The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Viral marketing, a marketing strategy that leverages the influence power in intimate relationship, has become more prevalent due to the popularity of online social networking services in recent years. Consumers are more likely to make a purchase based on social media referrals. Since marketing through social media and traditional channels may target on different audiences, how to maximize the revenue...
The widespread use of social media and the internet are emerging trends that offer an additional interaction channel for companies to better understand customer sentiments about their brands and products. Sentiment analysis uses text data from social media such as customer comments and reviews, which has the nature of high dimensionality. Without selection, typically there are at least thousands of...
Since the social media hype started in the early 2000s, the Internet has bloomed with user-generated data. The content generated by users in social media varies from blogs, forums, social network platforms, and video sharing communities. This data has a special emphasis on the relationships among users of the community. As a consequence, social media data contains significant information about their...
Internet technology has changed many aspects in business these days, from new product and services development, to business process improvement such as online tender, mobile payment, online registration, and many others. As a result of those changes, companies need the right resources who understand on how to do business and compete in this new economy hence new competencies are hired. This research...
A social media message that is forwarded (e.g., Retweeted in Twitter) by many users may diffuse widely. Such a 'viral' message may have a major impact in the real world. If the content maligns a company, the company must respond as quickly as possible to defend its brand image. Timely knowledge about what kinds of information are diffusing in social media is thus quite important. We have developed...
Our research project has been triggered by recent research findings in the field of cognitive info-communications. Our interest has been intrigued specifically by views and definitions of cognitive infocommunications (CogInfoCom) as formulated, e.g. in (Baranyi and Csapo, 2014 and Baranyi, Csapo and Sallai, eds, 2015). We have conducted empirical research to find out how the cognitive processes of...
Social media crises pose significant challenges for organizations in terms of their rapid propagation and deterioration of brand parameters and can have sustained negative business impacts. This paper reports a multiple case study of four different corporate social media crises. The multiple case study was informed by crisis communication and management theories and employed multiple methods consisting...
This paper presents a state-of-the art visual analytics dash-board, Social Set Visualizer (SoSeVi), of approximately 90 million Facebook actions from 11 different companies that have been mentioned in the traditional media in relation to garment factory accidents in Bangladesh. The enterprise application domain for the dashboard is Corporate Social Responsibility (CSR) and the targeted end-users are...
Over the years, different development waves have shaped the Web. Introduced as a tool to browse Web sites, the Web now is a dynamic and robust platform upon which enterprises conduct e-Business. One of these waves known as Web 2.0 (or social Web) is putting pressure on how enterprises should ensure a productive use of Web 2.0 applications such as Facebook and Twitter. Misuse cases of these applications...
The fast growth of e-commerce business in several previous years has attracted attention of many researchers. There are numerous research investigate about purchase behavior. Despite of that, only a few study conducted to determine segmentation of online buyers. Market segmentation is the most fundamental and basic step in determining marketing strategies. This study illustrates the segmentation of...
With an increase in the potential to allocate financial online advertising spending, managers are facing a sophisticated decision and allocation process. We developed a binary logit model with a Bayesian mixture approach to address consumers' buying decision processes and to account for the effects of multiple online advertising channels. By analyzing data from a medium-sized online mail order business,...
With the rapid development of social media and social strategies, firms have defined and applied an action plan in order to offer and to lure their customers. In this context, the internet has become the meeting place between companies and their targeted audience. Recent studies have shown us that customers are more likely to buy a certain product or service from a company they can follow or contact...
In this paper we describe a new approach to creating rich, dynamic and customized maps for business or leisure activities, and demonstrate how the approach can be implemented through a prototype system. The approach is aimed at changing the way we map the world by providing a meaningful and personalized context that is augmented with the semantic web, social media integration and sentiment analysis...
The world of marketing has been revolutionized in recent times. So many new methods of marketing are being experimented with. Marketing is imperative for any business and the world today focuses on gaining more attention from the customers, where people are rigorously trying to find out effective and cost saving techniques of reaching out to the customers. Viral Marketing is also one such technique...
The debate about the use of automated security measures versus training and awareness of people with access to data (such as employees) to protect sensitive and/or private information has been going on for some time. In this paper, we outline the thinking behind security, what hackers are trying to accomplish and the best ways of combating these efforts using the latest techniques that combine multiple...
A company's capability to be involved in science popularization plays a very important role in advancing the nation's innovation capability. Based on the definition of a nation's science popularization capabilities, the company's science popularization's capability is put forward. In addition the theoretical model and indicator system of a regional company's science popularization capability is also...
List-based steganography or Listega is a steganography methodology with noiseless steganography paradigm, or Nostega. In this methodology, a message is embedded in the first characters of list items to create a list-cover. Listega uses filtered cover, which contains only the embedded list items. There are some rooms of improvements in Listega due to several problems, i.e. small embedding capacity...
Living in the knowledge age, we acknowledge that new ideas and innovative products are the new sources of economic growth. Technologies play a critical role in knowledge-based economy in several ways For example, internet is one of the main conduits for learning new skills and information that are necessary in a knowledge-based economy. Technologies, at the same time, also drive changes in education...
Using the social media services is becoming more and more popular nowadays. For companies and their employees, they communicate with customers and colleagues with the new ways of social media. More and more people tend to use mobile social media service at any time and any place but mobile virus and malware are dramatically increasing in frequency. The mobile social media has become a very popular...
The purpose of this study contributes to safe improvement in consideration of security in addition to convenience by the social media utilization in the company. The company uses the marketing using social media, but a lot of risks exist. We contribute to safe improvement by performing an example investigation in this study, and doing risk assessment. In this study, in order to extract a risk event,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.