نتایج جستجو برای: knowing trustful marketing information sources
تعداد نتایج: 1438194 فیلتر نتایج به سال:
Bayesian methods have become widespread in marketing literature. We review the essence of the Bayesian approach and explain why it is particularly useful for marketing problems. While the appeal of the Bayesian approach has long been noted by researchers, recent developments in computational methods and expanded availability of detailed marketplace data has fueled the growth in application of B...
On a cold day between Christmas and New Year 1961, in search of a place to study, I met Heinz in his office at the Biological Computer Laboratory. I knew of him through a network of designers who, like me, were interested in issues that conventional curricula did not address. Heinz greeted me, a total stranger, with the enthusiasm usually reserved for an old friend. To my surprise, he knew of t...
This article describes challenges faced by agricultural production and marketing in the era of big data, and then builds the agricultural market information matching platform based on HADOOP & NUTCH combining cloud computing technology, finally details its layers and key technologies, including the use of open source search engine to capture the whole network market information to build agricul...
Despite the vital role of information in relational-oriented firms, there are limited studies on the impact of information quality on relationship marketing. To address this gap, this study develops a conceptual model to examine the impact of information quality on the successful implementation of relationship marketing by assessing the mediating role of salespeople's relational competency. The...
Social networks have become an important marketing tools for business to build brand pages to prompt their new products. If this medium is explored intelligently then the social network medium has a potential to provide many new ways to market the audience with the help of registered users indirectly, without knowing them. Social Network (Face book) has provided many tools for marketing purpose...
One of an operating system's duties is to provide a trustful security architecture to protect user information from threats coming from all aspects the information world. Trojan horses, viruses, and other threats are all aimed at users' personal information. Therefore, the concept of access control has been introduced to system security area years ago. Typically, it guaranties that only process...
The chapter investigates different sources of trust as factors affecting consumers’ willingness to provide companies with personal information and the permission to use it in mobile marketing. The chapter develops a conceptual model, which is tested with data from a survey of 200 young Finnish consumers. The data were analyzed by means of structural equation modeling (LISREL8.7). The main sourc...
this study was conducted based on primary data collected using a questionnaire. a total of 90 respondents among farmers associations were interviewed in kano state of nigeria. therefore, double stage stratified and purposive simple random sampling technique was used to select 30 respondents in each of three (3) farmers associations, one from each of the three (3) agricultural zones of the state...
It is becoming increasingly apparent that current technology will not provide the necessary infrastructure for electronic commerce and internet marketing to realise its full potential. As the World Wide Web increases in size and complexity, systems that can seek, locate and manage complex unstructured information will be required. In addition systems will need to be able to communicate, collabo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید