請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/62464完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 謝明慧(Ming-Huei Hsieh),陳厚銘(Homin Chen) | |
| dc.contributor.author | "Caskey, D'Arcy Nelson" | en |
| dc.contributor.author | 凱達西 | zh_TW |
| dc.date.accessioned | 2021-06-16T16:02:53Z | - |
| dc.date.available | 2013-07-11 | |
| dc.date.copyright | 2013-07-11 | |
| dc.date.issued | 2013 | |
| dc.date.submitted | 2013-07-03 | |
| dc.identifier.citation | Essay I
Acemoglu, D., & Robinson, J.A. (2012). Why nations fail: The origins of power, prosperity and poverty, New York: Crown Publishers. B.C. Stats (2009). British Columbia Manufacturing Shipments - Economic Activity. Bagozzi, R.P. (2009). The evolution of marketing thought: From economic to social exchange and beyond. In: Maclaran P, Saren M, Stern B, et al. (eds) The SAGE Handbook of Marketing Theory. London: Sage Publications Ltd. Barstow, D., & Xanic von Bertrab, A. (2012). How Wal-Mart used payoffs to get its way in Mexico. The New York Times, December 17. Bremmer, I. (2010). The end of the free market : who wins the war between states and corporations?, New York: Portfolio. Butler, P., & Collins, N. (1995). Marketing public sector services: concepts and characteristics. Journal of Marketing Management, 11(1-3), 83-96. Buurma, H. (2001). Public policy marketing: marketing exchange in the public sector. European Journal of Marketing, 35(11/12), 1287-1302. Burrell, J. (2008). Problematic empowerment: West African Internet scams as strategic misrepresentation. Information Technologies & International Development 4: 15-30. Cowichan Valley Citizen. (2008). Pot industry ranks second in GDP contribution. Cowichan Valley Citizen, May 18, 2008. Darke, P.R. (2007). The defensive consumer: Advertising deception, defensive processing, and distrust. JMR, Journal of Marketing Research 44: 114. Deighton, J., & Grayson, K. (1995). Marketing and seduction: Building exchange relationships by managing social consensus. The Journal of Consumer Research 21: 660-676. Eckblad, M. (2009). In banks' profit push, 'era of low fees is over'. Wall Street Journal, July 31. The Economist. (2012). Shell companies: Launderers anonymous. The Economist. Ekman, P. (2009). Telling lies: Clues to deceit in the marketplace, politics, and marriage: W.W. Norton. Fleming, M.H., Roman, J., & Farrell, G. (2000). The shadow economy. Journal of International Affairs 53: 387. Gardner, D.M. (1975). Deception in Advertising: A Conceptual Approach. Journal of Marketing 39: 40-46. Glenny, M. (2009). McMafia: A journey through the global criminal underworld: Knopf Doubleday Publishing Group. Glenny, M. (2012). DarkMarket: How hackers became the new Mafia: Random House. Goodman, P.S. (2009). Lucrative fees may deter efforts to alter loans. New York Times, July 29, 2009. Gorman, S. (2012). Al Qaeda papers show split on mission, brand. The Wall Street Journal, May 3. Hackley, C.E. (2001). Marketing and social construction: exploring the rhetorics of managed consumption, New York: Routledge. Hirschman, E.C. (2008). Evolution, biology and consumer research: What Darwin knew that we've forgotten. In: Tadajewski M and Brownlie D (eds) Critical marketing: Issues in contemporary marketing. Hoboken, NJ: John Wiley & Sons, Ltd. Jae H, Seevers MT and Gassenheimer JB (2007). Underground economy and marketing exchange: A macro perspective. Marketing Management Journal 17: 1-15. Johnston, A. (2013). Italy tackles mafia-owned businesses. Retrieved from BBC News website: http://www.bbc.co.uk/news/business-20784957 Kotler, P. (2012). Dr. Philip Kotler Answers Your Questions on Marketing. kotlermarketing.com. Retrieved May 15, 2013, from http://www.kotlermarketing.com/phil_questions.shtml Kotler, P. (2011). Reinventing Marketing to Manage the Environmental Imperative. Journal of Marketing 75: 132-135. Kotler, P. (1972a). A generic concept of marketing. The Journal of Marketing, 46-54. Kotler, P. (1972b). What consumerism means for marketers. Harvard Business Review, 50(3), 48-57. Levitt, S.D., & Dubner, S.J. (2005). Freakonomics: A rogue economist explores the hidden side of everything, New York: William Morrow. Luhnow, D, (2001). Crossover Success: How Nafta Helped Wal-Mart Reshape The Mexican Market --- Lower Tariffs, Retail Muscle Translate Into Big Sales; Middlemen Are Squeezed --- `Like Shopping in the U.S.'