Essays about: "model of consumer behavior"

Showing result 1 - 5 of 189 essays containing the words model of consumer behavior.

  1. 1. Genetic Data Privacy and Consumer Choice Behavior: An Exploratory Study on Direct-To-Consumer Genetic Testing

    University essay from Göteborgs universitet/Graduate School

    Author : Inês Raeiro; Xuexin Li; [2023-07-03]
    Keywords : consumer privacy; privacy calculus theory; trust; genetic data privacy; direct-to-consumer genetic testing; consumer choice behavior;

    Abstract : The rapid growth of the Direct-to-Consumer Genetic Testing (DTC-GT) industry has raised significant concerns regarding the collection, storage, and use of highly sensitive genetic information. This study aims to address the existing research gaps by examining consumer privacy and choice behavior in the context of DTC-GT. READ MORE

  2. 2. Social Media Platforms - The Most Valuable Player? - The role of social media platforms in fostering football fans’ team loyalty

    University essay from Göteborgs universitet/Graduate School

    Author : Sofia Granberg; Julia Löfblad; [2023-07-03]
    Keywords : Twitter; podcast; e-zine; social media usage; football; fandom; brands; involvement; team identification; attitudinal loyalty; behavioral loyalty;

    Abstract : With football as an increasing business, alongside the rise and importance of user-generated content on social media, this mixed methodological paper analyzes which roles Twitter, podcasts and e-zines usage have for Swedish football fans’ loyalty towards their favorite teams, by utilizing surveys and semi-structured interviews. This paper provides support for positive relationships between social media usage and behavioral fan loyalty, since social media platforms keep fans updated and generate information, especially when there is a geographical distance between the fans and the team. READ MORE

  3. 3. The COVID-19 Pandemic’s Influence on Born-digitals’ Internationalization and Performance

    University essay from Göteborgs universitet/Företagsekonomiska institutionen

    Author : Natasha Jamali; Hoda Kasem; [2023-06-28]
    Keywords : ;

    Abstract : In this qualitative research, the purpose is to explore the influence of the COVID-19 pandemic on born-digital firms’ international expansions and performance. This is to fill in the gap in research where many other industries have been examined in relation to the pandemic but not the born-digital firms. READ MORE

  4. 4. Reaching Your Destination: A Qualitative Study on Ridesharing as a Solution for First and Last-Mile Transportation Challenges

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Guillermo Berrojo Romeyro Mascarenhas; Joost Krämer; [2023]
    Keywords : Ridesharing; First Mile; Last Mile; Sustainable Urban Mobility; Urban Transportation; Innovation Management; Business Model Innovation; Business and Economics;

    Abstract : The study aims to explore the increasingly relevant and theoretically underexplored field of ridesharing as a solution for first and last-mile transportation, its success factors and challenges, as well as the process of integrating ridesharing into a public transport network. It utilizes a business model innovation framework as the theoretical basis to explore success factors as well as challenges when operating and setting up a ridesharing service. READ MORE

  5. 5. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE