Insights Into Social Media Strategies by Small Marine Tourism Operators in Auckland

Total Page:16

File Type:pdf, Size:1020Kb

Insights Into Social Media Strategies by Small Marine Tourism Operators in Auckland Insights into Social Media Strategies by Small Marine Tourism Operators in Auckland by Mohamed Shenaan A thesis submitted to the Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of International Tourism Management 2017 School of Hospitality and Tourism Abstract The development of Social Media from its infancy towards the end of the 20th century, to its mass proliferation in recent years has been rapid. Its function as a communication, marketing and distribution tool has influenced the consumer decision making process, especially for intangible, information intensive service industries, such as tourism. As a result of the low start-up costs and its ease of use, Social Media has facilitated new marketing channels for smaller businesses. The aim of this explorative study is to gain an insight into the usage, perception and barriers of using Social Media as a tool by small marine tourism operators in Auckland, New Zealand; to offer recommendations to improve the use of the tool by these businesses; and to add to existing scholarly knowledge in the area. Semi-structured interviews were used to collect data from twelve marine operators based in Auckland. The exploration of this data was carried out by using a thematic analysis approach. Results indicated that the most popular and most frequently used Social Media channels were the social network Facebook, and the recommendation and review website TripAdvisor. Findings suggest that Social Media use by participants lacked clear goals and strategies, mainly due to barriers such as lack of resources, lack of time, lack of knowledge, and due to, in a minority of cases, prioritisation of lifestyle choice over business growth. The absence of clear goals, accentuated by an absence of monitoring, led to disillusionment, owing to the perceived lack of return on investment of using Social Media. Findings did indicate that participants felt Social Media did positively enhance the business brand, though again due to the lack of monitoring, there was no way to clearly measure how much of an actual influence Social Media had on positive brand image. A theoretical framework of barriers faced by the participants was developed. These barriers include a lack of control, operational issues, and a loss of trust in Social Media. With these barriers in mind, recommendations were suggested to improve the effective use of Social Media for the participants of this study and similar businesses. This included carrying out analysis of existing Social Media activities; the development of a clear strategy with measureable and qualitative goals; suggestions of cost free online tools for monitoring and analysis; and proposals for the most effective content to be uploaded. In conclusion, this study highlighted the difficulties of small businesses to keep up with the rapidly evolving nature of Social Media, the challenges of resource deficient operations of adequately utilising this hugely prevalent mass communication tool, and the need for ii such businesses to develop communications methods, which lead to personalised and rewarding relationships with consumers. Keywords: Social Media, small businesses, marine tourism, Auckland iii Contents Abstract ........................................................................................................................ ii List of figures ............................................................................................................. vii List of tables ............................................................................................................... vii Attestation of authorship ......................................................................................... viii Acknowledgements ..................................................................................................... ix INTRODUCTION ........................................................................................................... 1 1.1 Characteristics of the tourism industry .............................................................................................. 2 1.2 Marine tourism .................................................................................................................................. 3 1.3 Social Media – definition, background and as a marketing tool ........................................................ 4 1.4 Problem discussion ............................................................................................................................ 7 1.5 Research questions ............................................................................................................................ 8 1.6 Chapter overview............................................................................................................................... 9 LITERATURE REVIEW ............................................................................................. 11 2.1 Information and communication technology (ICT) ......................................................................... 12 2.1.1 ICT and tourism ....................................................................................................................... 12 2.2 Historical developments: Web 1.0 to Web 2.0 ................................................................................ 14 2.2.1 Web 1.0 .................................................................................................................................... 14 2.2.2 The interconnected web ........................................................................................................... 14 2.2.3 The mobile revolution.............................................................................................................. 16 2.3 Web 2.0 to Social Media ................................................................................................................. 19 2.3.1 Social media pervasiveness ..................................................................................................... 19 2.3.2 Social Media and the tourist: The consumer perspective......................................................... 22 2.3.3 Social Media and tourism: The business perspective .............................................................. 27 2.4 Social Media marketing strategies for businesses ........................................................................... 30 2.5 Small businesses .............................................................................................................................. 