Professional Documents
Culture Documents
Full Ebook of Integrated Marketing Communication Advertising and Promotion in A Digital World 2Nd Edition Jerome M Juska Online PDF All Chapter
Full Ebook of Integrated Marketing Communication Advertising and Promotion in A Digital World 2Nd Edition Jerome M Juska Online PDF All Chapter
https://ebookmeta.com/product/ise-advertising-and-promotion-an-
integrated-marketing-communications-perspective-12th-edition-
george-belch/
https://ebookmeta.com/product/advertising-and-integrated-brand-
promotion-8th-edition-thomas-oguinn/
https://ebookmeta.com/product/contemporary-advertising-and-
integrated-marketing-communications-15th-edition-william-f-arens/
https://ebookmeta.com/product/paid-attention-innovative-
advertising-for-a-digital-world-2nd-edition-faris-yakob/
Innovation in Advertising and Branding Communication
1st Edition Lluís Mas Manchón
https://ebookmeta.com/product/innovation-in-advertising-and-
branding-communication-1st-edition-lluis-mas-manchon/
https://ebookmeta.com/product/principles-of-integrated-marketing-
communications-team-ira-2nd-edition-lawrence-ang/
https://ebookmeta.com/product/marketing-management-a-cultural-
perspective-2nd-edition-luca-m-visconti/
https://ebookmeta.com/product/influencer-marketing-for-brands-
what-youtube-and-instagram-can-teach-you-about-the-future-of-
digital-advertising-1st-edition-aron-levin/
https://ebookmeta.com/product/place-event-marketing-in-the-asia-
pacific-region-branding-and-promotion-in-cities-1st-edition-
waldemar-cudny-editor/
Integrated Marketing
Communication
Second Edition
Jerome M. Juska
Cover image: © Getty Images
and by Routledge
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
The right of Jerome M. Juska to be identified as author of this work has been
asserted in accordance with sections 77 and 78 of the Copyright, Designs and
Patents Act 1988.
DOI: 10.4324/9780367443382
Typeset in Sabon-Roman
by Deanta Global Publishing Services, Chennai, India
Dedicationxxi
Authorxxiii
Forewordxxv
Prefacexxix
v
Contents
vi
Detailed Contents
Dedicationxxi
Authorxxiii
Forewordxxv
Prefacexxix
vii
Detailed Contents
viii
Detailed Contents
Advertisers39
Consumer Advertising 39
B2B Advertising 40
Agricultural Advertising 40
Government Advertising 40
Non-Profit Advertising 41
Advocacy Advertising 41
Agencies41
Types of Agency 41
Methods of Compensation 43
Employment Positions and Functions 44
Selection Procedures for a New Agency 44
Media44
Suppliers45
Research Firms 45
Production Companies 46
Independent Consultants 46
Technological Support 46
The Customer’s Journey 46
AIDA Model 47
Sales Funnel 48
Top of the Funnel 48
Middle of the Funnel 49
Bottom of the Funnel 49
Attribution Model 50
The IMC Planning Process 51
Purpose of the Plan 51
Responsibility for Development 52
Procedures for Approval 53
Structure of the IMC Plan 53
Executive Summary 54
Marketing Research 55
Segmentation Strategies 55
Target Audience 55
Communication Objectives 56
Budget Allocations 56
Creative Message Strategies 57
Media Delivery Strategies 57
Performance Metrics 57
Summary58
Discussion Questions 58
Chapter Assignments 59
Continuity Case Study 59
IMC Plan Development 60
ix
Detailed Contents
x
Detailed Contents
xi
Detailed Contents
xii
Detailed Contents
xiii
Detailed Contents
Teaser143
Technical143
Testimonial144
User-Generated144
Format for Creative Proposal 144
Copy and Layout 145
Audio Scripts 146
Wireframes147
Evaluating Creative Presentations 148
Agency Perspective 148
Advertiser’s Reaction 148
Summary149
Discussion Questions 150
Chapter Assignments 150
Continuity Case Study 150
IMC Plan Development 151
xiv
Detailed Contents
xv
Detailed Contents
Radio209
Station Formats 209
Dayparts 209
Average Quarter Hour (AQH) 209
Cumes 210
Total Audience Plans (TAP) 211
Outdoor/Transit Advertising 212
Outdoor Bulletins 213
Showings 213
Transit Advertising 214
Preparing Media Spreadsheets 215
Summary216
Discussion Questions 216
Chapter Assignments 217
Continuity Case Study 217
IMC Plan Development 218
xvi
Detailed Contents
xvii
Detailed Contents
xviii
Detailed Contents
xix
Dedication
When my entire life has revolved around advertising and marketing communication,
it is very difficult to thank everyone who has helped and supported me during
my professional and academic career. My long list would include so many
professors and administrators along with corporate managers and executives. And,
there is a multitude of long-time friends, family members, neighbors, and casual
acquaintances. So many people were important and valued!
Let me begin with the primary reasons for writing this textbook. At the top of my list
are my parents, Tony and Felicia Juska, who always provided me with inspiration,
guidance, and tremendous support. It was my mother’s creative spirit, enthusiasm,
and compassion plus my father’s determination, persistence, and motivation that
forged my perspective and personality.
And, to my Northwestern classmates, thank you for the memories and friendships
over the years.
My next thank you is given to Dr. Greg Marshall, the distinguished marketing
professor and former editor of the Journal of Marketing. As an experienced and
successful textbook author, Greg gave me insights on the publishing process and
challenges involved with preparing a manuscript. Knowing what to expect next
was an important part of completing the project.
xxi
I also want to thank Dr. Tulay Girard, a talented marketing professor at Penn State
University. Tulay and I have continually shared academic thoughts and theories of
advertising, social media, and marketing communication since our days together at
Nova Southeastern University. Over many years, we have built a lasting friendship
together, along with her husband, Bill.
I also have deep respect and admiration for Professor Yasuhiko Kobayashi at Aoyama
Gakuin University in Tokyo, Japan. During the years, I enjoyed many visits and
experiences, especially involving Dentsu, the largest advertising agency in Japan, and
Nihon Keizai Shimbun, publisher of the Japan Economic Journal. I also have many
friends at academic institutions in Europe, including: Franklin University in Lugano,
Switzerland, the American University in Paris, Passau University in Germany, Bocconi
University in Milan, and Jyvaskyla University in Finland.
There are also thanks and gratitude for the wisdom of many other people, such as
Joe Cappo, retired editor of Advertising Age, and Dan O’Brien, former Director of
Advertising at Accenture.
Plus, great friends from San Francisco to New York and from Chicago to Miami,
including Jack Minkow, Dor Novak, Ron Krisik, Brent Kubasta, Rafael Martinez-
Pratts, Dr. Julia Maskivker, Dr. Kent Williams, and Dr. Arnold Harrison, who have
helped me in so many different ways over the years by reminding me to count my
blessings and good fortune.
