945 resultados para anonymous customers
Resumo:
This work proposes a supermarket optimization simulation model called Swarm-Moves is based on self organized complex system studies to identify parameters and their values that can influence customers to buy more on impulse in a given period of time. In the proposed model, customers are assumed to have trolleys equipped with technology like RFID that can aid the passing of products' information directly from the store to them in real-time and vice-versa. Therefore, they can get the information about other customers purchase patterns and constantly informing the store of their own shopping behavior. This can be easily achieved because the trolleys "know" what products they contain at any point. The Swarm-Moves simulation is the virtual supermarket providing the visual display to run and test the proposed model. The simulation is also flexible to incorporate any given model of customers' behavior tailored to particular supermarket, settings, events or promotions. The results, although preliminary, are promising to use RFID technology for marketing products in supermarkets and provide several dimensions to look for influencing customers via feedback, real-time marketing, target advertisement and on-demand promotions. ©2009 IEEE.
Resumo:
The starting point of this thesis is the notion that in order for organisations to understand what customers value and how customers experience service, they need to learn about customers. The first and perhaps most important link in an organisation-wide learning process directed at customers is the frontline contact person. Service- and sales organisations can only learn about customers if the individual frontline contact persons learn about customers. Even though it is commonly recognised that learning about customers is the basis for an organisation’s success, few contributions within marketing investigate the fundamental nature of the phenomenon as it occurs in everyday customer service. Thus, what learning about customers is and how it takes place in a customer-service setting is an issue that is neglected in marketing research. In order to explore these questions, this thesis presents a socio-cultural approach to understanding learning about customers. Hence, instead of considering learning equal to cognitive processes in the mind of the frontline contact person or learning as equal to organisational information processing, the interactive, communication-based, socio-cultural aspect of learning about customers is brought to the fore. Consequently, the theoretical basis of the study can be found both in socio-cultural and practice-oriented lines of reasoning, as well as in the fields of service- and relationship marketing. As it is argued that learning about customers is an integrated part of everyday practices, it is also clear that it should be studied in a naturalistic and holistic way as it occurs in a customer-service setting. This calls for an ethnographic research approach, which involves direct, first-hand experience of the research setting during an extended period of time. Hence, the empirical study employs participant observations, informal discussions and interviews among car salespersons and service advisors at a car retailing company. Finally, as a synthesis of theoretically and empirically gained understanding, a set of concepts are developed and they are integrated into a socio-cultural model of learning about customers.
Resumo:
Suvi Nenonen Customer asset management in action: using customer portfolios for allocating resources across business-to-business relationships for improved shareholder value Customers are crucial assets to all firms as customers are the ultimate source of all cash flows. Regardless this financial importance of customer relationships, for decades there has been a lack of suitable frameworks explaining how customer relationships contribute to the firm financial performance and how this contribution can be actively managed. In order to facilitate a better understanding of the customer asset, contemporary marketing has investigated the use of financial theories and asset management practices in the customer relationship context. Building on this, marketing academics have promoted the customer lifetime value concept as a solution for valuating and managing customer relationships for optimal financial outcomes. However, the empirical investigation of customer asset management lags behind the conceptual development steps taken. Additionally, the practitioners have not embraced the use of customer lifetime value in guiding managerial decisions - especially in the business-to-business context. The thesis points out that there are fundamental differences between customer relationships and investment instruments as investment targets, effectively eliminating the possibility to use financial theories in a customer relationships context or to optimize the customer base as a single investment portfolio. As an alternative, the thesis proposes the use of customer portfolio approach for allocating resources across the customer base for improved shareholder value. In the customer portfolio approach, the customer base of a firm is divided into multiple portfolios based on customer relationships’ potential to contribute to the shareholder value creation. After this, customer management concepts are tailored to each customer portfolio, designed to improve the shareholder value in their own respect. Therefore, effective customer asset management with the customer portfolio approach necessitates that firms are able to manage multiple parallel customer management concepts, or business models, simultaneously. The thesis is one of the first empirical studies on customer asset management, bringing empirical evidence from multiple business-to-business case studies on how customer portfolio models can be formed, how customer portfolios can be managed, and how customer asset management has contributed to the firm financial performance.
Resumo:
Suvi Nenonen Customer asset management in action: using customer portfolios for allocating resources across business-to-business relationships for improved shareholder value Customers are crucial assets to all firms as customers are the ultimate source of all cash flows. Regardless this financial importance of customer relationships, for decades there has been a lack of suitable frameworks explaining how customer relationships contribute to the firm financial performance and how this contribution can be actively managed. In order to facilitate a better understanding of the customer asset, contemporary marketing has investigated the use of financial theories and asset management practices in the customer relationship context. Building on this, marketing academics have promoted the customer lifetime value concept as a solution for valuating and managing customer relationships for optimal financial outcomes. However, the empirical investigation of customer asset management lags behind the conceptual development steps taken. Additionally, the practitioners have not embraced the use of customer lifetime value in guiding managerial decisions - especially in the business-to-business context. The thesis points out that there are fundamental differences between customer relationships and investment instruments as investment targets, effectively eliminating the possibility to use financial theories in a customer relationships context or to optimize the customer base as a single investment portfolio. As an alternative, the thesis proposes the use of customer portfolio approach for allocating resources across the customer base for improved shareholder value. In the customer portfolio approach, the customer base of a firm is divided into multiple portfolios based on customer relationships’ potential to contribute to the shareholder value creation. After this, customer management concepts are tailored to each customer portfolio, designed to improve the shareholder value in their own respect. Therefore, effective customer asset management with the customer portfolio approach necessitates that firms are able to manage multiple parallel customer management concepts, or business models, simultaneously. The thesis is one of the first empirical studies on customer asset management, bringing empirical evidence from multiple business-to-business case studies on how customer portfolio models can be formed, how customer portfolios can be managed, and how customer asset management has contributed to the firm financial performance.
