{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T19:33:24Z","timestamp":1777750404337,"version":"3.51.4"},"reference-count":33,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T00:00:00Z","timestamp":1194912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This study aims to examine the phenomenon of consumers' willingness to give permission to receive short message service (SMS) advertisements. The purpose of this research is threefold: to better understand the phenomenon of consumers' willingness to give permission to receive text message (SMS) advertisements, to provide empirical data that supports our understanding, and to develop and test a basic model of consumers' willingness to give permission to receive SMS advertisements.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The study utilised a multi\u2010method research approach with both qualitative and quantitative data \u2013 via focus group and scenario\u2010based survey.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results show that even if the relevance of the advertisement is high it does not on its own make consumers give permission; it needs to be combined with the control over opt\u2010in conditions to assure consumers and gain permission. Regarding brand familiarity, this appears to have little impact on consumers' willingness to give permission to receive SMS advertisements. The opt\u2010in conditions valued the most are: the possibility to withdraw at any time, personal data disclosure only with consent, and mobile phone operators as a primary advertising filter.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The principal contribution of the paper is in furthering our understanding of the concept of permission as related to the emerging topic of SMS advertising. The paper provides evidence and data triangulation in an area that so far has had little empirical investigation.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637150710834578","type":"journal-article","created":{"date-parts":[[2007,11,17]],"date-time":"2007-11-17T07:02:59Z","timestamp":1195282979000},"page":"815-829","source":"Crossref","is-referenced-by-count":43,"title":["SMS advertising, permission and the consumer: a study"],"prefix":"10.1108","volume":"13","author":[{"given":"Fatim","family":"Bamba","sequence":"first","affiliation":[]},{"given":"Stuart J.","family":"Barnes","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022022020283802800_b2","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1991), \u201cThe theory of planned behaviour\u201d, Organizational Behavior and Human Decision Processes, Vol. 50, pp. 179\u2010211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2022022020283802800_b1","doi-asserted-by":"crossref","unstructured":"Akaah, I.P., Korgaonkar, P.K. and Lund, D. (1995), \u201cDirect marketing attitudes\u201d, Journal of Business Research, Vol. 34 No. 3, pp. 211\u20109.","DOI":"10.1016\/0148-2963(94)00119-Y"},{"key":"key2022022020283802800_b3","doi-asserted-by":"crossref","unstructured":"Barnes, S.J. (2002), \u201cWireless digital advertising: nature and implications\u201d, International Journal of Advertising, Vol. 21 No. 3, pp. 399\u2010420.","DOI":"10.1080\/02650487.2002.11104939"},{"key":"key2022022020283802800_b4","unstructured":"Barnes, S. and Scornavacca, E. Jr (2003), \u201cMobile marketing: the role of permission and acceptance\u201d, Proceedings of the Second International Conference on Mobile Business, Vienna, Austria."},{"key":"key2022022020283802800_b6","doi-asserted-by":"crossref","unstructured":"Barwise, P. and Strong, C. (2002), \u201cPermission\u2010based mobile advertising\u201d, Journal of Interactive Marketing, Vol. 16 No. 1, pp. 14\u201024.","DOI":"10.1002\/dir.10000"},{"key":"key2022022020283802800_b5","unstructured":"Bauer, H., Barnes, S.J., Neumann, M. and Reichardt, T. (2005), \u201cDriving consumer acceptance of mobile marketing: a theoretical framework and empirical study\u201d, Journal of Electronic Commerce Research, Vol. 6 No. 4, pp. 181\u201092."},{"key":"key2022022020283802800_b7","doi-asserted-by":"crossref","unstructured":"Bellman, S., Johnson, J. and Lohse, G.L. (2001), \u201cTo opt\u2010in or opt\u2010out? It depends on the question\u201d, Communications of the ACM, Vol. 44 No. 2, pp. 25\u20107.","DOI":"10.1145\/359205.359241"},{"key":"key2022022020283802800_b8","unstructured":"Carroll, A., Barnes, S.J. and Scornavacca, E. Jr (2005), \u201cConsumers' perceptions and attitudes towards SMS mobile marketing in New Zealand\u201d, Proceedings of the Fourth International Conference on Mobile Business, Sydney, Australia, 11\u201013 July, pp. 434\u201044."},{"key":"key2022022020283802800_b9","unstructured":"Chaffey, D. (2003), E\u2010Business and E\u2010Commerce Management, Prentice\u2010Hall, London."},{"key":"key2022022020283802800_b10","unstructured":"Creswell, J.W. (2003), Research Design: Qualitative, Quantitative, and Mixed Approaches, Sage, London."},{"key":"key2022022020283802800_b11","doi-asserted-by":"crossref","unstructured":"Dickinger, A., Scharl, A. and Murphy, J. (2005), \u201cDiffusion and success factors of mobile marketing\u201d, Electronic Commerce Research and Applications, Vol. 4 No. 2, pp. 159\u201073.","DOI":"10.1016\/j.elerap.2004.10.006"},{"key":"key2022022020283802800_b12","doi-asserted-by":"crossref","unstructured":"Dickinger, A., Haghirian, P., Murphy, J. and Scharl, A. (2004), \u201cAn investigation and conceptual model of SMS marketing\u201d, Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, January.","DOI":"10.1109\/HICSS.2004.1265096"},{"key":"key2022022020283802800_b13","unstructured":"Enpocket (2005a), \u201cDirect Response Report\u201d, available at: www.enpocket.co.uk (accessed 10 February 2006)."