Effects of Persuasive Claims on Desirability and Impulse Purchase Behavior Research-In-Progress Michelle Y.T
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
White Collar Criminality: a Prediction Model Judith M
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1991 White collar criminality: a prediction model Judith M. Collins Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Industrial and Organizational Psychology Commons, Personality and Social Contexts Commons, Social Psychology Commons, and the Social Psychology and Interaction Commons Recommended Citation Collins, Judith M., "White collar criminality: a prediction model " (1991). Retrospective Theses and Dissertations. 9607. https://lib.dr.iastate.edu/rtd/9607 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. -
The Political Construction of Collective Insecurity: from Moral Panic To
Center for European Studies Working Paper Series 126 (October 2005) The Political Construction of Collective Insecurity: From Moral Panic to Blame Avoidance and Organized Irresponsibility by Daniel Béland Department of Sociology University of Calgary 2500 University Drive NW Calgary, Alberta, Canada T2N 1N4 Fax: (403) 282-9298 E-mail: [email protected]; web page: http://www.danielbeland.org/ Abstract This theoretical contribution explores the role of political actors in the social construction of collective insecurity. Two parts comprise the article. The first one briefly defines the concept of collective insecurity and the second one bridges existing sociological and political science literatures relevant for the analysis of the politics of insecurity. This theoretical framework articulates five main claims. First, although interesting, the concept of moral panic applies only to a limited range of insecurity episodes. Second, citizens of contemporary societies exhibit acute risk awareness and, when new collective threats emerge, the logic of “organized irresponsibility” often leads citizens and interest groups alike to blame elected officials. Third, political actors mobilize credit claiming and blame avoidance strategies to respond to these threats in a way that enhances their position within the political field. Fourth, powerful interests and institutional forces as well as the “threat infrastructure” specific to a policy area create constraints and opportunities for these strategic actors. Finally, their behavior is proactive or reactive, as political actors can either help push a threat onto the agenda early, or, at a later stage, simply attempt to shape the perception of this threat after other forces have transformed it into a major political issue. -
Social Engineering
Social Engineering Blurring reality and fake: A guide for the insurance professional www.cybcube.com Deception and disguise are criminal the radar of insurance professionals, as they methods that are as old as time. become more widely used. Numerous examples - from Ulysses Cyber insurance products do - and will and his Trojan Horse in Greek continue to - cover claims from social Mythology, to Fagan, the pickpocket, engineering attacks. This paper is designed in Charles Dicken’s Oliver Twist - to educate insurers on developing strains reinforce the long history of criminals of social engineering, so they can engage achieving their goals by hoodwinking with their clients meaningfully on their targets into believing that an cybersecurity and risk management interaction is something that it is not. strategies against these new attacks. Today, that deception is largely being carried CyberCube invests heavily in cybersecurity out in the non-physical realm. Recent huge expertise - both human capital with deep strides made in technology take historic social engineering techniques to new levels experience in the cyber security domain and in terms of both scale and sophistication. also in data sources and security signals that might flag vulnerabilities and risk areas. In this paper, we will outline some of the forms of social engineering and explore This paper combines those resources, to some of the criminal motivations for carrying offer some pointers on what warning signs out these attacks. We will take a deeper enterprises should be alert to, and how dive into four developing areas of social insurers could address this growing trend engineering, which we believe should be on before it becomes a major claims event. -
Floor Debate March 17, 2016
