The aim of this paper is to investigate the Chinese branding landscape. First, the strongest Chinese brands are analysed. This analysis offers explanations for typical Chinese brand strategy and establishes current trends in Chinese brand management practice from a corporate perspective. The research includes an empirical study on the motivations of Chinese consumers investigating their preferences of Chinese- over foreign brands. While the discipline of brand management has a relatively short tradition in Chinese boardrooms, the outcomes of Chinese consumer preferences towards their favorite brands are both revealing and unexpected. The paper will conclude with the formulation of four Chinese branding trends that are likely to shape the Chinese branding landscape in the future.
LINK
In this research, the experiences and behaviors of end-users in a smart grid project are explored. In PowerMatching City, the leading Dutch smart grid project, 40 households were equipped with various decentralized energy sources (PV and microCHP), hybrid heat pumps, smart appliances, smart meters and an in-home display. Stabilization and optimization of the network was realized by trading energy on the market. To reduce peak loads on the smart grid, several types of demand side management were tested. Households received feedback on their energy use either based on costs, or on the percentage of consumed energy that had been produced locally. Furthermore, devices could be controlled automatically, smartly or manually to optimize the energy use of the households. Results from quantitative and qualitative research showed that: (1) feedback on costs reduction is valued most; (2) end-users preferred to consume self-produced energy (this may even be the case when, from a cost or sustainability perspective, it is not the most efficient strategy to follow); (3) automatic and smart control are most popular, but manually controlling appliances is more rewarding; (4) experiences and behaviors of end-users depended on trust between community members, and on trust in both technology (ICT infrastructure and connected appliances) and the participating parties.
DOCUMENT
Combining electric cars with utility services seems to be a natural fit and holds the promise to tackle various mobility as well as electricity challenges at the same time. So far no viable business model for vehicle-to-grid technology has emerged, raising the question which characteristics a vehicle-to-grid business model should have. Drawing on an exploratory study amongst 189 Dutch consumers this study seeks to understand consumer preferences in vehicle-to-grid business models using conjoint analysis, factor analysis and cluster analysis. The results suggest that consumers prefer private ownership of an EV and a bidirectional charger instead of community ownership of bidirectional charger, they prefer utility companies instead of car companies as the aggregator and they require home and public charging. The most salient attributes in a V2G business model seem to be functional rather than financial or social. The customer segment with the highest willingness to adopt V2G prefers functional attributes. Based on the findings, the study proposes a business model that incorporates the derived preferences
DOCUMENT
Despite the benefits of the widespread deployment of diverse Internet-enabled devices such as IP cameras and smart home appliances - the so-called Internet of Things (IoT) has amplified the attack surface that is being leveraged by cyber criminals. While manufacturers and vendors keep deploying new products, infected devices can be counted in the millions and spreading at an alarming rate all over consumer and business networks. The objective of this project is twofold: (i) to explain the causes behind these infections and the inherent insecurity of the IoT paradigm by exploring innovative data analytics as applied to raw cyber security data; and (ii) to promote effective remediation mechanisms that mitigate the threat of the currently vulnerable and infected IoT devices. By performing large-scale passive and active measurements, this project will allow the characterization and attribution of compromise IoT devices. Understanding the type of devices that are getting compromised and the reasons behind the attacker’s intention is essential to design effective countermeasures. This project will build on the state of the art in information theoretic data mining (e.g., using the minimum description length and maximum entropy principles), statistical pattern mining, and interactive data exploration and analytics to create a casual model that allows explaining the attacker’s tactics and techniques. The project will research formal correlation methods rooted in stochastic data assemblies between IoT-relevant measurements and IoT malware binaries as captured by an IoT-specific honeypot to aid in the attribution and thus the remediation objective. Research outcomes of this project will benefit society in addressing important IoT security problems before manufacturers saturate the market with ostensibly useful and innovative gadgets that lack sufficient security features, thus being vulnerable to attacks and malware infestations, which can turn them into rogue agents. However, the insights gained will not be limited to the attacker behavior and attribution, but also to the remediation of the infected devices. Based on a casual model and output of the correlation analyses, this project will follow an innovative approach to understand the remediation impact of malware notifications by conducting a longitudinal quasi-experimental analysis. The quasi-experimental analyses will examine remediation rates of infected/vulnerable IoT devices in order to make better inferences about the impact of the characteristics of the notification and infected user’s reaction. The research will provide new perspectives, information, insights, and approaches to vulnerability and malware notifications that differ from the previous reliance on models calibrated with cross-sectional analysis. This project will enable more robust use of longitudinal estimates based on documented remediation change. Project results and methods will enhance the capacity of Internet intermediaries (e.g., ISPs and hosting providers) to better handle abuse/vulnerability reporting which in turn will serve as a preemptive countermeasure. The data and methods will allow to investigate the behavior of infected individuals and firms at a microscopic scale and reveal the causal relations among infections, human factor and remediation.