Kelman's source characteristics

Last updated

Kelman's source characteristics identify three characteristics of successful marketing communications sources:

Contents

  1. source credibility
  2. source attractiveness
  3. source power.

Source attractiveness

An attractive source is one that the receiver can identify with, or aspire to. The message from such as source is identified with by the receiver; e.g. "slice of life" advertising, for products such as washing powder, regularly feature actors in situations that are intended to reflect the lives of the target segment.

Source power

A powerful source is intended to bring about compliance in the receiver. An example would be a police officer giving an anti-drink drive message.

Related Research Articles

<span class="mw-page-title-main">Error detection and correction</span> Techniques that enable reliable delivery of digital data over unreliable communication channels

In information theory and coding theory with applications in computer science and telecommunication, error detection and correction (EDAC) or error control are techniques that enable reliable delivery of digital data over unreliable communication channels. Many communication channels are subject to channel noise, and thus errors may be introduced during transmission from the source to a receiver. Error detection techniques allow detecting such errors, while error correction enables reconstruction of the original data in many cases.

<span class="mw-page-title-main">Signals intelligence</span> Intelligence-gathering by interception of signals

Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis. Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis.

<span class="mw-page-title-main">SOAP</span> Messaging protocol for web services

SOAP is a messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. It uses XML Information Set for its message format, and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP), although some legacy systems communicate over Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.

A communications system or communication system is a collection of individual telecommunications networks systems, relay stations, tributary stations, and terminal equipment usually capable of interconnection and interoperation to form an integrated whole. The components of a communications system serve a common purpose, are technically compatible, use common procedures, respond to controls, and operate in union.

Direct Client-to-Client (DCC) is an IRC-related sub-protocol enabling peers to interconnect using an IRC server for handshaking in order to exchange files or perform non-relayed chats. Once established, a typical DCC session runs independently from the IRC server. Originally designed to be used with ircII it is now supported by many IRC clients. Some peer-to-peer clients on napster-protocol servers also have DCC send/get capability, including TekNap, SunshineUN and Lopster. A variation of the DCC protocol called SDCC, also known as DCC SCHAT supports encrypted connections. An RFC specification on the use of DCC does not exist.

Sender Policy Framework (SPF) is an email authentication method which ensures the sending mail server is authorized to originate mail from the email sender's domain. This authentication only applies to the email sender listed in the "envelope from" field during the initial SMTP connection. If the email is bounced, a message is sent to this address, and for downstream transmission it typically appears in the "Return-Path" header. To authenticate the email address which is actually visible to recipients on the "From:" line, other technologies such as DMARC must be used. Forgery of this address is known as email spoofing, and is often used in phishing and email spam.

The Resource Reservation Protocol (RSVP) is a transport layer protocol designed to reserve resources across a network using the integrated services model. RSVP operates over an IPv4 or IPv6 and provides receiver-initiated setup of resource reservations for multicast or unicast data flows. It does not transport application data but is similar to a control protocol, like Internet Control Message Protocol (ICMP) or Internet Group Management Protocol (IGMP). RSVP is described in RFC 2205.

Marketing communications refers to the use of different marketing channels and tools in combination. Marketing communication channels focus on how businesses communicate a message to its desired market, or the market in general. It is also in charge of the internal communications of the organization. Marketing communication tools include advertising, personal selling, direct marketing, sponsorship, communication, public relations, social media, customer journey and promotion.

The RTP Control Protocol (RTCP) is a binary-encoded out-of-band signaling protocol that functions alongside the Real-time Transport Protocol (RTP). Its basic functionality and packet structure is defined in RFC 3550. RTCP provides statistics and control information for an RTP session. It partners with RTP in the delivery and packaging of multimedia data but does not transport any media data itself.

<span class="mw-page-title-main">NAVTEX</span> System for remotely transmitting printed notices to ships

NAVTEX, sometimes styled Navtex or NavTex, is an international automated medium frequency direct-printing service for delivery of navigational and meteorological warnings and forecasts, as well as urgent maritime safety information (MSI) to ships.

<span class="mw-page-title-main">Advertising campaign</span> Advertisements based on a theme

An advertising campaign is a series of advertisement messages that share a single idea and theme which make up an integrated marketing communication (IMC). An IMC is a platform in which a group of people can group their ideas, beliefs, and concepts into one large media base. Advertising campaigns utilize diverse media channels over a particular time frame and target identified audiences.

<span class="mw-page-title-main">Broadcasting (networking)</span> Network messaging to multiple recipients simultaneously

In computer networking, telecommunication and information theory, broadcasting is a method of transferring a message to all recipients simultaneously. Broadcasting can be performed as a high-level operation in a program, for example, broadcasting in Message Passing Interface, or it may be a low-level networking operation, for example broadcasting on Ethernet.

Security testing is a process intended to detect flaws in the security mechanisms of an information system and as such help enable it to protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing the security testing process is not an indication that no flaws exist or that the system adequately satisfies the security requirements.

<span class="mw-page-title-main">Shannon–Weaver model</span> Linear model of communication

The Shannon–Weaver model is one of the first and most influential models of communication. It was initially published in the 1948 paper "A Mathematical Theory of Communication" and explains communication in terms of five basic components: a source, a transmitter, a channel, a receiver, and a destination. The source produces the original message. The transmitter translates the message into a signal, which is sent using a channel. The receiver translates the signal back into the original message and makes it available to the destination. For a landline phone call, the person calling is the source. They use the telephone as a transmitter, which produces an electric signal that is sent through the wire as a channel. The person receiving the call is the destination and their telephone is the receiver.

In computer networking, out-of-band data is the data transferred through a stream that is independent from the main in-band data stream. An out-of-band data mechanism provides a conceptually independent channel, which allows any data sent via that mechanism to be kept separate from in-band data. The out-of-band data mechanism should be provided as an inherent characteristic of the data channel and transmission protocol, rather than requiring a separate channel and endpoints to be established. The term "out-of-band data" probably derives from out-of-band signaling, as used in the telecommunications industry.

In social psychology, the Yale attitude change approach is the study of the conditions under which people are most likely to change their attitudes in response to persuasive messages. This approach to persuasive communications was first studied by Carl Hovland and his colleagues at Yale University during World War II. The basic model of this approach can be described as "who said what to whom": the source of the communication, the nature of the communication and the nature of the audience. According to this approach, many factors affect each component of a persuasive communication. The credibility and attractiveness of the communicator (source), the quality and sincerity of the message, and the attention, intelligence and age of the audience can influence an audience's attitude change with a persuasive communication. Independent variables include the source, message, medium and audience, with the dependent variable the effect of the persuasion.

Multicast is what enables a node on a network to address one unit of data to a specific group of receivers. In interactive multicast at the data link or network layer, such as IP multicast, Ethernet multicast or MBMS service over cellular network, receivers may join and leave the group using an interaction channel. Only one copy of the data is sent from the source, and multiple copies are created and then sent to the desired recipient by the network infrastructure nodes. In for example IP multicast, a multicast group is identified by a class D IP address. A host enters or exits a group using IGMP. A message sent via multicast is sent to all nodes on the network, but only the intended nodes accept the multicast frames. Multicasting is useful in situations such as video conferencing and online gaming. Multicast was used originally in LANs, with Ethernet being the best example. A problem with multicast communication is that it is difficult to guarantee that only designated receivers receive the data being sent. This is largely because multicast groups are always changing; users come and go at any time. A solution to the problem of ensuring that only the chosen recipient obtains the data is known as multicast encryption.

<span class="mw-page-title-main">Models of communication</span> Simplified representations of communication

Models of communication are simplified representations of the process of communication. Most models try to describe both verbal and non-verbal communication and often understand it as an exchange of messages. Their function is to give a compact overview of the complex process of communication. This helps researchers formulate hypotheses, apply communication-related concepts to real-world cases, and test predictions. Despite their usefulness, many models are criticized based on the claim that they are too simple because they leave out essential aspects. The components and their interactions are usually presented in the form of a diagram. Some basic components and interactions reappear in many of the models. They include the idea that a sender encodes information in the form of a message and sends it to a receiver through a channel. The receiver needs to decode the message to understand the initial idea and provides some form of feedback. In both cases, noise may interfere and distort the message.

Nonverbal influence is the act of affecting or inspiring change in others' behaviors and attitudes by way of tone of voice or body language and other cues like facial expression. This act of getting others to embrace or resist new attitudes can be achieved with or without the use of spoken language. It is a subtopic of nonverbal communication. Many individuals instinctively associate persuasion with verbal messages. Nonverbal influence emphasizes the persuasive power and influence of nonverbal communication. Nonverbal influence includes appeals to attraction, similarity and intimacy.

<span class="mw-page-title-main">Source–message–channel–receiver model of communication</span> Linear transmission model of communication

The source–message–channel–receiver model is a linear transmission model of communication. It is also referred to as the sender–message–channel–receiver model, the SMCR model, and Berlo's model. It was first published by David Berlo in his 1960 book The Process of Communication. It contains a detailed discussion of the four main components of communication: source, message, channel, and receiver. Source and receiver are usually distinct persons but can also be groups and, in some cases, the same entity acts both as source and receiver. Berlo discusses both verbal and non-verbal communication and sees all forms of communication as attempts by the source to influence the behavior of the receiver. The source tries to achieve this by formulating a communicative intention and encoding it in the form of a message. The message is sent to the receiver using a channel and has to be decoded so they can understand it and react to it. The efficiency or fidelity of communication is defined by the degree to which the reaction of the receiver matches the purpose motivating the source.

References