Saturday, January 25, 2020
Defining And Analysing Computer Crimes
Defining And Analysing Computer Crimes Computer crime comes in many different forms and can cause serious amounts of damage. It has been around as long as the computer has and criminals are always finding new ways to beat the system. With the constant advancements in technology, it has become easier for criminals to hide information about their crime. Evidence is now handled and collected differently than it was in the past and requires a significant amount of careful forensic investigation. What is computer crime? Computer crime is illegal activity that is committed on the internet or through networks. The department of justice has three separate categories in which computer crime can be labeled. The first category is attacking computers of others, such as spreading a virus. The second category is using the computer to commit a crime which could also be committed the physical world, such as fraud or illegal gambling. The third and last category is using the computer to store stolen or illegal information (Citizenship.org). There are several different types of computer crime committed in the world today. Of those include: fraud, identity theft, phishing scams, malware, viruses, cyber stalking, and child pornography. Computer crime has been around for nearly two centuries, with the first ever recorded occurring in the year 1820 (hubpages.com). With the continual advancements in technology, it has been made easier for criminals to hide information about their crimes. Cyber crimes are handled differently than they have in the past because of this fact. When computers are attacked, it can completely alter the system and most times it will even cause damage. Also, computers that have been attacked have the capability to spread the attack to other systems within the same network (CERT.org). Statistics on Computer crime According to Minnesotas Internet Crime Complaint Center (IC3) 2008 Internet Crime Report, a total of 3,578 complaints came in. There are several different categories that the complaints are separated into. To name a few of those categories, there is check fraud, hacking, credit card fraud, Nigerian letter fraud, and identity theft. Here are some statistics that were collected during the year 2008: Non Delivery of Merchandise/Payment was the top complaint and accounted for 31.9% of all internet crime called in. Auction fraud came in second accounting for 27.5% of all internet fraud 78.5% of all perpetrators were male Within the country, California is the home to the largest percentage of perpetrators accounting for 15.8% Of the world, the United States is home to 66.1% of all perpetrators This is just a small percentage of the statistics I discovered when visiting the website of the Federal Bureau of Investigation (fbi.org). According to the IC3, the rate of computer crime continues to climb as the years pass by. The group has been collecting information and statistics on internet crime for the past three years in hopes to find trends among perpetrators and crimes committed in order to better solve the crimes of the future. Hacking: What is it? The term hacking has several different meanings and it means different things to different generations. In the 1950s and 1960s, computer programmers viewed hacking as an intellectual exercise and prefer to use the term cracking instead in order to separate themselves with the negative connotation that came along with being considered a hacker. The younger generation feels that hackers of today are doing the real work of exploration which was made necessary due to the prior generation selling out (Thomas). According to the dictionary, the official definition of hacker is a computer enthusiast and a microcomputer user who attempts to gain unauthorized access to proprietary computer systems (dictionary.com). Hacking has its own meaning to different people. To some its a means of exploration and education; to others its more about playing childish, but costly, pranks on people and companies (Thomas). Hacking Then Hackers of the 1960s and 1970s were found to be university graduate students with a profound interest in computers. Hacking grew to be quite popular in the labs of well respected colleges such as the Massachusetts Institute of Technology (MIT), Cornell, and Harvard. Students would play around with computers on their college campus and solve problems that eventually led to the creation of the personal computer. It was the birth of something that would lead to a new culture of innovative technological advances. Those who were able to hack were considered to be computer geniuses or nerds, rather than hackers (Thomas). Hacking Now Hackers of today are commonly found to be in their teenage years. The reason for such age difference between the times is that fifty to sixty years ago, you could only find computers on college campuses whereas today, it is uncommon to find a household that does not own at least one computer. They are more readily available for young children not yet in college to dupe around with. Technology today is also very different than it used to be. There are now passwords and PIN numbers in order to protect the user from having any information stolen. Security is stronger now, which is good for the common users of online systems such as eBay, online banking, or any other accounts which are password protected. However, as Thomas clearly states, security today is a double-edged sword. Although people are more protected, it also protects the hackers from becoming easily identified (Thomas). Hackers are able to take advantage of this and often continue to hack into systems of major companies, or even your personal computer at home. It seems that hacking was something more positive 60 years ago. It was used to discover new technology and helped to design and create more advanced machines and programs for people to use. It was something great that only those who were quite knowledgeable were capable of doing. However, with such great accomplishments, it has been made easier for the younger generation to turn the term hacker into something negative. Thomas describes these hackers as new-school hackers and soon a new hacking culture was born. Soon, hackers of the new generation began to use their knowledge against the world. They would meet to share what they have learned and would develop new ways to attack systems (Thomas). This new generation would turn hacking into crime that so many were willing to commit. Ethical Evaluation of Hacking From what it seems, hacking can be used to do both good and bad, which may make one wonder whether or not it can be viewed as ethical. I have always assumed that hacking was a bad thing and went along with its ever common negative connotation. I feel that people hack into systems to steal information from another party; whether it be a large corporations secret files, or your next door neighbors bank account. From what Ive studied so far, hackers from the past acted on a more ethical basis than the hacker of today. They used their knowledge for the better and acted on good will to try and find new ways to improve the age of computers. In order to really dig into it, I studied the ethics of hacking using two different working ethical theories; Kantianism and the Social Contract Theory. Hacking and Kantianism Kantianism has a lot to do with good will and the desire to do the right thing. The reason for doing a certain act, in this case hacking, should cultivate the desire to what is right. There are two categorical imperatives correlated with this theory. The first states that if you act on moral rule, you must first see how it will affect the universal more laws. This means that before you commit an act, first think about what would