31 2.5.1 Defining small businesses ........................................................................................................ 33 2.5.2 Challenges for small businesses .............................................................................................. 33 2.5.3 Small businesses and Social Media ......................................................................................... 34 2.5.4 Value of Social Media for small businesses ............................................................................ 36 2.5.5 Barriers and challenges of Social Media for small businesses................................................. 37 2.5.6 Small businesses in tourism ..................................................................................................... 37 2.6 Marine tourism ................................................................................................................................ 38 2.6.1 The marine environment as a tourism product......................................................................... 38 2.6.2 Marine tourism position in New Zealand and Auckland ......................................................... 39 2.6.3 Categorisation of the marine tourism industry ......................................................................... 40 2.7 Conclusion ....................................................................................................................................... 43 METHODOLOGY ........................................................................................................ 44 3.1 Research paradigm .......................................................................................................................... 45 3.2 Case study ........................................................................................................................................ 48 3.3 Sample selection .............................................................................................................................. 49 iv 3.4 Research instrument ........................................................................................................................ 50 3.5 Data collection process .................................................................................................................... 51 3.5.1 Data sources ............................................................................................................................. 51 3.5.2 Primary data collection process ............................................................................................... 51 3.6 Data analysis .................................................................................................................................... 53 3.7 Trustworthiness of research ............................................................................................................. 55 3.8 Ethical considerations
Recommended publications
  • TREND ANALYSIS on TWITTER Tejal Rathod1, Prof
    TREND ANALYSIS ON TWITTER Tejal Rathod1, Prof. Mehul Barot2 1Research Scholar, Computer Department, LDRP-ITR, Gandhinagar Kadi Sarva Vishvavidhyalaya 2Assistant Prof. Computer Engineering Department, LDRP-ITR, Gandhinagar Abstract Twitter has standard syntax which listed follow: Twitter is most popular social media that . User Mentions: when a user mentions allows its user to spread and share another user in their tweet, @-sign is placed information. It Monitors their user postings before the corresponding username. Like @ and detect most discussed topic of the Username movement. They publish these topics on the . Retweets: Re-share of a tweet posted by list called “Trending Topics”. It show what is another user is called retweet. i.e., a retweet happening in the world and what people's means the user considers that the message in opinions are about it. For that it uses top 10 the tweet might be of interest to others. trending topic list. Twitter Use Method which When a user retweets, the new tweet copies provides efficient way to immediately and the original one in it. accurately categorize trending topics without . Replies: when a user wants to direct to need of external data. We can use different another user, or reply to an earlier tweet, Techniques as well as many algorithms for they place the @username mention at the trending topics meaning disambiguation and beginning of the tweet, e.g., @username I classify that topic in different category. totally agree with you. Among many methods there is no standard . Hashtags: Hashtags included in a tweet tend method which gave accuracy so comparative to group tweets in conversations or analysis is needed to understand which one is represent the main terms of the tweet, better and gave quality of the detected topic.
    [Show full text]
  • Social Media Events
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2018 Social Media Events Katerina Girginova University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Communication Commons Recommended Citation Girginova, Katerina, "Social Media Events" (2018). Publicly Accessible Penn Dissertations. 3446. https://repository.upenn.edu/edissertations/3446 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/3446 For more information, please contact [email protected]. Social Media Events Abstract Audiences are at the heart of every media event. They provide legitimation, revenue and content and yet, very few studies systematically engage with their roles from a communication perspective. This dissertation strives to fill precisely this gap in knowledge by asking how do social media audiences participate in global events? What factors motivate and shape their participation? What cultural differences emerge in content creation and how can we use the perspectives of global audiences to better understand media events and vice versa? To answer these questions, this dissertation takes a social-constructivist perspective and a multiple-method case study approach rooted in discourse analysis. It explores the ways in which global audiences are imagined and invited to participate in media events. Furthermore, it investigates how and why audiences actually make use of that invitation via an analytical framework I elaborate called architectures of participation (O’Reilly, 2004). This dissertation inverts the predominant top-down scholarly gaze upon media events – a genre of perpetual social importance – to present a much needed bottom-up intervention in media events literature. It also provides a more nuanced understanding of what it means to be a member of ‘the audience’ in a social media age, and further advances Dayan and Katz’ (1992) foundational media events theory.
