Results 1 to 10 of about 645,588 (340)
Some of the next articles are maybe not open access.
Journal of Marketing Communications, 2022
TikTok represents a new form of marketing communication technology due to its features and attributes. However, despite its ability to share brands’ viral content, scant research has examined TikTok as an advertising vehicle and its implications for ...
Shu-Chuan Chu, Tao Deng, J. Mundel
semanticscholar +1 more source
TikTok represents a new form of marketing communication technology due to its features and attributes. However, despite its ability to share brands’ viral content, scant research has examined TikTok as an advertising vehicle and its implications for ...
Shu-Chuan Chu, Tao Deng, J. Mundel
semanticscholar +1 more source
Perceived authenticity of social media influencers: scale development and validation
Journal of Research in Interactive Marketing, 2021PurposePublic perceptions of the authenticity of social media influencers (SMIs) are a key driver of the latter's persuasiveness as brand endorsers. Despite its importance, no measurement scale currently exists for perceived authenticity of social media ...
J. A. Lee, M. Eastin
semanticscholar +1 more source
Current Issues in Tourism, 2022
The emergence of Augmented Reality (AR) enriched and further enhanced the tourism experience. Drawn upon presence theory and a postmodernist perspective, this study rethinks the impact of postmodern authenticity on two different types of presences (Sense
C. Zhu, L. Fong, Manrong Gan
semanticscholar +1 more source
The emergence of Augmented Reality (AR) enriched and further enhanced the tourism experience. Drawn upon presence theory and a postmodernist perspective, this study rethinks the impact of postmodern authenticity on two different types of presences (Sense
C. Zhu, L. Fong, Manrong Gan
semanticscholar +1 more source
A logic of authentication [PDF]
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws.
Roger M. Needham +2 more
openaire +4 more sources
Brand authenticity: literature review, comprehensive definition, and an amalgamated scale
Journal of Marketing Theory and Practice, 2022Amidst a rapidly changing marketplace, sharp behavioral changes, and increased social media usage, brand authenticity, already an important attribute, has become an essential asset for brands.
Christopher L. Campagna +2 more
semanticscholar +1 more source
Journal of Product & Brand Management, 2022
Purpose Authenticity has become increasingly dominant in business practices, particularly in branding and corporate social responsibility (CSR) activities, as consumers want it in all aspects of their lives. Thus, the purpose of this study is to examine
A. Safeer, Hancheng Liu
semanticscholar +1 more source
Purpose Authenticity has become increasingly dominant in business practices, particularly in branding and corporate social responsibility (CSR) activities, as consumers want it in all aspects of their lives. Thus, the purpose of this study is to examine
A. Safeer, Hancheng Liu
semanticscholar +1 more source
Journal of Vacation Marketing, 2022
With the development of the AR tourism experience, destination managers are starting to pay attention to the essential role of AR in tourism marketing, while at the same time, tourists’ demand for authenticity in AR is also increasing.
C. Zhu +3 more
semanticscholar +1 more source
With the development of the AR tourism experience, destination managers are starting to pay attention to the essential role of AR in tourism marketing, while at the same time, tourists’ demand for authenticity in AR is also increasing.
C. Zhu +3 more
semanticscholar +1 more source
Authentication and Mutual Authentication
2014In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Gérald Maunier +2 more
openaire +2 more sources
Journal of Personality, 2022
OBJECTIVE The present study sought to examine: (1) how the components of authenticity (i.e., authentic living, self-alienation, accepting external influence) relate to one another at between- and within-person levels of analysis; (2) how the authenticity
Paul K. Lutz +3 more
semanticscholar +1 more source
OBJECTIVE The present study sought to examine: (1) how the components of authenticity (i.e., authentic living, self-alienation, accepting external influence) relate to one another at between- and within-person levels of analysis; (2) how the authenticity
Paul K. Lutz +3 more
semanticscholar +1 more source
Current Issues in Tourism, 2022
The main purpose of this study is to investigate how destination authenticity interacts with place attachment and loyalty and whether self-authenticity moderate these relationships at a traditional village-Luoyi, Hainan, China.
Zhi-Feng Zhao (赵志峰) +1 more
semanticscholar +1 more source
The main purpose of this study is to investigate how destination authenticity interacts with place attachment and loyalty and whether self-authenticity moderate these relationships at a traditional village-Luoyi, Hainan, China.
Zhi-Feng Zhao (赵志峰) +1 more
semanticscholar +1 more source

