The Relationship Between Self Esteem and Impulsive Buying in Muhammadiyah University Sidoarjo Students
Hubungan Antara Self Esteem dengan Impulsive Buying Pada Mahasiswa Universitas Muhammadiyah Sidoarjo
DOI:
https://doi.org/10.21070/ups.5381Keywords:
Self Esteem, Impulsive Buying, MahasiswaAbstract
This research is motivated by the phenomenon of impulsive buying among students at Muhammadiyah University of Sidoarjo, characterized by individuals making purchases suddenly and without planning. The aim of this research is to determine the relationship between self-esteem and impulsive buying among students at Muhammadiyah University of Sidoarjo. The research method used was a correlational quantitative method with a total of 8,815 students as subjects with sample determination developed by Isaac and Michael used at the 5% level for 335 students. The method for taking samples in this research is by probability sampling technique which uses proportional stratified random sampling. The instrument for measuring the impulsive buying variable uses a scale based on Verplanken and Herabadi’s theory and the instrument for measuring self-esteem is measured using a scale adopted from Coopersmith. The data analysis technique uses product moment correlation with the SPSS Version 25 application.
Downloads
References
W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135.
R. Hayes, G. Pisano, D. Upton, and S. Wheelwright, Operations, Strategy, and Technology: Pursuing the competitive edge. Hoboken, NJ: Wiley, 2005.
The Oxford Dictionary of Computing, 5th ed. Oxford: Oxford University Press, 2003.
A. Rezi and M. Allam, "Techniques in array processing by means of transformations, " in Control and Dynamic Systems, Vol. 69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.
O. B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.
H. Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov–Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19, no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].
A. Altun, "Understanding hypertext in the context of reading on the web: Language learners' experience," Current Issues in Education, vol. 6, no. 12, July 2003. [Online]. Available: http://cie.ed.asu.edu/volume6/number12/. [Accessed Dec. 2, 2004].
H. Imron, R. R. Isnanto and E. D. Widianto, "Perancangan Sistem Kendali pada Alat Listrik Rumah Tangga Menggunakan Media Pesan Singkat (SMS)". Jurnal Teknologi dan Sistem Komputer, vol.4, no. 3, pp. 454-462, Agustus 2016. [Online]. doi: http://dx.doi.org/10.14710/.4.3.2016.454-462. [Diakses 4 September 2016].
J. R. Beveridge and E. M. Riseman, "How easy is matching 2D line models using local search?" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 564-579, June 1997.
E. H. Miller, "A note on reflector arrays," IEEE Transactions on Antennas and Propagation, to be published.
L. Liu and H. Miao, "A specification based approach to testing polymorphic attributes," in Formal Methods and Software Engineering: Proc.of the 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, J. Davies, W. Schulte, M. Barnett, Eds. Berlin: Springer, 2004. pp. 306-19.
J. Lach, "SBFS: Steganography based file system," in Proc. of the 2008 1st Int. Conf. on Information Technology, IT 2008, 19-21 May 2008, Gdansk, Poland [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed: 10 Sept. 2010].
H. A. Nimr, "Defuzzification of the outputs of fuzzy controllers," presented at 5th Int. Conf. on Fuzzy Systems, 1996, Cairo, Egypt. 1996.
T. J. van Weert and R. K. Munro, Eds., Informatics and the Digital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conf. on Social, Ethical and Cognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.
R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.
European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB): Implementation guidelines for DVB terrestrial services; transmission aspects,” European Telecommunications Standards Institute, ETSI TR-101-190, 1997. [Online]. Available: http://www.etsi.org. [Accessed: Aug. 17, 1998].
“A ‘layman’s’ explanation of Ultra Narrow Band technology,” Oct. 3, 2003. [Online]. Available: http://www.vmsk.org/Layman.pdf. [Accessed: Dec. 3, 2003].
G. Sussman, "Home page - Dr. Gerald Sussman," July 2002. [Online]. Available: http://www.comm.pdx.edu/faculty/Sussman/sussmanpage.htm. [Accessed: Sept. 12, 2004].
FLEXChip Signal Processor (MC68175/D), Motorola, 1996.
A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.
F. Sudweeks, Development and Leadership in Computer-Mediated Collaborative Groups. PhD [Dissertation]. Murdoch, WA: Murdoch Univ., 2007. [Online]. Available: Australasian Digital Theses Program.
J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.
Downloads
Additional Files
Posted
License
Copyright (c) 2024 UMSIDA Preprints Server
This work is licensed under a Creative Commons Attribution 4.0 International License.