scholarly journals Marketing Movies on the Internet: How Does Canada Compare to the U.S.?

2000 ◽  
Vol 25 (3) ◽  
Author(s):  
Adam Finn ◽  
Nicola Simpson ◽  
Stuart McFadyen ◽  
Colin Hoskins

Abstract: Canadian filmmakers have had little success competing with Hollywood in the domestic market. Canadian films do not have the marketing budgets needed for the saturation television and newspaper advertising used by the Hollywood majors. But if Canadian film producers and distributors marketed their products as effectively as their Hollywood competitors, they would be expected to be quick to take advantage of a new, relatively low-cost marketing tool that is particularly suited to reaching niche audiences, namely, the Internet. In this paper, we compare the way Canadian, Hollywood major, and U.S. independent producers and distributors use the Internet to communicate with their target audiences. Résumé: Les réalisateurs de films canadiens ont eu peu de succès à concurrencer Hollywood dans le marché domestique. Les films canadiens n'ont pas les budgets de marketing nécessaires pour saturer de publicités la télévision et les journaux, contrairement aux grandes productions d'Hollywood. Mais si les réalisateurs et les distributeurs de films canadiens promouvaient leurs produits aussi efficacement que leurs concurrents hollywoodiens, on s'attendrait à ce qu'ils s'empressent de profiter d'un nouvel outil de marketing à coût relativement bas qui est particulièrement bien adapté pour rejoindre de nombreux amateurs de cinéma: l'Internet. Dans cet article, nous comparons les manières dont les réalisateurs et distributeurs canadiens, les grandes firmes d'Hollywood et les indépendants américains utilisent l'Internet pour communiquer avec leurs marchés cible.

2008 ◽  
Vol 55 (2) ◽  
pp. 233-248 ◽  
Author(s):  
Tassos Patokos

Since its early days, the Internet has been used by the music industry as a powerful marketing tool to promote artists and their products. Nevertheless, technology developments of the past ten years, and especially the ever-growing phenomenon of file sharing, have created the general impression that the Internet is responsible for a crisis within the industry, on the grounds that music piracy has become more serious than it has ever been. The purpose of this paper is to present the impact of new technologies and the Internet on the three main actors of the music industry: consumers, artists and record companies. It is claimed that the Internet has changed the way music is valued, and also, that it may have a direct effect on the quality of the music produced, as perceived by both artists and consumers alike.


Author(s):  
Valerie J. Robnolt ◽  
Joan A. Rhodes

Study skills, as defined by Harris and Hodges (1995), are the “techniques and strategies that help a person read or listen for specific purposes with the intent to remember” (p. 245). With over 34 percent of the world’s, and approximately 79 percent of North America’s, population using the Internet (Internet World Stats, 2012) and the percentage of classrooms in the U.S. that have Internet access increasing from three percent in 1994 to 94 percent in 2005 (Wells & Lewis, 2006), the way that students study and are taught to study must change. To teach study skills, teachers should use the explicit explanation model of reading (Stahl, 1997), which involves the teacher modeling, students practicing with the teacher scaffolding their use of the skills, and then students using the skills independently, using both print and digital texts. This chapter discusses these issues.


2018 ◽  
Vol 7 (1) ◽  
pp. 45-69
Author(s):  
Martina Pásková ◽  
Jan Hruška ◽  
Josef Zelenka

Abstract Multimedia communication through social media has been experiencing constantly growing significance in the field of airline marketing. The aim of the research presented in this paper was to find out and, with the help of both qualitative and quantitative analyses, describe the way YouTube is used by airlines. The research was conducted in the form of a comparative study with the objective of identifying the difference between YouTube performance of full-service carriers (FSCs) and low-cost carriers (LCCs). The intention was to identify which factors influence the effectiveness of airline marketing conducted via YouTube an as well as the way in which they do it. Analysis of selected data was facilitated by social media analytics tool SocialBakers, content analyses and a correlation analysis of YouTube metrics, selected on the base of previous research results. The research data were collected twice during the year 2017 in order to reflect changes over time. Research results showed that FSCs build their YouTube channels more systematically than LCCs. FSCs offer a substantially wider range of video topics and often sort out topics of their videos in a more detailed way. Regarding the basic metrics of YouTube channels (total number of views, number of subscribers), FSCs surpass LCCs significantly. One reason for their much higher rate of views is the fact that FSCs use celebrities more frequently, and frequently they offer high-quality impression/relationship airline presentation.