. Wall Street Journal, Lusch, Robert F. (2007). Marketing's Evolving Identity: Defining Our Future. Journal of Public Policy & Marketing, 26(2), 261-268. doi: 10.2307/30000801 March, J.G. (2006). Rationality, foolishness, and adaptive intelligence. Strategic Management Journal 27: 201-214. Moschis, G.P., & Cox, D. (1989). Deviant Consumer Behavior. Advances in Consumer Research 16: 732-737. Naim, M. (2005). Illicit: How smugglers, traffickers, and copycats are hijacking the global economy, New York, NY: Anchor Books. Naylor, R.T. (2004). Wages of crime: Black markets, illegal finance, and the underworld economy, Ithaca, NY: Cornell University Press. Nicholson, B. (2003). From cow to customer: Informal marketing of milk in Albania. Anthropology of East Europe Review 21: 148-158. Olson, J.C., & Dover, P.A. (1978). Cognitive effects of deceptive advertising. Journal of Marketing Research (JMR) 15: 29-38. Portes, A. (1996). The informal economy: Perspectives from Latin America. In: Pozo S (ed) Exploring the underground economy: Studies of illegal and unreported activities. Kalamazoo, Michigan: W.E. Upjohn Institute for Employment Research, 147-165. Portes, A., & Sassen-Koob, S. (1987). Making it underground: Comparative material on the informal sector in Western market economies. The American Journal of Sociology 93: 30-61. Schneider, F. (2006). Shadow economies and corruption all over the world: What do we really know? CESifo Working Paper Series 1806. Schneider, F. (2009). Size and development of the shadow economy in Germany, Austria and Other OECD-Countries. Some preliminary findings. Revue economique 60: 1079-1116. Shadel, D.P., & Pak, K.B.S. (2007). The psychology of consumer fraud. (Unpublished Thesis), Tillburg University. Retrieved from: http://www.taosinstitute.net/Websites/taos/Images/ProgramsTaosTilburgDissertations/Pak.ShadelDissertationFINAL.pdf Sheth, J.N. (2011). Impact of Emerging Markets on Marketing: Rethinking Existing Perspectives and Practices. Journal of Marketing 75: 166-182. Shover, N., Coffey, G., & Sanders, C. (2004). Dialing for dollars: Opportunities, justifications, and telemarketing fraud. Qualitative Sociology 27: 59-75. Taleb, N.N. (2012). Antifragile: Things that gain from disorder, New York: Random House Publishing Group. Tilley, C. (2006) Wal-Mart in Mexico: the limits of growth. In: Lichtenstein N (ed) Wal-Mart : the face of twenty-first-century capitalism. New York: New Press. Tilly, C. (1985). War Making and State Making as Organized Crime. In: Evans P, Rueschemeyer D and Skocpol T (eds) Bringing the State Back In. Cambridge: Cambridge University Press. Tipton, M.M., Bharadwaj, S.G., & Robertson, D.C. (2009). Regulatory Exposure of Deceptive Marketing and Its Impact on Firm Value. Journal of Marketing 73: 227-243. Titus, R.M., Heinzelmann, F., & Boyle, J.M. (1995). Victimization of Persons by Fraud. Crime Delinquency 41: 54-72. Tversky, A,. & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probability. Cognitive Psychology 5: 207-232. Tversky, A., & Kahneman, D. (1991). Loss aversion in riskless choice: A reference-dependent model. The Quarterly Journal of Economics, 106(4), 1039-1061. Venkatesh, S.A. (2006). Off the books: The underground economy of the urban poor, Cambridge, Mass.: Harvard University Press. Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. (2009). You say illegal, I say legitimate: Entrepreneurship in the informal economy. Academy of Management Review, 34(3), 492-510. Weber, M, (2004). The essential Weber: A reader, New York: Routledge. Wilkie, William L., & Moore, Elizabeth S. (2007). What Does the Definition of Marketing Tell Us about Ourselves? Journal of Public Policy & Marketing, 26(2), 269-276. doi: 10.2307/30000802 Witte, A.D. (1996). Beating the system? In: Pozo S (ed) Exploring the underground economy: Studies of illegal and unreported activity. Kalamazoo, MI: W.E Upjohn Institute for Employment Research, 129-146. Essay II Abagnale, F. W. (2002). The art of the steal: How to protect yourself and your business from fraud--America's #1 crime: Broadway Books. Aditya, R. N. (2001). The psychology of deception in marketing: A conceptual framework for research and practice. Psychology and Marketing, 18(7), 735-761. Anderson, K. B. (2007). Consumer fraud in the United States: The second FTC survey. Washington DC: Federal Trade Commission. Angie, A. D., Connelly, S., Waples, E. P., & Kligyte, V. (2011). The influence of discrete emotions on judgement and decision-making: A meta-analytic review. Cognition & Emotion, 25(8), 1393-1422. doi: 10.1080/02699931.2010.550751 Berger, P. L., & Luckmann, T. (1966). The social construction of reality: A treatise in the sociology of knowledge. Garden City, N.Y.: Doubleday. Berverland, M. B., & Farrelly, F. J. (2010). The quest for authenticity in consumption: Consumers' purposive choice of authentic cues to shape experienced outcomes. Journal of Consumer Research, 36(February), 838-856. doi: 10.1086/615047 Blumer, H. (1969). Symbolic interactionism: Perspective and method. Englewood Cliffs, NJ: Prentice-Hall. Boyd, B. (2009). On the origin of stories: Evolution, cognition, and fiction. Cambridge, MA: Harvard University Press. Burrell, J. (2008). Problematic empowerment: West African Internet scams as strategic misrepresentation. Information Technologies & International Development, 4(4), 15-30. Buss, D. M. (2012). Evolutionary psychology: The new science of the mind. Boston: Pearson Allyn & Bacon. Buss, D. M., & Schmitt, D. P. (1993). Sexual strategies theory: An evolutionary perspective on human mating. Psychological Review, 100(2), 204-232. CAFC. (2009). Mass market fraud & ID theft activities. Canadian Anti-Fraud Centre Criminal Intelligence Analytical Unit Retrieved from http://www.antifraudcentre-centreantifraude.ca/english/documents/AnnualStatisticalReport2009_001.pdf. CAFC. (2010). The Canadian Anti-fraud Centre launches its new website! Retrieved November 29, 2010, from http://www.antifraudcentre-centreantifraude.ca/english/newsroom-09-11-2010.html Cavalli-Sforza, L. L., & Feldman, M. W. (1981). Cultural transmission and evolution: A quantitative approach. Princeton, NJ: Princeton University Press. CBS News (Producer). (2007, December 26, 2009). Tracking down scammers north of the border. [Article and Videos] Retrieved from http://www.cbsnews.com/stories/2007/09/11/cbsnews_investigates/main3251611.shtml Chang, J. J. S., & Chong, M. D. (2010). Psychological influences in e-mail fraud. Journal of Financial Crime, 17(3), 337-350. doi: 10.1108/13590791011056309 Chew, R. (Feb. 05, 2009). The Bernie Madoff client list is made public. Time.com. Retrieved from http://www.time.com Chylinski, M., & Chu, A. (2010). Consumer cynicism: Antecedents and consequences. European Journal of Marketing, 44(6), 796. Cialdini, R. B. (2007). Influence: The psychology of persuasion (Revised ed.). New York, NY: HarperCollins. Clark, A. (2001). Mindware: An introduction to the philosophy of cognitive science. Oxford: Oxford University Press. Colarelli, S. M., & Dettmann, J. R. (2003). Intuitive evolutionary perspectives in marketing practices. Psychology and Marketing, 20(9), 837-865. doi: 10.1002/mar.10099 Corbin, J. M., & Strauss, A. (2008). Basics of qualitative research: techniques and procedures for developing grounded theory. Los Angeles: SAGE. Coupland, J. (2005). Invisible brands: An ethnography of households and the brands in their kitchen pantries. Journal of Consumer Research: An Interdisciplinary Quarterly, 32(1), 