Sunday, February 16, 2020
Business Environment and Society Buyer Behaviour Essay
Business Environment and Society Buyer Behaviour - Essay Example The possessions that we have to tell much about us and the psychology behind consumer behavior hence should be central to understanding consumer behavior. This is mostly because people use possessions to define themselves or create their identities (extended self) especially in contemporary society based on materialism. As such, we are what we have and possessions are an extension of our selves. This has implication for marketers as they should strive to understand the value attached to possessions by consumers in order to develop effective marketing strategies. There are many theories put forward to explain customer behavior. Economic theory views the customer as a rational and self-interested decision maker hence consumes to maximize utility. The theory thus concentrates on the buying action. The psychodynamic approach is attributed to Sigmund Freud (1856-1939) and posits that the instinctive forces of Id, Ego, and Superego are drivers of behavior. The behaviorist theory views beha vior as being driven by external forces or events. The cognitive theory attributes behavior to information processing in oneââ¬â¢s mind while humanistic theory stresses the role of emotions in consumer behavior. This essay will utilize the theories of consumer behavior to discuss the concept of extended self and its effects on consumer purchasing behavior. The idea of extended self is based on the fact that we are what we have; that is, we define ourselves based on the things that we possess. Belk (1988, 139) argues that ââ¬Å"our possessions are a major contributor to and reflection of our identities.â⬠He came up with this conclusion after collecting a variety of evidence and regarded it as the ââ¬Ëextended self.ââ¬â¢ The major categories of extended self according to Belk are a body, internal processes, ideas, experiences and those persons, places and things to which one feels attached.Ã
Sunday, February 2, 2020
Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 words
Attack Prevention Article Evaluation - Essay Example Before attempting to observe the issue, it is essential to understand the focal point of user domain itself. This is a huge focal point in managing security in IT networks. In essence, user domain is definedà as set of objects that allow a user to have controls and permissions. In essence, user domains can overlap. Another element of user domains is the fact that is allows users to possess segregation of duties. Segregation of duties allows users to have separate domains and grant permissions. User domains can range from simple user access accounts or it can be a specific domain such as sales, marketing, and managers. à Unlike traditional firewallsà that only guard the parameters of the traditional IT infrastructure, virtualizationà firewallsà provide comprehensive security measures that monitor activity within clients. If one machine is to be attacked by a host, the other machine automatically copies data in almost dynamic time that the user is not aware of the situation. Clearly, that is a huge benefit for organizations since it allows them to have a safety net in case of an attack. The Intrusion Detection System (IDS) is a critical precautionary tool that monitors the network through monitoring packets that are passed within users. The first and easiest application of virtualization for security purposes is known as application isolation. This is a huge component towards the security aspect because it allows IT managers to gain leverage over application stability and application allocation. One of the worst vulnerabilities for user domains are insider attacks. Insider attacks occur. For instance, denial of service and spoofing are one the most common themes that occur. The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN technology since it utilizes the traditional TCP/IP in user domains. A
Subscribe to:
Comments (Atom)