Search or add a thesis

Advanced Search (Beta)
Home > Protection and Growth of Brands Through Intellectual Property and Brand Governance Against Their Equity Loss at Firm Level in a Developing Country Pakistan

Protection and Growth of Brands Through Intellectual Property and Brand Governance Against Their Equity Loss at Firm Level in a Developing Country Pakistan

Thesis Info

Access Option

External Link

Author

Sarfaraz, Muhammad Zubair

Program

PhD

Institute

International Islamic University

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2017

Thesis Completion Status

Completed

Subject

Management Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/14183/1/Muhammad_Zubair_Sarfraz_Mngt%20Sci_HSR_IIU_2017_09.02.2018.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724952262

Similar


Brand equity loss is the most neglected area of research in brand management science at Asian level that has inhibited the developing nations to utilise the intangible value of brand equity of their firms. Brand equity is in nascent stage with no clear theoretical boundaries and notable research at Asian level whereas it‘s touching maturity at western world that not only nullifies the logic of using western theories in Asian perspective but also questions the credibility of past research in present scenario for Asian countries. In terms of research dominance, all the scholars of brand management have been working on the description, measurement and sustainable growth of brand equity from various business management research paradigms. In practice and theoretical explanation, intellectual property governance cannot explain the problem of brand equity loss; in contrast, brand governance is more holistic and provides the flexibility for the convergence of marketer and consumer perspective for identifying the most impactful reasons for brand equity loss. Qualitative descriptive research method was used by the researcher for the study of brand equity loss. Stratified purposeful sampling technique was deployed for collecting research problem concentric information from key informants for knowledge thickness after the analysis. Stratified samples were owners/brand managers/VPs/marketers from Businesses purposive sample for studying marketer perspective. Organisations and legal fraternity purposive samples had top managers and advocates as stratified samples for studying the consumer perspective. Primary data was collected from the stratified samples. The reports and documents of industries and organisations, related to brands, were used for support in extracting the targeted information from the interview transcripts for increasing data analysis richness. Thematic content analysis, by using Nvivo (version 10), was implemented through encoding the interview transcripts into nodes and reflecting the relation between the grouped data of the nodes through the Word Tag clouds, Frequency Tree Maps, Cluster Maps and Matrix Coding Maps. Brand governance model, as the result of the analysis, was crafted that provided the basis for deviation from previous main stream research on brand equity by having the meaning of brand equity loss from the dissection and integration of all the layers of the model, from top to bottom that cover both perspectives of brand science. The first layer is intellectual property governance and the consecutive ones are intellectual property enforcement, and brand equity loss. Therefore, brand equity loss cannot be explained by considering one approach or perspective holistically in Asian context. This invites cross sectional research in terms of approaches and perspectives. The study faced limitation in terms of lack of market documented evidence, theoretical work at Asian context, having a handful of people at national level who are information rich respondents under stratified sample and faced territorial restrictions. Conclusively, Cognitive Construct, personal concept of the brand in the minds of the consumer, is surrounded by loyalty, social sense, counterfeit, price, experience, and promises. All these are indicators of ''experience‘ that create suitable environment for infringement and counterfeiting that follows brand equity loss or vice versa. Furthermore, at the field, the best points of ''experience‘ are distributors, local sellers and people appointed from the same community as promoters.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

طفیل ہوشیار پوری کی قومی و مذہبی شاعری پر ایک نظر

طفیل ہوشیار پوری کی قومی و مذہبی شاعری پر ایک نظر

طفیل ہوشیار پوری کا اصل نام محمد طفیل ہے جبکہ ان کی شہرت طفیل ہوشیار پوری کے نام سے ہوئی۔ طفیل ضلع ہوشیارپورکی تحصیل گڑھ شنکر کے ایک گاؤں بینے والی میں پیدا ہوئے۔ ۱۹۳۴ء میں ہوشیار پور سے ہجرت کر کے سیالکوٹ میں مستقل سکونت اختیار کر لی ۔یہاں انھوں نے اپنے بڑے بھائی کے ساتھ مل کر منیمی(حساب کتاب) سکول قائم کیا۔ اس سکول میں سیالکوٹ کے ممتاز تاجر ان کے شاگرد رہے ہیں۔(1)حُب وطن پر مشتمل نظموں اور جنگی ترانوں پر مشتمل ‘‘میرے محبوب وطن’’ طفیل کا پہلا شعری مجموعہ کلام ہے۔ جوجنوری۱۹۶۶ء میں شائع ہوا۔مولانا ابو الا علیٰ مودودی نے حرفِ اول لکھا۔ جسٹس ایس۔اے رحمان نے ‘‘پیشِ لفظ’’ سید عابد علی عابد نے ‘‘دیباچہ’’ اور سید نذیرنیازی نے ‘‘مقدمہ ’’ اور طفیل نے‘‘میں خود کہوں تو’’ کے عنوان سے اپنی قومی نظموں کا پس منظر بیان کیا۔ پانچواں شعری مجموعہ ‘‘سلام ورثا’’ ہے جس میں طفیل نے اہل بیت سے اپنی عقیدت کا اظہار کیا ہے۔ اس کا دیباچہ ڈاکٹر سجاد باقر رضوی نے لکھا ہے۔ ساتواں شعری مجموعہ ‘‘رحمتِ یزداں’’ کے نام سے ۱۹۹۲ء میں شائع ہوا۔ یہ نعتیہ اور حمدیہ کلام پر مشتمل ہے۔ ڈاکٹر وحید قریشی نے اس کا مقدمہ اور احمد ندیم قاسمی نے‘‘ طفیل کی نعت نگاری’’ کے عنوان سے ان کی نعت پر رائے کا اظہار کیا ہے۔
طفیل نے محض تخیلاتی باتیں نہیں کی ہیں بلکہ حقیقت نگاری کی ہے۔ زندگی کی سچائیوں کو شعر کے پیکر میں ڈھال دیا ہے۔ان کی شاعری میں بلند حوصلگی اور نصیحت آموز باتیں بھی ہیں۔جس میں وہ ایک پیغام دیتے ہوئے نظر آتے ہیں۔اس حوالے حسبِ ذیل اشعار ملاحظہ ہوں :
اکثر اوقات سلگتے ہوئے ماضی کے نقوش
خواب بنتے ہیں خیالات میں ڈھل جاتے ہیں

عصر حاضر میں حصول انصاف میں مشکلات مسلم فکر کا تجزیاتی مطالعہ

Islam has given a complete code of life to run the system of this universe, which started with the arrival of Hazrat Adam (A.S) in this world and was completed with the Prophet (P.B.U.H). It is a comprehensive and system in which the individual and the rights and duties of both congregations are based on the concept of justice and fairness. Under this system of Islam, the supreme command on earth is only Allah’s persons, the position of man is that of vicegerent and caliph, mans responsibility is to carry out all the affairs of life according to the will of Allah. The earth and its resources will created for the benefits of all mankind. All human beings have the right to use them according to their needs, but no individual has the right to seize or hoard these resources to the detriment of others. Just as every person has rights, such as protection of life and property, honor and reputation, so it is also his duty to provide comfort and relief to no other people and not to cause any harm to anyone.

Extending the Authentication Mechanism in Ip Multimedia Subsystems for Universal Mobile Telecommunication System

IP multimedia subsystem (IMS) is an emerging platform for provisioning multimedia services (e.g., data, voice, and video) in 4G/5G networks. IMS authentication is an important procedure which grants legitimate users to access multimedia services. However, periodic re-authentication of mobile users results in significant signaling traffic overhead due to complete execution of hectic procedure. Moreover, signaling protocol such as SIP overlooks user’s confidentiality by leaving unprotected public and private identities. In IMS each user entering from another network like UMTS or VOLTE has to authenticate itself. However, it already passed through the same authentication process in its own network. Therefore, IMS core entities are affected by high signaling that could be a source of congestion. . The Session Initiation Protocol (SIP) is used in IMS to establish and manage sessions. It is easy for a hacker to attack IMS with flooding SIP messages. However, IMS does not provide any functions to prevent such kind of attacks. This research presents a secure aauthentication protocol (SAP) which creates a secure channel through the deployment of KMC (Key Management Center) for transmitting user identities; ECC (Elliptic curve cryptography) is used for key generation that provides reduced encryption and decryption time than existing schemes for IMS. FAP strives to minimize signaling overhead of periodic re-authentications. Once a user completes authentication, FAP grants a valid ticket for a particular time which can be used for subsequent re-authentications until it expires. This research introduce a header in SIP to hold the ticket. This research employ protocol composition logic for formal modeling and verification of SAP. The performance of SAP, FAP is validated through FOKUS IMS test bed. The results demonstrate the performance appraisal of FAP compared to other contemporary schemes in terms of signaling overhead, bandwidth consumption and response time. This research presents a Low congestion and Certificate based One-pass Authentication Protocol (COAP) that avoids duplication of authentication steps and makes its authentication efficient through the use of digital certificates. An authenticated user is allotted a certificate to restrict the repetition of complete authentication procedure until the certificate expires. COAP results in reduction of signaling traffic, which eliminates v the congestion problem, it also reduces bandwidth and delivery cost which make this scheme more efficient in terms of bandwidth consumption. An intrusion detection system is designed where a pair of subsystems is working, one is spoofing detection and prevention subsystem and other is flooding detection and prevention subsystem. A zero-watermarking scheme detects the spoofing attack.Watermark embedding is done by the original author and extraction done later by KMC to prove ownership. The flooding detection system is working on misuse rules and anomaly detection algorithms which provide successful detection and prevention for IMS and VOLTE environment. The results has shown that better than other schemes it is compared to i.e. when the no of requests are 30 the detection rate is 90.19 however, when no of request are 40 the accuracy rate of the proposed scheme is 100 percent.