• Title/Summary/Keyword: Adoption Decision Process

Search Result 71, Processing Time 0.029 seconds

The Study on Grief of Birthmothers who Surrendered their Babies for Adoption - Focused on External Locus of Control, Self-esteem, Social Support and Adoption Decision - (입양으로 자녀를 상실한 미혼모들의 슬픔 연구 - 외적통제소, 자아존중감, 사회적 지지, 입양결정과정의 영향력을 중심으로 -)

  • Choi, Seung-hee
    • Korean Journal of Social Welfare Studies
    • /
    • no.36
    • /
    • pp.203-225
    • /
    • 2008
  • The purpose of this study is to examine how much the external locus of control, social support, self-esteem, and adoption decision making process influence to teen parents' grief and find out the differences depending on meeting the baby, breast-feeding, anticipating the meeting the baby, ceremony for separation, and exposing their grief by themself or to others. Data was analysed with multiple regression and t-test. With the result of multiple regression analysis, the higher external locus of control, pressure of birthfather, regrets for adoption decision are, the higher grief is, and the lower support of friends and self-esteem are, the higher grief is. And It is estimated high grief statically among the group of breast-feeding, anticipating the baby, no ceremony for separation. But the group exposing their grief by self or to others felt low grief. On the basis of the results, we will find out the meaningful contents for intervention. The staffs of birthmother shelter and social worker don't overlooking the relationship between birthmother and birthfather and enforce the internal locus of control, self-esteem. Above all we will intervene about exploring the adoption decision making and facilitate the exposure of feeling related to surrendered baby(guilt, anxiety, sadness, shame, fear).

Prioritization-Based Model for Effective Adoption of Mobile Refactoring Techniques

  • Alhubaishy, Abdulaziz
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.375-382
    • /
    • 2021
  • The paper introduces a model for evaluating and prioritizing mobile quality attributes and refactoring techniques through the examination of their effectiveness during the mobile application development process. The astonishing evolution of software and hardware has increased the demand for techniques and best practices to overcome the many challenges related to mobile devices, such as those concerning device storage, network bandwidth, and energy consumption. A number of studies have investigated the influence of refactoring, leading to the enhancement of mobile applications and the overcoming of code issues as well as hardware issues. Furthermore, rapid and continuous mobile developments make it necessary for teams to apply effective techniques to produce reliable mobile applications and reduce time to market. Thus, we investigated the influence of various refactoring techniques on mobile applications to understand their effectiveness in terms of quality attributes. First, we extracted the most important mobile refactoring techniques and a set of quality attributes from the literature. Then, mobile application developers from nine mobile application teams were recruited to evaluate and prioritize these quality attributes and refactoring techniques for their projects. A prioritization-based model is examined that integrates the lightweight multi-criteria decision making method, called the best-worst method, with the process of refactoring within mobile applications. The results prove the applicability and suitability of adopting the model for the mobile development process in order to expedite application production while using well-defined procedures to select the best refactoring techniques. Finally, a variety of quality attributes are shown to be influenced by the adoption of various refactoring techniques.

Development and Distribution of Risk Governance Framework in Terms of Socially Viable Solutions

  • Choi, Choongik;Choi, Junho
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.3
    • /
    • pp.185-193
    • /
    • 2018
  • This paper aims to explore the risk governance framework and socially viable solutions, attempting to provide guidance for the decision making process. The key idea of this study start with overcoming the limitations of IRGC risk governance framework, which mainly focuses on a comprehensive framework for risk governance. This article has employed SWOT analysis as a methodology, which is a strategic planning technique used to help identifying the strengths, weaknesses, opportunities, and threats related to business competition or risk management. In this paper, socially viable solutions as an alternative plan place emphasis on the adoption of concern assessment through a concerns table. It is also proposed that scoping has to get introduced, with SWOT analysis in the process. The results of this paper support that multiple stakeholders have to participate in the process of identifying and framing risk and communicating with each other, considering the context. It should be noted that communities can become involved and take important parts in decision making process in various ways. It is recommended that engaging stakeholders to both risk assessment and risk management is material to dealing with risk in a socially viable way. It also implies that the community-based disaster management should be better prepared for the decision making process in socially viable solutions.

IS Continuance of Hedonic Information Systems (헤도닉 정보시스템의 지속적인 사용에 관한 연구: UCC를 중심으로)

  • Seo, Ho-Cheol;Ahn, Joong-Ho;Yang, Ji-Youn
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.25-53
    • /
    • 2007
  • The Expectation Confirmation Model (ECM) of information systems investigates the continued information systems usage behavior. This paper expands the original post-adoption beliefs and searches the applications in the emerging hedonic information systems. Previous IS researches focused on the organizational environments. However as the information technology (especially internet) evolves, information systems have not only emerged for the organizations but also for the individual users, such as internet portals, internet communities, on-line games etc. These information systems so called Hedonic Information Systems aims to provide self-fulfilling value rather than instrumental value to the users. Researches in other disciplines, including marketing and consumer behavior research, illustrate that the hedonic and utilitarian perspective of goods and services have different influence on the consumer behavior. Goods and services used to be classified into either hedonic or utilitarian aspect but now they may belong to both aspects simultaneously. Moreover consumer's goals or tasks have both hedonic utilitarian aspects. When a consumer makes a decision to purchase or repurchase goods or services, he/she compares the hedonic and utilitarian perspectives of goods to find most suitable ones to satisfy their goals/tasks. Finally, consumer's behavior is determined by the trade-off between what the goods can provide to the consumers and in what extent the goods fulfill consumer's purchase behavior. Consumer also shows that the salience of hedonic perspective is relatively greater when consumer decides which of several items to give up (forfeiture choices) than the time when they decide which item to acquire (acquisition choices). Some researches in MIS discipline have found out that the information systems also have both hedonic and utilitarian perspectives. The decision process of whether to use information systems or not is similar to that of a consumer's decision of purchasing or repurchasing goods or services. However most of researches in MIS tend to focus on the extrinsic motivation variables which only cover the utilitarian perspective of information systems. It is only recent that researches start to investigate the intrinsic motivation variable - Perceived Enjoyment - for the hedonic perspective. Considering the consumer's purchasing decision process, users of information systems evaluate the systems through balancing between intrinsic (hedonic) and extrinsic (utilitarian) variables according to their main tasks or tendencies. This paper proposes a model that is based on the ECM of IS Continuance model modified from Expectation Confirmation Model to fit into the continued usage of information system. It first started from the decision process regarding hedonic and utilitarian perspectives in the consumer behavior literatures. The model deals with continued usage of information systems beyond the mere technology adoption as in most of the previous MIS researches. This research is particularly important to the hedonic information systems, because their business model depends on the frequent usages rather simple adoption at the beginning. Because the basic model only considered the extrinsic motivations (perceived usefulness) to explain the users' behavior and as the information systems can have both hedonic and utilitarian dimensions, it should consider both perspectives. Therefore, this newly proposed model considers intrinsic variable (perceived enjoyment) as well. Since the individual user can have a preference on either aspects that is between the hedonic and utilitarian perspective depending on his/her main tasks or goals, some variables (Hedonic Orientation and Utilitarian Orientation) meaning the extents of users' pursuing from the information system were additionally studied.

Scenarios for Manufacturing Process Data Analysis using Data Mining (데이터 마이닝을 이용한 생산공정 데이터 분석 시나리오)

  • Lee, Hyoung-wook;Bae, Sung-min
    • Journal of Institute of Convergence Technology
    • /
    • v.3 no.1
    • /
    • pp.41-44
    • /
    • 2013
  • Process and manufacturing data are numerously accumulated to the enterprise database in industries but little of those data are utilized. Data mining can support a decision to manager in process from the data. However, it is not easy to field managers because a proper adoption of various schemes is very difficult. In this paper, six scenarios are conducted using data mining schemes for the various situations of field claims such as yield problem, trend analysis and prediction of yield according to changes of operating conditions, etc. Scenarios, like templates, of various analysis situations are helpful to users.

