• Title/Summary/Keyword: consumer's information need

Search Result 246, Processing Time 0.026 seconds

Perceptional Change of a New Product, DMB Phone

  • Kim, Ju-Young;Ko, Deok-Im
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.3
    • /
    • pp.59-88
    • /
    • 2008
  • Digital Convergence means integration between industry, technology, and contents, and in marketing, it usually comes with creation of new types of product and service under the base of digital technology as digitalization progress in electro-communication industries including telecommunication, home appliance, and computer industries. One can see digital convergence not only in instruments such as PC, AV appliances, cellular phone, but also in contents, network, service that are required in production, modification, distribution, re-production of information. Convergence in contents started around 1990. Convergence in network and service begins as broadcasting and telecommunication integrates and DMB(digital multimedia broadcasting), born in May, 2005 is the symbolic icon in this trend. There are some positive and negative expectations about DMB. The reason why two opposite expectations exist is that DMB does not come out from customer's need but from technology development. Therefore, customers might have hard time to interpret the real meaning of DMB. Time is quite critical to a high tech product, like DMB because another product with same function from different technology can replace the existing product within short period of time. If DMB does not positioning well to customer's mind quickly, another products like Wibro, IPTV, or HSPDA could replace it before it even spreads out. Therefore, positioning strategy is critical for success of DMB product. To make correct positioning strategy, one needs to understand how consumer interprets DMB and how consumer's interpretation can be changed via communication strategy. In this study, we try to investigate how consumer perceives a new product, like DMB and how AD strategy change consumer's perception. More specifically, the paper segment consumers into sub-groups based on their DMB perceptions and compare their characteristics in order to understand how they perceive DMB. And, expose them different printed ADs that have messages guiding consumer think DMB in specific ways, either cellular phone or personal TV. Research Question 1: Segment consumers according to perceptions about DMB and compare characteristics of segmentations. Research Question 2: Compare perceptions about DMB after AD that induces categorization of DMB in direction for each segment. If one understand and predict a direction in which consumer perceive a new product, firm can select target customers easily. We segment consumers according to their perception and analyze characteristics in order to find some variables that can influence perceptions, like prior experience, usage, or habit. And then, marketing people can use this variables to identify target customers and predict their perceptions. If one knows how customer's perception is changed via AD message, communication strategy could be constructed properly. Specially, information from segmented customers helps to develop efficient AD strategy for segment who has prior perception. Research framework consists of two measurements and one treatment, O1 X O2. First observation is for collecting information about consumer's perception and their characteristics. Based on first observation, the paper segment consumers into two groups, one group perceives DMB similar to Cellular phone and the other group perceives DMB similar to TV. And compare characteristics of two segments in order to find reason why they perceive DMB differently. Next, we expose two kinds of AD to subjects. One AD describes DMB as Cellular phone and the other Ad describes DMB as personal TV. When two ADs are exposed to subjects, consumers don't know their prior perception of DMB, in other words, which subject belongs 'similar-to-Cellular phone' segment or 'similar-to-TV' segment? However, we analyze the AD's effect differently for each segment. In research design, final observation is for investigating AD effect. Perception before AD is compared with perception after AD. Comparisons are made for each segment and for each AD. For the segment who perceives DMB similar to TV, AD that describes DMB as cellular phone could change the prior perception. And AD that describes DMB as personal TV, could enforce the prior perception. For data collection, subjects are selected from undergraduate students because they have basic knowledge about most digital equipments and have open attitude about a new product and media. Total number of subjects is 240. In order to measure perception about DMB, we use indirect measurement, comparison with other similar digital products. To select similar digital products, we pre-survey students and then finally select