happen if everyone were to commit this same act (Quinn). To put this into perspective, hackers basically break security barriers to obtain information which they are probably not allowed to see in the first place. If there is a rule that makes it okay for everyone to break security barriers, it would completely defeat the purpose of having a secure system set up in the first place. There would no longer be such a thing as unauthorized information. Everyone would be allowed to somehow break in to the system and read it. The company might as well just display t his information freely, for the world to see. This would not be right as the information is protected for a reason. It is for certain peoples eyes, and their eyes only and is not for anyone else to see. The second categorical imperative states that you should treat both yourself and other as ends in themselves and not as a means to an end. This basically states that it is unethical to use someone for your benefit (Quinn). When relating this to the act of hacking, it tells us that we need to respect others and their right to privacy. When a hacker breaks into a system, they are using other peoples information to their benefit. They are invading privacy to get what they want, which is personal information. The first categorical imperative seems to correspond better with the topic, but both imperatives basically state the hacking is an unethical act. It is not right to disrespect people or to treat them unfairly, and when hacking occurs, that is exactly what happens. Therefore, according to the Kantianism, hacking is deemed to be unethical Hacking and the Social Contract Theory The social contract takes place in a civilized society and is based upon two things. The first thing is that there is an establishment of moral rules to govern relations among citizens. The second thing is that there must be a government capable of enforcing such rules. The social contract theory states, Morality consists in the set of rules, governing how people are to treat one another; that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well. This contract suggests that no man has authority over another and that no one lives above the law. The community is supposed to determine the rules for its members, and all who is part of that community must abide by such rules. In order for this theory to work, the laws must not only be stated, but enforced as well. This will prevent anyone from trying to cheat the system (Quinn). If hacking were to ever be considered socially acceptable, it would almost defeat the purpose of having secure systems. People would have the right to invade other peoples privacy and basically steal what does not belong to them. This type of crime is not accepted in the physical world, so why should we choose to accept it in cyberspace? The answer to that is we should not. The social contract theory has much to do with respect for yourself and respect for others. It is not very respectful to be deceitful and steal information or items which do not belong to you. Therefore, according to the social contract theory, hacking is deemed to be unethical. How Does the FBI control Cyber Crime? The Federal Bureau of Investigation has a four-fold method that works to control and eliminate cyber crime. The first step in this process is to stop those behind the most serious computer invasions and the spread of malevolent code. Second, they must identify and put a stop to online sexual predators that use the internet to meet and exploit children and to produce, possess, or share child pornography. The third step is to counteract operations that target United States intellectual property, endangering our national security and competitiveness. Lastly, dismantle national and transnational organized criminal enterprises engaging in internet fraud (fbi.gov). Computer invasions are not taken lightly and it is very important that the FBI work to control such a crime. Here are some facts taken from the Federal Bureau of Investigation website on how serious these cyber crimes are taken: A Cyber Division at FBI Headquarters to address cyber crime in a coordinated and cohesive manner Specially trained cyber squads at FBI headquarters and in each of the 56 field offices, staffed with agents and analysts who protect against investigate computer intrusions, theft of intellectual property and personal information, child pornography and exploitation, and online fraud New Cyber Action Teams that travel around the world on a moments notice to assist in computer intrusion cases and that gather vital intelligence that helps us identify the cyber crimes that are most dangerous to our national security and to our economy; 93 Computer Crimes Task Forces nationwide that combine state-of-the-art technology and the resources of our federal, state, and local counterparts; A growing partnership with other federal agencies, including the Department of Defense, the Department of Homeland Security, and others-which share similar concerns and resolve in combating cyber crime. There are different levels of cyber crime, but we can never be too careful when it comes to protecting our people and our national security. There are several different ways of course in which the FBI will take action and that all depends on the type of cyber crime that is being committed. For example if it is trying to catch an online predator, a sting operation will be created and a member of the FBI will pose as a young child in hopes that someone will fall in to the trap. The FBI is full of highly trained professionals that know what they are doing and work their hardest to catch anyone who is being unlawful. How is Cyber Crime Different Than Physical Crime? Crime that takes place on in cyberspace is quite similar to physical crime. It is a person using their knowledge to break into another someone elses personal property. There are several laws against both types of crimes, and the penalties are just as harsh in the cyber crime world as they are in the physical. Also, both of them have the potential to cause a lot of harm and damage to others. The difference between the two is the way that the victims, or potential victims, feel about such cyber and physical crime. In recent surveys, it states that more people believe that their chances of being victims of cyber crime are much higher than being victims of physical crime. Many people are scared to participate in online banking or to shop online in fear of someone intercepting and hacking into their accounts. Also, it has been found that people are very cautious when it comes to documents that contain personal information on them by completely destroying them or assuring that they are safely stored (crime-research.org). According to a survey conducted by IBM, more than half of the businesses located in the United States believe that cyber crime is more costly to them than physical crime. The ways in which it costs them are through lost revenue, loss of current and prospective customers, and loss of employee productivity (allaboutroimag.org). Conclusion Cyber crime and hacking have been around for many years to date. It is something that developed as soon as the computing machine did. There have always been computer geniuses out there to use their knowledge for good, along with bad. After doing a lot of research and in my ethical evaluations, I have concluded that hacking is an unethical act. What started out as something that seemed like a good thing, quickly turned bad as soon as the personal computer became widely available. People began to use their knowledge against others and today we are faced with more cyber crime than ever. It is important for us and our government to keep it under control as it can cause a lot of damage to anyone who becomes a victim.