106-118. Darke, P. R. (2007). The defensive consumer: Advertising deception, defensive processing, and distrust. JMR, Journal of Marketing Research, 44(1), 114. Darwin, C. (1869). On the origin of species by means of natural selection, or, The preservation of favored races in the struggle for life (New Revised and Augmented by the Author ed.). New York, NY: D. Appleton and Co. Dawkins, R. (1976). The selfish gene. New York, NY: Oxford University Press. Dawkins, R. (2003). A devil's chaplain: Reflections on hope, lies, science, and love. Boston: Houghton Mifflin Co. Deighton, J., & Grayson, K. (1995). Marketing and seduction: Building exchange relationships by managing social consensus. The Journal of Consumer Research, 21(4), 660-676. Denzin, N. K., & Lincoln, Y. S. (2011). The Sage handbook of qualitative research. Thousand Oaks, CA: SAGE. DiClemente, D. F., & Hantula, D. A. (2003). Optimal foraging online: Increasing sensitivity to delay. Psychology and Marketing, 20(9), 785-809. doi: 10.1002/mar.10097 Dijksterhuis, A., Smith, P. K., van Baaren, R. B., & Wigboldus, D. H. J. (2005). The unconscious consumer: Effects of environment on consumer behavior. Journal of Consumer Psychology, 15(3), 193-202. doi: 10.1207/s15327663jcp1503_3 DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48(2), 147-160. Distin, K. (2011). Cultural evolution. Cambridge University Press. Dunham, B. (2011). The role for signaling theory and receiver psychology in marketing evolutionary psychology in the business sciences. In G. Saad (Ed.), Evolutionary psychology in the business sciences (pp. 225-256). Berlin: Springer. Ekman, P. (2009). Telling lies: Clues to deceit in the marketplace, politics, and marriage. W.W. Norton. Euromonitor International (2013) Taiwan: Country Pulse. London: Euromonitor International. Evans, J. S. B. T. (2009). How many dual-process theories do we need? One, two, or many? In J. S. B. T. Evans & K. Frankish (Eds.), In two minds: Dual processes and beyond (pp. 33-54). Oxford: Oxford University Press. Federal Trade Commission. (2009, April 24). Hang up on cross-border phone fraud. Facts for Consumers Retrieved December 26, 2009, from http://www.ftc.gov/bcp/edu/pubs/consumer/telemarketing/tel02.shtm Fitzsimons, G. M., Chartrand, T. L., & Fitzsimons, G. J. (2008). Automatic effects of brand exposure on motivated behavior: How Apple makes you 'Think Different'. The Journal of Consumer Research, 35(1), 21-35. Frankish, K., & Evans, J. S. B. T. (2009). The duality of mind: An historical perspective. In K. Frankish & J. S. B. T. Evans (Eds.), In two minds: Dual processes and beyond. Oxford: Oxford University Press. Gardner, D. M. (1975). Deception in Advertising: A Conceptual Approach. Journal of Marketing, 39(1), 40-46. Gartner Inc. (2009). Gartner says 7.5 percent of U.S. adults lost money as a result of some sort of financial fraud in 2008. Stamford, USA: Gartner Inc. Goffman, E. (1952). On cooling the mark out: Some aspects of adaptation to failure. Psychiatry, 15(4), 451. Goffman, E. (1959). The presentation of self in everyday life. Garden City, NY: Doubleday. Grayson, K., & Martinec, R. (2004). Consumer perceptions of iconicity and indexicality and their influence on assessments of authentic market offerings. Journal of Consumer Research, 31(2), 296-312. Gummesson, E. (2005). Qualitative research in marketing. European Journal of Marketing, 39(3/4), 309-327. doi: 10.1108/0309056051058179 Hinde, R. A., & Barden, L. A. (1985). The evolution of the teddy bear. Animal Behaviour, 33(4), 1371-1373. doi: 10.1016/s0003-3472(85)80205-0 Hirschman, E. C. (2008). Evolution, biology and consumer research: What Darwin knew that we've forgotten. In M. Tadajewski & D. Brownlie (Eds.), Critical marketing: Issues in contemporary marketing. Hoboken, NJ: John Wiley & Sons, Ltd. Hirschman, E. C. (2010). Evolutionary branding. Psychology and Marketing, 27(6), 568-583. doi: 10.1002/mar.20345 Holbrook, M. B., & Hirschman, E. C. (1982). The