And finally, I want to acknowledge the love and affection of my wonderful wife,
Adriana Schiavon. During all the long hours of writing a textbook and computer-
filled weekends of writing, she was always patient and understanding. The challenge
of completing this textbook was met during the dark specter of the pandemic,
which interrupted our lives and made everything more difficult, especially while
teaching several courses online during the process. Without Adriana, I am not sure
if I could have endured the barriers and limited resources.
My final dedication is to everyone who will be reading this textbook. I may never
meet you, know your name, or contact you, but my desire is to inspire you by
sharing this information and learning experience. Please use it, apply it, and grow
with knowledge and exciting new insights!
Author
xxiii
Foreword
In Chapter 1, the textbook begins with a glimpse of the future. The author has
taken the position that artificial intelligence and machine/human interactions will
precipitate another transformation of the marketing communication industry.
The introduction of digital media and mobile apps was only the beginning of
a new landscape for delivering brand messages and building relationships with
consumers. New technologies, such as facial recognition and seamless voice com-
merce, have the potential to reach and respond to potential buyers in remarkably
innovative ways.
While there are many concerns about privacy and surveillance, technology is
moving faster than our ability to adapt to it. The increased use of synthetic media
and computer-created avatars, along with the brave new world of artificial reality
with social media, is offering new communication opportunities for advertisers.
The most amazing vision of the future is exemplified by entrepreneurs like Elon
Musk, who is disrupting the communication industry by launching thousands of
Earth-orbiting satellites with SpaceX to create a private Internet system.
In Chapter 2, the concept of Integrated Marketing Communication (IMC) is
introduced and discussed. This provides the framework for delivering brand con-
tent and persuasive messages through six functional pathways: advertising, sales
promotion, public relations, brand visibility, digital media platforms, and personal
contact. The structure of the IMC industry is outlined, based on the collabora-
tion among four separate groups: advertisers, agencies, media, and suppliers. The
chapter continues with the review of three models that illustrate the marketing
approach to a customer’s journey: the classical AIDA model, the digitally oriented
funnel model, and the complex attribution model. This leads into the preparation
of an IMC Plan, which is the blueprint for combining all the elements required for
strategic brand communication.
In Chapter 3, the foundation of the Integrated Marketing Communication plan
is built using the information and insights gathered from marketing research. This
includes both primary and secondary research. Four marketing research catego-
ries are reviewed: industry, product, communication, and consumer research. The
importance of quantitative and qualitative research is emphasized, as well as the
need for competitive information. Understanding the mind and mood of existing
customers and potential buyers is essential for making creative advertising and
effective media decisions. The focus is on the consumer’s needs and wants, not
just a product.
In Chapter 4, the importance of communication objectives is discussed with a
direct connection to performance measurements. However, this is preceded by the
xxv
Foreword
xxvi
Foreword
In Chapter 9, the concept of sales promotion is defined along with the impor-
tance of formulating specific promotional objectives. Multiple sales promotion
strategies are reviewed and organized according to four categories: price reduc-
tion, value invitation, psychological rewards, and targeted interactions. The uti-
lization of both paper and digital coupons is emphasized, along with the most
popular forms of promotions, such as buy-one get-one (BOGO), cash back, free
trial, gift merchandise, brand sampling, games and puzzles, contests, and sweep-
stakes. The importance of measurement is also discussed and related to specific
objectives for each individual sales promotion program.
In Chapter 10, the value of public relations is presented within the framework
of stakeholder relationships. Since publicity is considered to be a form of earned
media, the basic method of calculating its financial value is demonstrated. The
chapter continues with a review of the functions of a public relations department,
or agency, followed by recommendations for how these activities can support a
marketing communication plan. This includes mutual collaboration for new prod-
uct introductions, trade shows, and brand-sponsored activities and events.
In Chapter 11, brand visibility is defined with a list categories, including prod-
uct placement, venue identification, brand packaging, licensing rights, retail dis-
plays, and logo merchandise. Brand visibility is considered to be different from
sales promotion since it involves a longer time frame, greater permanence, and a
more substantial impact on consumer awareness of a brand. The financial value
of brand visibility can be calculated based on a media exposure model or by esti-
mating its contribution to image and desirability. Brand visibility extends into
retail store locations and selling environments through packaging, signage, and
portable aisle displays.
In Chapter 12, business-to-business (B2B) marketing communication strategies
are introduced. The emphasis is placed on inbound marketing as the most cost-
effective method but also as part of a balanced approach that includes vertical and
horizontal media. Trade shows have traditionally been the most important way
to interact with thousands of potential buyers in a single location during a three
or four-day period. But, digital technology has been introduced for virtual online
trade shows. This not only saves time and money but enables a greater amount of
connectivity among buyers and sellers. B2B activities revolve around the channel
of distribution, or marketing intermediaries, such as wholesalers, retailers, deal-
ers, distributors, and brokers. Marketing and merchandising support is offered
through a diverse assortment of financial and psychological incentives, including
volume discounts, price concessions, co-op advertising, and product information
training for sales people.
xxvii
Preface
Technology is changing the world faster than our ability to adjust. The impact
on marketing communication industry during the past 20 years was nothing less
than a seismic shift in the way that brand messages had been created, delivered,
and measured. And now, artificial reality is rapidly emerging as it promises to
launch another wave of digital transformations.
That is why the first chapter of this textbook begins which a brief perspective of
the future, including such topics as facial recognition, seamless voice marketing,
synthetic media, predictive analytics, and competitive Internet systems developed
from Spacex satellites and the vision of Elon Musk. While everything is becoming
more sophisticated and complex, there is no doubt about the growing importance
of artificial intelligence and human-to-machine interactions.
The dynamics of the marketplace has already adjusted. Everyone is simulta-
neously competing for customers and opportunities. Enormous amounts of data
and information are collected, analyzed, and utilized in a real-time marketing
environment. So, it is essential for MBA students, corporate managers, and entre-
preneurs to have a basic and practical understanding of Integrated Marketing
Communication. This includes knowledge of legacy media as well as digital
media, along with the process for researching, planning, and implementing brand
content and advertising messages.
Where do we go from here? That’s the next challenge that we need to prepare
for today.
— a voice from the future.
xxix
Chapter 1
Artificial Intelligence
Another Digital Transformation
for the Future of Marketing
Learning Objectives
1. Understand the significance of artificial intelligence for marketing
communication
2. Explore the emerging new technologies for advertising, promotion, and
public relations
3. Imagine the possibilities of voice-only product purchasing and synthetic
media
4. Investigate the potential of facial recognition and virtual reality for social
media
5. Consider the impact of multiple Internet systems and global brand
channels
Introduction
While the future is always filled with new innovations, artificial intelligence is
promising to accelerate that trend and to inject even more disruptive business
models and digital media transformations. So, what is the emerging technological
environment for Integrated Marketing Communication? And, how will it influ-
ence the way brands and companies interact with existing customers and potential
buyers? This chapter begins with a discussion of artificial intelligence and then
moves into an exploration of the most important new technologies shaping the
future.