PDA, Car-TV, Cellular Phone, MP3 player, TV, and PSP. Quasi experiment is done at several classes under instructor's allowance. After brief introduction, prior knowledge, awareness, and usage about DMB as well as other digital instruments is asked and their similarities and perceived characteristics are measured. And then, two kinds of manipulated color-printed AD are distributed and similarities and perceived characteristics for DMB are re-measured. Finally purchase intension, AD attitude, manipulation check, and demographic variables are asked. Subjects are given small gift for participation. Stimuli are color-printed advertising. Their actual size is A4 and made after several pre-test from AD professionals and students. As results, consumers are segmented into two subgroups based on their perceptions of DMB. Similarity measure between DMB and cellular phone and similarity measure between DMB and TV are used to classify consumers. If subject whose first measure is less than the second measure, she is classified into segment A and segment A is characterized as they perceive DMB like TV. Otherwise, they are classified as segment B, who perceives DMB like cellular phone. Discriminant analysis on these groups with their characteristics of usage and attitude shows that Segment A knows much about DMB and uses a lot of digital instrument. Segment B, who thinks DMB as cellular phone doesn't know well about DMB and not familiar with other digital instruments. So, consumers with higher knowledge perceive DMB similar to TV because launching DMB advertising lead consumer think DMB as TV. Consumers with less interest on digital products don't know well about DMB AD and then think DMB as cellular phone. In order to investigate perceptions of DMB as well as other digital instruments, we apply Proxscal analysis, Multidimensional Scaling technique at SPSS statistical package. At first step, subjects are presented 21 pairs of 7 digital instruments and evaluate similarity judgments on 7 point scale. And for each segment, their similarity judgments are averaged and similarity matrix is made. Secondly, Proxscal analysis of segment A and B are done. At third stage, get similarity judgment between DMB and other digital instruments after AD exposure. Lastly, similarity judgments of group A-1, A-2, B-1, and B-2 are named as 'after DMB' and put them into matrix made at the first stage. Then apply Proxscal analysis on these matrixes and check the positional difference of DMB and after DMB. The results show that map of segment A, who perceives DMB similar as TV, shows that DMB position closer to TV than to Cellular phone as expected. Map of segment B, who perceive DMB similar as cellular phone shows that DMB position closer to Cellular phone than to TV as expected. Stress value and R-square is acceptable. And, change results after stimuli, manipulated Advertising show that AD makes DMB perception bent toward Cellular phone when Cellular phone-like AD is exposed, and that DMB positioning move towards Car-TV which is more personalized one when TV-like AD is exposed. It is true for both segment, A and B, consistently. Furthermore, the paper apply correspondence analysis to the same data and find almost the same results. The paper answers two main research questions. The first one is that perception about a new product is made mainly from prior experience. And the second one is that AD is effective in changing and enforcing perception. In addition to above, we extend perception change to purchase intention. Purchase intention is high when AD enforces original perception. AD that shows DMB like TV makes worst intention. This paper has limitations and issues to be pursed in near future. Methodologically, current methodology can't provide statistical test on the perceptual change, since classical MDS models, like Proxscal and correspondence analysis are not probability models. So, a new probability MDS model for testing hypothesis about configuration needs to be developed. Next, advertising message needs to be developed more rigorously from theoretical and managerial perspective. Also experimental procedure could be improved for more realistic data collection. For example, web-based experiment and real product stimuli and multimedia presentation could be employed. Or, one can display products together in simulated shop. In addition, demand and social desirability threats of internal validity could influence on the results. In order to handle the threats, results of the model-intended advertising and other "pseudo" advertising could be compared. Furthermore, one can try various level of innovativeness in order to check whether it make any different results (cf. Moon 2006). In addition, if one can create hypothetical product that is really innovative and new for research, it helps to make a vacant impression status and then to study how to form impression in more rigorous way.