experiential aspects of consumption: consumer fantasies, feelings, and fun. Journal of Consumer Research, 132-140. Horne, D. R. (2007). Exploring consumer lying in information-based exchanges. Journal of Consumer Marketing, 24(2), 90. Hyman, R. (1989). The psychology of deception. Annual Review of Psychology, 40, 133. Inglehart, R., Basanez, M., & Moreno, A. M. (1998). Human values and beliefs: A cross-cultural sourcebook : political, religious, sexual, and economic norms in 43 societies; findings from the 1990-1993 world value survey. Ann Arbor, MI: University of Michigan Press. Jae, H., Seevers, M. T., & Gassenheimer, J. B. (2007). Underground economy and marketing exchange: A macro perspective. Marketing Management Journal, 17(2), 1-15. Kahneman, D., Knetsch, J. L., & Thaler, R. H. (1991). Anomalies: The endowment effect, loss aversion, and status quo bias. The Journal of Economic Perspectives, 5(1), 193-206. Kahneman, D., & Tversky, A. (Eds.). (2000). Choices, values, and frames. Cambridge, MA: Cambridge University Press. Kim, T.-h. (2009, January 19). Phone scam becomes increasing problem, The Korea Times. Retrieved from http://www.koreatimes.co.kr/www/news/biz/2009/01/123_38133.html Kinsella, D. (2006). The black market in small arms: Examining a social network. Independent : the newsletter of the Independent Institute, 27(1), 100. Kvale, S. (1996). InterViews: An Introduction to Qualitative Research Interviewing. SAGE. Langenderfer, J., & Shimp, T. A. (2001). Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion. Psychology and Marketing, 18(7), 763-783. Langley, A. (1999). Strategies for theorizing from process data. Academy of Management Review, 691-710. Lea, S. E. G., Fischer, P., & Evans, K. M. (2009). The economic psychology of scams. Paper presented at the International Association for Research in Economic Psychology and the Society for the Advancement of Behavioral Economics, Halifax, Canada. Lee, J., & Geistfeld, L. V. (1999). Elderly consumers' receptiveness to telemarketing fraud. Journal of Public Policy & Marketing, 18(2), 208-217. Lee, J., & Soberon-Ferrer, H. (1997). Consumer vulnerability to fraud: Influencing factors. Journal of Consumer Affairs, 31(1), 70-89. Lee, M. (2011a). Chinese retailers hijack the Ikea experience. Reuters. Retrieved from http://www.reuters.com Lee, M. (2011b). Fake Apple store even fools staff. Reuters. Retrieved from http://www.reuters.com Leigh, T., Peters, C., & Shelton, J. (2006). The consumer quest for authenticity: The multiplicity of meanings within the MG subculture of consumption. Journal of the Academy of Marketing Science, 34(4), 481-493. Lin, Y., & Nitin, P. (2010). Inertia versus mimicry in location choices by Chinese multinationals. International Marketing Review, 27(3), 295-315. doi: 10.1108/02651331011048005 Lord, K. R., & Kim, C. K. (1995). Inoculating consumers against deception: The influence of framing and executional style. Journal of Consumer Policy, 18(1), 1-23. doi: 10.1007/BF01018086 Mazar, N., Amir, O., & Ariely, D. (2008). The dishonesty of honest people: A theory of self-concept maintenance. Journal of Marketing Research, 45(6), 633-644. McCausland, C. (2010). Counterfeit goods: Designer handbags, Rolex watches, and now airplane engine parts. The Christian Science Monitor. Retrieved from http://www.csmonitor.com Meyer, P. (2011). Liespotting: Proven Techniques to Detect Deception: St. Martin's Press. Miller, G. (2009). Spent: Sex, evolution, and consumer behavior. New York: Viking. Mitchell, R. W., & Thompson, N. S. (Eds.). (1986). Deception, perspectives on human and nonhuman deceit. Albany: State University of New York Press. Mittone, L., & Savadori, L. (2009). The scarcity bias. Applied Psychology: An International Review, 58(3), 453-468. doi: 10.1111/j.1464-0597.2009.00401.x Naim, M. (2005). Illicit: How smugglers, traffickers, and copycats are hijacking the gobal economy. New York, NY: Anchor Books. Naylor, R. T. (2004). Wages