DOI: 10.4324/9780367443382-1
1
Artificial Intelligence
In this chapter, we will briefly explore several of the most influential emerging
technologies. Most of these technologies are still evolving with plenty of obstacles,
problems, and challenges. Some might fail. And no doubt, many more will be
added. New approaches, innovations, and companies will appear with amazing
successes and disastrous collapses. But that isn’t so important. The critical chal-
lenge for corporations, small business owners, and entrepreneurs is to learn how
to incorporate these technologies into advertising, promotion, public relations,
and brand communication. It might be a lot to ask, but why not? There are only
three ways to get ready for the future: avoid it, create it, or quickly adapt to it. So,
let’s get started!
2
Artificial Intelligence
Hardware
Software
Artificial
Intelligence Systems Functions Behavior Abilities Communication
Processes
Interfaces
placing a remote-controlled vehicle the size of car, called Curiosity, on the surface
of Mars.
Elon Musk, the CEO of SpaceX, has an ambitious plan to get human to Mars
by 2026. The vehicle that will transport them to the Red Planet is the SpaceX
Starship, the largest rocket ever constructed at nearly 400 feet high or 120 meters
high, was put into orbital flight during 2021. Ultimately, Musk plans to schedule
multiple flights and even create a Mars Colony with its own rules, government,
and culture. But then, who can doubt the man who successfully created the Tesla
electric automobile?
So, what is artificial intelligence, and why is it important to marketing com-
munication? Let’s begin with an original, non-technical definition. Artificial intel-
ligence is “the interaction of computer hardware, software, systems, processes,
and interfaces that replicate human functions, behavior, abilities, and commu-
nication.” As shown in Figure 1.1, artificial intelligence has multiple connecting
points and interaction pathways with humans. As a result, artificial intelligence is
already performing many complex tasks and activities, such as facial recognition,
speech simulation, mood detection, physical mobility, and yes, even independent
decision-making.
Threats to Privacy
On a more philosophical level, artificial intelligence is also a threat. First, our
privacy is no longer as free and unrestricted as in previous years. Cameras are eve-
rywhere. They are located in stores, office buildings, street corners, parking lots,
restaurants, and even in our own homes. Plus, nearly everyone is walking, talking,
or looking into a small camera in their smartphone. Second, data about you, and
everyone else, is continually being collected, analyzed, stored, and in some cases,
illegally shared with others. And many times, this personal data is sold to third
parties without controls or restrictions. This includes the search results from our
computers, the products and services we purchase, the pets we own, the pho-
tos we share on social media, and probably even the things we did last summer.
And finally, intelligent machines in the form of autonomous robots are replacing
humans at an alarming rate. No one is exempt. Nothing is impossible. Machines
3
Artificial Intelligence
that think can quickly and efficiently complete physical work, solve the most com-
plex mathematical problems, design a building, and even predict our behavior.
The advantages and disadvantages of artificial intelligence will continue to be dis-
cussed with greater intensity and concern. Yet, humans created all the hardware,
software, systems, processes, and interfaces for artificial intelligence. Is it possible
that machines will eventually become inorganic duplicates of humans? It’s more
than just a science fiction story. It just might be a future reality.
Data-Driven Marketing
We are also experiencing an increase in data-driven marketing. This can be any-
thing from predictive analytics to programmatic media buying. The foundation
of this process is displayed in Figure 1.2. This is a simplification of the activity,
Acquisition Classification
Data
Distribution Interaction
4
Artificial Intelligence
but it does provide a framework. These are the four pillars of data-driven mar-
keting: acquisition, classification, delegation, and interaction. The acquisition of
data is really a combination of the production or generation of data along with a
simultaneous ability to retain large volumes of data. The Apple iPhone, which was
introduced way back in 2007, was the initial force behind the accelerating curve
of data. The iPhone has continued to evolve and every year offers new features,
options, and models. The capability to share photos and videos contributed to
the data explosion. And, there was also the ability to share and distribute user-
generated video content on YouTube. The final ingredient was the growth of cloud
computing, especially Amazon Web Services (AWS), which has silently dominated
the market for storage of data with millions of interconnected servers and com-
plex data networks.
The other phases of data-driven marketing are most frequently associated with
the decision sciences, along with knowledge management, while marketing is
dependent on management information systems. That is where classification and
delegation originate, especially when there is any interaction between humans and
machines. Social media is the primary data-generating activity involved with con-
sumer communication, while brand marketing focuses on increasing website traffic.
In the next 10 years, our personal communication with artificial intelligence
will dramatically change. It will be faster and more complex but will gradually
blend into a more natural style. The millions of algorithms that digital scientists
and engineers will be creating will go much further, probably well beyond our
comprehension. Machines will sense, understand, and react to our moods, our
behavior, and even our thoughts. This concept should be no surprise to anyone
in the field of marketing communication, since we have all viewed many differ-
ent visions of the future from movies, films, television programs, digital media,
streaming content, and video games. Our journey to the future has begun; now
we just have to get there.
5
Artificial Intelligence
Interactive
Proximity Programmatic
Store Beacons Voice
Marketing Media Buying
Commerce
Private
Personal Predictive Holographic
Internet
Identity Chips Analytics Television
Systems
now has already changed. And by the time you finish this textbook, there will be
another series of improvements, enhancements, and practical applications.
Facial Recognition
Have you ever watched Tom Cruise in the science fiction movie Minority Report?
There was a great scene when his character, walking through a large transporta-
tion center, was continually being confronted by video screens promoting differ-
ent consumer brands. The facial recognition system was not only identifying him
but using his first name in every simulated commercial. Not a good situation when
you are trying to hide from everyone who has been chasing you.
The most powerful, yet controversial, technology of the 21st century is now
facial recognition. However, many companies and organizations have already
developed and effectively utilized facial recognition software in their market prod-
ucts and services. While praised for its ability to provide safety and security, this
aspect of artificial intelligence has also been criticized for its intrusiveness. Often,
facial recognition is associated with discrimination or exclusion. This is a per-
plexing situation for management and marketing communication. Do consumers
have the right to privacy? And, is there an obligation to inform people that facial
recognition is being used for business purposes? That is a philosophical, ethical,
and cultural debate that is beyond the scope and purpose of this textbook. But, it
is a very serious and important issue for a global society.
6
Artificial Intelligence
where facial recognition is being used for marketing and brand communication?
That is where our exploration of artificial intelligence will begin, but from the
perspective of the future and how it can affect us.
There are four basic steps in facial recognition: virtual measurements, appli-
cation of algorithms, database matching, and accuracy estimation. The physi-
cal characteristics of the human face can include many features, but the most
important physiological variables for measurements include the size, location, and
spatial distances between distinct human parts, such as the eyes, nose, and ears,
and basic head geometry. Individual differences in the overall structure, and even
particular idiosyncratic motions, such as head movements, mouth shapes, and eye
blinking, can be incorporated into the algorithm. Unique items, such as moles,
freckles, discolorations, and scars, are other characteristics that can be utilized
for identification. The most sophisticated facial level of recognition systems can
detect and record the expression of moods and reactions to situations.
The use of other biometric measurements, such as thermal heat cameras,
is another part of the complex spectrum of facial recognition. As shown in
Figure 1.4, there are multiple aspects to the acquisition of data involving people,
classifying that information, then distributing the results, and eventually, inter-
acting with the users of this technology. As you can imagine, the same process
can be applied to voice characteristics and speaking patterns. And finally, the
information obtained from facial recognition can be compared with images on
private files and public records, including finger prints and several other biometric
identification measurements.
There are many questions about the reliability and accuracy of facial recogni-
tion. Depending on the algorithm, and the individual who designed it, results can
often be inconclusive. This means that a certain amount of error always occurs,
but is it significant, and can it be trusted? If the situation is a shopper in a store,
a misidentification would only be an embarrassment, but using this same technol-
ogy for law enforcement, security surveillance, or private protection might have
other, more severe consequences. So, there is plenty of room for improvement in
facial recognition technology, but as artificial intelligence continues to observe
and learn from the process, the degree of accuracy and reliability will dramati-
cally improve. Until then, marketing communication can only use what is avail-
able and recognize that errors will always be possible.
Complex
Algorithms
Skin Texture Structural
Analysis Relationships
3D
Facial Database
Geometric
Recogniton Matching
Modeling
7
Artificial Intelligence
Surveillance Environments
Nearly all of us are exposed to facial recognition cameras, as well as other biomet-
ric detection devices, several hundred times a week, or even more. That alone is a
significant amount of information about us. The data collected provides an accu-
rate record of our mobility, including the time, place, and duration of activities.
For example, facial recognition compiles information from many different loca-
tions, but the most important input sources are public places, homes and apart-
ments, business locations, retail stores, transportation, and social media.
This situation has often been described as a surveillance environment. But, it is
part of the world that we now live in. The challenge for marketing management is
to learn how to leverage this technology for brand communication, sales promo-
tional activities, and relationship building.
Let’s begin by developing a perspective of a surveillance environment, espe-
cially with the locations that are shown in Figure 1.5, along with the benefits that
might emerge from different methods of data collection.
Public Places Yes, cameras are everywhere. Some you see, but most of them are
hidden. Small video cameras are placed on street corners, buildings, bus stops,
road signs, traffic signals, and many other locations. While most cameras are
strategically arranged and used for specific purposes, such as the monitoring
of automotive traffic, crime prevention, or crowd control, others are for private
purposes. Do you have any idea how many cameras are located in your city or
neighborhood?
In New York City alone, there are 18,000 surveillance cameras used by the
Police Department to monitor the movement of people and activities around this
large metropolis. The entire city has a recorded number of 31,900 cameras, com-
pared with Los Angeles with 22,675, Paris with 26,835, Tokyo with 39,500, and
Hong Kong with about 50,000. London was ranked as the third most intensely
surveilled city in the world in 2020 with an astonishing total of 627,000 cameras.
This means that a density of 67 cameras per 1000 people is used for observ-
ing, monitoring, and recording the population of London. While the safety and
security of its citizens are very important, England has taken extraordinary pre-
cautions to maintain a network of social media connections, or digital eyes, to
identify problems and then take action immediately.
But, the utilization of facial recognition in Europe and the United States is
extremely low compared with China. Now, are you ready for this number? The
capital of China, Beijing, has over 1,150,000 cameras monitoring its population.
8
Artificial Intelligence
Shanghai has an equally high number of more than 1 million cameras. In fact,
nearly 100 cities in China also have intense surveillance and video observation
environments. Even though it is the most populated country in the world, China
has more than 200 million video cameras installed. That’s right, 200 million!
Homes and Apartments When you are looking at your computer, is your
computer looking back at you? It can, if programmed correctly. That small red
dot at the top of your laptop or desktop that indicates when your camera is turned
on could be activated remotely by a hacker. Many people are already concerned
about the possibility, and that is why tech experts recommend putting a piece of
tape over your camera viewing port at the top of your computer. Yes, that solves
the problem fast.
But facial recognition in home environments is all about those other video
cameras. While very small and inexpensive recording devices can be placed in any
room of a house or apartment, the most dramatic location is a different location.
How about outside your entrance door? About 10 years ago, Doorbot was intro-
duced to the home security market. From virtual obscurity as a start-up, this little
product would begin a whole new chapter in surveillance. The original device
was simple, at first, with a camera inside a doorbell to enable viewing who was
outside your entranceway. It also included a mobile app that enabled you to see a
visitor or guest on your cellphone. Later, the product was rebranded with a new
name, Ring. This version featured a high-definition camera, a microphone, and a
small speaker for two-way audio communication. So, when a person comes to the
entrance doorway, the owner or resident can silently view the person in real time,
record their appearance, and even have a short conversation or provide instruc-
tions. As the technology improved, Ring was capable of playing a pre-recorded
message, musical song, or special sound effects, or remotely performing other
functions, such as activating exterior lights.
During its early development, it was known to share crime-related video inci-
dents with local governments and police departments. This was perceived as a
positive activity. But, the other opinion is that while you are protecting your
home, you are also contributing to the global network of surveillance. Suddenly,
this became both an ethical and a personal issue, especially when it was discov-
ered that data from these devices was being sold to several digital marketing com-
panies, including Facebook. This raised an increasing number of questions about
its usage.
There is one final fact about Ring that you need to know. In 2018, Ring was
purchased by Amazon. And, it provided an entirely new data collection resource
for marketing purposes.
Then, there are apartments. You go out. You come in. And you go out again.
And you return. If you live in a large apartment building, these events are repeated
many times. But as you exit, or enter, the cameras are silently watching and record-
ing. The data collected is enormous. Just imagine! Who has left? What time? How
long were they gone? While most of the video cameras in apartment buildings
are used for live surveillance and security, the potential exists for sharing this
information with other data storage systems. It can be connected with movements
around the city or just down the block. And if social media is involved, the power
of social media and facial recognition are combined to match who you are, where
you are, and when you were there.
9
Artificial Intelligence
Offices and Warehouses The need for security and surveillance becomes the
most important motivating factor for using facial recognition in work locations.
