Countering Brandjacking in the Digital Age (Record no. 57660)

000 -LEADER
fixed length control field 03406nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-1-4471-5580-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112226.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131125s2013 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781447155805
-- 978-1-4471-5580-5
082 04 - CLASSIFICATION NUMBER
Call Number 343.0999
100 1# - AUTHOR NAME
Author Hofman, Christopher.
245 10 - TITLE STATEMENT
Title Countering Brandjacking in the Digital Age
Sub Title ... and Other Hidden Risks to Your Brand /
300 ## - PHYSICAL DESCRIPTION
Number of Pages VIII, 87 p. 18 illus.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 An Introduction to Brand Risk -- An Overview of Branding and its Associates Risks -- Brand Risk Management Theory -- Designing a Brand Risk Management Process -- Brand Risk in Cyberspace -- Appendix: Norwegian Air Shuttle Calculation.
520 ## - SUMMARY, ETC.
Summary, etc The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands more attractive for exploitation or attack by others. Brand risks can come in many different types and this book provides examples of how these risks can arise as well as providing quantitative estimates of the adverse impacts that can result from such risks. Brand owners need to be aware of the risks and of the need to develop strategies for identifying and managing them. This book details the process by which a brand owner can develop a brand risk management process to protect a brand's reputation and value. Rather than prescribe a one-size-fits-all approach, the authors provide guidance on how a brand risk management process can be tailored to particular needs and circumstances. This approach is underpinned by drawing on examples of best practice in the fields of risk management, interaction design and engineering design. This combined approach relies on developing an understanding of the risks faced by a particular brand owner, the full context of those risks and also the brand owner's capabilities for identifying and managing those risks. This book contains many real-world examples and interviews with a number of brand owning organisations ranging from small companies to large multinationals.
700 1# - AUTHOR 2
Author 2 Keates, Simeon.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-5580-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- E-commerce.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Legal Aspects of Computing.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- e-Commerce/e-business.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-5768
912 ## -
-- ZDB-2-SCS

No items available.