    [Show full text]
  • THE ESSENTIAL SOCIAL MEDIA RESOURCE GUIDE Everything You Ever Wanted to Know About Pinterest, Linkedin, Google+, Twitter, and Facebook
    THE ESSENTIAL SOCIAL MEDIA RESOURCE GUIDE Everything you ever wanted to know about Pinterest, LinkedIn, Google+, Twitter, and Facebook. And then a whole lot more. Copyright © 2016 | Act-On Software www.Act-On.com Your Guide to a Successful Social Media Program If you’re like most people, you’ve spent a good amount of time reading blog posts, downloading eBooks and sharing information about social media so you can get a deeper understanding of it. There’s a lot of information out there – in fact, it may seem as though every time you start your computer, there’s yet more information that you need to digest and understand. The problem is that there’s no simple, easy-to-understand guide that provides a roadmap for setting up, launching, and managing an effective social media program. Oh, sure, there’s plenty of information, but information is useless unless it’s laid out in a clear, action- oriented format. That’s why we created this guide. You’ll get tips on getting started, an overview of advertising opportunities, how to track and measure your social campaigns, insider tips, and common mistakes to avoid. You’ll learn everything you need to know about the most popular social media 11k platforms and more. In the end, our goal is quite simple – we want to provide you with the + tools and techniques you need to run a successful social media program, SHARE actionable information that you can implement right away, and a straightforward, easy-to-use reference guide you can use as you run and manage your social campaigns.
    [Show full text]
  • An Unprecedented Global Communications Campaign for the Event Horizon Telescope First Black Hole Image
    An Unprecedented Global Communications Campaign Best for the Event Horizon Telescope First Black Hole Image Practice Lars Lindberg Christensen Colin Hunter Eduardo Ros European Southern Observatory Perimeter Institute for Theoretical Physics Max-Planck Institute für Radioastronomie [email protected] [email protected] [email protected] Mislav Baloković Katharina Königstein Oana Sandu Center for Astrophysics | Harvard & Radboud University European Southern Observatory Smithsonian [email protected] [email protected] [email protected] Sarah Leach Calum Turner Mei-Yin Chou European Southern Observatory European Southern Observatory Academia Sinica Institute of Astronomy and [email protected] [email protected] Astrophysics [email protected] Nicolás Lira Megan Watzke Joint ALMA Observatory Center for Astrophysics | Harvard & Suanna Crowley [email protected] Smithsonian HeadFort Consulting, LLC [email protected] [email protected] Mariya Lyubenova European Southern Observatory Karin Zacher Peter Edmonds [email protected] Institut de Radioastronomie de Millimétrique Center for Astrophysics | Harvard & [email protected] Smithsonian Satoki Matsushita [email protected] Academia Sinica Institute of Astronomy and Astrophysics Valeria Foncea [email protected] Joint ALMA Observatory [email protected] Harriet Parsons East Asian Observatory Masaaki Hiramatsu [email protected] Keywords National Astronomical Observatory of Japan Event Horizon Telescope, media relations, [email protected] black holes An unprecedented coordinated campaign for the promotion and dissemination of the first black hole image obtained by the Event Horizon Telescope (EHT) collaboration was prepared in a period spanning more than six months prior to the publication of this result on 10 April 2019.