This is primarily used for accessing both private and government locations. These
include more than just office buildings and warehouses. There are manufacturing
plants, transportation centers, storage facilities, and the list goes on. For many
years, a security guard was the only gatekeeper and guardian of a work location.
The primary responsibility of these security guards was to check the identity of
employees, suppliers, or visitors to a work location. Then, technology intervened
with magnetic access cards, digital key fobs, and most recently, mobile apps, but
now, cameras have taken over by providing the same essential service of identity
verification using facial recognition technology. Smile, please!
Retail Stores In many large retail stores, there is a person at the main entrance
who gives you a friendly greeting or welcoming hello. But very soon, you might
begin interacting with a different personality, a digital avatar. Since this experience
will be a shopper’s first point of contact, the avatar has the opportunity to direct
a personalized message that is meaningful and relevant. This technological form
of engagement has the potential for interactive communication using artificial
intelligence.
Here’s how it works. As you walk through the entranceway, a facial recogni-
tion system is activated. It scans your face, searches the store’s internal database,
and attempts to identify you. If there is a match, the computer instantaneously
knows the answer to three important questions: Has this person ever visited this
store before? What did they purchase during their last visit? Is this individual a
member of the company’s brand loyalty program? There are thousands of differ-
ent pieces of information about you, and your shopping behavior, that are imme-
diately available for a sophisticated software program to analyze, interpret, and
utilize as the store prepares to interact with you. Depending on the technology,
you will automatically become part of the process.
That’s right. The computer, using artificial intelligence, is going to communi-
cate with you. First, since it already knows your name, it can welcome you on a
digital screen. Nothing fancy, just your first name displayed in bright bold letters.
Or, the computer can select a voice greeting. Synthesized speech is an easy-to-use
technology today. Imagine, “Hello, Martin. Welcome to Harrah’s.” And, after
you walk a few more steps, a video message from a friendly avatar: “Is there
anything we can help you with today?” As you can tell, the computer is trying to
establish, or maintain, a human-like relationship. This entire scenario might be
vaguely familiar. And, it should be. Remember the movie Minority Report with
Tom Cruise? If you recall that scene, then you fully understand the potential for
bombarding a person who is entering a retail store.
In the future, facial recognition can be used to monitor a customer’s shopping
behavior with the installation of “aisle-cams.” These strategically located cameras
could be a valuable source of observational research or a tremendous invasion
of privacy. Let’s begin with an exploration of the first application. The cameras
would be using facial recognition to identify individual shoppers and then, begin
collecting data that is specifically associated with that person. For example, the
purchase of a breakfast cereal. How long did they spend in this section of the
grocery store? Which packages did they look at first? Did they check prices online
with their smartphone? Which brand did they finally put in their shopping cart?
10
Artificial Intelligence
Transportation Most any public vehicle can have a surveillance camera inside,
on top, or mounted in a receptive position. This includes trains, buses, taxis, and
even trucks. Millions and millions of them are moving around out there right now.
Many of them have already been equipped with a camera for security purposes,
and even more will be installed tomorrow. The ride sharing services Uber and
Lyft immediately installed more cameras and in some cases, facial recognition
systems during the Covid-19 crisis. No mask, no ride. And if the company wants
to subtly identify and notify drivers of any previous customers who have been
uncooperative or caused problems, the same facial recognition technology can be
used. Also, there is another consideration: the physical area around transportation
locations, where people are either congregating or passing by the vehicles, such
as bus stops, train stations, or waiting shelters. Transportation locations provide
an excellent opportunity to use artificial intelligence to know who is going where
and when. Fortunately, there is no way to know why these people are traveling,
unless Alexa or Siri is involved in the process. Then, it morphs into a gigantic
surveillance network.
Social Media Find your friends, follow your family, and become fans of your
favorite celebrities, local personalities, and nearly anyone else with a Facebook
or Instagram page. But, wait. Do you know those other people in the photos or
posts? Not everyone has been tagged or identified, but now you can do this with
your very own social media software. There are plenty of free versions available
for download, as well as more sophisticated platforms for business enterprises,
non-profit organizations, and government units. During the past few years, as
facial recognition has become more popular, a barrage of new apps has emerged
in the marketplace. Some are good; others are not. One caution. Be sure you know
the reputation of the company and its privacy policy as well as the actual costs
of using or downloading the software. Here are a few suggestions that you might
want to consider and try out with social media.
Blippar is a face recognition app that can identify over 370,000 celebrity faces
for a quick search on their life, work, and other details. FacePhi is dedicated
to the financial sector, allowing banks to recognize their customers in order to
enhance the mobile experience with an added level of security. Luxand can recog-
nize faces in live video footage, along with an estimate of their age. This company
also aggressively markets itself on multiple social media platforms by offering
11
Artificial Intelligence
the consumer version of its software, called FaceSKD, which appears to be more
focused on collecting visual data from individuals than effectively using it to
enhance online experiences.
Face2Gene is a facial recognition app for the medical industry, which has been
used to help doctors perform genetic evaluations. FaceFirst uses facial recognition
software to identify individuals from a distance, making it ideal for law enforce-
ment, military, and other organizations. Log Me uses helps users find people from
any part of the world. Like a social networking platform, it enables users to search
for old friends and distant relatives from old photographs and compares the image
to find the best matches. If it is successful, you are provided with enough infor-
mation to contact them. Hopefully, the technology has worked correctly, or you
might just be reaching out to the wrong person. Want to see what you will look
like in the future? Then, try this “aging” and “feature modification” app. It is
appropriately called FaceApp and was launched in 2017 for iPhone users. FaceApp
filters include changing the smile, hairstyle, skin tone, age, and even gender of
your own image or the image of anyone else that you want to upload. Looks like
part of a digital playground, using technology to change reality, but then, what is
real and what is not?
Disney Theme Parks In March, 2021, the Disney Company announced that
visitors to its theme parks and entertainment centers had the option to use a “facial
recognition” system for the entrance pass. No more printed tickets, no more digital
bar codes, and no more QR codes on cellphones. While this was presented as a
test program, it is inevitable that the utilization of facial recognition by Disney
is a significant advancement in marketing technology. This method serves not
only as an admission control procedure but also as a continual monitoring and
surveillance system. Just think about it—Disney will know exactly where you are
in the theme park, how long you are spending in each location, and your physical
movement pattern through your entire visit!
Is this an invasion of privacy? Probably not. Because this is private property,
Disney has the right to make certain requirements for entering and utilizing its
facilities. This is like a contact and not very different from all the legal statements
involved in using any product or services.
Just read the statements and disclaimers when you sign up for any social media
platform. If you don’t agree to the conditions and regulations, then you cannot
use the service.
Disney’s expansion and implementation of a facial recognition for its theme
parks will be carefully observed by competitors. Other companies that interact
12
Artificial Intelligence
with large numbers of people in a single location, such as sports stadiums, out-
door concert venues, shopping malls, and even community events, will also be
very interested in the application of facial recognition.
