• Title/Summary/Keyword: Buy

Search Result 1,206, Processing Time 0.03 seconds

Optimal Booking Limit Decision in the Presence of Strategic Customer Behavior

  • Kim, Sang-Won
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.535-538
    • /
    • 2006
  • We consider a two-period airline revenue management problem where customers may act strategically. Specifically, we study a two-fare-class airline seat inventory allocation problem which allow for the possibility that a customer may decide to defer to purchase in the hope that a cheaper ticket than those currently on offer (expensive tickets) become available. We also allow for the possibility that some customer will buy a more expensive ticket if the cheaper tickets are not available. We show how to find the optimal booking limits in the presence of such strategic customer behavior and investigate the impact of such strategic customer behavior on the expected revenue. The results are compared with those by the expected marginal seat revenue (EMSR) heuristic approach (Belobaba, 1987, 1989) with strategic customer behavior.

  • PDF

A Study on Cosmetic Purchasing Behaviors among Female College Students in Cheongju Area (청주지역 여대생의 화장품 구매행동에 관한 연구)

  • Lee, Hee-Sook
    • Korean Journal of Human Ecology
    • /
    • v.5 no.1
    • /
    • pp.33-42
    • /
    • 1996
  • The purpose of this study is to investigate cosmetic purchasing behaviors among female college students in Cheongju area. Three-hundred female college students who were attending universities in Cheongju area were selected. Questionnaire survey method and SPSS computer program were utilized. The findings of this study were as follow: First, 8.5% of monthly disposible money was spent for cosmetic and this amount of cosmetic expenditure was a little burden to female college students. Second, most female college students began to make up from freshmen or sophomore. And they were making up for self-satisfaction rather than showing off. Third, the purchasing behaviors of female college students were most affected by TV advertisements. Fourth, female college students thought that cosmetic is a necessity rather than luxury for them. And they were considering quality when they buy cosmetic first and price second. Fifth, female college students showed that rather low level of impulse purchasing behaviors.

  • PDF

A Study on the Customer Attitudes toward UCC and its Effects as a Commercial Media (상업적 매체로서의 UCC에 대한 소비자의 태도와 효과에 관한 연구)

  • Jun, Byoung-Ho;Han, Pil-Koo;Kang, Byung-Goo
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.23-41
    • /
    • 2009
  • UCC paradigm based on Web 2.0 has made new business models and came to the forefront as a commercial media. The purpose of this study is to analyze the customer attitudes toward UCC and its effects as a commercial media. Based on prior studies of Internet and Web advertising, informativeness, entertainment, irritation, trust, usefulness, ease of use, incentives, and flow were identified as affecting factors of the attitude of UCC advertising. Results show that informativeness, entertainment, irritation, trust, ease of use, and flow are significantly related to the attitude of UCC advertising, but usefulness and incentives are not. Customer attitude toward UCC advertising was also found to be significantly related to the such effects as brand attitude, word of mouth, and intention to buy. This study contributes to improve the understanding of UCC as a commercial media and provides the base of activation strategies for it.

Simulation Testing in Mobile Networks Protocols and Applications Perspective

  • Jain Anurag;Tyagi Saurabh
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.75-87
    • /
    • 2004
  • The mobile industry is waking up to the reality that customers buy 'services', not technology. Thekey is to deliver a variety of differentiated services today and improve them as the advanced technology becomes available. In the increasingly data centric world of the future, the emphasis will be on the provision of a range of services audio, video, data and multimedia and of course speech. As we move closer to the realization of these mobile services in the conglomeration of converged networks, new challenges are being faced by the technology and application developers as well as the service providers to design, test and integrate new products and services. Functionalities like availability, scalability, performance and compatibility have become more important. This paper discusses the new test paradigms in the mobile networks, both from the applications and the protocols perspective.

  • PDF

Design of Digital Fingerprinting Scheme for Multi-purchase

  • Choi, Jae-Gwi;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1708-1718
    • /
    • 2004
  • In this paper, we are concerned with a digital fingerprinting scheme for multi-purchase where a buyer wants to buy more than a digital content. If we apply previous schemes to multi-purchase protocol, the number of execution of registration step and decryption key should be increased in proportion to that of digital contents to be purchased in order to keep unlinkability. More worse, most of fingerprinting schemes in the literature are based on either secure multi-party computation or general zero-knowledge proofs with very high computational complexity. These high complexities complicate materialization of fingerprinting protocol more and more. In this paper, we propose a multi-purchase fingerprinting scheme with lower computational complexity. In the proposed scheme, a buyer executes just one-time registration step regardless of the number of contents to be purchased. The number of decryption key is constant and independent of the number of contents to be purchased. We can also reduce the computational costs of buyers by introducing a concept of proxy-based fingerprinting protocol.

  • PDF

Relationships among Shopping Orientation, Shopping-Mall Characteristics, Consumer Satisfaction, and Loyalty in Online Market of Cosmetics (화장품 온라인 시장에서 쇼핑 성향, 쇼핑몰 특성, 소비자 만족, 충성도의 관계)

  • Park, Eun-Joo;Kim, Ji-Eun
    • The Research Journal of the Costume Culture
    • /
    • v.16 no.4
    • /
    • pp.696-708
    • /
    • 2008
  • The purpose of this study was to examine the relationship among Shopping Orientation, Shopping-mall characteristics, Consumer Satisfaction, and Loyalty in online market. Data were collected from 405 adult women and analyzed by factor analysis, cluster analysis, ANOVA and Duncan test using by SPSS 12.0. The results showed that recreation shoppers to buy the cosmetics in online market, were more likely to perceive the shopping mall characteristics, information, check-out convenience, and product price of shopping mall than the other shoppers. Both brand oriented shoppers and economic oriented shoppers were more likely to perceive information offered at newsletters and e-mail of Internet shopping mall. Additionally, the more active shoppers were the more satisfied and the greater loyalty at online shopping mall of cosmetics. Implications are drawn for the information useful marketer and retailers of the online shopping mall of cosmetics.

  • PDF

An Effect of Conformity Psychology on the Advertisement Effectiveness

  • Yang, Ting;Seo, Sangho
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • It is usually that some people who did not plan to buy anything walk into e-mart, but walk out with something in hands. Obviously, these people were stimulated and the result is purchasing something maybe are not really needed. As a consumer, sometimes we are interested in what somebody else is using, and sometimes we cannot help trying a kind of new drink when we found many of people around are drinking it. In this paper, conformity psychology's effect in the advertisement will be checked in the hope of helping improve the advertisement effectiveness.

Recommended Chocolate Applications Based On The Propensity To Consume Dining outside Using Big Data On Social Networks

  • Lee, Tae-gyeong;Moon, Seok-jae;Ryu, Gihwan
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.325-333
    • /
    • 2020
  • In the past, eating outside was usually the purpose of eating. However, it has recently expanded into a restaurant culture market. In particular, a dessert culture is being established where people can talk and enjoy. Each consumer has a different tendency to buy chocolate such as health, taste, and atmosphere. Therefore, it is time to recommend chocolate according to consumers' tendency to eat out. In this paper, we propose a chocolate recommendation application based on the tendency to eat out using data on social networks. To collect keyword-based chocolate information, Textom is used as a text mining big data analysis solution.Text mining analysis and related topics are extracted and modeled. Because to shorten the time to recommend chocolate to users. In addition, research on the propensity of eating out is based on prior research. Finally, it implements hybrid app base.

A Relationship between Security Engineering and Security Evaluation

  • Tai-hoon, Kim
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.141-144
    • /
    • 2004
  • The Common Criteria (CC) philosophy is to provide assurance based upon an evaluation of the IT product or system that is to be trusted. Evaluation has been the traditional means of providing assurance. It is essential that not only the customer' srequirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Unless suitable requirements are established at the start of the software development process, the resulting end product, however well engineered, may not meet the objectives of its anticipated consumers. By the security evaluation, customer can sure about the quality of the products or systems they will buy and operate. In this paper, we propose a selection guide for If products by showing relationship between security engineering and security evaluation and make help user and customer select appropriate products or system.

  • PDF

A Study of Connection Maintenance Techniques using TCP Hijacking

  • Kim, JeomGoo
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.57-63
    • /
    • 2014
  • Internet users drastically increases, also through the Internet to buy various intrusion significantly increased. These various methods of intrusion defense thinking hacker attempting to hack the actual position of the real-time tracking of the intruder backtracking technique for research have been actively carried out. In this paper, a technique used in TCP Connection trace-back System in one packet trace-back technique watermarking technique using TCP Hijacking Connection Reply packets how to solve the difficulties of maintaining presented.