7 resultados para do it yourself

em Aston University Research Archive


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Increasingly, retailers nowadays have to focus on service marketing strategies and tactics to differentiate themselves from their competitors. Delivering high levels of service quality becomes crucial for long-term success. Since customers' perception of service quality depends very much on the interaction between the customer and the employee, this study analyzes the link between employee and customer satisfaction in more detail. Moreover, based on three different theories that prior research has used, it investigates whether or not the level of customer contact is a determinant of the existence or the intensity of the employee–customer satisfaction link. Analysis of dyadic data from 53,645 customers and 1659 employees across 99 outlets of a large German Do-It-Yourself (DIY)-retailer shows that employee job satisfaction affects customer satisfaction even for employee groups that are not in direct interaction with customers, although effects seem to be slightly stronger for high interaction groups. Implications for research and management are discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Oliver’s 1997 four-stage loyalty model proposes that loyalty consists of belief, affect, intention, and action. Although this loyalty model has recently been subject to empirical examination, the issue of moderator variables has been largely neglected. This article fills that void by analyzing the moderating effects of selected personal and situational characteristics, using a sample of 888 customers of a large do-it-yourself retailer. The results of multi-group causal analysis suggest that these moderators exert an influence on the development of the different stages of the loyalty sequence. Specifically, age, income, education and expertise, price orientation, critical incident recovery, and loyalty card membership are found to be important moderators of the links in the four-stage loyalty model. Limitations of the study are outlined, and implications for both research and managerial practice are discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Oliver (1997) suggests a four-stage loyalty model proposing that loyalty consists of belief, affect, intentions, and action. Although this model has recently been subject to empirical examination, the issue of moderator variables has been largely neglected. This article fills that void by analyzing the moderating effects of switching barriers, using a sample of 589 customers of a large do-it-yourself (DIY) retailer. The results suggest that these moderators exert an influence on the development of the different stages of the loyalty sequence. Specifically, switching costs, social benefits, and attractiveness of alternatives are found to be important moderators of the links in the four-stage loyalty model.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Research on linking operational marketing inputs to customer attitudes and customer behavior has been gaining significance concomitant with the growing recognition that customers are market-based assets. In response to this, researchers and practitioners have proposed several conceptual models. Despite recent advances in research, the results are still inconclusive as to the relationship between customer attitude and future sales. A reason for this could be due to the paucity of studies combining survey-based data with behavioral data to understand better the drivers of customer behavior. With that in mind, the authors investigate the effects of customer perceptions of key marketing actions on customer attitudes and actual customer behavior as reflected by future sales. The authors propose that customer perceptions of value, brand, and relationship—“customer equity drivers”—affect loyalty intentions and future sales. The results of the study, which is based on a sample of 5694 customers of a large European do-it-yourself retailer, suggest that customer equity drivers can significantly predict future sales, even after the authors control for the current sales level.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Getting your work published is an important aim for anyone undertaking research. This paper described how to prepare your work for peer review. Some recommendations are detailed i.e ensure yourself that your work is of good quality, decide is which journal you want to submit it to, follow the required style and be structured. Finally, a few tips and the reviewer's checklist are reminded.