So, this is the just the beginning of the utilization of facial recognition for mar-
keting and the application of artificial intelligence to monitor, interact, analyze,
and interpret customer behavior. Let’s see what happens next and which other
companies follow Disney’s lead.
McDonald’s When you purchase a Big Mac, large fries, or just a small
cheeseburger, facial recognition is working hard to provide you with the best
customer service. Surprisingly, the cameras are not looking at you but at the
McDonald’s employees. The company is using facial recognition to monitor and
evaluate the facial expressions of its staff when they are waiting to take your
order, making a payment, or delivering the food to you. This is only being used
in a few select stores, but the technology could easily be expanded to include
customers. Then, in the future, when you are trying to decide between a Big Mac
and a salad, the facial recognition technology will be capturing information about
your reactions before, during, and after your purchase decision process. And,
artificial intelligence might be used to predict what you will buy in the next few
seconds based on your previous history. Maybe a large order of fries, again?
Walmart How you shop is even more important than what you buy. That’s the
approach taken by Walmart when using facial recognition to scan the aisles. What
is it searching for with those cameras? Walmart is gathering data about your
physical shopping behavior. It wants to know your movements around the display
racks, which packages are picked up from shelves, which ones are passed by, and
the walking pattern that you have taken while you were in the store.
This is marketing research about in-store shopping patterns. While Walmart
wants to study the flow of people going up and down the aisles, there are national
manufacturers who want to know more about how shoppers interacted with their
brands, specifically the packaging. But, Walmart owns and controls this infor-
mation. Should it be collaborating with the manufacturers? Or, can this provide
Walmart with another source of income from its retail operations? If facial rec-
ognition is being used, the technology can identify the person who is shopping
and send text notifications to them with coupons, special sale prices, or other
promotional incentives.
Chevron Can you buy gasoline just by showing your face? Yes. Chevron is using
facial recognition that allows truck drivers to purchase its fuel products at selected
service stations along motorways and highways. Will they expand it to include the
average motorist? Imagine pulling into a gas or petrol station and then looking
into a camera to get authorization and to make a payment. And, that’s not all.
In some countries, Chevron is using the same facial recognition technology with
gasoline delivery trucks to recognize fatigue, distractions, and other safety-related
factors among truck drivers. Is it possible that this application will also be used in
automobiles in the future?
MAC Cosmetics Imagine being able to try 800 shades of lipstick without leaving
your home or apartment? Well, you can. MAC Cosmetics has an interactive online
13
Artificial Intelligence
experience on its website that does just that. It uses the camera in your mobile
device or desktop for an image of your face. Then, you swipe as many different
shades as you want from its vast selections of colors and styles. Whatever you
want, from glossy to vibrant shades and from classic to modern, it’s on the screen.
You can even upload a photo of yourself in your new dress or fashionable clothing.
Perfect for going out to a party or clubbing, then match the shade of lipstick to
your mood. How cool is that?
But, consider what else might be going on during this virtual experience.
Biometric data is being collected about you. This includes not only your facial
expressions but also a potential scan of your eyes. It is possible to gather research
data about how you reacted to each shade of lipstick after you put it on your lips,
or the popularity of different choices of lipstick, ranked by the order of selection,
the number of product purchases, and the estimated demographics of the user.
But, the same facial recognition technology can be used at cosmetic counters with
retail stores. In those cases, the social interaction with a sales representative, or
a few of your friends who decided to shop with you, will enhance your shopping
experience.
14
Another random document with
no related content on Scribd:
Note al Capitolo Sedicesimo.
99. Cfr. Cic., Pro lege Man., 11, 31 sgg.; Plut., Pomp., 24.
100. Le fonti principali della nuova ed ultima guerra mitridatica, per la parte
che riguarda le campagne di Lucullo, sono App., Mithr., 72 sgg.; Plut.,
Lucull., 6-35. La monografia contemporanea più interessante è quella di
Th. Reinach, Mithridate Eupator roi du Pont, Paris, 1890, pp. 320-372.
Su Lucullo, la sua figura, la importanza storica e la cronologia delle sue
guerre, cfr. G. Ferrero, Grandezza e decadenza di Roma, vol. I, cap.
VII e VIII; vol. II, Appendice B.
101. Sulla guerra così detta di Spartaco, cfr. specialmente App., B. Civ., I,
116-20.
Baecula (in Spagna), prima battaglia (208 a. C.), 167; seconda battaglia
(206 a. C.), 169.
Baetis (Fl.), in Spagna, 167.
Baleari, conquistate da Roma, 260.
Bastarni, 281; mercenari, 307.
Belli, 213, 232.
Benevento, battaglia (275 a. C.), 107.
Beoti, 223.
Bisanzio, contro Filippo V, 178.
Bitinia, 178; il re di B. battuto da Aristonico, 245; invade con Mitridate la
Paflagonia, 281. V. Nicomede; la B. in eredità a Roma (75 a. C. o 74 a.
C.), 343; invasa da Mitridate (74 a. C.), 344; riconquistata da Lucullo, 346,
348; invasa di nuovo da Mitridate (67 a. C.), 359; provincia unica col
Ponto, 364.
Bituito, re degli Arverni, 260; catturato e deportato in Italia, 260, 267.
Bocco, re di Mauretania, alleato di Giugurta, 274; consegna Giugurta a
Mario, 276; riceve la porzione occidentale della Numidia, 278.
Boi, 96, 97, 142; assalgono Piacenza e Cremona (218 a. C.), 150. V. Galli.
Bologna, colonia romana, 195.
Boviano, capoluogo del Sannio, 88; distrutta da Silla, 333.
Bruzii, combattuti da Alessandro il Molosso, 72; contro Roma (285 a. C.
sgg.), 96-97; perdono parte del territorio dopo la guerra tarantina, 108;
passano ad Annibale, 160.
Dalmazia. V. Illiria.
Damasco, 362.
Dardano (nella Troade), pace di D. (85 a. C.), 323; sue conseguenze, 341-
42.
Debiti, questione dei d., 34, 54-55, 61; le leggi licinio-sestie e i d., 56-57;
saggio dell’interesse, 61; il nexum e sua abolizione (326 a. C.), 77; dopo
la terza sannitica, 94-95; nella seconda metà del II sec. a. C., 229;
richiamo in vigore delle antiche leggi sui d., 307; le leggi Cornelie dell’88
a. C., 315; legge Valeria (86 a. C.), 320.
Decemvirato, 36 sgg.; ufficio, 36-37; primo decemvirato (451 a. C.), e sua
opera, 37-38; secondo decemvirato (450-449 a. C.), 38-39; fine, 39.
Decima (decuma), 133.
Decio (P. Mure) (cons. 297; 295 a. C.), 92; muore a Sentino, 93.
