Holiday advertising versus gift cards: Influence of religiosity on retailer evaluations

Author(s):  
Valerie A. Taylor ◽  
Elizabeth A. Minton
Keyword(s):  
2013 ◽  
Vol 230 (2) ◽  
pp. 333-347 ◽  
Author(s):  
Moutaz Khouja ◽  
Hari K. Rajagopalan ◽  
Jing Zhou
Keyword(s):  

10.28945/3557 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-016
Author(s):  
Grandon Gill ◽  
Joni Jones

Jeffrey Stiles pondered these seemingly straightforward questions. As IT Director of Jagged Peak, Inc., a developer of e-commerce solutions located in the Tampa Bay region of Florida, it would be his responsibility to oversee the implementation of security measures that went beyond the existing user name and password currently required for each user. Recent events suggested that a move towards increased security might be inevitable. In just the past year, highly publicized security failures at the U.S. Department of Defense, major healthcare providers and large companies, such as Sony and JP Morgan Chase, had made executives acutely aware of the adverse consequences of IT system vulnerabilities. In fact, a study of business risk managers conducted in 2014 found that 69% of all businesses had experienced some level of hacking in the previous year. The nature of Jagged Peak’s business made the security of its systems a particular concern. The company, which had grown rapidly over the years, reporting over $61 million in revenue in 2014, provided its customers with software that supported web-based ordering, fulfillment and logistics activities, built around a philosophy of “buy anywhere, fulfill anywhere, return anywhere”. To support these activities, the company’s Edge platform needed to handle a variety of payment types, including gift cards (a recent target of hackers), as well as sensitive personal identifying information (PII). Compounding the security challenge: each customer ran its own instance of the Edge platform, and managed its own users. When only a single customer was being considered, the addition of further layers of security to authenticate uses was an eminently solvable problem. A variety of alternative approaches existed, including the use of various biometrics, key fobs that provided codes the user could enter, personalized security questions, and many others. The problem was that where multiple customers were involved, it was much more difficult to form a consensus. One customer might object to biometrics because it users lacked the necessary hardware. Another might object to security keys as being too costly, easily stolen or lost. Personalized questions might be considered too failure-prone by some customers. Furthermore, it was not clear that adding additional layers of authentication would necessarily be the most cost-effective way to reduce vulnerability. Other approaches, such as user training might provide greater value. Even if Stiles decided to proceed with additional authentication, questions remained. Mandatory or a free/added-cost option? Developed in house or by a third party? Used for internal systems only, customer platforms only, or both? Implementation could not begin until these broad questions were answered.


Author(s):  
Cheri A. Young ◽  
David L. Corsun ◽  
Karen L. Xie

Purpose The purpose of this study was to investigate travelers’ preferences for peer-to-peer (P2P) accommodations or hotels when traveling for leisure or business purposes given the rise of P2P accommodations in the form of Airbnb, Vacation Rentals by Owners (VRBO) One Fine Stay, etc. Design/methodology/approach VRBO hosts in Denver, Colorado, USA provided contact information for 788 travelers who stayed with them over the prior three years. These travelers received an email survey and the opportunity to be entered in a drawing for one of three US$250 gift cards. Findings P2P usage was driven by leisure travel. The most influential factors in the choice of P2P over hotel were price, location, party size, dwelling size and trip length. When choosing a hotel for business travel, the influential factors were location, safety and security, price and knowing what one will receive in the way of facility and services. Research limitations/implications The external validity of the findings is limited as the study was conducted in one US city using travelers of only one P2P accommodations platform. Practical implications Hotels may want to leverage their loyalty programs and stress the importance of safety and security when traveling as a means of competing with P2P accommodations. Originality/value Given limited empirical research on P2P accommodations, this study provides an informative first look at the preferences and behaviors of travelers using P2P accommodations and points to a growing loyalty to P2P accommodations versus hotels in the leisure segment.


BMJ ◽  
2009 ◽  
Vol 339 (jul14 1) ◽  
pp. b2841-b2841
Author(s):  
H. Mooney
Keyword(s):  

2015 ◽  
pp. ucv045 ◽  
Author(s):  
Nicholas Reinholtz ◽  
Daniel M. Bartels ◽  
Jeffrey R. Parker

Sign in / Sign up

Export Citation Format

Share Document