    [Show full text]
  • The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right
    The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right Jacob Davey Julia Ebner About this paper About the authors This report maps the ecosystem of the burgeoning Jacob Davey is a Researcher and Project Coordinator at ‘new’ extreme right across Europe and the US, which is the Institute for Strategic Dialogue (ISD), overseeing the characterised by its international outlook, technological development and delivery of a range of online counter- sophistication, and overtures to groups outside of the extremism initiatives. His research interests include the traditional recruitment pool for the extreme-right. This role of communications technologies in intercommunal movement is marked by its opportunistic pragmatism, conflict, the use of internet culture in information seeing movements which hold seemingly contradictory operations, and the extreme-right globally. He has ideologies share a bed for the sake of achieving provided commentary on the extreme right in a range common goals. It examines points of connectivity of media sources including The Guardian, The New York and collaboration between disparate groups and Times and the BBC. assesses the interplay between different extreme-right movements, key influencers and subcultures both Julia Ebner is a Research Fellow at the Institute for online and offline. Strategic Dialogue (ISD) and author of The Rage: The Vicious Circle of Islamist and Far-Right Extremism. Her research focuses on extreme right-wing mobilisation strategies, cumulative extremism and European terrorism prevention initiatives. She advises policy makers and tech industry leaders, regularly writes for The Guardian and The Independent and provides commentary on broadcast media, including the BBC and CNN. © ISD, 2017 London Washington DC Beirut Toronto This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged.
    [Show full text]
  • Online Hate Network Spreads Malicious COVID-19 Content
    www.nature.com/scientificreports OPEN Online hate network spreads malicious COVID‑19 content outside the control of individual social media platforms N. Velásquez1,2, R. Leahy1,2, N. Johnson Restrepo1,2, Y. Lupu2,4, R. Sear5, N. Gabriel3, O. K. Jha3, B. Goldberg6 & N. F. Johnson1,2,3* We show that malicious COVID‑19 content, including racism, disinformation, and misinformation, exploits the multiverse of online hate to spread quickly beyond the control of any individual social media platform. We provide a frst mapping of the online hate network across six major social media platforms. We demonstrate how malicious content can travel across this network in ways that subvert platform moderation eforts. Machine learning topic analysis shows quantitatively how online hate communities are sharpening COVID‑19 as a weapon, with topics evolving rapidly and content becoming increasingly coherent. Based on mathematical modeling, we provide predictions of how changes to content moderation policies can slow the spread of malicious content. In addition to its health and economic efects, the COVID-19 pandemic is playing out across the world’s online platforms1–4. While limiting the spread of infection through social distancing, isolation has led to a surge in social media use and heightened individuals’ exposure to increasingly virulent online misinformation. Users share misinformation about prevention and treatment, making it difcult for individuals to tell science from fction. As individuals react emotionally in their online posts to the growing death toll and economic peril 5, online extremists are rebranding their conspiracy theories around current events to draw in new followers 6. Tis growth in hateful online activity may have contributed to recent attacks against vulnerable communities and government crisis responders7–9.
    [Show full text]
  • Green Tweets
    twitter_praise_page Page i Thursday, March 12, 2009 12:35 PM Praise for Twitter API: Up and Running “Twitter API: Up and Running is a friendly, accessible introduction to the Twitter API. Even beginning web developers can have a working Twitter project before they know it. Sit down with this book for a weekend and you’re on your way to Twitter API mastery.” — Alex Payne, Twitter API lead “This book rocks! I would have loved to have had this kind of support when I initially created TwitDir.” — Laurent Pantanacce, creator of TwitDir “Twitter API: Up and Running is a very comprehensive and useful resource—any developer will feel the urge to code a Twitter-related application right after finishing the book!” — The Lollicode team, creators of Twitscoop “A truly comprehensive resource for anyone who wants to get started with developing applications around the Twitter platform.” — David Troy, developer of Twittervision “An exceptionally detailed look at Twitter from the developer’s perspective, including useful and functional sample code!” — Damon Cortesi, creator of TweetStats, TweepSearch, and TweetSum “This book is more than just a great technical resource for the Twitter API. It also provides a ton of insight into the Twitter culture and the current landscape of apps. It’s perfect for anyone looking to start building web applications that integrate with Twitter.” — Matt Gillooly, lead developer of Twalala “A wonderful account of the rich ecosystem surrounding Twitter’s API. This book gives you the insight and techniques needed to craft your own tools for this rapidly expanding social network.” — Craig Hockenberry, developer of Twitterrific twitter_praise_page Page ii Thursday, March 12, 2009 12:35 PM Twitter API: Up and Running Twitter API: Up and Running Kevin Makice Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Twitter API: Up and Running by Kevin Makice Copyright © 2009 Kevin Makice.