2010 ◽  
Vol 4 (2) ◽  
pp. 150-167
Author(s):  
Jim McDonnell

This paper is a first attempt to explore how a theology of communication might best integrate and develop reflection on the Internet and the problematic area of the so-called “information society.” It examines the way in which official Church documents on communications have attempted to deal with these issues and proposes elements for a broader framework including “media ecology,” information ethics and more active engagement with the broader social and policy debates.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Shore & Beach ◽  
2019 ◽  
pp. 3-12
Author(s):  
Joan Pope

In the 1970s, the U.S. Congress authorized and funded a five-year demonstration program on low-cost methods for shore protection called the “U.S. Army Engineers Shoreline Erosion Control Demonstration (Section 54) Program.” The Section 54 also known as the “Low-Cost Shore Protection” demonstration program is revisited. Demonstration and monitoring sites including the materials, devices, vegetative plantings, approaches tested, and program findings are discussed. Simply put, a major finding of the Section 54 program was that the concept of “low-cost shore protection” was a bit naïve. However, the program did lead to a wealth of public information documents and practical coastal engineering lessons that are still resonating as home owners, communities, and engineers consider alternative approaches for managing coastal erosion. The program structure and findings are applicable 40 years later as consideration is given toward the use of Natural and Nature-based Features (NNBF) for addressing coastal erosion. Evolution in thought relative to coastal erosion and shoreline enhancement activities since the 1970s has built upon many of the lessons and concepts of the Section 54 program and other real-world coastal erosion management success-failure experiences. This growth has led to a modern appreciation that those features that emulate NNBF are promising and responsible alternative coastal erosion management strategies if proper engineering standard elements of design are included in the project.


Author(s):  
DongBack Seo

For first generation (1G) wireless communications technology standards, the Japanese government’s early decision provided an opportunity for its national manufacturers to be first movers in the global market, while the late development of wireless communications in Korea made the Korean market dependent on foreign manufacturers by adopting the U.S. standard (AMPS). Moving toward the 2G wireless technology market, both countries decided to develop standards instead of adopting a technology from outside their regions. Japan developed its own standard, PDC, while Korea developed CDMA systems with Qualcomm, the U.S. technology provider. Although these governments’ decisions on technologies looked only slightly different, the socio-economic consequences were greatly distinctive. The Korean success brought not only the rapid development of its domestic market but also opportunities for its manufacturers to become global leaders, while the PDC standard only provided the fast growth of the Japanese domestic market without any opportunities for the Japanese manufacturers to grow further internationally in the 1990s. By the end of 1990s, two nations again had to decide a 3G technology standard with vast challenges and pressures.


2002 ◽  
Vol 41 (05) ◽  
pp. 414-418 ◽  
Author(s):  
I. Mavridis ◽  
C. Ilioudis ◽  
C. Georgiadis ◽  
G. Pangalos

Summary Objectives: Internet technologies provide an attractive infrastructure for efficient and low cost communications in regional health information networks. The advantages provided by the Internet come however with a significantly greater element of risk to the confidentiality and integrity of information. This is because the Internet has been designed primarily to optimize information sharing and interoperability, not security. The main objective of this paper is to propose the exploitation of public-key cryptography techniques to provide adequate security to enable secure healthcare Internet applications. Methods: Public-key cryptography techniques can provide the needed security infrastructure in regional health networks. In the regional health-care security framework presented in this paper, we propose the use of state-of-art Public Key Infrastructure (PKI) technology. Such an e-Health PKI consists of regional certification authorities that are implemented within the central hospitals of each region and provide their services to the rest of the healthcare establishments of the same region. Results: Significant experience in this area has been gained from the implementation of the PKI@AUTH project. Conclusions: The developed PKI infrastructure already successfully provides its security services to the AHEPA university hospital. The same infrastructure is designed to easily support a number of hospitals participating in a regional health information network.


Economies ◽  
2018 ◽  
Vol 6 (2) ◽  
pp. 36 ◽  
Author(s):  
Milos Maryska ◽  
Petr Doucek ◽  
Lea Nedomova ◽  
Pavel Sladek

Sign in / Sign up

Export Citation Format

Share Document