• Title/Summary/Keyword: direct-write

Search Result 61, Processing Time 0.025 seconds

An Equalizing for CCI Canceling in MLC NAND Flash Memory (MLC NAND 플래시 메모리의 CCI 감소를 위한 등화기 설계)

  • Lee, Kwan-Hee;Lee, Sang-Jin;Kim, Doo-Hwan;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.10
    • /
    • pp.46-53
    • /
    • 2011
  • This paper presents an equalizer reducing CCI(cell-to-cell interference) in MLC NAND flash memory. The CCI is a critical factor which affects occurring data errors in a cell, when surrounding cells are programed. We derived a characteristic equation for CCI considering write procedure of data that is similar with signal equalizing. The model considers the floating gate capacitance coupling effect, the direct field effect, and programming methods of the MLC NAND flash memory. We verify the proposed equalizer comparing with the measured data of 1-block MLC NAND flash memory. As the simulation result, the equalizer shows an error correction ratio about 60% under 20nm NAND process.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

Field Study For The Improvement of Medication System and Method for Inpatients at General Hospital (입원환자의 투약체계와 방법의 개선을 위한 현장연구)

  • Yoo, Hyung-Sook;Kuwan, Young-Mi;Song, Mi-Sook;Kim, Hyung-Ae;Park, Kyung-Sook
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.1 no.1
    • /
    • pp.147-211
    • /
    • 1995
  • Medication is a kind of medical service and a therapeutic nursing function which takes large portion of nursing service and requires complicated procedures. So many different medical personnel should be involved and cooporate each other in order to accomplish medication. Medication is also a vital nursing service, So nurse feels heavy responsibi lity in that she gives medication to the patient finally, so she has much responsibility if medication error is happened. Therefore it seems very important to clarify the problem of medication system and method, and find the subculture of medication situation because it may promote nursing productivity. The study was conducted to 1. Describe and interpret medication situation. 2. Find out the problem of medication system and method and on alternatives. 3. Compare the medication system and method of hospitals which are located in Seoul with object hospital Ethnographic methodology was used to study medication situation by doing participant observation and interview of health care personnel. Ten nurses and three nurse aids were interviewed. Two residents and internists, two phamacists and two accountants were also interviewed. Data was obtained and analized according to Developmental Research Sequence introduced by Spradly. On the basis of this data the results were as follows. 1. The overall flow of medication system was devided into six stage : first, checking doctor's order : second writing doctor's order, : third, transfering slip into the related departments such as account department, pharmacy : fourth, distribution of medication from pharmacy to unit : fifth, identifing medication by nurses : and finally, medicating to the patient. Behaviorors have been under a lot of stress in that they have to do much works, especially paperworks, So too much time were needed. They also have been suffered interpersonal conflicts among health care personnel and role conflicts in the process of doing medication service. 2. In the process of checking order, the problem was that too much time was required for checking order and paperwork. The more the order changes the more the paperwork is. Nurses have been suffering difficulties in calling internist in order to get bill. Even if writing down slip for medication order is doctor's job, Sometimes nurse has been expected to write slip by doctors or nurse would write slip beacuse of two much complexities and efforts for calling doctors. If the slip were incorrect, much time complicated procedures were more required for correcting it. So delay of administering drug would be resulted consequently. Drugs were delivered from pharmacy to units by delivery agent and phamacist. But because drugs were delivered without arranging room number of patient. Nurse should rearrange drugs in order of the room number So it had made waste time and effort, and Even when emergency drugs were needed, Prompt delivery of drug was not easy because of many reasons. For nurses, it took too long in the identification of the right drug. Actually nurses have heavy burden when medication error happens because nurse is the final actor who gives medication to the patient, So every three shift nurse ought to check drugs as soon as every shift begins. That's why it took too much time due to repeated confirming procedure. When nurses had to go patient room in order to give medications, there were difficulties in watching patient until the patient take medicine correctly. So it was impossible to check every patient wheather he took medicine or not especially in hectic situation. 3. There were many hospitals in Seoul which have similar medication system and method as object hospital according to the results of questionaire. This means that many hospitals have been suffering srimilar problems which were identified in object hospital. 4. Recommendations for promoting simplification of medication system and method were the following : Redesigning of slip from two pieces of paper into one : early discharge announcement system, and slip confirming through computer and controlling of period of prescreption from one day to two or three days : designing personal drug storage box for each patient and using it. If nurses follow the recommendations, they will make medication short & simple, and also have enough time of direct nursing care 5. Even though there were many difficulties in medicating patients. Medication itself has been considered as a caring among nurses because it makes rapport between nurse and patient. So nurses had better accept medication as a portion of nusing service not a original portion of phamacist. There are some limits in this research in terms of confining to only one unit of one hospital, and treating it especially in view of nurses' aspects, So further researchs should be continnued from various kmds of viewpoints of doctors, phamacists and so on. ${\cdot\cdot\cdot}$. Especially esthnographic study of computerized medication system and method seems to be followed.

  • PDF

High-Speed FPGA Implementation of SATA HDD Encryption Device based on Pipelined Architecture (고속 연산이 가능한 파이프라인 구조의 SATA HDD 암호화용 FPGA 설계 및 구현)

  • Koo, Bon-Seok;Lim, Jeong-Seok;Kim, Choon-Soo;Yoon, E-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.201-211
    • /
    • 2012
  • This paper addresses a Full Disk Encryption hardware processor for SATA HDD in a single FPGA design, and shows its experimental result using an FPGA board. The proposed processor mainly consists of two blocks: the first block processes XTS-AES block cipher which is the IEEE P1619 standard of storage media encryption and the second block executes the interface between SATA Host (PC) and Device (HDD). To minimize the performance degradation, we designed the XTS-AES block with the 4-stage pipelined structure which can process a 128-bit block per 4 clock cycles and has 4.8Gbps (max) performance. Also, we implemented the proposed design with Xilinx ML507 FPGA board and our experiment showed 140MB/sec read/write speed in Windows XP 32-bit and a SATA II HDD. This performance is almost equivalent with the speed of the direct SATA connection without FDE devices, hence our proposed processor is very suitable for SATA HDD Full Disk Encryption environments.

Romance between Women in the Age of 'Feminism Reboot' -Focusing on Biwan seri's Her Simcheong(justoon, 2017-2019) ('페미니즘 리부트' 시대의 여성 간 로맨스 -비완·seri, <그녀의 심청>(저스툰, 2017~2019))

  • Heo, Yoon
    • Journal of Popular Narrative
    • /
    • v.26 no.4
    • /
    • pp.183-212
    • /
    • 2020
  • GL(Girls' Love), which deals with romance between women, is considered a small, minor culture in the sub-culture market. Nevertheless, recent 'reboot feminism' in the voice of women in the epic that appears to be the central protagonist is increased, and interest in naturally glIncreasing. It encourages those who declare "post BL" to consume GLs featuring female characters instead of male characters. In an atmosphere where female creators consume female dictionaries who write women's stories and argue that they should expand the scope of their female counterparts, "Her Simcheong," a webtoon that won the 2018 Our Comics Award, explores the possibility of female epic through rewriting myths. Gender norms given to women, such as filial piety and nirvana, all get new names in . A good daughter is a liar, and a good wife has a woman she loves. Besides Simcheong, hit-and-run mothers, Jang Seung-sang's wife and Jang Seung-sang's daughter-in-law also focus on female characters' stories, highlighting solidarity among women to survive in a male-dominated society. In this process, solidarity among women naturally leads to GL imagination. Her Simcheong describes direct sexual contact, such as kissing and hugging among women, as beautiful illustrations, and shows romance between women in a manless world. While solidarity among women is always regarded as 'undangerous' friendship or girlish sensibility, the romance between women in breaks the cultural rules of women's growth novel and women's trade. This reveals the inconsistency of the conspiratorial male solidarity, which has been trading women around hegemony.

A Study on the Effective Way of Supplying of Highly Educated Fashion Specialists -Focusing on the Korean Apparel Manufacturers in Dalian, China- (패션 전문가의 성공적인 중국 진출에 관한 연구 -중국 대련의 의류제조업체를 중심으로-)

