You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A new approach to teaching consumer behaviour, incorporating the latest issues in behavioural, psychological and sociological learning alongside new areas of research. Practitioner commentaries including Renault and Thinkbox, and extended case studies featuring Pinterest and Havaianas, place this fascinating subject firmly in a real world context.
For lecturers: Comprehensive customizable PowerPoint slides; Learning activities (including, more detailed workshop-based activities, shorter lecture-based in-class exercises and suggestions for assessment approaches) An instructor's manual (containing guidance on how to use the case studies and Practitioner Insights in class, indicative answers, and some additional questions)
This book demonstrates that marketing scholarship has much to contribute to our understanding of consumer vulnerability and potential solutions. It brings to the fore ways in which so‐called vulnerable consumers navigate various marketplace and service interactions and develop specific consumer skills in order to empower themselves in such exchanges. It does so by exploring how consumer vulnerability is experienced across a range of different contexts such as poverty and disability, and the potential impact of vulnerability from childhood to old age. Other chapters extend focus from the consumer to the organisational perspective or consider more macro issues such as socio-spatial disadvantages. The fundamental aim of many of the contributors is to produce work that can benefit individual and societal well-being. They draw on various methodological approaches that generate both marketing management and policy-focused implications. A series of commentaries are also included to stimulate critical reflection and new insights into consumer vulnerability. This book was originally published as a special issue of the Journal of Marketing Management.
With globalisation taking centre stage in the business world and multiculturalism affecting markets and societies, there is a need to understand the ways that customers respond to the changing marketplace from international and multicultural perspectives. This book is timely in addressing important themes raised in the most recent marketing literature, such as: global consumer culture, and the impact of Western culture on consumer behaviour in other countries; consumer acculturation processes, and the impact on identity conflicts and the strategies people use to manage them; globalisation vs. localised strategies, and the interaction of local and global influences on customer behaviour; clim...
Directory of foreign diplomatic officers in Washington.
With globalisation taking centre stage in the business world and multiculturalism affecting markets and societies, there is a need to understand the ways that customers respond to the changing marketplace from international and multicultural perspectives. This book is timely in addressing important themes raised in the most recent marketing literature, such as: global consumer culture, and the impact of Western culture on consumer behaviour in other countries; consumer acculturation processes, and the impact on identity conflicts and the strategies people use to manage them; globalisation vs. localised strategies, and the interaction of local and global influences on customer behaviour; clim...
Death has never been more visible to consumers. From life insurance to burial plots to estate planning, we are constantly reminded of consumer choices to be made with our mortality in mind. Religious beliefs in the afterlife (or their absence) impact everyday consumption activities. Death in a Consumer Culture presents the broadest array of research on the topic of death and consumer behaviour across disciplinary boundaries. Organised into five sections covering: The Death Industry; Death Rituals; Death and Consumption; Death and the Body; and Alternate Endings, the book explores topics from celebrity death tourism, pet and online memorialization; family history research, to alternatives to ...
Polynomial Identities and Combinatorial Methods presents a wide range of perspectives on topics ranging from ring theory and combinatorics to invariant theory and associative algebras. It covers recent breakthroughs and strategies impacting research on polynomial identities and identifies new concepts in algebraic combinatorics, invariant and representation theory, and Lie algebras and superalgebras for novel studies in the field. It presents intensive discussions on various methods and techniques relating the theory of polynomial identities to other branches of algebraic study and includes discussions on Hopf algebras and quantum polynomials, free algebras and Scheier varieties.
In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and coding theory. Both cryptography and codes have crucial applications in our daily lives, and they are described here, while the complexity problems that arise in implementing the related numerical algorithms are also taken into due account. Cryptography has been developed in great detail, both in its classical and more recent aspects. In particular public key cryptography is extensively discussed, the ...
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.