Transcript Prepared By the Clerk of the Legislature Transcriber's Office Floor Debate March 17, 2016 [LB83 LB465 LB516 LB586 LB673 LB707 LB709 LB717 LB722A LB754 LB754A LB794 LB803 LB817 LB835 LB843 LB867A LB867 LB894 LB900 LB906 LB910 LB934 LB934A LB958 LB959 LB975 LB977 LB1009 LB1033 LB1056 LB1081 LB1082A LB1082 LB1093 LB1098A LB1105A LB1109 LR378CA LR492 LR493 LR494] PRESIDENT FOLEY PRESIDING PRESIDENT FOLEY: GOOD MORNING, LADIES AND GENTLEMEN. WELCOME TO THE GEORGE W. NORRIS LEGISLATIVE CHAMBER FOR THE FORTY-FOURTH DAY OF THE ONE HUNDRED FOURTH LEGISLATURE, SECOND SESSION. OUR CHAPLAIN FOR TODAY IS PASTOR MIKE WING OF THE GRACE COMMUNITY BIBLE CHURCH IN NORTH PLATTE, NEBRASKA, SENATOR GROENE'S DISTRICT. PLEASE RISE. PASTOR WING: (PRAYER OFFERED.) PRESIDENT FOLEY: THANK YOU, PASTOR WING. I CALL TO ORDER THE FORTY- FOURTH DAY OF THE ONE HUNDRED FOURTH LEGISLATURE, SECOND SESSION. SENATORS, PLEASE RECORD YOUR PRESENCE. ROLL CALL. MR. CLERK. PLEASE RECORD. CLERK: I HAVE A QUORUM PRESENT, MR. PRESIDENT. PRESIDENT FOLEY: THANK YOU, MR. CLERK. ARE THERE ANY CORRECTIONS TO THE JOURNAL? CLERK: I HAVE NO CORRECTIONS. PRESIDENT FOLEY: THANK YOU, MR. CLERK. ARE THERE ANY MESSAGES, REPORTS OR ANNOUNCEMENTS? CLERK: NEW RESOLUTION, SENATOR BURKE HARR OFFERS LR492, MR. PRESIDENT. THAT WILL BE LAID OVER. ATTORNEY GENERAL OPINION, SENATOR KOLTERMAN, TO BE INSERTED IN THE JOURNAL (RE LB975). THAT'S ALL THAT I HAVE. (LEGISLATIVE JOURNAL PAGES 1019-1037.) [LR492 LB975] 1 Transcript Prepared By the Clerk of the Legislature Transcriber's Office Floor Debate March 17, 2016 PRESIDENT FOLEY: THANK YOU, MR. CLERK. (VISITORS INTRODUCED.) MR. CLERK, WE'LL NOW PROCEED TO THE FIRST ITEM ON THE AGENDA, LEGISLATIVE CONFIRMATION REPORTS. -
Social Media's Use of Psychology of Persuasion 1
1 Running head: SOCIAL MEDIA’S USE OF PSYCHOLOGY OF PERSUASION How social media uses the psychology of persuasion to influence the purchase of beauty products to the young generations By Kiersten Denton A thesis submitted to the University Honors Program at Southern New Hampshire University to complete HON 401, and as part of the requirements for graduation from the University Honors Program Manchester, New Hampshire May 2019 ___________May, 2019__________ *Your year and month of graduation 2 Running head: SOCIAL MEDIA’S USE OF PSYCHOLOGY OF PERSUASION Abstract As someone who currently works in the beauty industry and follows the industry intensely. I noticed how much impact persuasive methods have on the young generation of consumers through social media and digital marketing. This was illustrated through the various sources on social media such as influencers, bloggers, celebrities, social media outlets and much more. This thesis sought to determine if these persuasive techniques that brands use to market their products to younger generations are increasing the amount of purchases these consumers make or influence their decisions to purchase beauty products. A survey was conducted through Qualtrics and distributed to the target market, comprised of the Millennial Generation and Generation Z between the ages of 18-40 years old to determine how much of an impact these persuasive methods conducted by the beauty industry has on them overall; as well as to gather demographic information. Results showed that although these methods have a strong impact on the purchasing decisions of young consumers on beauty products many still rely on word of mouth recommendations from trusted friends and family members. -
Social Engineering
Social Engineering Blurring reality and fake: A guide for the insurance professional www.cybcube.com Deception and disguise are criminal the radar of insurance professionals, as they methods that are as old as time. become more widely used. Numerous examples - from Ulysses Cyber insurance products do - and will and his Trojan Horse in Greek continue to - cover claims from social Mythology, to Fagan, the pickpocket, engineering attacks. This paper is designed in Charles Dicken’s Oliver Twist - to educate insurers on developing strains reinforce the long history of criminals of social engineering, so they can engage achieving their goals by hoodwinking with their clients meaningfully on their targets into believing that an cybersecurity and risk management interaction is something that it is not. strategies against these new attacks. Today, that deception is largely being carried CyberCube invests heavily in cybersecurity out in the non-physical realm. Recent huge expertise - both human capital with deep strides made in technology take historic social engineering techniques to new levels experience in the cyber security domain and in terms of both scale and sophistication. also in data sources and security signals that might flag vulnerabilities and risk areas. In this paper, we will outline some of the forms of social engineering and explore This paper combines those resources, to some of the criminal motivations for carrying offer some pointers on what warning signs out these attacks. We will take a deeper enterprises should be alert to, and how dive into four developing areas of social insurers could address this growing trend engineering, which we believe should be on before it becomes a major claims event. -
Download Download
