Purpose

This paper aims to explain the fundraising and valuation processes of startups and discuss the conflicts of interest between entrepreneurs, venture capital (VC) firms and stakeholders in the context of startup corporate governance. Further, this paper uses the examples of WeWork and Zenefits to explain how a failure of stakeholders to demand an external audit from an independent accounting firm in early stages of funding led to an opportunity for fraud.

Design/methodology/approach

The methodology used is a literature review and analysis of startup valuation combined with the Fraud Triangle Theory. This paper also provides a discussion of WeWork and Zenefits, both highly visible examples of startup fraud, and explores an increased role for independent external auditors in fraud risk mitigation on behalf of stakeholders prior to an initial public offering (IPO).

Findings

This paper documents a number of fraud risks posed by the “fake it till you make it” ethos and investor behavior and pricing in the world of entrepreneurial finance and VC, which could be mitigated by a greater awareness of startup stakeholders of the value of an external audit performed by an independent accounting firm prior to an IPO.

Research limitations/implications

An implication of this paper is that regulators should consider greater oversight of the startup financing process and potentially take steps to facilitate greater independence of participants in the IPO process.

Practical implications

Given the potential conflicts of interest between VC firms, investment banks and startup founders, the investors at the time of an IPO may be exposed to the risk that the shares of the IPO firms are overvalued at offering.

Social implications

This study demonstrates how startup practices can be extended to the Fraud Triangle and issue a call to action for the accounting profession to take a greater role in protecting the public from startup fraud. This study then offers recommendations for regulators and standards entities.

Originality/value

There are few academic papers in the financial crime literature that link the valuation and culture of startup firms with fraud risk. This study provides a concise explanation of the process of valuation for startups and highlights the considerations for stakeholders in assessing fraud risk. In addition, this study documents an emerging role for auditors as stewards of proper valuation for pre-IPO firms.

Details

Journal of Financial Crime, vol. 29 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 6 October 2023

Reijo Savolainen

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Abstract

Purpose

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Design/methodology/approach

Descriptive quantitative analysis and qualitative content analysis of 2,663 posts submitted to seven Reddit threads discussing a conspiracy operation, that is, the damage of the Nord Stream gas pipelines in September 2022. It was examined how the participants of online discussion assess the credibility of information constitutive of conspiracy theories speculating about (1) suspected actors responsible for the damage, (2) their motives and (3) the ways in which the damage was made. The credibility assessments focussed on diverse sources offering information about the above three factors.

Findings

The participants assessed the credibility of information by drawing on four main criteria: plausibility of arguments, honesty in argumentation, similarity to one's beliefs and provision of evidence. Most assessments were negative and indicated doubt about the informational believability of conspiracy theories about the damage. Of the information sources referred to in the discussion, the posts submitted by fellow participants, television programmes and statements provided by governmental organizations were judged most critically, due to implausible argumentation and advocacy of biased views.

Research limitations/implications

As the study focuses on a sample of posts dealing with conspiracy theories about a particular event, the findings cannot be generalized to concern the informational credibility conspiracy narratives.

Originality/value

The study pioneers by providing an in-depth analysis of the nature of credibility assessments by focussing on information constitutive of conspiracy theories.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Content available
Book part
Publication date: 9 February 2023

Abstract

Details

Online Reputation Management in Destination and Hospitality
Type: Book
ISBN: 978-1-80382-376-8

Content available
Book part
Publication date: 7 October 2020

Abstract

Details

Retail Futures
Type: Book
ISBN: 978-1-83867-664-3

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 84