of crime: Black markets, illegal finance, and the underworld economy (Revised ed.). Ithaca, NY: Cornell University Press. O'Sullivan, M. (2009). Why most people parse palters, fibs, lies, whoppers, and other deceptions poorly. In B. Harrington (Ed.), Deception: From ancient empires to Internet dating. Stanford, CA: Stanford University Press. Olson, J. C., & Dover, P. A. (1978). Cognitive effects of deceptive advertising. Journal of Marketing Research (JMR), 15(1), 29-38. Patwardhan, A., Noble, S. M., & Nishihara, C. M. (2009). The use of strategic deception in relationships. Journal of Services Marketing, 23(5), 318. Pinker, S. (2008). The stuff of thought: Language as a window into human nature. London: Penguin. Rafiq, M., & Collins, R. (1996). Lookalikes and customer confusion in the grocery sector: An exploratory survey. The International Review of Retail, Distribution and Consumer Research, 6(4), 329 - 350. Richerson, P. J., & Boyd, R. (2005). Not by genes alone: How culture transformed human evolution. London: University of Chicago Press. Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York, NY: Free Press. Saad, G. (2007). The evolutionary bases of consumption. Mahwah, NJ: L. Erlbaum Associates. Saad, G. (2008). The collective amnesia of marketing scholars regarding consumers' biological and evolutionary roots. Marketing Theory, 8(4), 425-448. doi: 10.1177/1470593108096544 Saad, G., & Gill, T. (2003). An evolutionary psychology perspective on gift giving among young adults. Psychology and Marketing, 20(9), 765-784. doi: 10.1002/mar.10096 Saad, G., & Peng, A. (2006). Applying Darwinian principles in designing effective intervention strategies: The case of sun tanning. Psychology and Marketing, 23(7), 617-638. doi: 10.1002/mar.20149 Seitz, S. J., Lord, C. G., & Taylor, C. A. (2007). Beyond pleasure: Emotion activity affects the relationship between attitudes and behavior. Personality and Social Psychology Bulletin, 33(7), 933-947. doi: 10.1177/0146167207301025 Shover, N., Coffey, G., & Sanders, C. (2004). Dialing for dollars: Opportunities, justifications, and telemarketing fraud. Qualitative Sociology, 27(1), 59-75. Simons, D. J. (2010). Monkeying around with the gorillas in our midst: familiarity with an inattentional-blindness task does not improve the detection of unexpected events. i-Perception, 1(1), 3-6. doi: 10.1068/i0386 Simons, D. J., & Chabris, C. F. (1999). Gorillas in our midst: Sustained inattentional blindness for dynamic events. Perception, 28(9), 1059-1074. doi: 10.1068/p2952 Sperber, D. (1985). Anthropology and psychology: Towards an epidemiology of representations. Man (N.S.), 20, 73-89. Sperber, D. (1996). Explaining culture: A naturalistic approach. Oxford: Blackwell. Sperber, D. (1997). Intuitive and Reflective Beliefs. Mind & Language, 12(1), 67-83. doi: 10.1111/j.1468-0017.1997.tb00062.x Stanovich, K. E. (2004). The robot's rebellion: Finding meaning in the age of Darwin. Chicago, IL: University of Chicago Press. Stanovich, K. E. (2009). Distinguishing the reflective, algorithmic, and autonomous minds: Is it time for a tri-process theory? In J. S. B. T. Evans & K. Frankish (Eds.), In two minds: Dual processes and beyond. New York, NY: Oxford University Press. Stanovich, K. E. (2011). Rationality and the reflective mind. New York, NY: Oxford University Press. Stanovich, K. E., & West, R. F. (2003). Evolutionary versus instrumental goals: How evolutionary psychology misconceives human rationality. In D. E. Over (Ed.), Evolution and the psychology of thinking: The debate. New York: Psychology Press. Taleb, N. N. (2007). The black swan: The impact of the highly improbable. New York, NY: Random House. Tanner, R. J., Ferraro, R., Chartrand, T. L., Bettman, J. R., & Baaren, R. V. (2008). Of chameleons and consumption: The impact of mimicry on choice and preferences. Journal of Consumer Research, 34(6), 754-766. doi: 10.1086/522322 Tavris, C., & Aronson, E. (2007). Mistakes were made (but not by me): Why we justify foolish beliefs, bad decisions, and hurtful acts. Orlando, FL: Harcourt. 