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) Uncovering Coordinated Networks on Social Media: Methods and Case Studies Diogo Pacheco,∗1,2 Pik-Mai Hui,∗1 Christopher Torres-Lugo,∗1 Bao Tran Truong,1 Alessandro Flammini,1 Filippo Menczer1 1Observatory on Social Media, Indiana University Bloomington, USA 2Department of Computer Science, University of Exeter, UK [email protected],fhuip,torresch,baotruon,aflammin,fi[email protected] Abstract develop software to impersonate users and hide the iden- tity of those who control these social bots — whether they Coordinated campaigns are used to influence and manipulate are fraudsters pushing spam, political operatives amplifying social media platforms and their users, a critical challenge to misleading narratives, or nation-states waging online war- the free exchange of information online. Here we introduce a general, unsupervised network-based methodology to un- fare (Ferrara et al. 2016). Cognitive and social biases make cover groups of accounts that are likely coordinated. The pro- us even more vulnerable to manipulation by social bots: posed method constructs coordination networks based on ar- limited attention facilitates the spread of unchecked claims, bitrary behavioral traces shared among accounts. We present confirmation bias makes us disregard facts, group-think five case studies of influence campaigns, four of which in the and echo chambers distort perceptions of norms, and the diverse contexts of U.S. elections, Hong Kong protests, the bandwagon effect makes us pay attention to bot-amplified Syrian civil war, and cryptocurrency manipulation. In each memes (Weng et al. 2012; Hills 2019; Ciampaglia et al. -
1 the Effects of Naming and Shaming on Public Support for Compliance
The Effects of Naming and Shaming on Public Support for Compliance with International Agreements: An Experimental Analysis of the Paris Agreement1 Research Note Dustin Tingley, Harvard University Michael Tomz, Stanford University June, 2021 Forthcoming, International Organization How does naming and shaming affect public support for compliance with international agreements? We investigated this question by conducting survey experiments about the Paris Agreement, which relies on social pressure for enforcement. Our experiments, administered to national samples in the United States, produced three sets of findings. First, shaming by foreign countries shifted domestic public opinion in favor of compliance, increasing the political incentive to honor the Paris Agreement. Second, the effects of shaming varied with the behavior of the target. Shaming was more effective against partial compliers than against targets that took no action or honored their obligations completely. Moreover, even partial compliers managed to reduce the effects of shaming through the strategic use of counter-rhetoric. Third, identity moderated responses to shaming. Shaming by allies was not significantly more effective than shaming by non-allies, but Democrats were more receptive to shaming than Republicans. Overall, our experiments expose both the power and the limits of shaming as a strategy for enforcing the Paris Agreement. At the same time, they advance our understanding of the most significant environmental problem facing the planet. 1 For feedback on earlier -
Bullying and the Peer Group: a Review
Aggression and Violent Behavior 15 (2010) 112–120 Contents lists available at ScienceDirect Aggression and Violent Behavior Bullying and the peer group: A review Christina Salmivalli ⁎ University of Turku, Finland University of Stavanger, Norway article info abstract Article history: It is often stated that bullying is a “group process”, and many researchers and policymakers share the belief Received 15 June 2009 that interventions against bullying should be targeted at the peer-group level rather than at individual Received in revised form 26 August 2009 bullies and victims. There is less insight into what in the group level should be changed and how, as the Accepted 28 August 2009 group processes taking place at the level of the peer clusters or school classes have not been much Available online 6 September 2009 elaborated. This paper reviews the literature on the group involvement in bullying, thus providing insight into the individuals' motives for participation in bullying, the persistence of bullying, and the adjustment of Keywords: fl Bullying victims across different peer contexts. Interventions targeting the peer group are brie y discussed and future Victimization directions for research on peer processes in bullying are suggested. Participant roles © 2009 Elsevier Ltd. All rights reserved. Peer group Classroom context Contents 1. What does the bully want? ....................................................... 113 2. Peer involvement during bullying incidents: participant roles ....................................... 114 3. Why -
Social Media and Credibility Indicator: the Effects of Bandwagon and Identity Cues Within Online Health and Risk Contexts