},{"key":"key2022022020283802800_b14","unstructured":"Enpocket (2005b), \u201cConsumer Preferences Report\u201d, available at: www.enpocket.co.uk (accessed 10 February 2006)."},{"key":"key2022022020283802800_b15","unstructured":"Enpocket (2005c), \u201cBrand performance of SMS advertising\u201d, available at: www.enpocket.co.uk (accessed 10 February 2006)."},{"key":"key2022022020283802800_b17","unstructured":"Godin, S. (1999), Permission Marketing: Turning Strangers into Friends, and Friends into Customers, Simon and Schuster, New York, NY."},{"key":"key2022022020283802800_b18","unstructured":"Hoyer, W.D. and MacInnis, D.J. (2004), Consumer Behavior, Houghton Mifflin, New York, NY."},{"key":"key2022022020283802800_b19","doi-asserted-by":"crossref","unstructured":"Hristova, N. and O'Hare, G. (2004), \u201cAd\u2010me: wireless advertising adapted to the user location, device and emotions\u201d, Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, January.","DOI":"10.1109\/HICSS.2004.1265673"},{"key":"key2022022020283802800_b20","unstructured":"Jelassi, T. and Enders, A. (2004), \u201cLeveraging wireless technology for mobile advertising\u201d, Proceedings of the 12th European Conference on Information Systems, Turku, Finland, 14\u201016 June."},{"key":"key2022022020283802800_b21","unstructured":"Jupiter Research (2004), Wireless Market Forecast, 2004 to 2009, available at: www.jupiterresearch.com\/ (accessed 7 February 2005)."},{"key":"key2022022020283802800_b22","unstructured":"Kotler, P., Armstrong, G., Saunders, J. and Wang, V. (2002), Principles of Marketing: European Edition, Prentice\u2010Hall, London."},{"key":"key2022022020283802800_b23","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, S. (2001), \u201cA comprehensive analysis of permission marketing\u201d, Journal of Computer Mediated Communication, Vol. 6 No. 2, available at: www.ascusc.org\/jcmc\/vol6\/issue2\/krishnamurthy.html (accessed 10 February 2006).","DOI":"10.1111\/j.1083-6101.2001.tb00119.x"},{"key":"key2022022020283802800_b25","unstructured":"Milne, G.M., Boza, M.E. and Rohm, A. (1999), \u201cControlling personal information in marketing databases: a consumer perspective\u201d, Proceedings of the American Marketing Association Winter Meeting."},{"key":"key2022022020283802800_b26","unstructured":"Patton, M.Q. (2002), Qualitative Research and Evaluation Methods, Sage, Thousand Oaks, CA."},{"key":"key2022022020283802800_b27","doi-asserted-by":"crossref","unstructured":"Petty, R.D. (2000), \u201cMarketing without consent: consumer choice and cost, privacy and public policy\u201d, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 42\u201053.","DOI":"10.1509\/jppm.19.1.42.16940"},{"key":"key2022022020283802800_b28","doi-asserted-by":"crossref","unstructured":"Phelps, J., Wowak, G. and Ferrell, E. (2000), \u201cPrivacy concerns and consumer willingness to provide personal information\u201d, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 27\u201041.","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"key2022022020283802800_b29","unstructured":"Saunders, M., Lewis, P. and Thornhill, A. (2003), Research Methods for Business Students, Prentice\u2010Hall, London."},{"key":"key2022022020283802800_b30","doi-asserted-by":"crossref","unstructured":"Sheehan, K.B. and Hoy, M.G. (2000), \u201cDimensions of privacy concerns among online consumers\u201d, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 62\u201073.","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"key2022022020283802800_b31","doi-asserted-by":"crossref","unstructured":"Tezinde, T., Smith, B. and Murphy, J. (2002), \u201cGetting permission: exploring factors affecting permission marketing\u201d, Journal of Interactive Marketing, Vol. 16 No. 4, pp. 28\u201036.","DOI":"10.1002\/dir.10041"},{"key":"key2022022020283802800_b32","unstructured":"Ververidis, C. and Polyzos, G. (2002), \u201cMobile marketing using location\u2010based services\u201d, Proceedings of the First International Conference on Mobile Business, Athens, Greece."},{"key":"key2022022020283802800_b33","doi-asserted-by":"crossref","unstructured":"Wu, J. and Wang, S. (2005), \u201cWhat drives mobile commerce? An empirical evaluation of the revised technology acceptance model\u201d, Information & Management, Vol. 42 No. 5, pp. 719\u201029.","DOI":"10.1016\/j.im.2004.07.001"},{"key":"key2022022020283802800_frd1","doi-asserted-by":"crossref","unstructured":"Faulkner, X. and Culwin, F. (2005), \u201cWhen fingers do the talking: a study of text messaging\u201d, Interacting with Computers, Vol. 17 No. 2, pp. 167\u201085.","DOI":"10.1016\/j.intcom.2004.11.002"},{"key":"key2022022020283802800_frd2","doi-asserted-by":"crossref","unstructured":"Milne, G. and Gordon, M. (1993), \u201cDirect mail privacy\u2010efficiency trade\u2010offs within an implied social contract framework\u201d, Journal of Public Policy & Marketing, Vol. 12 No. 2, pp. 206\u201016.","DOI":"10.1177\/074391569101200206"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637150710834578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710834578\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710834578\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:03Z","timestamp":1753403763000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/13\/6\/815-829\/272586"}},"subtitle":[],"editor":[{"given":"Ragnar","family":"Schierholz","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,11,13]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,11,13]]}},"alternative-id":["10.1108\/14637150710834578"],"URL":"https:\/\/doi.org\/10.1108\/14637150710834578","relation":{},"ISSN":["1463-7154"],"issn-type":[{"value":"1463-7154","type":"print"}],"subject":[],"published":{"date-parts":[[2007,11,13]]}}}