    [Show full text]
  • Breaking Television News: Is Social Media Coverage You Can Count On?
    University of the Incarnate Word The Athenaeum Theses & Dissertations 5-2016 Breaking Television News: Is Social Media Coverage You Can Count On? Eileen Canosa Teves University of the Incarnate Word, [email protected] Follow this and additional works at: https://athenaeum.uiw.edu/uiw_etds Part of the Business Administration, Management, and Operations Commons, and the Journalism Studies Commons Recommended Citation Teves, Eileen Canosa, "Breaking Television News: Is Social Media Coverage You Can Count On?" (2016). Theses & Dissertations. 7. https://athenaeum.uiw.edu/uiw_etds/7 This Dissertation is brought to you for free and open access by The Athenaeum. It has been accepted for inclusion in Theses & Dissertations by an authorized administrator of The Athenaeum. For more information, please contact [email protected]. BREAKING TELEVISION NEWS: IS SOCIAL MEDIA COVERAGE YOU CAN COUNT ON? by EILEEN C. TEVES A DISSERTATION Presented to the Faculty of the University of the Incarnate Word in partial fulfillment of the requirements for the degree of DOCTOR OF BUSINESS ADMINISTRATION UNIVERSITY OF THE INCARNATE WORD May 2016 ii Copyright by Eileen C. Teves 2016 iii ACKNOWLEDGMENTS The Doctor of Business Administration program has been a very rewarding experience. I am honored to be a part of history at the University of the Incarnate Word H-E-B School of Business & Administration, as the first graduate in the inaugural DBA program. I am grateful for everyone who has helped me reach this point of my destination. I want to first thank the participants involved in this study. Their involvement enabled me to insert the last piece of the puzzle, and possibly help launch innovative solutions in improving our industry.
    [Show full text]
  • Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS
    Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS Executive Summary ....................................................... 1 What Techniques Do Media Manipulators Use? ....... 33 Understanding Media Manipulation ............................ 2 Participatory Culture ........................................... 33 Who is Manipulating the Media? ................................. 4 Networks ............................................................. 34 Internet Trolls ......................................................... 4 Memes ................................................................. 35 Gamergaters .......................................................... 7 Bots ...................................................................... 36 Hate Groups and Ideologues ............................... 9 Strategic Amplification and Framing ................. 38 The Alt-Right ................................................... 9 Why is the Media Vulnerable? .................................... 40 The Manosphere .......................................... 13 Lack of Trust in Media ......................................... 40 Conspiracy Theorists ........................................... 17 Decline of Local News ........................................ 41 Influencers............................................................ 20 The Attention Economy ...................................... 42 Hyper-Partisan News Outlets ............................. 21 What are the Outcomes? ..........................................
    [Show full text]
  • Listen Well on Twitter
    ★★★★★★★ ★★★★★★★ round 4: listen well on twitteR • • Launched: March 2006 • • The company’s logo, a little blue • • As of December 2012, there were bird, is officially named Larry, after more than 100 million users in the Larry Bird, the former player for the United States, 500 million world- Boston Celtics. wide. • • JetBlue was one of the first com- • • The Twitter concept evolved out of panies to start using Twitter for a brainstorming session that took marketing research and customer place at the top of a slide on a San s e r v i c e . Francisco playground. • • Users post 750 tweets per second. talk about Twitter with almost the same affection as I talk about my children. i It’s had that much of an impact on my life since I started using it to reach out to customers in 2007. As an extrovert who can get to know a room full of people in just a few hours, I felt at home in Twitter’s 140 -­word cocktail party environ­ ment. It was the platform that came most naturally to me, because it was per ­ fectly suited for small bursts of quick-­fire conversation and idea exchanges. If the only platform I’d had at my disposal in early 2006, when I first started trying to storytell about my family business, Wine Library, had demanded long-­form 83 Jab Jab Jab right Hook writing, like a magazine column or a written blog, the business would not be what it is today. Twitter’s restrictions played directly to my strengths.
