Cargando…

Countering Brandjacking in the Digital Age ... and Other Hidden Risks to Your Brand /

The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands mo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hofman, Christopher (Autor), Keates, Simeon (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Springer London : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Colección:SpringerBriefs in Computer Science,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4471-5580-5
003 DE-He213
005 20220117214846.0
007 cr nn 008mamaa
008 131125s2013 xxk| s |||| 0|eng d
020 |a 9781447155805  |9 978-1-4471-5580-5 
024 7 |a 10.1007/978-1-4471-5580-5  |2 doi 
050 4 |a K564.C6 
072 7 |a UBL  |2 bicssc 
072 7 |a LAW099000  |2 bisacsh 
072 7 |a UBL  |2 thema 
082 0 4 |a 343.0999  |2 23 
100 1 |a Hofman, Christopher.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Countering Brandjacking in the Digital Age  |h [electronic resource] :  |b ... and Other Hidden Risks to Your Brand /  |c by Christopher Hofman, Simeon Keates. 
250 |a 1st ed. 2013. 
264 1 |a London :  |b Springer London :  |b Imprint: Springer,  |c 2013. 
300 |a VIII, 87 p. 18 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5776 
505 0 |a An Introduction to Brand Risk -- An Overview of Branding and its Associates Risks -- Brand Risk Management Theory -- Designing a Brand Risk Management Process -- Brand Risk in Cyberspace -- Appendix: Norwegian Air Shuttle Calculation. 
520 |a The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands more attractive for exploitation or attack by others. Brand risks can come in many different types and this book provides examples of how these risks can arise as well as providing quantitative estimates of the adverse impacts that can result from such risks. Brand owners need to be aware of the risks and of the need to develop strategies for identifying and managing them. This book details the process by which a brand owner can develop a brand risk management process to protect a brand's reputation and value. Rather than prescribe a one-size-fits-all approach, the authors provide guidance on how a brand risk management process can be tailored to particular needs and circumstances. This approach is underpinned by drawing on examples of best practice in the fields of risk management, interaction design and engineering design. This combined approach relies on developing an understanding of the risks faced by a particular brand owner, the full context of those risks and also the brand owner's capabilities for identifying and managing those risks. This book contains many real-world examples and interviews with a number of brand owning organisations ranging from small companies to large multinationals. 
650 0 |a Computers-Law and legislation. 
650 0 |a Information technology-Law and legislation. 
650 0 |a Electronic commerce. 
650 1 4 |a Legal Aspects of Computing. 
650 2 4 |a e-Commerce and e-Business. 
700 1 |a Keates, Simeon.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781447155812 
776 0 8 |i Printed edition:  |z 9781447155799 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5776 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4471-5580-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)