  • Bae Soo-Jeong
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.29 no.12 s.148
    • /
    • pp.1562-1570
    • /
    • 2005
  • The purpose of this thesis is to find the effective way of practical education in the fashion related department in order to supply the appropriate experts to the Korean apparel manufacturers located in Dalian, China. The interviews were made twice from $25^{th}$ of Feb. to $15^{th}$ of Mar. 2005 and from $28^{th}$ of July to 31st of July 2005 through the method ot a direct interview with the CEOs of the 7 representative apparel manufactures. The results of the interviews were as following. Seven companies$(100\%)$ participated in the survey all complained of insufficient workers. Also the companies were having difficulties at finding appropriate workers who can handle designing, management, and circulation, because specialists who are fluent in Korean and Chinese are very rare. Moreover, Korean apparel manufacturers are now taking a step further to launch a high quality fashion brand, getting out of the simple hand work depending on low wage or low-tech(6 companies $85.7\%$). Thus, well-educated fashion specialists(intermediate manager) are required on the part of Korean clothing companies or apparel manufacturers in China. It is expected the intermediate managers and the specialists who are capable of launching a new brand will be urgently needed. Therefore, appropriate educations in Korea would be essential to minimize the problems the Korean fashion specialists might face in China. 1 would like to present three suggestions. 1. The highly educated Korean fashion specialists on apparel industry will be a solution both to the high jobless status in our country and to the deficiency in human resources of Korean apparel manufacturers in Dalian. 2. The students in the college should learn how to write down the working chart and matching chart in practical conditions. Taking an intern-ship in working factories in China during a certain period of time will be helpful. 3. The experts should be trained with emphasis on the quality, design, and value of the brand. This study will be used as a base for Koreans who work in fashion related department to enter the Chinese fashion market having a great potential.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Methodology for Identifying Issues of User Reviews from the Perspective of Evaluation Criteria: Focus on a Hotel Information Site (사용자 리뷰의 평가기준 별 이슈 식별 방법론: 호텔 리뷰 사이트를 중심으로)

  • Byun, Sungho;Lee, Donghoon;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.23-43
    • /
    • 2016
  • As a result of the growth of Internet data and the rapid development of Internet technology, "big data" analysis has gained prominence as a major approach for evaluating and mining enormous data for various purposes. Especially, in recent years, people tend to share their experiences related to their leisure activities while also reviewing others' inputs concerning their activities. Therefore, by referring to others' leisure activity-related experiences, they are able to gather information that might guarantee them better leisure activities in the future. This phenomenon has appeared throughout many aspects of leisure activities such as movies, traveling, accommodation, and dining. Apart from blogs and social networking sites, many other websites provide a wealth of information related to leisure activities. Most of these websites provide information of each product in various formats depending on different purposes and perspectives. Generally, most of the websites provide the average ratings and detailed reviews of users who actually used products/services, and these ratings and reviews can actually support the decision of potential customers in purchasing the same products/services. However, the existing websites offering information on leisure activities only provide the rating and review based on one stage of a set of evaluation criteria. Therefore, to identify the main issue for each evaluation criterion as well as the characteristics of specific elements comprising each criterion, users have to read a large number of reviews. In particular, as most of the users search for the characteristics of the detailed elements for one or more specific evaluation criteria based on their priorities, they must spend a great deal of time and effort to obtain the desired information by reading more reviews and understanding the contents of such reviews. Although some websites break down the evaluation criteria and direct the user to input their reviews according to different levels of criteria, there exist excessive amounts of input sections that make the whole process inconvenient for the users. Further, problems may arise if a user does not follow the instructions for the input sections or fill in the wrong input sections. Finally, treating the evaluation criteria breakdown as a realistic alternative is difficult, because identifying all the detailed criteria for each evaluation criterion is a challenging task. For example, if a review about a certain hotel has been written, people tend to only write one-stage reviews for various components such as accessibility, rooms, services, or food. These might be the reviews for most frequently asked questions, such as distance between the nearest subway station or condition of the bathroom, but they still lack detailed information for these questions. In addition, in case a breakdown of the evaluation criteria was provided along with various input sections, the user might only fill in the evaluation criterion for accessibility or fill in the wrong information such as information regarding rooms in the evaluation criteria for accessibility. Thus, the reliability of the segmented review will be greatly reduced. In this study, we propose an approach to overcome the limitations of the existing leisure activity information websites, namely, (1) the reliability of reviews for each evaluation criteria and (2) the difficulty of identifying the detailed contents that make up the evaluation criteria. In our proposed methodology, we first identify the review content and construct the lexicon for each evaluation criterion by using the terms that are frequently used for each criterion. Next, the sentences in the review documents containing the terms in the constructed lexicon are decomposed into review units, which are then reconstructed by using the evaluation criteria. Finally, the issues of the constructed review units by evaluation criteria are derived and the summary results are provided. Apart from the derived issues, the review units are also provided. Therefore, this approach aims to help users save on time and effort, because they will only be reading the relevant information they need for each evaluation criterion rather than go through the entire text of review. Our proposed methodology is based on the topic modeling, which is being actively used in text analysis. The review is decomposed into sentence units rather than considering the whole review as a document unit. After being decomposed into individual review units, the review units are reorganized according to each evaluation criterion and then used in the subsequent analysis. This work largely differs from the existing topic modeling-based studies. In this paper, we collected 423 reviews from hotel information websites and decomposed these reviews into 4,860 review units. We then reorganized the review units according to six different evaluation criteria. By applying these review units in our methodology, the analysis results can be introduced, and the utility of proposed methodology can be demonstrated.

Interpreting Bounded Rationality in Business and Industrial Marketing Contexts: Executive Training Case Studies (집행관배훈안례연구(阐述工商业背景下的有限合理性):집행관배훈안례연구(执行官培训案例研究))

  • Woodside, Arch G.;Lai, Wen-Hsiang;Kim, Kyung-Hoon;Jung, Deuk-Keyo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.3
    • /
    • pp.49-61
    • /
    • 2009
  • This article provides training exercises for executives into interpreting subroutine maps of executives' thinking in processing business and industrial marketing problems and opportunities. This study builds on premises that Schank proposes about learning and teaching including (1) learning occurs by experiencing and the best instruction offers learners opportunities to distill their knowledge and skills from interactive stories in the form of goal.based scenarios, team projects, and understanding stories from experts. Also, (2) telling does not lead to learning because learning requires action-training environments should emphasize active engagement with stories, cases, and projects. Each training case study includes executive exposure to decision system analysis (DSA). The training case requires the executive to write a "Briefing Report" of a DSA map. Instructions to the executive trainee in writing the briefing report include coverage in the briefing report of (1) details of the essence of the DSA map and (2) a statement of warnings and opportunities that the executive map reader interprets within the DSA map. The length maximum for a briefing report is 500 words-an arbitrary rule that works well in executive training programs. Following this introduction, section two of the article briefly summarizes relevant literature on how humans think within contexts in response to problems and opportunities. Section three illustrates the creation and interpreting of DSA maps using a training exercise in pricing a chemical product to different OEM (original equipment manufacturer) customers. Section four presents a training exercise in pricing decisions by a petroleum manufacturing firm. Section five presents a training exercise in marketing strategies by an office furniture distributer along with buying strategies by business customers. Each of the three training exercises is based on research into information processing and decision making of executives operating in marketing contexts. Section six concludes the article with suggestions for use of this training case and for developing additional training cases for honing executives' decision-making skills. Todd and Gigerenzer propose that humans use simple heuristics because they enable adaptive behavior by exploiting the structure of information in natural decision environments. "Simplicity is a virtue, rather than a curse". Bounded rationality theorists emphasize the centrality of Simon's proposition, "Human rational behavior is shaped by a scissors whose blades are the structure of the task environments and the computational capabilities of the actor". Gigerenzer's view is relevant to Simon's environmental blade and to the environmental structures in the three cases in this article, "The term environment, here, does not refer to a description of the total physical and biological environment, but only to that part important to an organism, given its needs and goals." The present article directs attention to research that combines reports on the structure of task environments with the use of adaptive toolbox heuristics of actors. The DSA mapping approach here concerns the match between strategy and an environment-the development and understanding of ecological rationality theory. Aspiration adaptation theory is central to this approach. Aspiration adaptation theory models decision making as a multi-goal problem without aggregation of the goals into a complete preference order over all decision alternatives. The three case studies in this article permit the learner to apply propositions in aspiration level rules in reaching a decision. Aspiration adaptation takes the form of a sequence of adjustment steps. An adjustment step shifts the current aspiration level to a neighboring point on an aspiration grid by a change in only one goal variable. An upward adjustment step is an increase and a downward adjustment step is a decrease of a goal variable. Creating and using aspiration adaptation levels is integral to bounded rationality theory. The present article increases understanding and expertise of both aspiration adaptation and bounded rationality theories by providing learner experiences and practice in using propositions in both theories. Practice in ranking CTSs and writing TOP gists from DSA maps serves to clarify and deepen Selten's view, "Clearly, aspiration adaptation must enter the picture as an integrated part of the search for a solution." The body of "direct research" by Mintzberg, Gladwin's ethnographic decision tree modeling, and Huff's work on mapping strategic thought are suggestions on where to look for research that considers both the structure of the environment and the computational capabilities of the actors making decisions in these environments. Such research on bounded rationality permits both further development of theory in how and why decisions are made in real life and the development of learning exercises in the use of heuristics occurring in natural environments. The exercises in the present article encourage learning skills and principles of using fast and frugal heuristics in contexts of their intended use. The exercises respond to Schank's wisdom, "In a deep sense, education isn't about knowledge or getting students to know what has happened. It is about getting them to feel what has happened. This is not easy to do. Education, as it is in schools today, is emotionless. This is a huge problem." The three cases and accompanying set of exercise questions adhere to Schank's view, "Processes are best taught by actually engaging in them, which can often mean, for mental processing, active discussion."

  • PDF

Consumer Awareness and Evaluation of Retailers' Social Responsibility: An Exploratory Approach into Ethical Purchase Behavior from a U.S Perspective (소비자인지도화령수상사회책임(消费者认知度和零售商社会责任): 종미국시각출발적도덕구매행위적탐색성연구(从美国视角出发的道德购买行为的探索性研究))

  • Lee, Min-Young;Jackson, Vanessa P.
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.1
    • /
    • pp.49-58
    • /
    • 2010
  • Corporate social responsibility has become a very important issue for researchers (Greenfield, 2004; Maignan & Ralston, 2002; McWilliams et al., 2006; Pearce & Doh 2005), and many consider it necessary for businesses to define their role in society and apply social and ethical standards to their businesses (Lichtenstein et al., 2004). As a result, a significant number of retailers have adopted CSR as a strategic tool to promote their businesses. To this end, this study sought to discover U.S. consumers' attitudes and behavior in ethical purchasing and consumption based on their subjective perception and evaluation of a retailer. The objectives of this study include: 1) determine the participants awareness of retailers corporate social responsibility; 2) assess how participants evaluate retailers corporate social responsibility; 3) examine whether participants evaluation process of retailers CSR influence their attitude toward the retailer; and 4) assess if participants attitude toward the retailers CSR influence their purchase behavior. This study does not focus on actual retailers' CSR performance because a consumer's decision making process is based on an individual assessment not an actual fact. This study examines US college students' awareness and evaluations of retailers' corporate social responsibility (CSR). Fifty six college students at a major Southeastern university participated in the study. The age of the participants ranged from 18 to 26 years old. Content analysis was conducted with open coding and focused coding. Over 100 single-spaced pages of written responses were collected and analyzed. Two steps of coding (i.e., open coding and focused coding) were conducted (Esterberg, 2002). Coding results and analytic memos were used to understand participants' awareness of CSR and their ethical purchasing behavior supported through the selection and inclusion of direct quotes that were extracted from the written responses. Names used here are pseudonyms to protect confidentiality of participants. Participants were asked to write about retailers, their aware-ness of CSR issues, and to evaluate a retailer's CSR performance. A majority (n = 28) of respondents indicated their awareness of CSR but have not felt the need to act on this issue. Few (n=8) indicated that they are aware of this issue but not greatly concerned. Findings suggest that when college students evaluate retailers' CSR performance, they use three dimensions of CSR: employee support, community support, and environmental support. Employee treatment and support were found as an important criterion in evaluation of retailers' CSR. Respondents indicated that their good experience with a retailer as an employee made them have a positive perception and attitude toward the retailer. Regarding employee support four themes emerged: employee rewards and incentives based on performance, working environment, employee education and training program, and employee and family discounts. Well organized rewards and incentives were mentioned as an important attribute. The factors related to the working environment included: how well retailers follow the rules related to working hours, lunch time and breaks was also one of the most mentioned attributes. Regarding community support, three themes emerged: contributing a percentage of sales to the local community, financial contribution to charity organizations, and events for community support. Regarding environments, two themes emerged: recycling and selling organic or green products. It was mentioned in the responses that retailers are trying to do what they can to be environmentally friendly. One respondent mentioned that the company is creating stores that have an environmentally friendly design. Information about what the company does to help the environment can easily be found on the company’s website as well. Respondents have also noticed that the stores are starting to offer products that are organic and environmentally friendly. A retailer was also mentioned by a respondent in this category in reference to how the company uses eco-friendly cups and how they are helping to rebuild homes in New Orleans. The respondents noticed that a retailer offers reusable bags for their consumers to purchase. One respondent stated that a retailer uses its products to help the environment, through offering organic cotton. After thorough analysis of responses, we found that a participant's evaluation of a retailers' CSR influenced their attitudes towards retailers. However, there was a significant gap between attitudes and purchasing behavior. Although the participants had positive attitudes toward retailers CSR, the lack of funds and time influenced their purchase behavior. Overall, half (n=28) of the respondents mentioned that CSR performance affects their purchasing decisions making when shopping. Findings from this study provide support for retailers to consider their corporate social responsibility when developing their image with the consumer. This study implied that consumers evaluate retailers based on employee, community and environmental support. The evaluation, attitude and purchase behavior of consumers seem to be intertwined. That is, evaluation is based on the knowledge the consumer has of the retailers CSR. That knowledge may influence their attitude toward the retailer and thus influence their purchase behavior. Participants also indicated that having CSR makes them think highly of the retailer, but it does not influence their purchase behavior. Price and convenience seem to surpass the importance of CSR among the participants. Implications, recommendations for future research, and limitations of the study are also discussed.