• Title/Summary/Keyword: credit card companies

Search Result 82, Processing Time 0.027 seconds

SK Energy's Customer Satisfaction

  • Yeu Minsun;Lee, Doo-Hee;Kim, Jaehwan
    • Asia Marketing Journal
    • /
    • v.16 no.1
    • /
    • pp.195-214
    • /
    • 2014
  • Many oil refinery companies have been proactively carried out marketing activities to survive in highly intensified service station industry. In 2012, SK Energy ranked number one in three customer satisfaction surveys (NCSI, KCSI, and KS-SQI). SK Energy's success is in its differentiated customer satisfaction business strategy. SK Energy has been implementing various marketing activities. As a part of the activities, it issued an affinity credit card with on spot discount privilege for the first time in the oil refinery industry. SK Energy also issued EnClean bonus card for OK Cashbag points that can be used for discounts at the service stations. On top of all, SK Energy generated point value-up with '3K Exclusive Privilege' program. In addition, team 'CS 119' was formed to noticeably improve the service. 'CS 119' visited each service station, diagnosed its CS service level then provided customized field training for improvement. Long-termimplementation of 'ACE Program', a field-base CS monitoring system, regularly checked customer satisfaction level. 'ACE Program' has significantly contributed improving SK Service Station's service quality and customer satisfaction. This case reviews customer satisfaction marketing activities SK Energy carried out. The focus is on distinctive factors that distinguish SK Energy's customer satisfaction marketing activities from competitors.

  • PDF

Needs and considerrations of corporate security assessment (Focusing on financial companies) (기업 보안평가 공시제도의 필요성 및 구현방안 (금융회사 중심으로))

  • Kim, Bo;Lim, Jong-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.273-279
    • /
    • 2014
  • Recently, it was occurred in the nation's largest Information spill about 140 million cases of credit card customers' personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.

Consumer Trend Platform Development for Combination Analysis of Structured and Unstructured Big Data (정형 비정형 빅데이터의 융합분석을 위한 소비 트랜드 플랫폼 개발)

  • Kim, Sunghyun;Chang, Sokho;Lee, Sangwon
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.133-143
    • /
    • 2017
  • Data is the most important asset in the financial sector. On average, 71 percent of financial institutions generate competitive advantage over data analysis. In particular, in the card industry, the card transaction data is widely used in the development of merchant information, economic fluctuations, and information services by analyzing patterns of consumer behavior and preference trends of all customers. However, creation of new value through fusion of data is insufficient. This study introduces the analysis and forecasting of consumption trends of credit card companies which convergently analyzed the social data and the sales data of the company's own. BC Card developed an algorithm for linking card and social data with trend profiling, and developed a visualization system for analysis contents. In order to verify the performance, BC card analyzed the trends related to 'Six Pocket' and conducted th pilot marketing campaign. As a result, they increased marketing multiplier by 40~100%. This study has implications for creating a methodology and case for analyzing the convergence of structured and unstructured data analysis that have been done separately in the past. This will provide useful implications for future trends not only in card industry but also in other industries.

The Effects of the Perceived Call Center Service Quality on Service Loyalty - Focused on Mediating Effects of the Perceived Brand Personality - (콜센터 서비스에 대한 인지된 품질이 서비스 로열티에 미치는 영향 - 인지된 브랜드 개성의 매개효과를 중심으로 -)

  • Lee, Myeong Sik;Kim, Gyoung Suk
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.4
    • /
    • pp.531-542
    • /
    • 2012
  • Purpose: This study examines the causal relationship among perceived call center service quality, perceived brand personality, and service loyalty. Methods: This study employs call center services in mobile phone, credit card, and internet shopping, to collect data from respondents via on-line survey, and analyzes causal relationship among above-mentioned three constraints. Results: Perceived call center service quality has a positive impact on perceived brand personality and service loyalty. Perceived brand personality has a positive impact on service loyalty. Cognitive loyalty has a positive influence on attitudinal loyalty. Attitudinal loyalty has a positive impact on behavioral loyalty. Perceived brand personality has a mediating effect towards perceived call center service quality and service loyalty. Conclusion: In order to improve service loyalty, it is necessary to understand diverse variables. Call center service companies are required to find the ways to improve their service quality, while positively applying the techniques of differentiating the brand personality used by manufacturing companies.