15 U.S.C. §6101(3) (2000). Thaler, R. H. (1980). Toward a positive theory of consumer choice. Journal of Economic Behavior & Organization, 1(1), 39-60. Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven: Yale University Press. The Straits Times. (2009, November 27). Phone scam: Taiwan nabs 23. Retrieved from http://www.straitstimes.com/BreakingNews/Asia/Story/STIStory_459791.html Trivers, R. (2000). The elements of a scientific theory of self-deception. Annals of the New York Academy of Sciences, 907(1), 114-131. doi: 10.1111/j.1749-6632.2000.tb06619.x Trivers, R. (2010). Deceit and self-deception. In P. M. Kappeler & J. B. Silk (Eds.), Mind the gap: Tracing the origins of human universals (pp. 373-395). Heidelberg: Springer. Trivers, R. (2011). The folly of fools: The logic of deceit and self-deception in human life. New York, NY: Basic Books. Tversky, A., & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probability. Cognitive Psychology, 5(2), 207-232. doi: 10.1016/0010-0285(73)90033-9 van Baaren, R. B., Holland, R. W., Steenaert, B., & van Knippenberg, A. (2003). Mimicry for money: Behavioral consequences of imitation. Journal of Experimental Social Psychology, 39(4), 393-398. doi: 10.1016/S0022-1031(03)00014-3 Whitson, J. A., & Galinsky, A. D. (2008). Lacking control increases illusory pattern perception. Science, 322(5898), 115-117. doi: 10.1126/science.1159845 Wimsatt, W. C. (2010). Memetics does not provide a useful way of understanding cultural evolution. In F. J. Ayala & R. Arp (Eds.), Contemporary Debates in Philosophy of Biology (pp. 273-291). West Sussex: Wiley-Blackwell. Wood, W., & Neal, D. T. (2009). The habitual consumer. Journal of Consumer Psychology, 19(4), 579-592. doi: 10.1016/j.jcps.2009.08.003 Zak, P. J., Stanton, A. A., & Ahmadi, S. (2007). Oxytocin Increases Generosity in Humans. PLoS ONE, 2(11), e1128. doi: 10.1371/journal.pone.0001128 | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/62464 | - |
| dc.description.abstract | 一直以來,黑市中繁多的經濟變動與相關支援活動,都被排除在一般界定的行銷範疇之外。行銷文獻對於黑色行銷的緘默是不尋常的,畢竟這些活動在全球的普遍性、總值、以及對於消費者偏好與選擇的影響,與檯面上合法的市場相似。緣此,本論文旨在透過兩篇研究探討黑色行銷的面向。第一篇研究脈絡化黑色行銷在傳統行銷範疇關係之活動,另一篇則是基於一個特殊、常見於黑色行銷卻鮮少被研究的現象,發展出概念化的流程模式。
第一篇研究始於行銷文獻的回顧,揭露出鮮少被探究、且不在傳統行銷詮釋範圍內的非法交易。一直以來,行銷幾乎都專注在創造正向知覺價值(對交易雙方)的合法交易上。本研究將界定並解釋許多造成行銷學界缺乏檢視這些現象的主要障礙。接著,本研究將介紹由各種不同類型交易活動所構成的概念性架構,包含非法交易。該架構係基於行銷與其他相關文獻的延伸回顧,基於三個軸面來區分交易活動:價值、合法性、以及自由意志。研究結果呈現出一個可被分割為16大區塊的概念性行銷領域。本論文對於行銷文獻的貢獻,在於界定、敘述、與脈絡化許多一直到最近才被免於排除於行銷活動之外的非合法交易活動。本研究亦克服文獻回顧中所界定的大多困難。其架構提供未來相關議題研究的導引,同時也意味著許多既存行銷理論/模型是需要被重新檢視的,以釐清過去被忽略的黑色行銷活動可能帶來的影響。本研究最後也探討研究架構的限制及意涵。 第二篇研究則針對上一篇概念架構所提之黑色行銷活動,針對其中一種特定且不常被討論的活動進行檢視:騙局。構成騙局的多樣化交易活動,都享有非合法性、單向或負面價值傳遞、與詐欺等特徵。由於騙局遍及於全球市場以及消費者的日常生活,因此這是一項重要的研究探索。再者,騙局直接且間接影響其所仿效的合法行銷物件之行銷與知覺。儘管該議題重要,既有行銷觀點的研究卻相當有限且分歧。本實證研究旨在填補這樣的知識缺口。本研究的資料蒐集自多重來源,包含警局與政府網站、網路上的自我陳述、媒體文章、以及面對面受害者的深入訪談。後續分析則採取社會文化認知觀點並應用質化研究方法,發展受害者接受騙局的過程模型。受害流程始於處理真實性時的思考錯誤,並因欠缺意識與非意識層次的處理而持續。根據此模型,受害者將騙局處理為真實的文化資訊(CI),但事實上CI是被仿製的。本研究亦界定並分類經常被仿製的CI,以強調出騙局所利用的常見思考錯誤。該模型也呈現出,輔助的注意力分散與混淆的CI如何迫使受害者自願移轉價值給詐騙者。本篇論文最後透過討論模型對於一般行銷與社會行銷的意涵而歸論總結,並且提出數個可在未來研究中進一步驗證的命題。同樣地,本研究亦討論研究架構的限制。 | zh_TW |
| dc.description.abstract | The many economic exchanges and supporting activities found in black markets have long remained outside marketing academia’s generally recognized scope. Marketing literature’s silence towards black marketing is unusual considering these activities’ global prevalence, aggregate value, and the many influences they have on consumer preferences and choices in underground and legitimate markets alike. This thesis explores aspects of black marketing in two essays. One essay contextualizes black marketing activities in relation to the scope of conventional marketing. The other develops a conceptual process model based on an empirical examination of a specific group of seldom studied but frequently encountered black marketing phenomena.