Friday, January 17, 2020
A Study on the Customer Satisfaction and Customer Loyalty of Furniture Purchaser in on-Line Shop
The current issue and full text archive of this journal is available at www. emeraldinsight. com/1598-2688. htm AJQ 11,2 146 A study on the customer satisfaction and customer loyalty of furniture purchaser in on-line shop Yongju Jeong and Yongsung Lee Department of Business Administration, The University of Incheon, Incheon, South Korea Abstract Purpose ââ¬â The paper intends to explore the in? uencing factors on customer satisfaction and customer loyalty in the internet shopping mall through service quality based on the data obtained from furniture purchaser. Design/methodology/approach ââ¬â The research model and the relevant research hypothesis were set up through the data derived from the existing researches, and then the relevant hypothesis was tested through regression analysis. Findings ââ¬â As result of analysis, the in? uencing factors on customer satisfaction of furniture purchaser in the internet shopping mall were proved to be product diversity of service quality, tangibles, responsiveness, interaction, stability, and customer satisfaction was found to be a signi? cant in? encing factor on customer loyalty in the internet shopping mall. Research limitations/implications ââ¬â Although this study was carried out against actual furniture purchaser in selecting the samples, it reached the limit in considering the diversity of internet shopping mall, and sorting into on-line and off-line concurrent shopping mall and internet exclusive shopping mall. Originality/value ââ¬â The study reviews the service quality measure suggested in the existing literature on service quality, newly applying it to on-line services environment, and then ? ding out the in? uence of service quality in internet shopping mall on customer satisfaction, customer loyalty, and repurchase intention as well as in which dimension they are built up. Keywords Internet, Shopping, Customer satisfaction, Customer loyalty, Electronic commerce Paper type Research paper The Asian Journal on Quality Vol. 11 No. 2, 2010 pp. 146-156 q Emerald Group Publishing Limited 1598-2688 DOI 10. 1108/15982681011075952 1. Introduction Owing to rapid development of information communication, e-commerce through internet is picking up briskly throughout the world. According to the survey of Korea National Statistical Of? ce, the volume of transaction in domestic cyber shopping mall in Korea steadily grew starting from 2001 when it reached approximately 3,400,000,000,000 won, which is well over 20,000,000,000,000 won in 2009. Like this, internet market is growing in non-negligible scale, and even it is expected to grow more and more in future. Development of various information communication technology including computer has changed the consumption life of the consumers, and especially tons of changes take place in the consumersââ¬â¢ selection through their decision making. Such changes suggest a new environment characterized by global market, collapse of hierarchy, and economy of information era. Internet shopping mall is a business that can be operated at minimum expense with minimum labor force, which allows to ecure price competitiveness by minimizing distribution stages, and further provide better customer service than the existing off-line shopping by providing various information. These days, rapid growth of do-it-yourself furniture stimulates the tendency of purchasing furniture through internet shopping. On-line furniture sales system was attempted by a small-scale ? rm at the beginning, but large furniture suppliers soon after jumped on to the on-line market band wagon without hesitation (The Korea Economic Da ily, 2007, July 16). This study is intended to ? d out the factors of customer satisfaction and customer loyalty by exploring the characteristic of the users regarding customer satisfaction and customer loyalty of the furniture purchasers in the internet shopping mall, and then reviewing the literature on customer satisfaction and customer loyalty, conducting empirical research through statistical data obtained from questionnaire survey by establishing model and hypothesis after reviewing the literature on customer satisfaction and customer loyalty in order to discover the characteristic that appeared through the userââ¬â¢s purchase of furniture. . Theoretical backgrounds 2. 1 Internet shopping mall Internet shopping allows the purchaser to search and survey the information on service or product by accessing internet shopping site through internet in remote place instead of retail shop as a physical space, and then enables to select or order the goods, and ultimately pay the mone y using credit card to purchase the goods/services (Ruth, 2000). It is de? ed as the collective concept of on-line shops having the products in a variety of lines where advertisement and exhibition of the products for internet shopping is carried out through electronic shopping mall, server is equipped with data like prices, structures, characteristics of various products, webpage provides information on the product together with multi-media information (Hoffman and Novak, 1996). Internet shopping mall is characterized by connecting producer directly with ? al end-user while traditional off-line market comprises four steps from producer through ? nal consumer. In addition, it is rarely restricted by time/space, and easy to acquire information from customer. Traditional commercial transaction requires a large amount of investment to maintain ? xed assets and human resource, while e-commerce requires investment mainly for system installation only. Besides, in terms of advertisement, p romotion, etc. owing to conversion to two-way from the existing one-way, it is changed into the style of one-to-one connection with customer. . 2 Furniture industry The structure of Koreaââ¬â¢s furniture industry is driven to domestic demand while Taiwan to export market. Therefore, the industry is very weak in its management foundation owing to extremely ? erce competition within the same industrial circle, generalized phenomenon of design being imitated and the subsequent deterioration of pro? tability, etc. In addition, because of insuf? cient timber source at home, the industry depends on import from Indonesia, etc. for 95 percent of major raw materials such as plywood for furniture production, etc. Domestic furniture industry has structural problems in both design and distribution sectors. Especially, in distribution sector, attacked by aggressive merchants who seek unlawful deals with low-price sale, general tax payers A study on customer satisfaction 147 AJQ 11,2 148 with sincerity tend to lose their competition foundation, and furthermore event companies or representatives hold their own discount sales ruthlessly, disturbing domestic distribution order, resulting in sharp drop of quality and subsequent damage to the consumers. Accordingly, it is necessary to develop our furniture business circle again in such a manner of reinforcing production foundation centered on own specialized product of each while expediting cooperative relationship with professional companies for the other non-specialized products, and thus it is needed to establish production and operation strategy under new system, and then reinforce the competitiveness in price and distribution. 2. 3 Service quality Service means an intangible activity or bene? provided by the services provider to customer, which can be tangible product and something that is added to intangible service, or in an independent form (Kotler, 1991). With regard to the nature of service, there exist some different opinions among the researchers, but service is known to have four properties; being intangible, inseparability of production and consumption, heterogeneity, and perishability (Parasuraman et al. , 1985). The concept of service quality can be represented in different way depending on aspect and approaching method. Especially, service quality has a aspect emphasized by subjective assessment recognized by each individual customer rather than that examined objectively being dif? cult to measure owing to its specialty. Generally, the de? nition of quality varies depending on the methods of approach driven to transcendental experience, product, manufacture, value, and user (Garvin, 1984). Parasuraman et al. 1985, hereinafter ââ¬Å"PZBâ⬠) de? ned cognitive service quality, aside from objective quality, is a type of attitude ââ¬Å"that is the comparison between consumerââ¬â¢s recognition of the result of service provided by the corporation and the expectation of consumer that should be provided by the corporation in their opinionâ⬠. Accordingly, cognitive service quality was observed through the degree and direction of the difference existing between consumerââ¬â¢s recognit ion and expectation (Woo-seong, 2006). According to PZB, although there exists the difference of relative importance that assess the service quality depending on service types, there exists basically similar assessment criteria, and therefore the service quality observation system developed by them is the decisive factor of service quality that may be generally applied to service industry. Since then, Parasuraman et al. (1988) discovered that there exist correlation among ten decisive factors of service quality that were examined from Parasuraman et al. 1985) conducted against the corporations such as machinery repair and maintenance, bank, long-distance telephone company, credit card company, and security broker. Finally, they named SERVQUAL for it by combining ? ve factors (tangibles, reliability, responsiveness, assurance, and empathy). SERVQUAL can be also measured by gap score between the score of consumerââ¬â¢s performance recognition and score of expectation. Five dimensions comprising SERVQUAL and the descripti on of each dimension is as shown in Table I. As a result of reviewing the precedent research on the service quality of on-line shopping mall, it was found that the study on the satisfaction with loyalty and consumer satisfaction as result of the service quality of on-line shopping mall was conducted in such a manner that the property of on-line shopping mall was re? ected in the existing service quality dimensions to develop the dimension of on-line shopping mall service quality. 2. 4 Customer satisfaction and customer loyalty 2. 4. 1 Customer satisfaction. In the study on customerââ¬â¢s satisfaction/dissatisfaction, there exists inconsistency concerning its concept among the researchers, and a variety of attempts are carried out in its measurement. The de? nition of customer satisfaction can be divided into two; de? nitions driven to outcome and driven to process (Lee, 1995). From the aspect driven to outcome, customer satisfaction is conceptualized as the result of consumption experience such as the recognition felt by customer that the price paid is rewarded in proper or improper manner, emotional reaction against the retail shop or purchasing behavior related with purchased speci? product or service, or emotional reaction against the behavior in wider meaning such as consumerââ¬â¢s behavior or the market on the whole, comprehensive mental state that occurs when the emotion due to inconsistent expectation is combined with the emotion prior to the customerââ¬â¢s experience of purchase. The aspect driven to process is useful i n that it generalizes the whole consumption experience, and it enables to examine an important process that reaches customer satisfaction through the measure of observing unique elements at each stage (Oliver, 1981). Internet shopping mall is a web site in virtual space in the name of internet. Chen and Wells (1999), in measuring the attitude to the web site, suggested three aspects; informativeness that shows the degree of usefulness of information provided by web site to the visitor, entertainment of web site that shows the degree on how it meets emotional necessity and desire of the visitor, and organization of web site that shows the degree on how it provides the visitorââ¬â¢s desired information and product/service in convenient and prompt way. 2. 4. 2 Customer loyalty. Typically, customer loyalty means the property of customer to repeatedly purchasing speci? c subject (brand, product, service, shop, etc. with affection regardless of the change in the circumstance (Jacoby and Chesnut, 1978; Oliver and Swan, 1989). There are the variables for measuring customer loyalty such as devotion into speci? c subject, repurchase intention, and intention to recommend to others, etc. (Reichheld, 1993). Especially, customer loyalty is known to arise from the result of customer sa tisfaction in general. Customer loyalty in on-line can be de? ned the tendency of customer to keep on using speci? c web site with affection (Anderson and Srinivasan, 2003). Customer with high loyalty is supposed to keep a speci? web site with him/her using bookmark function, frequently visit it, and show high site adhesion with high detention time. In addition, Dimension Tangibles Reliability Responsiveness Assurance Empathy De? nition Physical facility, equipment, outlook of employee Ability to perform the committed service in reliable and correct manner Will of assisting the customer and providing quick service to the customer Knowledge, courtesy, ability of the employees that give rise to reliability and assurance Careful concern and individual interest in the customer A study on customer satisfaction 149 Table I. Five types of SERVQUAL AJQ 11,2 they are very friendly with the site, and positively promote or recommend it to the others. The customers of high customer loyalty like this is very possible to purchase the goods from that site, and tends to consistently purchase again from that site in spite of positive marketing activity by other sites (Anderson and Srinivasan, 2003). 3. Design of research 3. 1 Research model and establishment of research hypothesis This study aims for reviewing service quality measure suggested in the existing literature on service quality, newly applying it to on-line services environment, and then ? nding out the in? ence of service quality in internet shopping mall on customer satisfaction, customer loyalty, and repurchase intention as well as in which dimension they are built up. Therefore, research model for empirical analysis was established as Figure 1 based on the result of precedent research. As research model, based on the results of previous studies; Lee and Lin (2005), Lee (2 006), Jeon (2006), etc. the dimension of on-line service quality were suggested to ? nd out its in? uences on customer satisfaction, customer loyalty, and repurchase intention: H1. Product diversity of service quality in on-line shopping mall will have positive (? in? uence. H2. Tangibles of service quality in on-line shopping mall will have positive (? ) in? uence. H3. Responsiveness of service quality in on-line shopping mall will have positive (? ) in? uence. H4. Interaction of service quality in on-line shopping mall will have positive (? ) in? uence. H5. Stable service quality in on-line shopping mall will have positive (? ) in? uence. H6. Customer satisfaction with service quality in on-line shopping mall will have positive (? ) in? uence on customer loyalty. Service quality Product driversity H1 Tangibles H2 H3 H4 Interaction H5 Customer satisfaction H6 Customer loyalty 50 Responsiveness Figure 1. Research model Stability 3. 2 Method of research In this study, the questionnai re survey was targeted against the customers aged from 20s to 50s who had experience of purchasing furniture from on-line shopping mall. To accomplish the purpose of research, questionnaire survey was carried out for approximately ten days from August 6, 2009 to August 15, 2009. Total 140 questionnaire sheets were collected out of 150 distributed to the subject. Among 140 sheets collected, 131 were adopted except nine returned deemed to be answered with insincerity. In this study, survey was targeted to the persons who purchased the products in furniture category 1 made of steel or wood available in on-line shopping mall. 4. Empirical analysis 4. 1 Reliability analysis In this study, in order to measure reliability, Cronbachââ¬â¢s a coef? cient ââ¬â internal consistency analysis ââ¬â was used. The reason of adopting Cronbachââ¬â¢s a coef? cient was to enhance variable reliability by sorting out the items affecting reliability and then ruling out those variables when several items were used to measure the same concept. Normally, it proves to be suf? cient when Cronbachââ¬â¢s a coef? cient appears at least 0. 6, and therefore reliability coef? cient on each variable was suggested in Table II to show reliability for each item. 4. 2 Validity analysis In this study, the result of exploratory factor analysis on service quality, customer satisfaction, and customer loyalty in deriving the factors that in? uences on customer satisfaction and customer loyalty of furniture purchaser in the case of on-line shopping mall as shown in Table III. As result of factor analysis, product diversity of service quality, tangibles of service quality, responsiveness of service quality, interaction of service quality, stable service quality, customer satisfaction, and customer loyalty were classi? ed to be the factors, and the variable to be excluded being less than 0. 5 in factor loading did not appear. 4. 3 Testing of hypothesis To test the hypothesis, analysis of correlation among variables and multiple regression analysis between antecedent and dependent variables were carried out. Multiple regression analysis normally aims for estimating one dependent variable from the knowledge of several variables. Accordingly, this would enable to ? nd out the In? uencing variable acting on the use of internet shopping mall Product diversity of service quality Tangibles of service quality Responsiveness of service quality Interaction of service quality Stable service quality Customer satisfaction Customer loyalty Cronbachââ¬â¢s a coef? cient 0. 827 0. 773 0. 829 0. 843 0. 758 0. 739 0. 917 A study on customer satisfaction 151 Table II. Result of reliability analysis AJQ 11,2 Factor Product diversity Component Variable Factor 1 Factor 2 Factor 3 Factor 4 Factor 5 Factor 6 Factor 7 sv1 sv2 sv3 st1 st2 st3 st4 sr1 sr2 sr3 sr4 sc1 sc2 sc3 sc4 ss1 ss2 ss3 cs1 cs2 cs3 cr1 cr2 cr3 0. 840 0. 770 0. 791 0. 129 0. 087 0. 028 0. 419 0. 145 0. 161 0. 113 0. 071 0. 264 2 0. 011 0. 189 0. 104 0. 329 0. 170 0. 187 0. 466 0. 363 0. 269 0. 180 0. 180 2 0. 027 0. 066 0. 238 0. 123 0. 820 0. 851 0. 772 0. 667 0. 231 0. 160 0. 104 0. 048 0. 175 0. 166 0. 162 0. 304 0. 019 0. 139 0. 069 0. 111 0. 109 0. 141 0. 019 20. 006 0. 006 0. 138 0. 146 0. 114 0. 113 0. 135 0. 195 0. 045 0. 707 0. 712 0. 801 0. 810 0. 075 0. 157 20. 040 0. 321 0. 299 0. 83 0. 134 20. 001 0. 141 0. 221 0. 213 0. 203 20. 024 0. 103 20. 056 0. 181 0. 052 0. 192 0. 112 0. 153 0. 263 0. 359 0. 086 0. 041 0. 682 0. 780 0. 807 0. 649 0. 315 0. 172 0. 125 0. 197 0. 089 0. 042 0. 035 0. 065 20. 023 0. 011 0. 129 0. 219 0. 225 0. 133 0. 205 0. 026 2 0. 095 2 0. 105 0. 221 0. 198 0. 167 0. 111 0. 168 0. 255 0. 573 0. 838 0. 854 2 0. 042 2 0. 219 2 0. 106 2 0. 154 2 0. 138 2 0. 263 0. 003 0. 172 0. 202 0. 227 0. 134 0. 190 0. 041 20. 059 20. 072 0. 208 0. 172 0. 221 0. 199 0. 261 0. 303 0. 279 0. 169 0. 099 0. 634 0. 751 0. 844 0. 091 0. 120 0. 004 0. 065 0. 109 0. 090 20. 097 0. 068 20. 015 0. 163 0. 05 0. 102 20. 079 20. 288 0. 254 0. 269 0. 233 0. 253 0. 233 20. 031 20. 014 20. 050 20. 024 20. 091 0. 808 0. 834 0. 545 152 Tangibles Responsiveness Interaction Stability Customer satisfaction Customer loyalty Table III. Result of factor analysis Notes: Extraction method: principal component analysis; rotation method: varimax with Kaiser normalization; rotation converged in six iterations strategy of enhancing customer satisfaction and customer loyalty by grasping which factors in? uence on customer satisfaction and customer loyalty of furniture purchaser in on-line shopping mall, and to which degree it has in? uence if so. In carrying out regression analysis, it may produce wrong interpretation if independent variables are not mutually independent or regression coef? cients are estimated incorrectly. In other words, there could exist the problem of multi-collinearity. In order to conduct the test for equal variance and normality that are the premise of multiple regression analysis, testing of multi-collinearity was carried out. Pearsonââ¬â¢s correlation was used in the analysis of correlation, which shows there exist no problem of multi-collinearity (Table IV). 4. 3. 1 Testing of hypothesis between customer satisfaction and antecedent variable. As the antecedent factor of customer satisfaction, diversity of service quality, tangibles of service quality, responsiveness of service quality, interaction of service quality, and stable service quality were set up, and then multiple regression analysis was conducted to test the in? uence on customer satisfaction (Table V). Table VI is the result of analysis on the signi? cance for individual variables. Each b coef? cient appeared 0. 361 for diversity of service quality, 0. 526 for tangibles of service quality, 0. 364 for responsiveness of service quality, 0. 486 for interaction of service quality, and 0. 32 for stable service quality. Standardized regression coef? cient (b) that represents Constructive concept Diversity Tangibles Responsiveness Interaction Stability Customer satisfaction Customer loyalty Customer Customer Diversity Tangibles Responsiveness Interaction Stability satisfaction loyally 1 0. 201 * * 0. 125 * 0. 256 * * 0. 534 * * 0. 361 * * 0. 431 * * 1 0. 075 0. 601 * * 0. 512 * * 0. 526 * * 0. 367 * * A study on customer satisfaction 153 1 0. 219 * * 0. 438 * * 0. 364 * * 0. 547 * * 1 0. 608 * * 0. 486 * * 0. 249 * * 1 0. 332 * * 0. 341 * * 1 0. 236 * * 1 Notes: Correlation coef? cient is signi? cance at *0. 05 and * *0. 1 levels, respectiviely, at both sides; n ? 131 Table IV. Correlation matrix of constructive concepts R2 0. 487 Adjusted R 2 0. 476 F-value 50. 647 F-signi? cance 0. 000 Durbin-Watson 2. 016 Table V. ANOVA Independent variable (Constant) Diversity Tangibles Responsiveness Interaction Stability Unstandardized coef? cients b SE 2 0. 005 0. 361 0. 526 0. 364 0. 486 0. 332 0. 041 0. 061 0. 098 0. 057 0. 060 0. 054 Standardized coef? cients b 0. 360 0. 518 0. 375 0. 497 0. 356 T 20. 073 8. 