University of Kentucky UKnowledge Theses and Dissertations--Communication Communication 2016 Social Media And Credibility Indicator: The Effects Of Bandwagon And Identity Cues Within Online Health And Risk Contexts Xialing Lin University of Kentucky, [email protected] Digital Object Identifier: http://dx.doi.org/10.13023/ETD.2016.059 Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Lin, Xialing, "Social Media And Credibility Indicator: The Effects Of Bandwagon And Identity Cues Within Online Health And Risk Contexts" (2016). Theses and Dissertations--Communication. 46. https://uknowledge.uky.edu/comm_etds/46 This Doctoral Dissertation is brought to you for free and open access by the Communication at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--Communication by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my thesis or dissertation and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained needed written permission statement(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine) which will be submitted to UKnowledge as Additional File. I hereby grant to The University of Kentucky and its agents the irrevocable, non-exclusive, and royalty-free license to archive and make accessible my work in whole or in part in all forms of media, now or hereafter known. -
Chicago Unbound Philippic.Com
University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2002 Philippic.com Cass R. Sunstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Cass R. Sunstein, "Philippic.com ," 90 California Law Review 611 (2002). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. Review Essay Philippic.corn REPUBLIC.COM By Cass Sunstein Princeton, New Jersey: Princeton University Press, 2001. Pp. 224. $19.95 cloth. Reviewed by Dan Hunterf A recent trend in so-called "second generation" legal commentary about the Internet suggests that, though it is an unparalleledcommunica- tion medium and a means of engaging in global e-commerce, it is not an unmitigatedforce for good. Instead,the Net poses afundamental danger to democracy. This trend takes shape in works by well-known cyberlaw theo- rists like Lawrence Lessig, Andrew Shapiro, and Neil Weinstock Netanel, but the most recent and most troubling criticism lies in Professor Cass Sunstein 's Republic.com. In this book, Professor Sunstein argues that perfectfiltering of infor- mation on the Internet will lead to a fractured communications environ- ment. He suggests that this fracturing will lead to group polarization, cascades of false information, and a concomitant rise in extremism. Governmental regulation of the Internet to reduce these features is there- fore warranted,and desirable.He suggests that the appropriateregulatory responses should include setting up or supportingpublic environmentsfor deliberation and debate on the Net, along with a series of disclosure and "must-carry" rules. -
An Analysis of the Effects Between Prison Documentaries and Popularity Among Viewers
University of Tennessee at Chattanooga UTC Scholar Student Research, Creative Works, and Honors Theses Publications 12-2019 An analysis of the effects between prison documentaries and popularity among viewers Dominique Malone University of Tennessee at Chattanooga, [email protected] Follow this and additional works at: https://scholar.utc.edu/honors-theses Part of the Criminology and Criminal Justice Commons Recommended Citation Malone, Dominique, "An analysis of the effects between prison documentaries and popularity among viewers" (2019). Honors Theses. This Theses is brought to you for free and open access by the Student Research, Creative Works, and Publications at UTC Scholar. It has been accepted for inclusion in Honors Theses by an authorized administrator of UTC Scholar. For more information, please contact [email protected]. An Analysis of the Effects Between Prison Documentaries and Popularity Among Viewers Dominique Malone Departmental Honors Thesis The University of Tennessee at Chattanooga Social, Justice, and Cultural Studies Examination Date: November 5, 2019 Dr. Courtney Crittenden Assistant Professor Social, Cultural, and Justice Studies Thesis Director Dr. Karen McGuffee Associate Department Head; Professor Social, Cultural, and Justice Studies Department Examiner Mr. Andy Browne Academic Advisor; Associate Professor Social, Cultural, and Justice Studies Department Examiner Table of Contents Abstract…………………………………………………………………………………………...3 Introduction……………………………………………………………………………………...4 Literature Review………………………………………………………………………………..5 Methods………………………………………………………………………………………….16 Analysis/Findings………………………………………………………………………….........17 Conclusion……………………………………………………………………………………....23 References………………………………………………………………………………….........26 Abstract This research examines the themes between a variety of prison documentaries and the subsequent viewership. In recent years, documentaries depicting prison life have risen in popularity due to a number of factors such as violence, drama, hysteria, and an overall sense of fascination (Cecil, 2009).