A news channel runs a two-minute story on phishing scams. The report features the testimonies of a phishing victim and a computer security expert from a software company. The story narrates how a security product from the company acts as "a first line of defense" against phishing scams. If the report is actually funded by the company, the given scenario would then be an example of