053 12. 438 8. 215 10. 573 7. 663 Signi? cance probability 0. 292 0. 000 0. 000 0. 000 0. 000 0. 000 Note: Dependent variable: customer satisfaction Table VI. Multiple regression analysis between customer satisfaction and antecedent variable importance of regression coef? cient appeared 0. 360 for diversity of service quality, 0. 518 for tangibles of service quality, 0. 375 for responsiveness of service quality, 0. 497 for interaction of service quality, and 0. 356 for stable service quality. In the result of analysis, absolute value of beta coef? cient for tangibles of service quality appeared large and therefore, it is deemed to be the variable of best explanation of all. F-value of regression model was 50. 647 (? 0. 000) proved to be of signi? cance, and Durbin-Watson value was 2. 16 (close to 2) deemed to satisfy the assumption of independence. As result of testing, the coef? cient of determination (R 2) ââ¬â one of the measures that show the adequacy of regression estimated from sample data to the observed value appeared 0. 476. Therefore, 47. 6 percent of variation on customer satisfaction that was the dependent variabl e as result of regression analysis was well explained by antecedent variables. AJQ 11,2 154 Thus, ? ve factors such as diversity of service quality, tangibles of service quality, responsiveness of service quality, interaction of service quality, and stable service quality were found to directly in? ence on customer satisfaction at a signi? cant level. 4. 3. 2 Testing of hypothesis between customer loyalty and customer satisfaction. F-value of regression model was 38. 763 (? 0. 000) proved to be signi? cant, and Durbin-Watson value was 1. 912 (close to 2). Therefore, it is deemed to satisfy the assumption of independence (Table VII). The coef? cient of determination ( ) was 0. 212, and therefore 21. 2 percent of variation on customer satisfaction that was a dependent variable as a result of regression analysis. That is, customer loyalty is explained by customer satisfaction, and it was found to directly in? ence on customer loyalty at a signi? cant level (Table VIII). 5. Conclusion T his study aimed for analyzing the in? uence on customer loyalty exerted by product diversity, tangibles, responsiveness, interaction, stability, and customer satisfaction that are suggested as service quality factor felt by furniture purchaser in internet shopping mall. The result is as follows. First, as result of exploring the factors in internet shopping mall service quality which in? uence customer satisfaction, it was proved product diversity, tangibles, responsiveness, interaction, and stability have positive in? ence on internet shopping mall customer satisfaction. As on-line shopping mall market reaches maturity, it is thought time-saving is the main reason for the customer to prefer internet shopping, and the shopping malls focus on their service on such needs. Second, as for the relationship between customer satisfaction and customer loyalty concerning internet shopping mall service quality, more satisfaction with internet shopping mall appeared to have more positive in? u ence on customer loyalty. In result, it seems that the consumer satis? ed with internet shopping mall can keep consistent relation with internet shopping mall in future. As aforementioned, the result of this study shows that excellent service quality of internet shopping mall operator becomes the factors that can improve the competitiveness of shopping mall, and furthermore the internet shopping mall could R Table VII. ANOVA 0. 216 Adjusted 0. 212 F-value 38. 763 F-signi? cance 0. 000 Durbin-Watson 1. 912 Independent variable Table VIII. Multiple regression analysis on customer loyalty (Constant) Customer loyalty Unstandardized coef? cients b SE 2 0. 002 0. 236 0. 052 0. 051 Standardized coef? cients b 0. 238 T 20. 036 5. 603 Signi? ance probability 0. 962 0. 000 Note: Dependent variable: customer loyalty raise customer loyalty if they would improve service quality consistently to get satisfaction from the customers. Although this study was carried out against actual furniture purchaser in selecting the samples, it reached the limit in considering the diversity of internet shopping mall, and sorting into on-line and off-line concurrent shopping mall and internet exclusive shopping mall. Thus, a further study needs to be done to ? nd the aforementioned area. References Anderson, R. E. and Srinivasan, S. S. (2003), ââ¬Å"E-satisfaction and e-loyalty: a contingency frameworkâ⬠, Psychology & Marketing, Vol. 20. Chen, Q. and Wells, W. D. (1999), ââ¬Å"Attitude toward the siteâ⬠, Journal of Advertising Research, September-October. Garvin, D. A. (1984), ââ¬Å"What does product quality really mean? â⬠, SLoan Management Review, Vol. 26, Fall. Hoffman, D. L. and Novak, T. P. (1996), ââ¬Å"Marketing in hypermedia computer-mediated environments: conceptual foundationsâ⬠, Journal of Marketing, Vol. 60. Jacoby, J. and Chesnut, R. W. (1978), Brand Loyalty Measurement Management, Wiley, New York, NY. Jeon, H. -B. 2006), ââ¬Å"Research about quality of service of cybermallâ⬠, Industry Management Research, Vol. 29. (The) Korea Economic Daily (2007), The Korea Economic Daily, July 16. Kotler, P. (1991), Marketing Management, 5th ed. , Prentice-Hall, Upper Saddle River, NJ. Lee, G. -G. and Lin, H. -F. (2005), ââ¬Å"Customer perceptions of e-service quality in online shop pingâ⬠, International Journal of Retail & Distribution Management, Vol. 33. Lee, J. -S. (2006), ââ¬Å"Effect research that quality of service factor importance by service type gets in customer satisfactionâ⬠, Is Service Management Learned Society, Vol. No. 1. Lee, Y. -J. (1995), ââ¬Å"Research on justice and measurement of customer satisfactionâ⬠, Management Symposium, Vol. 29. Oliver, R. L. (1981), ââ¬Å"Measurement and evaluation of satisfaction processes in retail settingsâ⬠, Journal of Retailing, Vol. 57. Oliver, R. L. and Swan, J. E. (1989), ââ¬Å"Customer perception of interpersonal equity and satisfaction in transactions: a ? eld survey approachâ⬠, Journal of Marketing, Vol. 53, April. Parasuraman, A. , Zeithaml, V. A. and Berry, L. L. (1985), ââ¬Å"A conceptual model of service quality and its implications for future researchâ⬠, Journal of Marketing, Vol. 9, pp. 41-50. Parasuraman, A. , Zeithaml, V. A. and Berry, L. L. (1988), ââ¬Å"SERVQU AL: a multiple-item scale for measuring consumer perceptions of service qualityâ⬠, Journal of Retailing, Vol. 64. Reichheld, F. F. (1993), ââ¬Å"Loyalty-based managementâ⬠, Harvard Business Review, Vol. 71. Ruth, C. (2000), ââ¬Å"Applying a modi? ed technology acceptance model to determine factors affecting behavior intention to adopt electronic shopping on the world wide web: a structural equation modeling approachâ⬠, doctoral thesis, Drexel University, Philadelphia, PA. Woo-seong, L. 2006), ââ¬Å"The effects of service quality on customer loyalty in online shopping mallâ⬠, Masterââ¬â¢s thesis, Sejong University, Seoul. A study on customer satisfaction 155 AJQ 11,2 Further reading Gefen, D. and Straub, D. W. (2000), ââ¬Å"The relative importance of perceived ease of use in IS adoption: a study of e-commerce adoptionâ⬠, Journal of the Association for Information Systems, Vol. 1. About the authors Yongju Jeong is graduated from Korea National Open Univ ersity. He is also graduated in MA from University of Incheon and doing PhD in University of Incheon. Yongju Jeong is the corresponding author and can be contacted at: [emailà protected] net Yongsung Lee is graduated from the Department of Administration, University of Incheon. He is also graduated in Information and Communication Engineering, University of Incheon. He received his Master of Business Administration from University of Incheon Admission. 156 To purchase reprints of this article please e-mail: [emailà protected] com Or visit our web site for further details: www. emeraldinsight. com/reprints
