GET THE APP

..

Journal of Mass Communication & Journalism

ISSN: 2165-7912

Open Access

Volume 9, Issue 5 (2019)

Research Article Pages: 1 - 7

Sensationalism in Journalism Practice: Analysis of Private and Public Print Media Coverage of Crisis Situations in Cameroon

Kingsley Lyonga Ngange and Forcha Dominic Elempia

Newspapers in Cameroon are increasingly attempting to lure audience and increase readership amidst stiff competition. This competition for audience and the attempt to set the agenda for the public have made many media houses to implore controversial techniques of presentation of news such as sensitive and captivating headlines, shocking images, emotional headlines, rumours, obscenity and a reduced emphasis on verification. This research examines the Cameroon print media landscape and provides empirical evidence of the presence of sensationalism in the Cameroon press and more particularly during crisis situations. A content analysis of ‘The Post Newspaper’, ‘The Guardian Post Newspaper’, and ‘Cameroon Tribune Newspaper’ is done, based on the theoretical underpinnings of the Social Responsibility theory, which highlights media’s obligations to the public. While the private press is more sensational, the public press, due to its status, tends to calm down things by using very mild tones and at times avoiding to report on controversial or crisis situations or paying less emphasis on them. The findings from 102 issues analysed reveal that the private press is notorious for using emotional headlines, rumours, imagery and very hard tone especially when it comes to criticising Government action during crisis situations. Some of the reasons which motivate sensationalism, like competition, financial gains and political leanings, have been revealed in the study. Thus, the research concludes that in addition to the many causes of sensationalism practices in journalism, the media is more likely to be sensational when it sympathises with a particular course during crisis situations. The major recommendation is that need exists for the Cameroon press to respect the basic canons of the profession (accuracy, fairness, balance and objectivity) in reporting, especially during crisis situations.

Research Article Pages: 1 - 7

Role of Indomie?¢????s ?¢????Like No Other?¢??? Campaign in Cultivating Pester Power in the Children of Eleko Community, Lagos

Nnawuihe D and Ogbu SU

‘Pester power’ as a marketing strategy used in targeting kids has been a controversial topic for ages. Critics express concern over its negative results such as parent-child conflict, health hazards from unhealthy food consumption, unethical manipulation of children, etc. This births the question – who or what cultivates ‘pester power’ in children? While some scholars attribute the cultivation of pester power to advertisers, others suggest that the concept is a socially driven phenomena that has existed long before the coinage of the term. This study is an attempt to explore the concept of ‘pester power’ and determine the factors responsible for its cultivation in children by using Indomie’s “like no other” campaign as its focus. From the prisms of the Cognitive Development Theory and the AIDA Model, the study examined the processes of cultivating pester power in the early developmental stages of children in Eleko Community, Ibeju-Lekki, Lagos State. Exploratory research design comprising of both quantitative and qualitative methods was used for this investigation. Data was gathered from 244 questionnaires as well as interviews of five parents in the Eleko community. Results of the research revealed that Indomie “like no other” advertisement, parents and other identified factors played contributory roles in cultivating the children’s pester power. Based on these findings, the study recommends that parents should exercise better control over the exposure of their children to television and the communication patterns they create at home. The study makes the case for a stronger regulation of advertisement contents that target children as consumers and for further research on this sensitive subject matter.

Short Communication Pages: 1 - 3

An Exploration of Video Consumption Habits

Weiland SJ and Bromberg C

The purpose of this phenomenological study was to explore video consumption habits. The researchers wondered if viewers who engage in heavy consumption of video on demand (VOD) might see the world in a different way than others who do not engage in heavy consumption of VOD. An interview of 25 participants led to mixed responses. The theme of “procrastination” quickly emerged. Participants indicated that they consume video on television and video on demand on an equal basis, which contradicts current literature on the subject. The majority of respondents noted that they multi-task while watching traditional television or video on demand. The majority of respondents also noted that they engage in procrastination because of heavy consumption of video on demand.

Research Article Pages: 1 - 5

An Exploratory Factor Analysis of AI Enabled SE Attacking Risk in Higher Learning Institute

Khidzir NZ and Abdullah-Al-Musa Ahmed S

Any kind of business organization or individual organization one word is very common that is information. Depending on the information and its communication medium ensure the effective of business. Whereas it is very much essential to understanding Artificial Intelligence (AI) Enabled Social Engineering (SE) attacks and its security risk management approach. Under such circumstance, information is exchanged from one country to another country for various purposes. In that case, artificial intelligence enabled social engineering attack must be considered in any kind of organization. Any kind of business venture is disturbed by this kind of attacks which will be failure the business operation, whilst enabling them to concentrate on their core business activities. Social engineering is one kind of criminal activities in the information security. It has proven to be very successful way for a criminal to get inside an organization. Once social engineering got password from an employee, then snooping around the sensitive data. However social engineering are the types of attacks inherent risk and any kind of organization should be aware of its potential risks. So, it could be identify and resolved quickly. The objective of this article, therefore, conducting an Exploratory Factor Analysis (EFA) in artificial intelligence enabled social engineering attacks on various organizations. Which consequently provide knowledge of the most relevant information security risk factor. For this article distributed 300 questionnaires in education sector for the study and 110 were returned. That means the response rate is 36%. In that case, the finding of the article shows that threat and vulnerability factors in artificial intelligence enabled social engineering attacks. So, for any organization these two factors are the most
for information security risk. 

arrow_upward arrow_upward