An Investigation of the Evaluation of the Viral Marketing Research

2013 ◽  
Vol 3 (4) ◽  
pp. 1-27 ◽  
Author(s):  
Antonius Raghubansie ◽  
Hatem El-Gohary ◽  
Chandrani Samaradivakara

This paper aims to locate the key schools of thought in viral marketing (VM) literature, recognise the various sub-sets within viral marketing overall area of research and to identify the different gaps in viral marketing research literature offering a summation of the existing work done so far. The paper tries to build on the existing body of literature in the field of viral marketing, its related electronic word of mouth (eWOM) context and to present a taxonomic classification for future research. The review uses the paradigm funnel to examine the development of VM, key research contributions and categorises the published literature according to their objectives, analytical approaches and their contributions to theory. The literature addresses many subjects of study (e.g. E-Marketing, E-Word of Mouth, Social Media, Peer-to-Peer Communications, Viral Marketing, Buzz Marketing, Stealth Marketing, Viral Advertising, Viral Videos and other aligned research areas). The findings illustrated that there are various gaps in the literature that require further investigation. Based on the findings, it is evident that the existing frameworks arising from the literature should be enhanced by the adoption of qualitative approaches that explore how general observations respond to contingent factors.

Author(s):  
Antonius Raghubansie ◽  
Hatem El-Gohary ◽  
Chandrani Samaradivakara

This paper aims to locate the key schools of thought in viral marketing (VM) literature, recognise the various sub-sets within viral marketing overall area of research and to identify the different gaps in viral marketing research literature offering a summation of the existing work done so far. The paper tries to build on the existing body of literature in the field of viral marketing, its related electronic word of mouth (eWOM) context and to present a taxonomic classification for future research. The review uses the paradigm funnel to examine the development of VM, key research contributions and categorises the published literature according to their objectives, analytical approaches and their contributions to theory. The literature addresses many subjects of study (e.g. E-Marketing, E-Word of Mouth, Social Media, Peer-to-Peer Communications, Viral Marketing, Buzz Marketing, Stealth Marketing, Viral Advertising, Viral Videos and other aligned research areas). The findings illustrated that there are various gaps in the literature that require further investigation. Based on the findings, it is evident that the existing frameworks arising from the literature should be enhanced by the adoption of qualitative approaches that explore how general observations respond to contingent factors.


2020 ◽  
Vol 20 (1) ◽  
pp. 73-91
Author(s):  
Arash Kamangar

The purpose of this paper is to provide a systematic literature review of 26 papers in which an eye tracker has been used to analyse how e-commerce websites can impact customers' behaviour. Most journal articles included in the literature on consumer neuroscience only provide a summary of the actual functions of neuroscience techniques. There are no reviews of studies that focus on the use of an eye tracker on e-commerce websites in either the consumer neuroscience or marketing research literature. The findings show that websites affect customers differently according to variables such as age, gender, nationality, etc., so there is a need to make changes in how the website is designed, depending on the types of users and audiences of the websites. This review article discusses limitations and suggestions for future research as well as detailing the theoretical and practical implications for neuromarketing.


2021 ◽  
Vol 2022 (1) ◽  
pp. 586-607
Author(s):  
Maximilian Zinkus ◽  
Tushar M. Jois ◽  
Matthew Green

Abstract Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past several years, providers have deployed a number of advanced cryptographic features intended to protect data on mobile devices, even in the strong setting where an attacker has physical access to a device. Many of these techniques draw from the research literature, but have been adapted to this entirely new problem setting. This involves a number of novel challenges, which are incompletely addressed in the literature. In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks. Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on. We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-28
Author(s):  
Deepak Thakur ◽  
Jaiteg Singh ◽  
Gaurav Dhiman ◽  
Mohammad Shabaz ◽  
Tanya Gera

Contemporary technologies have ensured the availability of high-quality research data shared over the Internet. This has resulted in a tremendous availability of research literature, which keeps evolving itself. Thus, identification of core research areas and trends in such ever-evolving literature is not only challenging but interesting too. An empirical overview of contemporary machine learning methods, which have the potential to expedite evidence synthesis within research literature, has been explained. This manuscript proposes Simulating Expert comprehension for Analyzing Research trends (SEAR) framework, which can perform subjective and quantitative investigation over enormous literature. TRENDMINER is the use case designed exclusively for the SEAR framework. TRENDMINER uncovered the intellectual structure of a corpus of 444 abstracts of research articles (published during 2010–2019) on Android malware analysis and detection. The study concludes with the identification of three core research areas, twenty-seven research trends. The study also suggests the potential future research directions.


2019 ◽  
Vol 12 (1) ◽  
pp. 1-11
Author(s):  
Bhavna P. Harne ◽  
Azra A. Tahseen ◽  
Anil S. Hiwale ◽  
Ram S. Dhekekar

Meditation and yoga both have positive effects on physical, as well as mental health. Om mantra chanting, a simple and easy to practice, also comes under the aspect of meditation. The “Om” mantra is also considered as the very name of the absolute. Om meditation not only affects the various parts of the brain, such as pre-frontal cortex, vagus nerve, amygdala and others but also affects the heart rate and respiratory rate. Considering the healing effects of Om meditation, through this paper, we are trying to explore all the relevant work done in the field of Om meditation. The survey includes a large number of papers covering the research previously conducted by many researchers, their results and different techniques adopted to study the effect of Om meditation on human beings. Studies on Om meditation are categorized under four different heads: Neuroimaging studies, EEG studies, evoked potentials studies and other methods studies. Even though the existing research evidenced capability of Om meditation in curing anxiety and depression, more rigorous studies with better design, with larger sample size and with different control groups are required. Especially the need to explore untouched research areas of Loud Om meditation using EEG is suggested in the paper. Furthermore, future research directions are also suggested.


Humaniora ◽  
2011 ◽  
Vol 2 (2) ◽  
pp. 1193
Author(s):  
Rosidah Syaukat ◽  
Ekky Imanjaya

New media, like Twitter, has changed many possibilities, including marketing strategy in Indonesia. One of the extraordinary phenomena is paid-to-tweet, as being used by celebrity or ordinary users. The purpose of the article is to identify how Twitter roles in marketing: what the unique characteristic of Twitter so that Word-of-Mouth (WOM) could work effectively and efficiently? How viral marketing, buzz marketing and recommendation could move simultaneously to increase awareness to consumers about specific goods and services? How to choose the endorsers, as buzzers and key opinion leader in social media like Twitter? And why is hard-sale highly forbidden in new marketing practical style? Generally, the article will analyze about what and how regarding phenomena of paid-to-tweet happening in Indonesia. 


Author(s):  
Jill Sweeney

Word of mouth (WOM) reflects informal communication between private individuals that evaluates goods and services (Anderson, 1998). It provides a highly credible means of persuasion because the communicator is not seen as having a vested interest in selling the recommended product or service. In this chapter, WOM is conceptualized as a type of advice between private parties (typically consumers), focused on goods or services, and not necessarily purposeful or directive. WOM is a very powerful tool, especially given the relatively new focus in marketing on customer engagement and the customer’s role in value co-creation in the context of market offerings. However, over the decades, a number of myths have developed surrounding the effects of WOM. These myths are challenged within a review of the research literature. Suggestions for future research directions, research methods to capture WOM, and some best practices are also discussed.


Sign in / Sign up

Export Citation Format

Share Document