Thursday, January 9, 2020
Analysis Of The Poem The Wanderer - 1376 Words
At first interpretation, The Wanderer lends itself to a depressing and lamenting read from the hands of the poet who wrote the words of a poor and lonely voyager battling against his internal struggle of loneliness and the external force of nature. This wanderer longs for the company he held before battle and death took them away. He has lost his lord and fellow-warriors, the lively mead-halls, and the showers of feasts and treasures. This social circle is no more, leaving the wanderer alone to contemplate the aspects of sadness, nobility, and wisdom. The Wanderer is composed of two voices: the narrator and the wanderer. The poet, however, writes both. The poetââ¬â¢s characterization of the wanderer allows readers to experience symptoms of Anglo-Saxon depression on paper. However, when read again (and a few more times after that), a hint of humor can be found in the harsh words of the wanderer and the narration of the poet. The Christianization of the Anglo-Saxons began in 597, and this poem is a didactic response to the paganism previously common. In this paper, I will, first, establish the wanderer as a pagan and, following, explore how the unconscious humor in the poetââ¬â¢s words presents a Christian remedy for the pre-Christian world of paganism. The opening lines of the poem confirm the first of the wandererââ¬â¢s pagan ideologies. Often the lone-dweller longs for relief, the Almightyââ¬â¢s mercyâ⬠¦ â⬠¦Fate is firmly set This is a blatant contradiction betweenShow MoreRelatedAnalysis Of The Poem The Wanderer Essay1695 Words à |à 7 Pagesââ¬Å"The Wandererâ⬠is an early English poem focused on a man ââ¬Ëlone-dwellerââ¬â¢, who had recently lost his lord and consequently experiences deep feelings of nostalgia and depression. The poem cycles through present events and flashbacks to highlight the drastic difference of his current life and his life prior to the death of his master. The flashbacks throughout the poem are exceptionally vivid and provide the reader with a clear idea of the joyful life the ââ¬Ëlone-dwellerââ¬â¢ had in the past. Following theseRead MoreAnalysis Of The Poem, God, Earth Walker And The Wanderer955 Words à |à 4 PagesFrom the first depiction of the subject of The Wanderer, ââ¬Å"earth-stepper,â⬠ââ¬Å"earth-walker,â⬠and ââ¬Å"the Wanderer,â⬠the translators Greg Delanty, E. Talbot Donaldson, and Alfred David differ in their translations (Delanty l. 6, Donaldson 112, David l. 6). These differences build throughout the rest of the poem, eventually leading the audience to arrive at different conclusions based on each translation. By translating the Christian ideas in the poem (God, Earth, human) with distinct word choice, DelantyRead MoreComparison between Beowulf and The Wanderer1436 Words à |à 6 Pagesï » ¿Survey of English Literature / Comparison between Beowulf and the Wanderer 10th October, 2013 / Esma Bike Bostancà ± BEOWULF AND THE WANDERER There are many factors to consider in comparing the two poems of the Old English society ââ¬â Beowulf and The Wanderer. While they have many similarities; they have, within their structure and plot, many differences we can easily find or eventually make out. When we look at both the poems in terms of their genre; while they are both products of the traditionalRead MoreHelen Of Troy : The World Of Mythology1188 Words à |à 5 PagesPoetry Analysis Essay Helen of Troy holds legendary status is the world of mythology. Being the catalyst of one of mythologies largest wars, Helen lacks no influence. Many know the story, at least in its most basic form, the girl so mesmerizingly beautiful that the mighty empires of Greece and Troy waged war over her. With that said, a story so widely known has, predictable, many interpretations. Here Edgar Allan Poe in his piece ââ¬Å"To Helenâ⬠and H.D. in her piece ââ¬Å"Helenâ⬠each capture their own interpretationRead More Poetic Analysis of Fern Hill Essay960 Words à |à 4 PagesPoetic Analysis Fern Hill Dylan Thomass poem Fern Hill represents the passage of one mans life from boyhood to adulthood and the realization of his mortality. The speaker in this poem uses expressive language and imagery to depict a tale of growing up. The use of colour adds life and character to people and abstract ideas. He looks up to Time (313) as an authority figure who has strict control of his life, and with descriptions of biblical figures we can presume that he is aRead MoreContrast and Comparison of Wordsworths Tintern Abbey and Colderidges Kubla Khan1591 Words à |à 7 Pagesimagination within the two poems. Even though the two poets were contemporaries and friends, Wordsworth and Colderidge each have an original and different way in which they introduce images and ideas into their poetry. These differences give the reader quite a unique experience when reading the works of these two authors. Through the imagination of the poet, the reader can also gain insight into the mind and personality of the poet himself. These ideas will be explored through analysis and comparison of theRead MoreAnalysis Of Percy Shelley s Frankenstein, Thomas Love Peacock And Lord Byron1486 Words à |à 6 Pagesalthough romantic. It involves a main character Wolfstein who is a wanderer who is very solitary. The wanderer encounter s Ginotti who is an alchemist of the Rosicrucian or the order of the Rose Cross. The mission by Ginotti is to seek to impart immortality secrets. Although it is a story filled with horror, it is thrilling and a story revolving around the unsatisfied quest to obtaining secrets of having an eternal life. The classic poems that had been written by Shelley include ozymandious which hasRead MoreThe Victorian Age : An Upper Class Society1049 Words à |à 5 PagesJekyll and Mr. Hyde,â⬠and Alfred, Lord Tennysonââ¬â¢s poem, ââ¬Å"Ulyssesâ⬠illustrates the dominant characteristics of the Victorians, specifically addressing social manners, money and power, and priorities and goals. To the Victorians, proper conduct and decorum was a measure of social standing and a necessary attribute to the upper class. Robert Louis Stevensonââ¬â¢s novel, ââ¬Å"Dr. Jekyll and Mr. Hydeâ⬠demonstrates the accepted behaviors through the analysis of its characters. The novel introduces the firstRead MoreThe Red Wheelbarrow Analysis Essay example1881 Words à |à 8 Pagesa that whatever is being depended upon is a pretty big deal. Line 2 upon * Upon ââ¬â what a pretty preposition. And an important one too. So important, in fact, that it gets its very own line. * Visually (on the page) the first line of the poem (which is way longer than this line) actually looks like its resting upon the upon of line two. The first lineà dependsà upon this second line. Hehe. Line 3 a red wheel * A brand new couplet. Were dying to know what so much depends upon ââ¬âRead MoreAnalysis of Mary Shelleys Frankenstein Essay1720 Words à |à 7 PagesAnalysis of Mary Shelleys Frankenstein Analyzing a book can be a killer. Especially when it contains tons of subtle little messages and hints that are not picked up unless one really dissects the material. Mary Shelleys Frankenstein is a prime example. It is analyzed by scholars all the time because of the subtle messages it sends through its themes, one of which needs to be discussed that is called Romanticism. Romanticism dealt with simplifying things as a break from the previous age which