  • PDF

Needs and considerrations of corporate security assessment (Focusing on financial companies) (기업 보안평가 공시제도의 필요성 및 구현방안 (금융회사 중심으로))

  • Kim, Bo;Lim, Jong-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.273-279
    • /
    • 2014
  • Recently, it was occurred in the nation's largest Information spill about 140 million cases of credit card customers' personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.

Determinants of Credibility of Electronic Word-of-Mouth (eWOM) in WeChat-based Social Commerce: Applying the Heuristic-Systematic Model (중국의 웨이신(WeChat) 기반 소셜커머스에서 온라인 구전 신뢰성의 결정요인: 휴리스틱-체계적 모델(HSM)의 적용)

  • Qu, Min;Choi, Su-Jeong
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.107-135
    • /
    • 2017
  • Purpose Along with the growth of smart phones and social networking service (SNS), social commerce continues to expand. Although online reviews have become an important source of the information that consumers use to make purchasing decisions, theoretical development and empirical testing in this area are still limited. Thus, there is a need to develop further understanding about the influence of electronic word-of-mouth (eWOM). Drawing upon the heuristic - systematic model (HSM) which is one of the dual-process theories, this study develops a research model that explains key factors influencing consumers' eWOM credibility. Furthermore, this study verifies that consumer's eWOM credibility is a key determinant of eWOM and purchase intentions. Design/methodology/approach The proposed model is empirically tested with 493 users who have experience in WeChat-based social commerce. The structural equation model (SEM) analysis is used to evaluate the research model and hypotheses. Findings The major findings are as follows. First, argument quality of eWOM (a systematic factor) has a positive effect on eWOM credibility. Second, source credibility and recommendation consistency of eWOM (heuristic factors) are positively associated with eWOM credibility. Finally, purchase and eWOM intentions greatly depend on eWOM credibility. These results confirm the effectiveness of HSM in explaining eWOM mechanisms in SNS-based social commerce. The details of findings and implications are presented.

Grandparenting Style and Consumption Behavior of Elderly Consumers for Grandchildren (한국 노인의 조부모역할 유형과 손자녀를 위한 소비행동)

  • Hong, Seung Woo;Choi, Hye Kyong
    • 한국노년학
    • /
    • v.32 no.4
    • /
    • pp.1163-1180
    • /
    • 2012
  • The main purpose of this study is to figure out the spending tendency of elderly consumers for their grandchildren. To this end, a detailed survey was carried out for two months from October 1 to November 30, 2011. The respondents consist of 461 elderly consumers over 60s who have grandchildren in elementary grades. Among the gathered data, relevant information was sorted out, coded, and then turned into statistical figures through SPSS 18.0 program. The outcome of this research is explained in the following three respects. First of all, based upon factor and cluster analysis, the role of grandparents has been divided into three categories, which are a babysitter, a friend and a visitor. Depending on their role, the surveyed elderly have been split into three groups-'Friend Group', 'Formal Visitor Group', 'Attached Group'. Second, to give you an overview of the consumption trend of the three groups, this study has reviewed the expenditure items, spending amount and consumption patterns, and made a list of products and services they purchased for the past one year for their grandchildren. Third, given the probability of wealth transfer to the next generation, there is a compelling need to figure out the purchase pattern of financial products. The elderly have been categorized into those with bank deposits only and those with a mixture of bank deposits and other financial products (insurance, fund, stocks, gold, dollar etc.).

Consumer Perceptions of Food-Related Hazards and Correlates of Degree of Concerns about Food (주부의 식품안전에 대한 인식과 안전성우려의 관련 요인)

  • Choe, Jeong-Sook;Chun, Hye-Kyung;Hwang, Dae-Yong;Nam, Hee-Jung
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.34 no.1
    • /
    • pp.66-74
    • /
    • 2005
  • This survey was conducted to assess the consumer perceptions of food-related hazard in 500 housewives from all over Korea. The subjects were selected by stratified random sampling method. The survey was performed using structured questionnaire through telephone interview by skilled interviewers. The results showed that 34.6% of the respondents felt secure and were not concerned about food safety, and 65.4% were concerned about food safety. Logistic regression analysis showed that the increasing concern on food brands, food additives (such as food preservatives and artificial color), and imported foodstuffs indicated the current increasing concern on food safety. Other related factors indicating the increasing concern on food safety were education level and care for children's health. The respondents who cared about food safety expressed a high degree of concern on processed foodstuffs such as commercial boxed lunch (93.3%), imported foods (92.7%), fastfoods (89.9%), processed meat products (88.7%), dining out (85.6%), cannery and frozen foods (83.5%), and instant foods (82.0%). The lowest degree of concern was on rice. All the respondents perceived that residues of chemical substances such as pesticides and food additives, and endocrine disrupters were the most potential food risk factors, followed by food-borne pathogens, and GMOs (Genetically Modified Organisms). However, these results were not consistent with scientific judgment. Therefore, more education and information were needed for consumers' awareness of facts and myths about food safety. In addition, the results showed that consumers put lower trust in food products information such as food labels, cultivation methods (organic or not), quality labels, and the place of origin. Nevertheless, the respondents expressed their desire to overcome alienation, and recognized the importance of knowing of the origin or the producers of food. They identified that people who need to take extreme precautions on food contamination were the producers, government officials, food companies, consumers, the consumer's association, and marketers, arranged in the order of highest to lowest. They also believed that the production stage of agriculture was the most important step for improving the level of food safety Therefore, the results indicated that there is a need to introduce safety systems in the production of agricultural products, as follows: Good Agricultural Practice (GAP), Hazard Analysis and Critical Control Point (HACCP), and Traceability System (75).

