941 resultados para secret shopping


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper aims to describe the results of three rounds of secret shopping conducted at the Hubert Library of Florida International University, and how the results affected and were affected by changes made to circulation desk student training programs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2011 the Reference Department at the Glenn Hubert Library (HL), Biscayne Bay Campus, Florida International University (FIU) moved to a joint ser-vice desk with the circulation desk. Shortly after the move reference librarians became concerned with the misinformation that the circulation department’s work-study students sometimes provided to patrons. As a result, we felt a Secret Shopping program would be a good method to evaluate the information provided. Furthermore, it was seen as a method of improving customer service and com-paring the self-perceptions of service to patrons’ perceptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visiting a modern shopping center is becoming vital in our society nowadays. The fast growth of shopping center, transportation system, and modern vehicles has given more choices for consumers in shopping. Although there are many reasons for the consumers in visiting the shopping center, the influence of travel time and size of shopping center are important things to be considered towards the frequencies of visiting customers in shopping centers. A survey to the customers of three major shopping centers in Surabaya has been conducted to evaluate the Ellwood’s model and Huff’s model. A new exponent value N of 0.48 and n of 0.50 has been found from the Ellwood’s model, while a coefficient of 0.267 and an add value of 0.245 have been found from the Huff’s model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Quality has been an important factor for shopping centers in competitive conditions. However, quality measurement has no standard. In Surabaya, only two regional shopping centers will be measured in this research. The objective is assessing quality of shopping centers building using Analytical Hierarchy Process (AHP) method and calculating the Building Quality Index. An overall ranking of Hierarchy priorities of quality criteria founded as a result from AHP analysis. Access and Circulation became the highest priority in affecting quality of shopping centers building according to respondents’ perception of quality. Weightened value as a result from comparison between two shopping centers as follows: Tunjungan Plaza get 0,732 point and Surabaya Plaza get 0,268 point. The first shopping center got higher weight than the second shopping center. The BQI for Tunjungan Plaza is 66% and for Surabaya Plaza is 64%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the representation of Indigenous sexuality on Australian television drama since the 1970s, suggesting the political importance of such representations. In 1976 Justine Saunders became the first regular Indigenous character on an Australian television drama series, as the hairdresser Rhonda Jackson in Number 96. She was presented as sexually attractive, but this was expressed through a rape scene after a party. Twenty five years later, Deborah Mailman starred in The Secret Life of Us, as Kelly, who is also presented as sexually attractive. But her character can be seen in many romantic relationships. The article explores changing representations that moved us from Number 96 to The Secret Life of Us, via The Flying Doctors and Heartland. It suggests that in representations of intimate and loving relationships on screen it has only recently become possible to see hopeful models for interaction between Indigenous and non-Indigenous Australians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research suggests that people differ in terms of changing their shopping behaviour during a recession. This paper reports on a preliminary descriptive study assessing what influences those consumers who have altered their shopping behaviour during such times. Driving the alteration of shopping behaviour were both demographic (age, gender, education, and nationality) and psychographic variables (attitudes, and head vs. heart decision making). Overall, the findings show that there are statistically significant differences between the two groups’ that marketers can address in their marketing strategies during the recession.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.