    [Show full text]
  • Detection and Analysis of Twitter Trending Topics Via Link- Anomaly Detection
    Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12 RESEARCH ARTICLE OPEN ACCESS Detection and Analysis of Twitter Trending Topics via Link- Anomaly Detection Chandan M G*, Chandra Naik** *(PG Scholar, Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India) ** (Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India) ABSTRACT This paper involves two approaches for finding the trending topics in social networks that is key-based approach and link-based approach. In conventional key-based approach for topics detection have mainly focus on frequencies of (textual) words. We propose a link-based approach which focuses on posts reflected in the mentioning behavior of hundreds users. The anomaly detection in the twitter data set is carried out by retrieving the trend topics from the twitter in a sequential manner by using some API and corresponding user for training, then computed anomaly score is aggregated from different users. Further the aggregated anomaly score will be feed into change-point analysis or burst detection at the pinpoint, in order to detect the emerging topics. We have used the real time twitter account, so results are vary according to the tweet trends made. The experiment shows that proposed link-based approach performs even better than the keyword-based approach. Keywords - anomaly-detection, social network, change-point analysis, burst detection. I. INTRODUCTION – Credit card fraud A. Introduction to Social network and Twitter: Cyber intrusion is the unauthorized act of spying, Nowadays Social network has become one of the snooping, and stealing information through cyber most important aspects in our daily life.
    [Show full text]
  • Kompendium „Corporate Twitter“ Sechs Beiträge Zum Einsatz Von Twitter in Der Unternehmenskommunikation Von Jörg Hoepfner
    Kompendium „Corporate Twitter“ Sechs Beiträge zum Einsatz von Twitter in der Unternehmenskommunikation Von Jörg Hoepfner ÜBERSICHT ÜBER DIE EINZELNEN BEITRÄGE: ► Beitrag 1: Charakteristika von Twitter und Third-Party-Applikationen Beitrag 2: Die Nutzerschaft von Twitter sowie twitternde Organisationen und Einzelpersonen Beitrag 3: Generelle Nutzung von Twitter durch Unternehmen sowie Ziele und Strategien von Corporate Twitter Beitrag 4: Chancen und Risiken von Corporate Twitter sowie Details der Nutzung von Twitter durch Unternehmen Beitrag 5: Vier Beispiele für Chancen und Risiken von Corporate Twitter Beitrag 6: Resümee, Ausblick und weiterführende Literatur, Informationen und Tipps BEITRAG 1: Charakteristika von Twitter und Third-Party-Applikationen Einleitung Im August 2006 ging der Microblogging-Dienst Twitter online, seit Ende des Jahres 2008 ist Twitter auch in Deutschland in aller Munde. „Twittern“ ist in: Immer mehr Deutsche melden Profile (sogenannte „Accounts“) bei Twitter an, und die unterschiedlichsten Massenmedien berichten ausführlich über diese Medieninnovation. Ein wahrer „Hype“ lässt sich erkennen, der teilweise Parallelen zu dem Medien-Hype rund um das Metaversum „Second Life“ im Jahr 2007 erkennen lässt. Genau wie viele Bürger mit einer Anmeldung bei Twitter liebäugeln, wird auch in vielen Unternehmen diskutiert, inwiefern ein Einsatz von Twitter im Rahmen der Unternehmenskommunikation Sinn machen kann. Manche Unternehmen nutzen Twitter schon und haben unterschiedlichste Erfahrungen gemacht. Wiederum andere hatten
    [Show full text]