An Efficient VM-Level Scaling Scheme in an IaaS Cloud Computing System: A Queueing Theory Approach

  • Lee, Doo Ho
    • International Journal of Contents
    • /
    • v.13 no.2
    • /
    • pp.29-34
    • /
    • 2017
  • Cloud computing is becoming an effective and efficient way of computing resources and computing service integration. Through centralized management of resources and services, cloud computing delivers hosted services over the internet, such that access to shared hardware, software, applications, information, and all resources is elastically provided to the consumer on-demand. The main enabling technology for cloud computing is virtualization. Virtualization software creates a temporarily simulated or extended version of computing and network resources. The objectives of virtualization are as follows: first, to fully utilize the shared resources by applying partitioning and time-sharing; second, to centralize resource management; third, to enhance cloud data center agility and provide the required scalability and elasticity for on-demand capabilities; fourth, to improve testing and running software diagnostics on different operating platforms; and fifth, to improve the portability of applications and workload migration capabilities. One of the key features of cloud computing is elasticity. It enables users to create and remove virtual computing resources dynamically according to the changing demand, but it is not easy to make a decision regarding the right amount of resources. Indeed, proper provisioning of the resources to applications is an important issue in IaaS cloud computing. Most web applications encounter large and fluctuating task requests. In predictable situations, the resources can be provisioned in advance through capacity planning techniques. But in case of unplanned and spike requests, it would be desirable to automatically scale the resources, called auto-scaling, which adjusts the resources allocated to applications based on its need at any given time. This would free the user from the burden of deciding how many resources are necessary each time. In this work, we propose an analytical and efficient VM-level scaling scheme by modeling each VM in a data center as an M/M/1 processor sharing queue. Our proposed VM-level scaling scheme is validated via a numerical experiment.

Status-Based RFID Authentication Protocol (상태기반 RFID 인증 프로토콜)

  • Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.57-68
    • /
    • 2004
  • Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.

Apple eases up on SDK policy: Avoiding antitrust? or strategic decision? (Apple의 폐쇄적 SDK정책 포기의 함의: 반독점성 시비의 회피와 전략적 결정)

  • Kim, Joon-Young;Park, Jin-Kyung;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.135-144
    • /
    • 2010
  • Apple recently announced a new policy about software development kit that banned the use of tools that convert apps built on other platforms into iPhone apps. Therefore, Adobe cannot develop their software to AppStore that inquire to the Department of Justice and the Federal Trade Commission about antitrust actions. Someone argue that Apple try to exclusive smartphone market such as the Microsoft antitrust lawsuit in 1998, but this case is essentially different. First, it need to define Apple's software development kit for iPhone and iPad is whether antitrust or not. Because of the characteristics of two-sided market in Smartphone Apple's iPhone cannot monopoly in cellphone or smartphone market, but it can be an antitrust in application store market. However, Apple re-announced new software development kit policy that shows positive results. Instead of hastily intervened regulatory agencies, the DOJ or the FTC, it is quite desirable that watching the interaction between companies that whether market failures or not and if it's harmful for consumer's benefit. Adobe attack Apple to advocate consumers and developers freedom of choice, but the most important thing is conclusion based on a comprehensive analysis need to objective point of view that Apple do whether antitrust act or not and damage to developers and consumers who are both side of platform.

