Online consumer buying behavior is gaining significance in the field of marketing and advertising because it has changed the ways and techniques business adopt today for gaining market share with usage of web based techniques. The main purpose of current study is to investigate the impact of online product, price and promotion on online consumer buying behavior, this study also analyzed the role of attitude and gender as mediator and moderator between online product, price, promotion and online consumer buying behavior.
This study adds value to the literature in following ways; firstly, it provides broader understanding on online consumer buying behavior as new technique which many businesses are operating their activities. Secondly, it provides detailed understanding of attitude as a mediator which elaborates its direct and indirect impact on online product, price, promotion and online consumer buying behavior. Its direct effect is observed with online consumer buying behavior while its indirect effect as a mediator between online product, price, promotion and online consumer buying behavior is observed in this study. Thirdly, the role of gender is investigated as a moderator with online product, price, promotion and online consumer buying behavior.
Regression analysis along with dual statistical techniques were employed i.e. Barron and Kenny?s (1986) and Preacher and Hayes (2008) method of bootstrapping for analyzing the role of attitude and gender as mediator and moderator respectively. The findings showed that online product, price, promotion and online consumer buying behavior were positively and significantly associated with each other. It was observed that attitude partially mediates the relationship between online product, price, promotion and online consumer buying behavior. It was also observed that gender as a moderator moved in the opposite direction and was found in the insignificant range, which showed that gender does not moderate the relationship between online product, price, promotion and online consumer buying behavior. The findings of this study might be helpful for marketing managers and web inclined businesses to place relevant and targeted advertising messages along with the products that are tailored according to customer choice.
لگدا اے سکھ پریڑے ہو گئے دکھ ہن چار چوفیرے ہو گئے نہیں پرندے لہندے گھر وچ اُچے ڈھیر بنیرے ہو گئے بُھج کلیجہ زخمی ہویا سیکھاں اتے بیرے ہو گئے وچ درگاہ دے رتبے پاندے عاجز ڈھیر نویرے ہو گئے جتھے حسن بہاراں آئیاں اوتھے عشق دے ڈیرے ہو گئے جنھاں وفا نہ میں نال کیتی سکے کیویں اوہ تیرے ہو گئے
غم دی رات ہجر دی لمی اتوں گھپ ہنیرے ہو گئے کیویں ختم غلامی منّاں جدوں غلام پتھیرے ہو گئے رُکھ تاں سارے کٹ دتے نیں پکھواں کتھ بسیرے ہو گئے سجناں رات غماں دی گھلی قسمت نال سویرے ہو گئے میں باغی ہاں اس مسکن دا منصف جتھ وڈیرے ہو گئے واہی ہجر دی برہوں فصلاں اتوں غم دے کیرے ہو گئے دکھاں دی پنڈ چاون والے ساتھی کئی ہن میرے ہو گئے
Penelitian ini dilaksanakan di Program Studi S1 Manajemen UIN Suska Riau dan Program Studi S1 Manajemen UIN Sunan Gunung Djati Bandung , Penelitian ini menggunakan metode Komparatif membandingkan dua gejalan pada objek yang berbeda,dalam penelitian ini jumlah sampel sebesar 96 responden yaitu masing masing 48 sampel adalah mahasiswa program studi S1 Manajemen UIN Suska Riau dan 48 sampel adalah mahasiswa program studi S1 Manajemen UIN Sunan Gunung Djati Bandung, Nilai R2 ( R Square ) Mahasiswa Program Studi S1 Manajemen 0.490 atau 49 % dan Nilai R2 ( R Square ) Mahasiswa Program Studi S1 Manajemen UIN Sunan Gunung Djati Bandung. Saran dalam penelitian ini bahwa seharusnya mahasiswa UIN Suska Riau lebih bijak menggunakan fasilitas internet dan sebaiknya kecanduang internat pada mahasiswa UIN Bandung digunakan untuk meningkatkan motivasi belajar dan untuk kegiatan bisnis seperti bisnis online yang sangat menarik dalam prospek bisnis di era digitalisasi sekarang.
WSNs may be described as self-composed networks without the emergence of any fundamental regulator. Because of this property, protection and power consumption are main issues of WSNs. The security attacks are triggered by the malicious nodes which enter the network. Two categories of safety intrusions are active and passive. Sinkhole intrusion comes in the category of active intrusion. During sinkhole attack, the malicious nodes spoof identity of the base station and act like base station. The sensor nodes start transmitting data to malicious nodes instead of base station. In the existing system, the technique of monitor mode and mutual authentication are proposed for isolating the malicious nodes present in WSN. In the projected study, a novel approach is designed for detection and isolation of attacker sensor nodes from the system. Identity verification is the base of projected approach. Ns2 is used for the implementation of algorithm and results are analyzed in by means of throughput, package trouncing and power. Various investigations indicated that throughput of the projected technique is high in comparison with presented technique. The energy consumption of projected technique is fewer in comparison with accessible technique. Packet loss in case of existing technique is high as compared to proposed technique.