نتایج جستجو برای: permission based advertising
تعداد نتایج: 2966743 فیلتر نتایج به سال:
The aim of this research is to help advance a better understanding of digital advertising innovation adoption, consumer acceptance of customized advertising, and the influence of customized advertising on product purchase intent via a mobile social network. To this end, two types of questionnaires, including an open questionnaire filled up by 16 experts and university professors was designed to...
This semiotic analysis of early Nike women's advertising explores the evolution of the women's brand from its launch in 1990 through 2000, and includes twenty-seven print campaigns. The semiotic analysis is enhanced by in-depth interviews of the creative team. The study is framed by a single research question. What symbolically ties these ten years of advertising into a cohesive whole and how? ...
Some format issues inherent in the e-media version may also appear in this print version. Responsibility for the accuracy of all statement in each paper rests solely with the author(s). Statements are not necessarily representative of, nor endorsed by, The Society for Modeling and Simulation International. Permission is granted to photocopy portions of this publication for personal use and for ...
1 Copyright (c) 2003 IEEE. Reprinted from the Proceedings of the 7 European Conference on Software Maintenance and Reengineering, Benevento, Italy, March 26-28, 2003. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Tata Consultancy Services's products or services. Internal or personal use of this material...
Studies report that users avoid looking at areas they consider to display advertising. The objective of the present study was to systematically investigate the influences of task demand, and web information type on recognition of verbal emotional advertising when people focus on a primary task. Our findings contribute important insights into preattentive procssing research. First, the empirical...
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید