62 research outputs found

    The System Requirement for the Online Auction Based on UUM Student Perspective

    Get PDF
    The main objective of this study is to develop an online auction for UUM students, the student can buy or sale their belonging through by using this system after to be developed for UUM students. The design is tested on the prototype and evaluated to test the usability and acceptability of the system. The Active Server Page.Net (ASP.Net)programming language have been used in this study to develop the system of online auction for UUM student, and SPSS have been used to analysis the data after collected form the student of UUM

    CONSUMER BEHAVIOR IN DIGITAL MARKETS

    Get PDF
    AN ABSTRACT OF THE RESEARCH PAPER OF JOHN QUIGLEY, for the M.S. degree in MASS COMMUNICATION AND MEDIA ARTS, presented on APRIL 3, 2015, at Southern Illinois University Carbondale. TITLE: CONSUMER BEHAVIOR IN DIGITAL MARKETS Advancements in technology have reshaped the way we behave as consumers. Today’s commerce is turning digital. Consumers are becoming more aware of electronic commerce and the security concerns that come with e-commerce. This study will outline the differences of traditional commerce and electronic commerce, and how and why it is changing the market place. A survey was also completed, a sample of 66 undergraduates. Showed a positive outlook on the future of e-commerce. A little over half “57.8%” responded saying they still find it difficult to spend a vast amount of money while purchasing a good online. This paper will outline the pros and cons of e-commerce, traditional brick and mortar businesses and consumer behavior

    Transactions Behavior Analysis for Internet Auction Fraud

    Get PDF
    People often enmesh the Internet auction frauds which damage the benefits of Internet market and threaten transactions security. This research applies social network analysis and data mining to extract characteristic features from two random collected transaction datasets of Yahoo auction site. One dataset is used to construct prediction model and another is treated as validation. The average accuracy ratio of proposed model is at least 90%. The findings are: (1) the abnormal accounts involve circular transaction; (2) fraud accounts can accumulate higher positive reputations in very short time from its circular transaction and rarely play key nodes in transaction network

    Is Trust the Whole Story? Rethinking Online Auction viaNetwork Exchange Theory

    Get PDF

    E-Business Oriented Optimal Online Auction Design

    Get PDF
    Online auctions, in the absence of spatial, temporal and geographic constraints, provide an alternative supply chain channel for the distribution of goods and services. This channel differs from the common posted-price mechanism that is typically used in the retail sector. In consumer-oriented markets, buyers can now experience the thrill of ‘winning’ a product, potentially at a bargain, as opposed to the typically more tedious notion of ‘buying’ it. Sellers, on the other hand, have an additional channel to distribute their goods, and the opportunity to liquidate rapidly aging goods at greater than salvage values. The primary facilitator of this phenomenon is the widespread adoption of electronic commerce over an open-source, ubiquitous Internet Protocol (IP) based network. In this paper, we derive an optimal bidding strategy in sequential auctions that incorporates option value assessment. Furthermore, we establish that our optimal bidding strategy is tractable since it is independent of the bidding strategies of other bidders in the current auction and is only dependent on the option value assessmen

    The Effect of Product Presentation and Website Trust Features on the Perception of Counterfeit Deception

    Get PDF
    The Internet has provided a new advantage for counterfeiters - the opportunity to sell goods without prior consumer inspection. Leveraging this opportunity, deceitful purveyors of imitation goods use product presentation and website trust features to sell counterfeit goods as genuine. Based on trust and deception theories we propose that there are two categories of counterfeit deception mechanisms online: product level information and seller level information. Counterfeiters conceal the signals that identify the product as a fake using product presentation, and present themselves as legitimate business entities using website trust features. We find that advanced product presentation has a positive influence on consumers’ perception of the authenticity of products. The results of this study are informative and might be effective in further exploration of deception mechanisms in online counterfeit markets

    Is Web3 Better Than Web2 for Investors? Evidence from Domain Name Auctions

    Get PDF
    Blockchain-based assets are commonly believed to attract new investors. To investigate this claim, we compared investor preferences for Web2 and Web3 domain name auctions by analyzing daily auction patterns in Namecheap and OpenSea. Our results indicate that Web3 platforms may attract extreme investors with low or high values as a niche market. We found a significantly higher number of bids per auction, higher average bid prices, and greater price spreads on OpenSea, but a significantly lower number of unique bidders per auction. Our findings highlight the importance of considering the auction platform\u27s characteristics and asset context when evaluating bid patterns and predicting bid prices. This study serves as a starting point for future research in this emerging market and offers directions for further investigation

    Fixing feedback revision rules in online markets

    Get PDF
    Feedback withdrawal mechanisms in online markets aim to facilitate the resolution of conflicts during transactions. Yet, frequently used online feedback withdrawal rules are flawed and may backfire by inviting strategic transaction and feedback behavior. Our laboratory experiment shows how a small change in the design of feedback withdrawal rules, allowing unilateral rather than mutual withdrawal, can both reduce incentives for strategic gaming and improve coordination of expectations. This leads to less trading risk, more cooperation, and higher market efficiency.Series: Department of Strategy and Innovation Working Paper Serie

    Building Cooperation in VoIP Network through a Reward Mechanism

    Get PDF
    In this paper, for solving the moral hazard problem of super nodes in VOIP network and achieving better communication quality, we establish a reward mechanism based on classical efficiency-wage models. In the reward mechanism, the function of reward is to encourage super nodes to contribute their bandwidth and cover their effort costs, whereas the function of fine is to prevent opportunistic super nodes from shirking. We consider that network quality and idle bandwidth are the essential criterions for selecting qualified super nodes. Once all super nodes can satisfy specific conditions, the required reward can be derived so as to improve the VoIP platform\u27s revenue. Moreover, we also suggest several targets both in technical and economic view that the platform provider can strive in order to boost his/her market share. In addition, the case of Skype is discussed in this study and we also examine its current pricing strategy

    Investigation of Online Visual Merchandising (OVM) Elements of Apparel Web Stores

    Get PDF
    The paper presents the results of a scientific research project concerning the new emerging academic field of Online merchandising. The study aims to identify, classify, and measure the OVM elements/subelements and it is the first one that generalizes and systematizes on a global basis the groups, the categories, the elements, and the subelements of OVM of apparel online shops. The method of content analysis is applied in the context of randomly selected apparel web stores. The adopted inductive approach in the study reveals 55 subelements which are grouped into 13 elements. These elements form 5 categories. Finally the 5 categories form 2 major groups. The OVM elements/subelements are analyzed and the frequency of usage of each subelement is measured and discussed. Finally, the authors summarize the results and outline the future directions for research
    corecore