A Study on the Effect of the Facilitating Factors of B2C eCommerce on the Online Shopping and the Overseas Direct Purchase (우리나라 B2C 전자상거래 촉진요인이 온라인쇼핑과 해외직접구매에 미치는 영향 : 택배물류기업의 과제를 중심으로)

  • Jung, Seok-Mo;Park, Seung-Lak
    • International Commerce and Information Review
    • /
    • v.18 no.2
    • /
    • pp.27-51
    • /
    • 2016
  • The purpose of this paper is to examine correlations between the facilitating factors of the B2C e-commerce and the online shopping and the overseas direct purchase for the purpose of suggesting the successful logistics operational strategies for the domestic parcel delivery service companies. This paper conducts wide literature reviews and empirical analyses on relationships between the facilitating factors of B2C e-commerce and the online shopping and the overseas direct purchase in B2C e-commerce. We built two regression equations that dependable variables are the turnover of online shopping and the amount of imports by international postal logistics services respectively. The former equation's estimation results show that all the independable variables are affecting the dependable variable in the long-term jointly. And, the results show that the change of the turnover of online shopping is affected not only by the change of the usage count of a credit card and the real GDP, but also by the change of the error-correction variable. The latter equation's estimation results show that all the independable variables are affecting the dependable variable in the long-term jointly. Futhermore, the results show that the change of the amount of imports by international postal logistics services is affected not only by the change of the usage count of a credit card, the exchange rate and the internet protocol IPv4, but also by the change of the error-correction variable. Based on these research results, a high advanced strategic approach for optimum parcel delivery services is highly required.

  • PDF

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

A Study of Convergence Technology in Robotic Process Automation for Task Automation (업무 자동화를 위한 RPA 융합 기술 고찰)

  • Kim, Ki-Bong
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.8-13
    • /
    • 2019
  • Recently, In line with the recent trend of the fourth industrial revolution, many companies and institutions have been increasingly applying automated technologies using artificial intelligence to various tasks. Particularly, due to the government's 52-hour workweek system, companies are increasingly struggling with manpower management. Therefore, they are interested in RPA (Robotic Process Automation) for office environment automation for efficient manpower management. It is being introduced in the back-office business in credit card companies, bank, insurance. These RPA solutions require AI-based recognition technology, scripting technology, business software API-related technologies, and various solutions such as Automate One, Automation Anywhere, UiPath, and Blue Prism are provided. This paper analyzes and describes the technology of RPA solution, the market trend, and the efficiency of RPA adoption.

A Study on the Countermeasure Technology for Fin-Tech Optimized Financial Security (금융 보안에 최적화된 Fin-Tech 대응기술 연구)

  • Kim, Seokhoon;Kwak, Ha-Min
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.25-30
    • /
    • 2015
  • Recently, interest in Fin-Tech, a compound word of finance and technology, has been increased. However, Fin-Tech that is a mixture of finance and IT is exposed in terms of security. In this paper, we propose a method to solve the security-related problem that occurs in the financial sector where the Fin-Tech is used. Proposed method found out different problems of services which are provided by companies through a variety of financial sectors and described a method to facilitate the security service. In particular, proposed method presents a service plan to secure safety and to minimize the damage. Also, proposed method set an objective to stabilize financial services based on analyzed result after analyzing the problems of existing FinTech security services.

  • PDF

Study on Consumer Problems Related to Use of Online Game Services by Type and Age (온라인게임 서비스 이용 소비자의 연령별.유형별 소비자문제 연구)

  • Choi, Eun-Sill
    • Journal of Family Resource Management and Policy Review
    • /
    • v.10 no.3
    • /
    • pp.23-43
    • /
    • 2006
  • The purpose of this study is to identify the types of consumer problems involving the use of online game services in Korea. This study analyzed the consumer damage cases by age and type that were reported to the Korea Consumer Protection Board (KCPB). The results of this study are as follows: The online game complaints varied by age. In the case of children, most complaints involved phone charging online game fees without parents' consent. There were similarities in the victimization of teens and children according to reason for complaint, handling result and type of damage. However, based on method of charging, mobile phone and credit card payments were causes in the case of teen victimization. Meanwhile, complaints among adults showed more complexity than the previous two groups such as cases relating to online game companies illegally seizing game items and game accounts, and charging fees for unused services caused by identity theft. By type of charging method, most complaints involved phone and mobile phone payments. According to the analysis result of online game victims, the monetary damage of consumers did not differ among socio-demographic variables such as age, residence, gender and occupation but there was difference in the method of charging. In the handling period, differences could be seen by age, year, gender and type of damage.

  • PDF

A Study on Website Operators Privacy Breaches through Hacking Forensic Research (통신사 홈페이지 해킹을 통한 개인정보유출 사고 포렌식 연구)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.257-260
    • /
    • 2014
  • Digital Forensics in the event of an accident, the system restore files and the only way to find evidence KT Website hacking happening now, credit card companies, and leakage of personal information by three recent spills occurred, such as Skin Food Home Up Customer Information hackers to find these crimes only means as well. This study attempted to bypass the KT website hacking attacks utilizing automated programs hacking programs, and if you try to experiment on whether any information has been disclosed and if so what home attacked forensics evidence for hackers to locate the can make a report is described.

  • PDF