Decuria, 15.
Decurioni, magistrati delle colonie romane, 113.
Delo, emporio romano, 175-76; restituita agli Ateniesi e sua nuova
floridezza, 208; Italici a D., 226; occupata dai generali di Mitridate, 310.
Demetriade, piazzaforte macedone in Grecia, 185.
Demetrio di Faro, 135; combatte contro Filippo V (220 a. C.), 148.
Demetrio, re di Macedonia, 134.
Dionisio, tiranno di Siracusa, 110.
Distribuzioni frumentarie, introdotte da C. Gracco, 251; le d. fr. e Livio
Druso, 299; abolite da Silla, 335.
Dittatore, carattere della magistratura, 41; sua origine, 41.
Dittatura. V. Dittatore.
Divicone, capo dei Tigurini, vince il cons. Longino (107 a. C.), 274-75.
Domizio (Cn. Enobarbo) (censore 92 a. C.), suo editto sulle scuole di
retorica, 298; un democratico, 327.
Dorilao, generale di Mitridate, 322.
Drepano. V. Trapani.
Duilio (C.) (cons. 260 a. C.), vince i Cartaginesi a Mylae, 124.
Duoviri, magistrati delle colonie romane, 113.
Duoviri navales, 85.
Eacida, padre di Pirro, 101.
Ebro (Fl.), in Spagna, 146.
Ecnomo (M. S. Angelo), battaglia (256 a. C.), 125.
Edepo (Fl.), battaglia (73 a. C.), 346.
Edili della plebe, 35; curuli, 58.
Edui, in amicizia coi Romani, 268.
Efeso, emporio commerciale, 321; insorge a favore di Mitridate (87 a. C.),
321.
Egadi, battaglia (242 a. C.), 129.
Egitto, sotto i Tolomei, 110; fornisce grano a Roma, 166; decadenza
durante le guerre puniche, 178; Italici in E., 226.
Eleno, figlio di Pirro, 107.
Ellenismo, in Roma, nel periodo regio, 18-19; dopo la Guerra tarantina,
118-19; nel II sec. a. C., 197, 226-27; nel I sec. a. C., 294-95, 296.
Ellesponto, possessi dei Tolomei su l’E., 110.
Emilio (L. Paolo) (cons. 216 a. C.), 158; ucciso a Canne, 160.
Emilio (Paolo) (cons. 168 a. C.), 207; del partito tradizionalista, 207;
generale per la terza macedonica, 207; vince a Pidna (168 a. C.), 207; si
oppone all’annessione della Macedonia, 207.
Emilio (M. Scauro) (cons. 115 a. C.), 312; esclude i liberti dalle tribù, 312;
princeps senatus e ambasciatore a Giugurta, 263; ufficiale nella guerra
contro Giugurta, 264.
Emilio (Q. Barbula) (console 281 a. C.), e Taranto, 100.
Emilio (M. Lepido) (cons. 70 a. C.), 339; propone l’abolizione delle leggi
sillane, 339; in Etruria ad arruolare ribelli, 337; hostis publicus, 340; vinto
da Pompeo, 341; fugge in Sardegna e sua morte (77 a. C.), 341; i seguaci
di E. L., amnistiati.
Emilio (M. Scauro), in Celesiria, 362.
Emporie, 223.
Enea, 6, 7.
Ennio, 197.
Epidamno, nella confederazione italica, 135.
Epiro, durante la seconda macedonica, 184; durante la terza macedonica,
206; saccheggiato dopo la terza macedonica, 208.
Equi, 3; guerre con Roma, 29, 30; incursioni a mezzo il secolo V, 36; nel
449 a. C., 39; dopo l’incendio gallico, 53.
Eraclea, battaglia (280 a. C.), 102; occupata dai Romani, 105.
Erea, 186.
Erice, 128.
Ermocrate, generale di Mitridate, 344.
Ernici, 3; in lega con Roma, 30; insurrezione, 88.
Esercito, di Roma regia, 15; legione, 15, 79; gratuità del servizio, 31;
obbligatorietà, 187; soldo ai legionari, 48-49; il bottino, 31; modificazioni
durante la seconda Guerra sannitica, 79; manipoli, 79; cavalleria, 79; suoi
elementi, 187; condizioni durante e dopo la seconda macedonica, 187,
188, 201; durante la terza macedonica, 206; crisi dell’esercito romano di
coscrizione, 187, 206; ulteriore decadenza dopo la terza macedonica,
212, 229-30; corruzione degli eserciti romani di Spagna, 235; riforma di
Mario e sua portata, 272-73, 279-80; armamento secondo le riforme di
Mario, 280; il nuovo esercito, 313-14; colonie militari, 333. V. Veterani;
Coorte.
Esernia, città del Sannio, distrutta, 333.
Esino (Fl.), 97.
Esquilino, 19.
Etoli, lega etolica, 164; e la prima Guerra illirica, 135; mercenari etoli, 178;
nemici della Macedonia, 182; alleati di Roma nella seconda macedonica,
164; pace con Filippo V (205 a. C.), 169; durante la seconda Guerra
macedonica, 183; alleati di Roma, (199 a. C.) 183, 184; dopo la seconda
macedonica, 186; contro la politica romana in Grecia, 189; invocano
Antioco di Siria, 189; guerra con Roma, 191; discordie interne, 204;
notabili etoli avversi a Roma, trucidati, 208.
Etruria, 3-4, e i Tarquinii, 18; Etruria e Roma, 18-62; l’E. meridionale
sottomessa a Roma, 49, 54, 87; decadenza nel III sec. a. C., 109; invasa
dai Galli (225 a. C.), 141; colonie militari in E., 333; insurrezione dei coloni
sillani, in E., 338; repressione della rivolta, 341.
Etruschi, 3. V. Etruria; territorio, 3; dominio, 3; civiltà, 3-4; città, 4;
ordinamento politico, 4; in Campania e nel Lazio, 9-10; e Roma, 9-10, 18;
in Roma, 12; prime guerre con Roma, 27; minacciati da Greci, Sanniti,
Celti, 47; contro il Lazio dopo l’incendio gallico, 53; guerra etrusco-
romano-sannitica (311-310 a. C.), 86, 88; nuova sottomissione a Roma
(294 a. C.), 93; nuova insurrezione (285-283 a. C.), 96-97; e la Guerra
sociale, 302, 303.
Eubea, attaccata dalla flotta romana (199 a. C.), 183; gli Eubei alleati della
lega achea, 223.
Eumene, re di Pergamo, alleato dei Romani, nella guerra siriaca, 191; alla
battaglia di Magnesia, 192; ottiene il Chersoneso Tracico, la Lidia, la Frigia
e parte della Caria (189 a. C.), 192; dopo la Guerra siriaca, 205; incita
Roma alla terza macedonica, 205; alleato di Roma nella terza
macedonica, 206; sospettato a Roma, 208.