An exploratory study on Social Network Services in the context of Web 2.0 period (웹 2.0 시대의 SNS(Social Network Service)에 관한 고찰)

  • Lee, Seok-Yong;Jung, Lee-Sang
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.143-167
    • /
    • 2010
  • Diverse research topics relating to Social Network Services (SNS) such as, social affective factors in relationships among internet users, social capital value of SNS, comparing attributes why users are intending to participate in SNS, user's lifestyle and their preferences, and the exploratory seeking potential of SNS as a social capital need to be focused on. However, these researches that have been undertaken only consider facts at a particular period of the changing computing environment. In accordance with this indispensability, the integrated view on what technical, social and business characteristics and attributes need to be acknowledged. The purpose of this study is to analyze the evolving attributes and characteristics of SNS from Web 1.0 to Mobile web 2.0 through the Web 2.0 and Mobile 1.0 period. Based on the relevant literature, the attributes that drive the changing technological, social and business aspects of SNS have been developed and analyzed. This exploratory study analyzed major attributes and relationships between SNS and users by changing the paradigms which represented each period. It classified and chronicled each period by representing paradigms and deducted the attributes by considering three aspects such as technological, social and business administration. The major findings of this study are, firstly, the web based computing environment has been changed into the platform attribute for users in the aspect of technology. Users can only read, listen and view information through the web site in the early stages, but now it is possible that users can create, modify and distribute all kinds of information. Secondly, the few knowledge producers of web services have been changed into a collective intelligence by groups of people in the aspect of society. Information authority has been distributed and there is no limit to its spread. Many businesses recognized the potential of the SNS and they are considering how to utilize these advantages toward channel of promotion and marketing. Thirdly, the conventional marketing channel has been changed into oral transmission by using SNS. The market of innovative mobile technology such as smart phones, which provide convenience and access-ability toward customers, has been enlarged. New opportunities to build friendly relationship between business and customers as a new marketing chance have been created. Finally, the role of the consumer has been changed into the leading role of a prosumer. Users can create, modify and distribute information, and are performing the dual role of customer and producer.

  • PDF

The Effect of Consumer Need for Tactile Cues on Purchase Intention in Internet Shopping Mall - An Moderating Effect of Perceived Risk, Purchased Experience - (인터넷 쇼핑몰 이용자의 촉각단서 윽구가 의류상품 구매행동에 미치는 영향에 관한 연구 - 구매경험, 지각된 위험의 조절효과 -)

  • Kwon, So-Young;Lee, Jin-Young;Oh, Hee-Sun;Suh, Yong-Han
    • Fashion & Textile Research Journal
    • /
    • v.6 no.5
    • /
    • pp.618-624
    • /
    • 2004
  • This study is to explore how consumers' needs for tactile cues affect their purchasing behaviors in the internet shopping mall. Since previous studies about internet shopping malls are mainly performed on the primary factors of perceived risk, there are insufficient studies of tactile cues for apparel products. Emphasis of this study is placed on verifying the following hypothesis; it is expected that consumers' needs for tactile cues affect apparel purchasing behaviors in internet shopping. The questionnaire was administered to 20 to 30 year old male and female respondents who are either students or businessmen living in the Busan area. 150 questionnaires were completed and collected for data analysis. The data were, using SPSS 10. 0 for Window, statistically analyzed by frequency and factor analysis for VARIMAX, Cronbach's coefficient and Linear regression analysis. Data were, using SPSS 10. 0 for Window, statistically analyzed by frequency and factor analysis for VARIMAX, Cronbach's coefficient, and ANOVA. The results of data analysis are as follows: First, the tactile cues negatively affect purchase intentions of consumers. This shows that apparel internet shoppers who have high desire for tactical cues tend to avoid purchasing products through the internet. Second, the factor analysis of the moderating effect on perceived risks shows that the perceived risks significantly moderate both the tactile cues and purchase intention of consumers. Third, analysis of purchased experience also shows that purchased experiences significantly moderate both the tactile cues and purchase intention.