921 resultados para credit card payments


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tropical wildlands and their biodiversity will survive in perpetuity only through their integration into human society. One protocol for integration is to explicitly recognize conserved tropical wildlands as wildland gardens. A major way to facilitate the generation of goods and services by a wildland garden is to generate a public-domain Yellow Pages for its organisms. Such a Yellow Pages is part and parcel of high-quality search-and-delivery from wildland gardens. And, as they and their organisms become better understood, they become higher quality biodiversity storage devices than are large freezers. One obstacle to wildland garden survival is that specific goods and services, such as biodiversity prospecting, lack development protocols that automatically shunt the profits back to the source. Other obstacles are that environmental services contracts have the unappealing trait of asking for the payment of environmental credit card bills and implying delegation of centralized governmental authority to decentralized social structures. Many of the potential conflicts associated with wildland gardens may be reduced by recognizing two sets of social rules for perpetuating biodiversity and ecosystems, one set for the wildland garden and one set for the agroscape. In the former, maintaining wildland biodiversity and ecosystem survival in perpetuity through minimally damaging use is paramount, while in the agroscape, wild biodiversity and ecosystems are tools for a healthy and productive agroecosystem, and the loss of much of the original is acceptable.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Este estudo visa compreender a relação entre os atributos intrínsecos e extrínsecos do produto calça jeans e o seu preço no varejo, tendo como objetivo específico analisar a influência separadamente dos atributos intrínsecos e extrínsecos sobre os preços. Para tanto, utiliza-se da teoria de atributos proposta por Lancaster (1966) e dos métodos de preços hedônicos propostos por Rosen (1974), por meio dos quais é possível observar a importância dos pacotes de atributos intrínsecos e extrínsecos sobre os preços, bem como observar a constituição de pacotes de atributos para diferentes perfis econômicos de consumidores. Foram analisadas 12 categorias de atributos sendo 5 de atributos intrínsecos e outras 7 de atributos extrínsecos. A coleta de dados foi realizada por meio de observação e a pesquisa foi realizada no período de 01 de julho a 31 de julho de 2015 nos maiores shoppings centers e principais lojas de ruas de São Paulo. A partir dos dados coletados, foram realizadas regressão múltipla e a regressão quantílica. A regressão múltipla apresentou o R2 de 58%, nessa análise os principais atributos que influenciam são: loja premium, venda assistida, origem da loja, tamanho da loja (megaloja), tamanho da loja (ampla), lavagem destroyed, resina, modelo flare, lavagem dirty, localização da loja (rua ou shopping), complementos, modelo skinny insumos elastano e poliéster. A regressão quantílica proporciou a análise para 10% das calças mais caras e para os 10% das calças mais baratas. Para as calças mais caras o R2 é de 45% para as calças mais caras há mais atributos extrínsecos do que atributos do produto interferindo no preço, são eles: os insumos poliéster e elastano, lavagem e resinagem, origem da marca da loja, posicionamento da marca, venda assistida, localização da loja, cartão de crédito - private label (nesse caso influenciando negativamente), e tamanho da loja, todos extrínsecos ao produto, se mostraram relevantes para o processo de precificação das calças jeans mais caras observadas nesse estudo. Já para as calças mais baratas, com R2 de 27%, parece haver um equilíbrio entre o número de variáveis intrínsecas e extrínsecas que interferem no preço das calças jeans mais baratas, pois somente a modelagem (atributo intrínseco) e cartão private label (atributo extrínseco) parecem não interferir na precificação. Concluiu-se que há mais atributos extrínsecos que influenciam o preço da calça jeans no varejo.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Using Google as a security testing tool, basic and advanced search techniques using advanced google search operators. Examples of obtaining control over security cameras, VoIP systems, web servers and collecting valuable information as: Credit card details, cvv codes – only using Google.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Prescribing support tools range from traditional printed texts to state-of-the-art computerised decision support systems. Comparison between available literature is difficult due to country-specific resources often being the focus of the research. In the UK, it is widely accepted that hospitals take their own individualised approaches to reducing prescribing errors. Objective - This study focused on specialist paediatric hospitals. It aimed to identify the localised approaches taken by paediatric hospitals to reduce prescribing errors. Method - Applied thematic analysis was used to explore the publically published board meeting minutes from the four specialist stand-alone paediatric hospitals in England. Three years of data was collected from each hospital. Codes were collected into groups to identify themes from the data. Results - The main themes identified were clinician involvement in prescribing support is important; credit card-sized reminder tools are used to provide prescribing guidance; electronic prescribing is considered important for reducing prescribing errors; feedback from clinical pharmacists on prescribing errors is widely used; junior doctors require extra support when prescribing; medical records may be incomplete and specific prescribing support (eg, antibiotic prescribing support) is widely in use. Conclusions - There is no single collaborative approach taken to paediatric prescribing support in English paediatric hospitals. Success of electronic prescribing in English paediatric hospitals is considerably behind leaders such as the USA. Use of clinical pharmacists to support prescribers is important as supported by previous studies in Spain and the USA.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this study was to empirically investigate the adoption of retail electronic commerce (REC). REC is a business transaction which takes place over the Internet between a casual consumer and a firm. The consumer has no long-term relationship with the firm, orders a good or service, and pays with a credit card. To date, most REC applications have not been profitable. To build profitable REC applications a better understanding of the system's users is required. ^ The research model hypothesizes that the level of REC buying is dependent upon the Buying Characteristics of Internet Use and Search Experience plus the Channel Characteristics of Beliefs About Internet Vendors and Beliefs About Internet Security. The effect of these factors is modified by Time. Additional research questions ask about the different types of REC buyers, the differences between these groups, and how these groups evolved over time. ^ To answer these research questions I analyzed publicly available data collected over a three-year period by the Georgia Institute of Technology Graphics and Visualization Unit over the Internet. Findings indicate the model best predicts Number of Purchases in a future period, and that Buyer Characteristics are most important to this determination. Further, this model is evolving over Time making Buyer Characteristics predict Number of Purchases better in more recent survey administrations. Buyers clustered into five groups based on level of buying and move through various levels and buy increasing Number of Purchases over time. ^ This is the first large scale research project to investigate the evolution of REC. This implications are significant. Practitioners with casual consumer customers need to deploy a finely tuned REC strategy, understand their buyers, capitalize on the company reputation on the Internet, install an Internet-compatible infrastructure, and web-enable order-entry/inventory/fulliment/shipping applications. Researchers might wish to expand on the Buyer Characteristics of the model and/or explore alternative dependent variables. Further, alternative theories such as Population Ecology or Transaction Cost Economics might further illuminate this new I.S. research domain. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