The first essay begins with a review of the marketing literature, which reveals illegitimate exchanges have seldom been investigated because they do not fall within conventional interpretations of marketing. Instead marketing has focused almost exclusively on legitimate exchanges that create positive perceived value (to both parties). Several main obstacles that have contributed to marketing academia’s lack of interest in these phenomena are also identified and explained. Next a conceptual framework is introduced that underlies all different types of exchange activities including illegitimate ones. This framework, which is grounded on an extensive review of marketing and other relevant literatures, classifies exchange activities along three dimensions: value, legal legitimacy, and free will. The result is a conceptual marketing universe that can be divided into 16 sectors. This essay contributes to the marketing literature by identifying, describing, and contextualizing the many illegitimate exchange activities have been mostly excluded until now. It also overcomes most of the obstacles identified in the literature review. This framework provides a guide for future research that wishes to explore relevant topics. It also implies that many existing marketing theories/models can be reexamined to identify the possible influences of black marketing activities that initially went unnoticed. The limitations and implications of this framework are also discussed. The second essay investigates one specific and infrequently discussed black marketing activity that was identified in the previously proposed conceptual framework—scams. The diverse exchange activities that make up this group share the characteristics of illegitimacy, one-way or negative-value transfer, and the use of deception. This is an important research inquiry because scams pervade global markets and consumers’ everyday lives. Furthermore scams directly and indirectly affect the marketing and perception of the legitimate marketing objects they imitate. Despite this topic’s importance, existing research from a marketing perspective is extremely limited and disparate. This empirical study helps fill this knowledge gap. Data for this study was gathered from multiple sources including police and governmental websites, online self-reports, media articles, and face-to-face in-depth victim interviews. The subsequent analysis took a sociocultural-cognitive perspective and utilized a qualitative research methodology, which led to the development of the process model of victim acceptance of scams. The process of victimization begins with thinking errors during authenticity processing and continues with default processes at both conscious and nonconscious levels. According to this model victims process scams as authentic cultural information (CI) when in fact the CI is mimicked. Frequently mimicked types of CI are also identified and classified, which helps highlight the common thinking errors that scams take advantage of. The model also shows how supplementary distracting and confounding CI helps compel victims to voluntarily transfer value to the scammer. The essay concludes with a discussion of the implications of this model to both marketing in general and social marketing in particular. Several propositions are also introduced that can be tested in future research. Limitations of the current framework are likewise discussed. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-16T16:02:53Z (GMT). No. of bitstreams: 1 ntu-102-D97724013-1.pdf: 5594061 bytes, checksum: 2b32c6138cdb33b9d337a570c0384736 (MD5) Previous issue date: 2013 | en |
| dc.description.tableofcontents | 論文口試委員審定書 i
謝辭 ii 摘要 iii Abstract v Table of Contents viii List of Figures x List of Tables x ESSAY I: Contextualizing Illegitimate Exchange in Marketing Discourse 1 Introduction 2 Literature review 4 Issues perpetuating the black marketing knowledge gap 8 Conceptual Framework 15 Value: the conventional dimension 16 Legitimacy: black marketing’s defining dimension 17 Free will: the missing dimension 21 Discussion and Implications 25 Theoretical Implications 28 Managerial Implications 30 Limitations and Future Research 31 Limitations 31 Future Research 33 ESSAY II: Mistaking Mimics for the McCoy: Understanding Consumer Participation in Negative-Value Exchanges 37 Introduction 38 Literature Review 40 Deception 40 Deceptive Mimicry 42 Quantifying Scams 43 Existent Explanations of Victimization 44 Methodology 48 Primary Sources 49 Secondary Sources 51 Analysis and Classification 54 Findings 55 A Typology of Scams 55 Artifacts 61 Narratives 62 Social roles and institutions 62 Distractors and confounders. 63 Victim Scam Processing Model 64 Sensing and assigning authenticity 65 Default processes 70 Automaticity and nonconscious processes 71 Heuristics and biases. 71 Affect. 72 Habits. 73 Conscious and reflective processes 74 Role of distractors and confounders. 76 Caveats. 78 Following the process through informant experience. 78 Discussion and Implications 79 Theoretical Implications 81 Managerial Implications 83 Limitations and Future Research 87 References 90 Essay I 90 Essay II 95 | |
| dc.language.iso | en | |
| dc.subject | 知覺價值詐欺 | zh_TW |
| dc.subject | 文化資訊 | zh_TW |
| dc.subject | 真實性 | zh_TW |
| dc.subject | 騙局 | zh_TW |
| dc.subject | 非合法性 | zh_TW |
| dc.subject | 模仿 | zh_TW |
| dc.subject | scam | en |
| dc.subject | illegitimacy | en |
| dc.subject | perceived value | en |
| dc.subject | deception | en |
| dc.subject | mimicry | en |
| dc.subject | cultural information | en |
| dc.subject | authenticity | en |
| dc.title | 探討非正當性交換活動—通往理解黑暗行銷之道 | zh_TW |
| dc.title | Exploring and Conceptualizing Illegitimate Exchange Activities—Towards an Understanding of Black Marketing | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 101-2 | |
| dc.description.degree | 博士 | |
| dc.contributor.oralexamcommittee | 黃恆獎(Heng-Chiang Huang),任立中(Li-Chung Jen),林俊昇(J. Chris Lin),周建亨(Chien-Heng Chou) | |
| dc.subject.keyword | 非合法性,知覺價值詐欺,模仿,文化資訊,真實性,騙局, | zh_TW |
| dc.subject.keyword | illegitimacy,perceived value,deception,mimicry,cultural information,authenticity,scam, | en |
| dc.relation.page | 107 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2013-07-03 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 國際企業學研究所 | zh_TW |
| 顯示於系所單位: | 國際企業學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-102-1.pdf 未授權公開取用 | 5.46 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
