204 resultados para Shopper Identity


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a fashion clothing context, this study explores the relationships between materialism,gender, fashion clothing involvement and recreational shopper identity. These relationships are tested using (N = 200) Australian Generation Y consumers. Results suggest that fashion clothing involvement is significantly affected by materialism and gender, and in turn fashion clothing involvement influences recreational shopper identity. A direct relationship was also found between materialism and recreational shopper identity.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study is concerned with consumer involvement in fashion clothing. Amidst the consumer objects that facilitate everyday life, fashion clothing is an important and meaningful object for many consumers. In the extant consumer literature few studies have attempted to examine fashion clothing involvement, particularly in terms of its causes and outcomes. This study then focuses on building a reliable nomological network to bring a greater understanding to this facet of consumer behaviour. To achieve this, materialism and gender are examined as drivers of fashionclothinginvolvement. Recreational shopper identity, ongoing information search, market mavenism, and purchase decision involvement are explored as outcomes of fashion clothing involvement. Data were gathered using an Australian Generation Y sample resulting in 200 completed questionnaires. The results support the study’s model and its hypotheses and show that materialism and gender are significant drivers of fashion clothing involvement. While also, recreational shopper identity, ongoing information search, market mavenism and purchase decision involvement are significant outcomes of fashion clothing involvement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.