As an emerging payment method, mobile payment technology is perceived to be a secure and effective substitute of traditional debit/credit card payment. Although several reports and scholars claimed that mobile payment technology would become a major future payment method, consumers rather caught on this trend slowly, and little is known about key determinants of consumers’ acceptance of mobile payment. To close that gap, the current study extended the classic Technology Acceptance Model by adding four additional predictors that are relevant to hospitality industry. The study results suggested that compatibility with lifestyle was the strongest predictor of consumers’ intention to adopt mobile payment technology in restaurants, followed by perceived usefulness, subjective norm, security, and previous experience with mobile payment. Important theoretical and practical implications were provided based on our findings.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this study was to empirically investigate the adoption of retail electronic commerce (REC). REC is a business transaction which takes place over the Internet between a casual consumer and a firm. The consumer has no long-term relationship with the firm, orders a good or service, and pays with a credit card. To date, most REC applications have not been profitable. To build profitable REC applications a better understanding of the system's users is required. The research model hypothesizes that the level of REC buying is dependent upon the Buying Characteristics of Internet Use and Search Experience plus the Channel Characteristics of Beliefs About Internet Vendors and Beliefs About Internet Security. The effect of these factors is modified by Time. Additional research questions ask about the different types of REC buyers, the differences between these groups, and how these groups evolved over time. To answer these research questions I analyzed publically available data collected over a three-year period by the Georgia Institute of Technology Graphics and Visualization Unit over the Internet. Findings indicate the model best predicts Number of Purchases in a future period, and that Buyer Characteristics are most important to this determination. Further, this model is evolving over Time making Buyer Characteristics predict Number of Purchases better in more recent survey administrations. Buyers clustered into five groups based on level of buying and move through various levels and buy increasing Number of Purchases over time. This is the first large scale research project to investigate the evolution of REC. This implications are significant. Practitioners with casual consumer customers need to deploy a finely tuned REC strategy, understand their buyers, capitalize on the company reputation on the Internet, install an Internet-compatible infrastructure, and web-enable order-entry/inventory/fulfillment/ shipping applications. Researchers might wish to expand on the Buyer Characteristics of the model and/or explore alternative dependent variables. Further, alternative theories such as Population Ecology or Transaction Cost Economics might further illuminate this new I.S. research domain.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

I study local shocks to consumer credit supply arising from the opening

of bank-related retail stores. Bank-related store openings coincide with

sharp increases in credit card placements in the neighborhood of the

store, in the months surrounding the store opening, and with the bank

that owns the store. I exploit this relationship to instrument for new

credit cards at the individual level, and find that obtaining a new

credit card sharply increases total borrowing as well as default risk,

particularly for risky and opaque borrowers. In line with theories of

default externality, I observe that existing lenders react to the

increased consumer borrowing and associated riskiness by contracting

their own supply. In particular, in the year following the issuance of a

new credit card, banks without links to stores reduce credit card limits

by 24-51%, offsetting most of the initial increase in total credit

limits.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper examines the influence of customer-facing technology in full-service restaurants. As a new addition to the service experience, tabletop devices offer the customer more control over the dining experience, and also increase customer participation in the service process, which has the potential to upset the traditional exchange between service providers and customers in restaurants. To examine how customers react to the use of tabletop devices, this study examines 1,343 point-of-sales transactions from 20 units of a full-service casual dining restaurant chain and matches customer in-restaurant transactions to their reactions to tabletop devices used during their meals. Results show that over 70% of the customers who used tabletop devices reported positive affect toward the device, with approximately 79% of customers reporting that the device improved their experience, citing convenience, ease of use, and credit card security as some benefits of using the technology. Approximately 80% of the customers who used the device reported that they would return to the restaurant because of the positive affect. The results also indicate that likeability of the device and tip percentage were positively and significantly connected to customer reports of the devices having a positive effect on experience and on desire to return. In addition, when customers reported increased return intentions, likeability of the device was higher regardless of reports of the device improving restaurant experience, showing that the introduction of tabletop devices had a positive effect for most—but not all—customers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This paper contributes to research in online security and reducing personal footprint by evaluating the levels of privacy provided by the Firefox browser. The aim of identifying conditions that would minimize data leakage and maximize data privacy is addressed by assessing and comparing data leakage in the four possible browsing modes: normal and private modes using a browser installed on the host PC or using a portable browser from a connected USB device respectively. To provide a firm foundation for analysis, a series of carefully designed, pre-planned browsing sessions were repeated in each of the various modes of Firefox. This included low RAM environments to determine any effects low RAM may have on browser data leakage. The results show that considerable data leakage may occur within Firefox. In normal mode, all of the browsing information is stored within the Mozilla profile folder in Firefox-specific SQLite databases and sessionstore.js. While passwords were not stored as plain text, other confidential information such as credit card numbers could be recovered from the Form history under certain conditions. There is no difference when using a portable browser in normal mode, except that the Mozilla profile folder is located on the USB device rather than the host's hard disk. By comparison, private browsing reduces data leakage. Our findings confirm that no information is written to the Firefox-related locations on the hard disk or USB device during private browsing, implying that no deletion would be necessary and no remnants of data would be forensically recoverable from unallocated space. However, two aspects of data leakage occurred equally in all four browsing modes. Firstly, all of the browsing history was stored in the live RAM and was therefore accessible while the browser remained open. Secondly, in low RAM situations, the operating system caches out RAM to pagefile.sys on the host's hard disk. Irrespective of the browsing mode used, this may include Firefox history elements which can then remain forensically recoverable for considerable time.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Even though much attention has been paid to online consumer behavior, academic studies are deficient in comprehending offline consumer behavior. This study offers a survey of reflections concerning the Portuguese offline consumer behavior by observing how Portuguese adult consumers engage, embrace and act throughout the offline world, i.e., the offline media channels and the customer decision-making process at a store in regard of digital nativity, education and gender. Drawing on an online questionnaire and using a convenience sample of 471 respondents, data was analyzed using descriptive analysis and independent sample t-test analysis. The results observed indicate Portuguese consumers prefer calling or going to a store when they have an operational problem, value the credit card security at a store and that Portuguese females highly value touching and feeling the product at a store. Finally, implications for academics and marketeers are discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper studies monetary policy transmission using several statistical tools -- We find that the relationships between the policy interest rate and the financial system’s interest rates are positive and statistically significant, and transmission is complete eight months after policy shocks occur -- The speed of transmission varies according to the type of interest rates -- Transmission is faster for interest rates on loans provided to households, and is particularly rapid and complete for rates on preferential commercial loans -- Transmission is slower for credit card and mortgage rates, due to regulatory issues (interest rate ceilings)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This dissertation is composed of three essays covering two areas of interest. The first topic is personal transportation demand with a focus on price and fuel efficiency elasticities of mileage demand, challenging assumptions common in the rebound effect literature. The second topic is consumer finance with a focus on small loans. The first chapter creates separate variables for fuel prices during periods of increasing and decreasing prices as well as an observed fuel economy measure to empirically test the equivalence of these elasticities. Using a panel from Germany from 1997 to 2009 I find a fuel economy elasticity of mileage of 53.3%, which is significantly different from the gas price elasticity of mileage during periods of decreasing gas prices, 4.8%. I reject the null hypothesis or price symmetry, with the elasticity of mileage during period of increasing gas prices ranging from 26.2% and 28.9%. The second chapter explores the potential for the rebound effect to vary with income. Panel data from U.S. households from 1997 to 2003 is used to estimate the rebound effect in a median regression. The estimated rebound effect independent of income ranges from 17.8% to 23.6%. An interaction of income and fuel economy is negative and significant, indicating that the rebound effect may be much higher for low income individuals and decreases with income; the rebound effect for low income households ranged from 80.3% to 105.0%, indicating that such households may increase gasoline consumption given an improvement in fuel economy. The final chapter documents the costs of credit instruments found in major mail order catalogs throughout the 20th century. This study constructs a new dataset and finds that the cost of credit increased and became stickier as mail order retailers switched from an installment-style closed-end loan to a revolving-style credit card. This study argues that revolving credit's ability to decrease salience of credit costs in the price of goods is the best explanation for rate stickiness in the mail order industry as well as for the preference of revolving credit among retailers.