Eupatoria, città del Ponto, 349.
Fabio (Q. Massimo), sua carriera, 156; dittatore (217-16 a. C.), 156; in
Apulia, 157; depone la dittatura (216 a. C.), 158.
Fabio (Q. Massimo Serviliano) (cons. 141 a. C.), in Spagna, 232; conclude
la pace con Viriato, 232.
Fabio (Q. Rulliano) (cons. 310 a. C.), invade l’Etruria, 87; (cons. 297 e 295
a. C.), 92; vince a Sentino, 92.
Farisei, 363.
Farnace, figlio di Mitridate, ribelle al padre, 363; riceve il regno della
Tauride, 364.
Felsina, 4.
Fenicia, occupata da Tigrane, 353; dai Romani, 362.
Ferento, 79.
Feriae imperativae, 312.
Feziali, 14.
Fidene; Veio, Roma e F., 46; distruzione, 46.
Fiesole, città etrusca, 4.
Filippo V, re di Macedonia, 148; guerreggia Demetrio di Faro (220 a. C.),
148; si allea con Annibale, 160, 161; la prima Guerra macedonica (215-
205 a. C.), 162, 164, 167, 169; pace con Etoli e con Romani (205 a. C.),
169; seconda Guerra macedonica (200-196 a. C.), 177 sgg.; si allea con
Antioco il Grande, 178; sue mire sull’Egitto, 178; occupa le Cicladi, il
Chersoneso tracico e la Bitinia, 178; invade l’Attica, 178, 179, 183; alleato
con Roma durante la guerra siriaca, 190 sgg.; tenta di espandersi
nuovamente in Grecia e in Tracia, 204; si amica i barbari d’oltre Danubio,
204-05; muore (179 a. C.), 205.
Fimbria, luogotenente di Valerio Flacco, 322-23; generale democratico
contro Silla, 323; invade l’Asia e occupa Pergamo (85 a. C.), 324; vinto da
Silla e suicida (85 a. C), 324.
Flamini, sacerdoti romani, 14; delle colonie romane, 113.
Flaminino. V. Quinzio.
Flaminio (C.) (tribuno della pl. 233 a. C.), 140; legge agraria, 140; (cons.
223 a. C.), 142; (cons. 217 a. C.), 154; a Fiesole, 155; battuto e ucciso al
Trasimeno, 155-156.
Focesi, 223.
Fondi, 70.
Forche Caudine, 77-78.
Formia, 70.
Foro romano, 9.
Fossa Mariana, 283.
Fregellae (Ceprano), colonia romana, 72; rioccupata dai Sanniti, 78;
ripresa dai Romani (313 a. C.), 80; insurrezione, 248.
Frentani, 3.
Frigia, possesso dei re di Pergamo (189 a. C.), 192.
Fulvio (Flacco) (cons. 125 a. C.), sua legge per la cittadinanza agli Italici,
247.
Fulvio (Q. Nobiliore) (cons. 153 a. C.), disfatto in Celtiberia, 213.
Furio (M. Camillo), e la distruzione di Veio, 49.
Gabinio (Aulo), tribuno della pl. (67 a. C.), 358; lex Gabinia, 358; inviato
da Pompeo in Fenicia, 362.
Gaeta, origine del nome, 6.
Galati, alleati di Antioco, 191; invadono la Grecia, 310.
Galazia, 293; i tetrarchi della G., 362; riordinata da Pompeo, 364.
Galli, nell’Italia nord, 47; i G. Senoni, loro territorio, 97; in Toscana e nel
Lazio, 50-51; incendiano Roma e assediano il Campidoglio, 51;
sgomberano Roma, 52; cronologia dell’invasione, 58, n. 1; invasioni del
360 e 348 a. C., 62; nella terza sannitica, 92-93; i Galli assediano Arezzo
e muovono contro il Lazio (285 a. C), 96; Roma ne occupa il territorio, 97;
i G. soldati mercenari, 122; guerra con Roma (225-222 a. C.), 141 sgg.;
durante la seconda punica, passano dalla parte dei Cartaginesi, 152, 154;
arrolati da Asdrubale, 167; da Magone, 169; continuano la guerra con
Roma, 179, 182; razzie nel territorio di Marsiglia, 260; e nuova guerra con
Roma, 260; i G. nella valle del Danubio, 281; i G. d’Asia Minore. V. Galati;
Arverni; Edui; Insubri.
Gallia Cisalpina, occupata da Roma (224-222 a. C.), 141-142; causa della
seconda punica, 147-48; guerra nella C., (216 sgg.), 158, 179, 187, 190;
progressi economici, 302; e la Guerra sociale, 302; ammessa alla
cittadinanza latina (89 a. C.), 305; insurrezione dopo la morte di Silla, 340;
e repressione, 341. Narbonese, provincia romana, 260; invasa dai Tigurini
(107 a. C.), 274; insurrezione contro i Romani, 271, 275; pacificata, 275,
279. Transalpina, invasa dai Cimbri (109 a. C.), 268. V. Arverni; Edui.
Gaziura, città del Ponto, 357.
Gellio Egnazio, 92; muore a Sentino, 93.
Gellio (L.), censore (70 a. C.), 354.
Gempsale. V. Iempsale.
Genova, presa da Magone (205 a. C.), 169.
Genti, 14; composizione, 14-15; le g. e l’esercito romano, 15.
Gerone, tiranno, poi re di Siracusa, 116, 122; alleato di Roma, 122, 128,
154; sua morte, 162.
Geronimo, nipote di Gerone, 162; si allea con Cartagine, 162; ucciso, 162-
163.
Gerusalemme, assediata e presa da Pompeo, 363.
Getuli, alleati di Giugurta, 269.
Giudea, indipendente dai Seleucidi, 362; guerre civili, 362-363; annessa
alla provincia di Siria, 363.
Giugurta, figlio naturale di Massinissa, 261; in Spagna, 261, 262; amico di
Scipione Emiliano, 261-62; uccide Iempsale e scaccia Aderbale, 261;
corrompe il Senato romano? 261-62, 263; nuova guerra ad Aderbale, 263;
protetto dalla nobiltà senatoria, 263-264; attaccato dai democratici, 264;
guerra giugurtina, (117-106 a. C.), 264 sgg.; chiede pace ai Romani, 264-
65; i comizi rifiutano la pace, 265; invitato a Roma, 265-266; fa uccidere
Massiva, 268; espulso da Roma, 267; sconfigge Sp. Postumio Albino,
267; è sconfitto da Metello, 269; la guerra e i partiti in Roma, 269-72;
sconfitto da Mario, si rifugia in Mauretania, 274; consegnato a Mario (105
a. C.), 276; è fatto morire nel carcere Tulliano, 278.