Changing Strategies in Marketing Kenya's Tourist Art: From Ethnic Brands to Fair Trade Labels

2012 ◽  
Vol 55 (1) ◽  
pp. 161-190 ◽  
Author(s):  
Dillon Mahoney

Abstract:This article explores recent changes in Kenya's curio or handicrafts industry. In addition to a crisis in access to raw materials and a diversifying tourist market, the rise in the use of cell phones and the Internet during the early 2000s present unique challenges. Nonetheless, innovative Kenyan entrepreneurs are using these challenges to market and brand products in new ways—by representing modern global interconnectedness as “fair trade” or creatively promoting the authenticity of their products in other ways. Kenya's artisans and traders have also adapted to diverse and complex tastes beyond the desire for an invented tradition of ethnic and “tribal” art.

Author(s):  
Ya-Wen Lei

This introductory chapter reveals that a nationwide contentious public sphere has emerged in China. It is an unruly sphere capable of generating issues and agendas not set by the Chinese state, as opposed to a sphere mostly orchestrated and constrained by said state. Over time, China's contentious public sphere has been increasingly recognized by the Chinese state as a force to be reckoned and negotiated with. Starting around 2010, official media of the Chinese Communist Party (CCP), such as the People's Daily, began to warn of a threatening public sphere mediated by cell phones, the Internet, and even some unruly voices within state-controlled media. The state's awareness of these developments, however, means that one must not overstate the stability or permanence of the newly emerged contentious public sphere. Indeed, this provocative public arena has encountered serious opposition and setbacks, particularly since 2013. Seeing the rise of such a sphere as a threat to national security and an indication of ideological struggle between the West and China, the Chinese state has taken comprehensive and combative measures to contain it.


2012 ◽  
pp. 911-917 ◽  
Author(s):  
Adam M. Bossler ◽  
Thomas J. Holt

The development of computers, cell phones, and the Internet allows individuals to connect with one another with ease in a variety of ways in near real time. The beneficial impact of these resources, however, has been adulterated by some to engage in abusive communications while online. Specifically, individuals now use email, text messaging, and social networking sites to spread hurtful or malicious information about others. This entry summarizes the problem of online abuse via cyberbullying, online harassment, and stalking by discussing the prevalence of these phenomena as well as the prospective predictors of victimization.


Author(s):  
Jerry Pournelle

There are two basic categories of Internet lies: frauds, where the object is to get your money, and hoaxes, where the primary object is just to pull your chain, but there can be far-reaching consequences as well. Hoaxes give the perpetrators ego gratification as they watch their creation spread throughout the Internet. Frauds may give the perpetrators your life savings, and give you months—maybe years—of hassle as you try to repair your credit record and retrieve your very identity. Hoaxes—Hoaxes are spread by e-mail and come in an endless variety of guises. There are, for example, fake virus warnings, chain letters promising riches if you follow their instructions (or threatening dire consequences if you don’t); urban myths about women in peril, dogs in microwaves, and hypodermic needles on theater seats; letters that tug at your heart strings or appeal to your greedy side; Internet petitions (often based on false information); and letters claiming that Bill Gates wants to give you money. Yeah, right. Even the most “innocent” hoaxes are harmful. At the very least, they take up your time, and they try to get you to forward them to other people as well. If you forward a letter to just 40 people, and each of them does the same, and so on, then after just four steps, more than two and a half million copies will have been sent out. That’s a lot of wasted time and wasted bandwidth. These letters can also contain dangerous misinformation and bad advice. One example is a common letter advising women not to stop when pulled over by the highway patrol, but instead to dial #77 on their cell phones to talk to the police—a wrong number in 48 of the 50 states! Perhaps the most common example is the virus hoax—typically a letter forwarded by someone you know warning you that if you find a certain file on your computer it means you are infected with a virus.


1995 ◽  
Vol 4 (2) ◽  
pp. 193-202
Author(s):  
Peter Jeffery

Anyone who pays attention to the popular news media will have read or heard a lot lately about the rapidly expanding international network of computer networks known as the Internet. Though the Internet was originally developed by the universities to support international research cooperation and the exchange of scholarly information, the hardware and software have become so cheap and easily available that many commercial firms, non-educational organizations and individuals are now connected to the Internet also. The most explosive growth has been in the multimedia portion of the Internet, known as the World Wide Web, which is able to transmit computerized image, video and sound files as well as text. The lack of any central authority that can regulate or moderate the content of Internet communications has forced governments and citizens to become increasingly embroiled in issues of free speech, fair trade and community responsibility – yet despite the empty chatter, political grandstanding, sales hype and pornography, the Internet remains an unparalleled and unprecedented medium of valuable information, much of which would otherwise be unavailable to many, or available only with extensive travel, inconvenience or expense. The quantity of such information increases daily, and it includes much that is helpful to serious students of medieval music and chant.


2021 ◽  
Vol 16 (1) ◽  
pp. 17-28
Author(s):  
Roman Kisiel ◽  
Greta Woźnialis

The internet has revolutionised the world over the past half of a century, and the COVID-19 pandemic has contributed to an increase in its importance. Although the global network brings with it more advantages than disadvantages, its existence also causes certain threats which have an impact on the life of Polish households and operations of Polish enterprises. This paper is theoretical and empirical in nature. Its aim is to explore the relationship between the internet and the COVID-19 pandemic, i.e. the time household members spend online. The impact of the two factors on survival in the market was examined in the case of enterprises. Moreover, the subjectively most important benefits and threats arising from the global network consumption in the opinion of the business entities mentioned above were illustrated. According to the respondents, facilitating communication is the main advantage of the internet (33.33%), whereas the spreading of hate on the internet is the major threat associated with its use (24.17%). The main benefit derived from the global network resources by enterprises is the possibility of obtaining raw materials from the most profitable sources (28.40%), whereas the major threat identified by them is that a negative opinion published on the internet can weaken the financial standing of a company or even make it disappear from the market (55.56%). Nearly 60% of household members found themselves spending more time online during the COVID-19 pandemic. Nearly 94% of the entrepreneurs who use the internet in running their businesses admitted that it helped them to keep their business in the market during the pandemic.