  • PDF

A Research and Analysis for ISO 9000 Certification of Small and Medium Manufacturing Companies (ISO 9000 인증획득 준비의 문제점과 개선 방안에 대한 실증적 연구 -중소제조기업을 중심으로-)

  • 유재권
    • Journal of the Korean Professional Engineers Association
    • /
    • v.33 no.6
    • /
    • pp.87-92
    • /
    • 2000
  • As more and more companies pursue ISO 9000 certification, the adaptation of ISO 9000 has brought about some significant positive effects to domestic quality systems However, somenegative results occurred in domestic industries rushing to fulfill the requirements of these new quality systems. The primary objective of this research is to provide the efficient implemen tation process of ISO 9000 certification on the basis of total quality management concerning with ISO/ DIS 9000:2000, ISO/ DIS 9001:2000, ISO/DIS 9004:2000. this study has been conducted using the data collected from 325 Korean small and medium manufacturing companies which registered ISO 9000 certification in March 2000. The first, the adoption of a quality manage ment system needs to be a strategic decision of the organization. The design period of the adoption of a quality management system is influenced by the size of the organization, the products process, KS certification, the rate of management.

  • PDF

Factors Associated with Stages of Adoption for Breast Cancer Screening : Based on the Precaution Adoption Process Model -Focusing on Comparisons Between Nurses and General Women- (유방암검진 관련요인 : 예방책 채택과정 모형을 적용하여 -간호사와 일반여성의 비교 중심으로-)

  • Oh, Jae-Woo;Moon, Young-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.11
    • /
    • pp.246-257
    • /
    • 2012
  • Objectives : This study was aimed to grasp the stages of change in breast cancer screening of the nurses and general women who were over 20 and under 50 and specify the factors which affected the stages of change in breast cancer screening, based on Precaution Adoption Process Model. Methods : This study was conducted for 158 people who consisted of the nurses and general women who were over 20 and under 50. Results : As a result of examining the factors of cues to action and the belief in cancer screening according to the stages of change in the breast cancer screening of the nurses and general women, there was not a statistically significant difference and the perceived barriers showed a statistically significant difference in the stage of behavioral decision, the fifth stage. Conclusion : It is necessary to approach the individuals with the recommendation of cancer screening through the people around them and differentiated strategies considering the stages of change in cancer screening in order to induce the behavioral change in breast cancer screening, and develop and apply the strategies to enhance the severity perceived on the breast cancer.

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach (BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구)

  • Lee, Young-Chan;Hanh, Tang Nguyen
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

An Exploratory Study on The Factors Affecting BPO(Business Process Outsourcing) Performance of Domestic Firms: Focused on Knowledge Intensity and Degree of Informatization of Business Process (국내 기업의 비즈니스 프로세스 아웃소싱 영향요인에 관한 탐색적 연구 : 프로세스의 지식강도와 정보기술지원 정도를 중심으로)

  • 김정욱;박정훈;남기찬
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.149-168
    • /
    • 2003
  • With the increase of global competition and the reduction of the lifecycle of business process, most leading companies begin to adopt BPO(Business Process Outsourcing), by outsourcing the whole or part of their business process to external service providers and focusing on their core capability, in order to enhance their core competency, In adopting BPO, it is an important decision-making issue that which part of process should be outsourced. So identifying core/non-core process among the business processes is a prerequisite for managing corporate capability and performance of outsourcing. In this study, by focusing on knowledge intensity and degree of informatization of the business process that are important factors in adopting BPO, we have analyzed the current status of BPO adoption of domestic firms and proposed several guidelines for adopting BPO.

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.