250 resultados para secret shopping

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visiting a modern shopping center is becoming vital in our society nowadays. The fast growth of shopping center, transportation system, and modern vehicles has given more choices for consumers in shopping. Although there are many reasons for the consumers in visiting the shopping center, the influence of travel time and size of shopping center are important things to be considered towards the frequencies of visiting customers in shopping centers. A survey to the customers of three major shopping centers in Surabaya has been conducted to evaluate the Ellwood’s model and Huff’s model. A new exponent value N of 0.48 and n of 0.50 has been found from the Ellwood’s model, while a coefficient of 0.267 and an add value of 0.245 have been found from the Huff’s model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Quality has been an important factor for shopping centers in competitive conditions. However, quality measurement has no standard. In Surabaya, only two regional shopping centers will be measured in this research. The objective is assessing quality of shopping centers building using Analytical Hierarchy Process (AHP) method and calculating the Building Quality Index. An overall ranking of Hierarchy priorities of quality criteria founded as a result from AHP analysis. Access and Circulation became the highest priority in affecting quality of shopping centers building according to respondents’ perception of quality. Weightened value as a result from comparison between two shopping centers as follows: Tunjungan Plaza get 0,732 point and Surabaya Plaza get 0,268 point. The first shopping center got higher weight than the second shopping center. The BQI for Tunjungan Plaza is 66% and for Surabaya Plaza is 64%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the representation of Indigenous sexuality on Australian television drama since the 1970s, suggesting the political importance of such representations. In 1976 Justine Saunders became the first regular Indigenous character on an Australian television drama series, as the hairdresser Rhonda Jackson in Number 96. She was presented as sexually attractive, but this was expressed through a rape scene after a party. Twenty five years later, Deborah Mailman starred in The Secret Life of Us, as Kelly, who is also presented as sexually attractive. But her character can be seen in many romantic relationships. The article explores changing representations that moved us from Number 96 to The Secret Life of Us, via The Flying Doctors and Heartland. It suggests that in representations of intimate and loving relationships on screen it has only recently become possible to see hopeful models for interaction between Indigenous and non-Indigenous Australians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research suggests that people differ in terms of changing their shopping behaviour during a recession. This paper reports on a preliminary descriptive study assessing what influences those consumers who have altered their shopping behaviour during such times. Driving the alteration of shopping behaviour were both demographic (age, gender, education, and nationality) and psychographic variables (attitudes, and head vs. heart decision making). Overall, the findings show that there are statistically significant differences between the two groups’ that marketers can address in their marketing strategies during the recession.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the siphon has been in use since ancient times, the exact mechanism of operation is still under discussion. For example, most dictionaries assert that atmospheric pressure is essential to the operation of a siphon rather than gravity. Although there is general agreement that gravity is the motivating force in a siphon, there is disagreement on how liquid enters a siphon – is it atmospheric push or tensile pull? This paper describes a classroom experiment that can serve as the basis for discussing how a siphon works. The experiment involves the construction of a siphon in which the water level in the upper reservoir is held constant during the operation of the siphon. Since the atmosphere is not doing any work on the water in the upper reservoir only gravity is at work. The special situation of a bubble-in-a-siphon is also discussed in which both atmospheric pressure and gravity are at work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Simulating passenger flows within airports is very important as it can provide an indication of queue lengths, bottlenecks, system capacity and overall level of service. To date, visual simulation tools such as agent based models have focused on processing formalities such as check-in, and not incorporate discretionary activities such as duty-free shopping. As airport retail contributes greatly to airport revenue generation, but also has potentially detrimental effects on facilitation efficiency benchmarks, this study developed a simplistic simulation model which captures common duty-free purchasing opportunities, as well as high-level behaviours of passengers. It is argued that such a model enables more realistic simulation of passenger facilitation, and provides a platform for simulating real-time revenue generation as well as more complex passenger behaviours within the airport. Simulations are conducted to verify the suitability of the model for inclusion in the international arrivals process for assessing passenger flow and infrastructure utilization.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ABSRACT. Despite the surge in online retail sales in recent years there still remains reluctance by consumers to complete the online shopping process. A number of authors have attributed consumers’ reluctance to purchase online to apparent barriers. However, such barriers as yet have not been fully examined within a theoretical context. This research explores the application of the perceived risk theoretical framework. Specifically, performance risk and the influence of perceived performance risk has on the phenomenon of Internet Abandoned Cart Syndrome (ACS) is evaluated. To explore this phenomenon, a number of extrinsic cues are identified as playing a major role in the performance evaluation process of online purchases. The results of this study suggest the extrinsic cues of brand, reputation, design and price have an overall impact on the performance evaluation process just prior to an online purchase. Varying these cues either positively or negatively had a strong impact on performance evaluation. Further, it was found that positive or negative reputation was heavily associated with shopping cart abandonment.