Resumo:
Inspired by the recent debate in the financial press, we set out to investigate if financial analysts warn their preferred customers of possible earnings forecast revisions. The issue is explored by monitoring investors’ trading behavior during the weeks prior to analyst earnings forecast revisions, using the unique official stock transactions data set from Finland. In summary, we do not find evidence of large investors systematically being warned of earnings forecast revisions. However, the results indicate that the very largest investors show trading behavior partly consistent with being informed of future earnings forecast revisions.
Resumo:
In this paper, we use reinforcement learning (RL) as a tool to study price dynamics in an electronic retail market consisting of two competing sellers, and price sensitive and lead time sensitive customers. Sellers, offering identical products, compete on price to satisfy stochastically arriving demands (customers), and follow standard inventory control and replenishment policies to manage their inventories. In such a generalized setting, RL techniques have not previously been applied. We consider two representative cases: 1) no information case, were none of the sellers has any information about customer queue levels, inventory levels, or prices at the competitors; and 2) partial information case, where every seller has information about the customer queue levels and inventory levels of the competitors. Sellers employ automated pricing agents, or pricebots, which use RL-based pricing algorithms to reset the prices at random intervals based on factors such as number of back orders, inventory levels, and replenishment lead times, with the objective of maximizing discounted cumulative profit. In the no information case, we show that a seller who uses Q-learning outperforms a seller who uses derivative following (DF). In the partial information case, we model the problem as a Markovian game and use actor-critic based RL to learn dynamic prices. We believe our approach to solving these problems is a new and promising way of setting dynamic prices in multiseller environments with stochastic demands, price sensitive customers, and inventory replenishments.
Resumo:
The methods of secondary wood processing are assumed to evolve over time and to affect the requirements set for the wood material and its suppliers. The study aimed at analysing the industrial operating modes applied by joinery and furniture manufacturers as sawnwood users. Industrial operating mode was defined as a pattern of important decisions and actions taken by a company which describes the company's level of adjustment in the late-industrial transition. A non-probabilistic sample of 127 companies was interviewed, including companies from Denmark, Germany, the Netherlands, and Finland. Fifty-two of the firms were furniture manufacturers and the other 75 were producing windows and doors. Variables related to business philosophy, production operations, and supplier choice criteria were measured and used as a basis for a customer typology; variables related to wood usage and perceived sawmill performance were measured to be used to profile the customer types. Factor analysis was used to determine the latent dimensions of industrial operating mode. Canonical correlations analysis was applied in developing the final base for classifying the observations. Non-hierarchical cluster analysis was employed to build a five-group typology of secondary wood processing firms; these ranged from traditional mass producers to late-industrial flexible manufacturers. There is a clear connection between the amount of late-industrial elements in a company and the share of special and customised sawnwood it uses. Those joinery or furniture manufacturers that are more late-industrial also are likely to use more component-type wood material and to appreciate customer-oriented technical precision. The results show that the change is towards the use of late-industrial sawnwood materials and late-industrial supplier relationships.
Resumo:
We present a distributed algorithm that finds a maximal edge packing in O(Δ + log* W) synchronous communication rounds in a weighted graph, independent of the number of nodes in the network; here Δ is the maximum degree of the graph and W is the maximum weight. As a direct application, we have a distributed 2-approximation algorithm for minimum-weight vertex cover, with the same running time. We also show how to find an f-approximation of minimum-weight set cover in O(f2k2 + fk log* W) rounds; here k is the maximum size of a subset in the set cover instance, f is the maximum frequency of an element, and W is the maximum weight of a subset. The algorithms are deterministic, and they can be applied in anonymous networks.
Resumo:
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.
Resumo:
Analisa elementos que caracterizam os grupos de manifestação política dispersos pelas redes e mídias digitais, a partir do caso do Anonymous, grupo cuja atuação política foge aos padrões convencionais de participação, contestação e ativismo. Sugere-se para a entidade o conceito de “grupos difusos”, visto que não há liderança unificada e nem centralização de suas ações. Além disso, o grupo não possui uma política claramente definida e nem atores identificados. Conclui-se que, ao favorecer a interação e permitir o espraiamento de mútuos padrões comportamentais, o grupo aparenta alcançar ainda mais cooperação do que os modelos tradicionais de manifestação política.
Resumo:
Estuda o novo modelo de ativismo político levado a efeito por meio das mídias sociais e tem como objeto de análise o fenômeno dos hackers intitulados Anonymous, especialmente no que diz respeito às atividades do grupo no Brasil.
Resumo:
WSEAS, Tech Univ Sofia, Univ Politehn Bucharest, Univ Genova, Univ IASI, Fac Elect Engn, Zhejiang Univ Technol, Norwegian Univ Sci & Technol, Politehn Univ Bucharest, Engn & Management Technol Syst Fac, Execut Agcy Higher Educ & Res Fund, Ctr Invest Sobfre, Univ Algarve, UAlg, Cybercom Grp