Kosmik Hukum ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 121
Author(s):  
Reza Hikmatulloh ◽  
Evy Nurmiati

Cybercrime can be defined as illegal activities with computer intermediaries that can be carried out through global electronic networks. In computer networks such as the internet, the problem of crime is becoming increasingly complex due to its wide scope. The purpose of this study is to see what strategies are suitable for preventing cybercrime actions via cell phones based on the ITE Law in Indonesia. The data analysis method used in this study is to use routine activity theory. Cohen and Felson's incidence that crime against crime is related to three variables, namely someone who is motivated, the target who is the target, and the absence of protection from the target (absence of a capable guard). The suggestion is that Gojek provides education about awareness in this fraud case. Gojek appeals to users on their social media to be more careful in trusting information. In addition, the government should not only give warnings to its users as a form of vigilance, but the government should be more optimal in giving more effort.Keywords: Cybercrime, ITE Law, Routine Activity Theory


Author(s):  
Arlene J. Nicholas ◽  
John K. Lewis

The traditional college student of today is part of the Net Generation who has been raised in an era of instant access. Their communication and learning is complemented by the Internet, a major influence on this cohort. The regular method of contact is text messaging, instant messaging and cell phones. Learning methods for the Net Generation include Internet tools such as Web-CT, Blackboard, online courses, online journals and i-pod downloads. Are they ready to also change from print textbooks to Internet based textbooks? This paper describes the attitudes of some Net Generation students towards the usage of electronic textbooks. Three case studies were conducted: one class used an online textbook and two other classes used e-chapter supplements. Students were questioned on their perceptions of using and learning with e-textbooks. Their views describe some changing thoughts towards network connected media that is the mantra of this generation.


2021 ◽  
Vol 15 (57) ◽  
pp. 577-588
Author(s):  
Daniel Bezerra da Silva ◽  
Joana Dar’c Moreira Pimenta ◽  
Maria Zilvanir Pinheiro ◽  
Raimundo Edilberto Moreira Lopes

Resumo – Este artigo tem como objetivo refletir sobre o poder das redes sociais na venda de produtos educacionais, sabendo que o universo tecnológico se faz a cada dia mais presente na sociedade. Assim, aumentando o vínculo de empresa e cliente. Inicialmente foram realizadas pesquisas e análises em diversas fontes de literatura sobre marketing digital e redes sociais. Tais ações foram necessárias para um aprofundamento teórico sobre a temática. Após as análises literárias, foram elaborados questionários e aplicados em forma de entrevista, coletando assim, informações através do público alvo. A entrevista foi aplicada através de links do Google formulários onde realizou-se uma análise da utilização do uso das tecnologias e quais suas estratégias utilizadas no marketing para vender de forma rápida e satisfatória para seus clientes. Foram entrevistadas quatro empresas bem conceituadas na área educacional, todas elas utilizam a internet como fonte de venda assim promovendo as mesmas e suas mercadorias. Ainda existem dificuldades no marketing digital, muitos ainda não o utilizam de forma correta e positiva pois é algo inovador que precisa sempre está de acordo com a necessidade do cliente, construindo uma relação fortalecida buscando o maior número de atrações fazendo com que as conheça e se relacione bem alavancando os negócios. Hoje o marketing digital é uma das maiores modalidades do comercio devido ao grande número de usuários da internet. Afinal, o mesmo é feito não só por computadores e celulares mais por um conjunto de pessoas e ações que buscam a melhoria e a qualidade de serviços para seus negócios. Palavras-Chave: Tecnologias. Vendas. Consumidores. Abstract:This article aims to reflect on the power of social networks in the sale of educational products, knowing that the technological universe is increasingly present in society. Thus, increasing the bond between company and customer. Initially, research and analysis were carried out in various sources of literature on digital marketing and social media. Such actions were necessary for a theoretical deepening on the subject. After the literary analyses, questionnaires were developed and applied in the form of an interview, thus collecting information from the target audience. The interview was applied through links from Google forms where an analysis of the use of the use of technologies was carried out and what are their strategies used in marketing to sell quickly and satisfactorily to their customers. Four reputable companies in the educational area were interviewed, all of which use the internet as a source of sales, thus promoting themselves and their goods. There are still difficulties in digital marketing, many still do not use it correctly and positively because it is something innovative that always needs to be in line with the customer's needs, building a strengthened relationship seeking the greatest number of attractions, making them know them and get to know them. relate well leveraging the business. Today, digital marketing is one of the biggest forms of commerce due to the large number of internet users. After all, the same is done not only for computers and cell phones, but also for a group of people and actions that seek to improve the quality of services for their businesses.Keywords: Technologies. Sales. Consumers.


2005 ◽  
Vol 104 (683) ◽  
pp. 251-256 ◽  
Author(s):  
Peter Hays Gries

It would be a mistake to attribute to the Communist Party complete control over Chinese nationalism today. With the emergence of the Internet, cell phones, and text messaging, popular nationalists in China are increasingly able to act independently of the state.


Sign in / Sign up

Export Citation Format

Share Document