Wednesday, January 1, 2020
Modernism And Modernism Postmodernism And Postmodernism
Modernism is what most people describe as what came before postmodernism. For this essay I will first be looking at what the meaning of modernism and postmodernism is and I will also be looking at the different factors of both modernism and postmodernism and why modernism has declined and has been rejected. I will also be researching on how modernism and postmodernism started and why it started and for this I will be looking at different characteristic of both modernism and post modernism and compare how they were both so different to each other. Modernism had been around even before the eighteenth century while as the postmodernism has been around since the 1960s. what actually lead to the rejection of modernism and the start of a new movement the postmodernism, that I hope to find out. Modernism Modernism is a cultural movement has been around ever since the nineteenth century when the arts music architecture literatures were changing where it came after enlightenment where to reject them. The master narratives and Meta narratives fall in the grand theory of history. The culture and natural identity: myths of culture and ethnic origin totalizing explanations in history science and culture to represent knowledge and explain everything. ââ¬Å"Central to modernity is a paradox: the seventeenth and eighteenth century enlightenment values of reason and science and defeat tradition, obscurantist superstition and the perils of what was then termed religious ââ¬Ëenthusiasmââ¬â¢, emerged inShow MoreRelatedPostmodernism : Modernism And Postmodernism1472 Words à |à 6 PagesModernism and Postmodernism are both two important eras in design. Postmodernism takes a lot of concepts from the modernism era. Both modernism and post modernism focus on Style, Social analysis, Cultural C ontext, Philosophy, Politics, Human experience, Machine aesthetics, and the constant transformation of the ââ¬Å"Newâ⬠. An interesting fact of the Modernism and Postmodernism is the use of the psychology and philosophy themes 1. Subjectivity 2.History 3. Culture and 4. Theoretically divers aestheticsRead MorePostmodernism : Modernism And Postmodernism1549 Words à |à 7 PagesModernism and Postmodernism To begin with, to determine the meaning of postmodernism is possible only through the relationship with modernism. Modernism in modern science is understood as a kind of cultural consciousness, which is implemented in the artistic practice of symbolism, expressionism and acmeism. In the socio-historical context, it means the period of modernism in the development of culture from the late nineteenth to mid-twentieth century, that is, from Impressionism to a new novel andRead MorePostmodernism : Modernism And Postmodernism2457 Words à |à 10 PagesThis paper outlines, argues and evaluates the key ideas used in debates about modernism and postmodernism. In order to understand and evaluate the key ideas the terms modernism and postmodernism had to be defined. I found much difficulty in finding a clear and concise definition of the two terms and so I researched and formed a train of thoughts into one definition. Modernism, beginning in the late nineteenth century and early twentieth ce ntury within Europe and America, was a movement mainly pioneeredRead MorePostmodernism And Modernism1273 Words à |à 6 PagesSuccessfully marketing a product is a fundamental component in remaining competitive in the vicious dog-eat-dog world of business. The rise of postmodernism in society redefined what successful and adaptive marketing looks like and consequently it gave branding a whole new meaning and significance. Postmodernism means different things to different disciplines, yet the general consensus is that it is a contemporary cultural phenomenon (Brown 1996). The postmodern brand model enabled brands to haveRead MoreModernism And Postmodernism1207 Words à |à 5 PagesModernism is very troublesome to define with clarity because of the fact that the term revolves around various genres of movements be it artistic or philosophical. Nonetheless, there are some primary beliefs of the Modernist genres that appeal in someway or the other to the various movements and also the writers. Modernism in general can broadly be described as the ââ¬Å"deviation from the ancient and classic mannerâ⬠. (Johnson, J., The New Royal and Universal English Dictionary, Millard, 1763). It isRead MoreModernism Versus Postmodernism918 Words à |à 4 PagesModernism vs. Postmodernism Post-modernism follows and shares many of the same ideas as modernism. Though, at the same time, they differ in many ways. These distinctions can be seen in the two works of literature, ââ¬Å"Death of a Salesmanâ⬠by Arthur Miller and ââ¬Å"Glengarry Glen Rossâ⬠by David Mamet. ââ¬Å"Death of a Salesmanâ⬠represents the modernist literature. Modernism is a style of literature that came about after World War I in Europe. It emerged in the United States in the late 1920s. ModernismRead MorePostmodernism : What Is Post Modernism?1389 Words à |à 6 PagesWhat is Post-Modernism? Post modernism is a difficult view point to interpret or describe in a few words, as to provide an insightful description that remains succinct is quite ironic as postmodernism opposes the attempt to ascribe one broad meaning to any ââ¬Å"thingâ⬠. Postmodernism has often been referred to as the destruction of the Metanarrative. Thought-out all cultural eras society has usually had a focal point in their cultures. The age of enlightenment used God, modernists used technology, postmodernismRead MoreDifferences Between Modernism And Postmodernism1411 Words à |à 6 PagesThere are a lot of differences between modernism and postmodernism. The first is that modernism began in the late 19th century and lasted until the 20th century, specifically from the year 1890s to 1945. According to Oak (2008), ââ¬Å"â⬠¦ modernism and postmodernism highlights the difference in the approaches towards life.â⬠A good example would be, during the modernist era rational and logical thinking was encouraged as well as being objective and postmodernism does not and is subjective. My chosen majorRead MoreDifferences Between Modernism And Postmodernism1576 Words à |à 7 PagesWhat are the key differences between Modernism and Postmodernism as architectural movements? I was looking at differences and similarity between the Modern and Post-modern Architectures movement in the 20th centuryââ¬â¢s, and found inspiration in the movements and the way the two movements has made a massive impact in the world of Architecture world Modernism Looking into the modernRead More Modernism vs Postmodernism Essay2441 Words à |à 10 Pagesof signifying practices, perhaps centred on a medium but certainly not bounded by it. (Victor Burgin, The absence of presence, Art in Theory, pp. 1098-9) Discuss the merits of Burgins statement as a basis on which to distinguish postmodernism from Modernism in the practice of art. In your answer you should make reference to at least four works which you consider to be of particular relevance to an argument between these two positions. This question highlights one of the themes central to
Subscribe to:
Posts (Atom)