• Title/Summary/Keyword: Compliance Intention

Search Result 93, Processing Time 0.021 seconds

Evaluation of Nutrition Education for Insulin Dependent Diabetic Students (인슐린 의존성 당뇨병 학생을 대상으로 실시한 영양교육의 효과)

  • 이정희;박동연;윤진숙
    • Journal of Nutrition and Health
    • /
    • v.28 no.10
    • /
    • pp.1015-1021
    • /
    • 1995
  • This study was conducted to evaluate changes in nutritional knowledge, attitudes, behavior intention and behavior in a sample of 27 insulin dependent diabetic students participating in diabetics' camp. Nutritional knowledge related to diabetes, attitudes toward diabetes treatment and behavior intention about dietary changes were tested before and after nutrition education. Six months after nutrition education, an open ended questionnaire about their actual behavior changes was mailed to all participants and 17 of them responded. Pre-and post-testing showed that nutrition education was effective in significant changes in knowledge and in promoting positive attitudes and behavior intention. Increases of knowledge were consistently the same regardless of sex, level of education, regularity of diet, and duration of disease. Compared to male students, female students showed more positive change in knowledge, attitudes and behavior intention. It also appeared that middle school students showed more positive improvement in knowledge, attitudes and behavior than elementary and high school students. A follow-up test showed that their actual behavior changes were not squared with their behavior intention. They pointed out difficulties in having proper amount of meals and snack and the conflict with school time schedule as the major reason for discordance. These findings suggest that nutrition education for diabetics can be effective to improve their knowledge, attitudes and behavior intention and understanding about barriers to behavior change is important for better compliance to the disease.

  • PDF

Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework (SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구)

  • Hwang, In-Ho;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

An Empirical Study on the factors for Information Protection Policy of Employee's Compliance Intention (정보보호정책 준수의도에 미치는 요인에 관한 경험적 연구)

  • Kwon, Jang-Kee;Lee, Joon-Taik
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.7-13
    • /
    • 2014
  • In recent years, according to the increasing of information security compliance, information security management system's requirements is not a matter of choice but an essential problem. In this respect, this research have an invention to survey what it will affect employees in compliance with the privacy policy antecedents and how to apply this information for the future, and to suggest ways to improve the employees' information security policy compliance intentions. In this paper, To investigate the factors affecting the degree of information security policy compliance using the structural equation of least squares (PLS Partial Least Square) in the confumatory level (confirmatory), the factor analysis of the primary factor analysis and secondary last. The results is that almost of influencing factors affect to the compliance with information security policies directly, but not affect self-efficacy.

  • PDF

Reinterpretation of Behavior for Non-compliance with Procedures : Focusing on the Events at a Domestic Nuclear Power Plants (절차 미준수 행동의 재해석 : 국내 원전 사건을 중심으로)

  • Dong Jin Kim
    • Journal of the Korean Society of Safety
    • /
    • v.39 no.1
    • /
    • pp.82-95
    • /
    • 2024
  • Analyzing the aftermath of events at domestic nuclear power plants brings in the question: "Why do workers not comply with the prescribed procedures?" The current investigation of nuclear power plant events identifies their reasons considering the factors affecting the workers' behaviors. However, there are some complications to it: in addition to confirming the action such as an error or a violation, there is a limit to identifying the intention of the actor. To overcome this limitation, the study analyzed and examined the reasons for non-compliance identified in nuclear power plant events by Reason's rule-related behavior classification. For behavior analysis, I selected unit behaviors for events that are related to human and organizational factors and occurred at domestic nuclear power plants since 2017, and then I applied the rule-related behavior classification introduced by Reason (2008). This allowed me to identify the intentions by classifying unit behaviors according to quality and compliance with the rules. I also identified the factors that influenced unit behaviors. The analysis showed that most often, non-compliance only pursued personal goals and was based on inadequate risk appraisal. On the other hand, the analysis identified cases where it was caused by such factors as poorly written procedures or human system interfaces. Therefore, the probability of non-compliance can be reduced if these factors are properly addressed. Unlike event investigation techniques that struggle to identify the reasons for employee behavior, this study provides a new interpretation of non-compliance in nuclear power plant events by examining workers' intentions based on the concept of rule-related behavior classification.

Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior (정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로)

  • Kim, Jongki;Mou, Jian
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.169-176
    • /
    • 2020
  • With widespread use of information technologies the importance of information security has been heightened. Security policies which deal with fundamental direction of information security are critical elements of information security management. Numerous studies have been conducted on users' intention to comply security policies. They were based on various theoretical foundations and the theory of planned behavior(TPB) was the most frequently used. This research employed one of the quantitatively synthesizing meta-analytic techniques called Two-Stage Structural Equation Modeling to investigate factors influencing information security policy compliance behavior based on TPB. Analysis results indicated that all three factors of TPB were significantly influencing the behavioral intention. Moreover, the overall fit indices of structural model exhibited satisfactory level.

A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts (모바일 뱅킹 이용자의 개인정보 유출사고 인지가 개인정보관리 준수행동에 미치는 영향에 대한 사전 연구)

  • Kim, Jungduk;Lim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.735-744
    • /
    • 2016
  • Recently, personal information leakage incidents with increased usage of mobile services are increasing. Personal information leakage incidents can have a significant impact on an individual's mobile banking services. Accordingly, we examine relationships among individual's psychological characteristics, intention and behavior regarding compliance in an individual's perception on personal information leakage incidents in mobile banking contexts. In this study, for explaining our research model and understanding with personal psychology and behavior in mobile banking contexts, we adopted two theories, theory of interpersonal behavior and stimulus-response theory. We collected the 55 data using online surveyor and then analyzed structural equation model in order to find causal relationships among research variables. The results of this study should be useful to the mobile banking services companies in promoting service users to follow the information privacy policies.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

Factors Related to Therapeutic Compliance of Hypertensive Patients in Small and Medium Scale Industry (중소규모 사업장 고혈압환자의 치료순응과 관련요인)

  • Kim, Yang-Mi;Lee, Kyung-Jae;Kim, Joo-Ja;Chung, Chee-Kyung
    • Korean Journal of Occupational Health Nursing
    • /
    • v.11 no.2
    • /
    • pp.91-107
    • /
    • 2002
  • In order to evaluate the factors related to therapeutic compliance of hypertensive patients in small and medium scale industry, the questionnaire survey and the blood pressure measurement were performed on 138 hypertensive patients who were reported to have C or $D_2$ result of hypertension at the workers' periodic health examination from March to November 2001. The contents of questionnaire included the informations of factors related to therapeutic compliance of hypertensive patients such as, age, sex, marital status, income, education levels, scale, occupation, work duration, smoking and drinking habits, exercise, family history, stress and A type personality, employer's concern, organizational culture, health status, awareness, knowledge and attitude toward the needs of hypertension treatment, and experience of health education. The results of the study were as follows: 1. The proportion of those who were compliant to the treatment of hypertension was 41.3% of subjects. Among small scale industry less than 50 employees, the rate of therapeutic compliance group was 27.5% and therapeutic noncompliance group was 72.5%. Among medium scale industry more than 50 employees, the rate of therapeutic compliance group was 60.3% and therapeutic noncompliance group was 39.7%. 2. Among therapeutic noncompliance group, 95.1% of patients were aware of the fact that workers have hypertension, and 77.8% of patients got 6-10 marks of hypertension related knowledge. For health education, 27.2% were experienced and 34.6% said no intention to participate. And for hypertension treatment, 9.9% said no need to get the treatment and 44.4% said have no idea whether get treatment or not. 3. The significant factors related to therapeutic compliance of hypertensive patients in small scale industry were work duration, A type personality(anger), health status, attitude toward the needs of hypertension treatment, and experience of health education. 4. The significant factors related to therapeutic compliance of hypertensive patients in medium scale industry were age, occupation, subjective symptom, attitude toward the needs of hypertension treatment, and experience of health education. In consideration of above findings, it was suggested that in order to improve the therapeutic compliance in small and medium scale industry hypertensives, it be necessary to change attitude, perception, knowledge and treatment of hypertension by various methods such as effective health education and individually consulting programs by occupational health professional.

  • PDF

Effects of the User's Perceived Threat to Freedom and Personalization on Intention to Use Recommendation Services (자유 위협과 개인화에 대한 사용자의 지각이 상품 추천 서비스 수용에 미치는 영향)

  • Lee, Gyu-Dong;Kim, Jong-Uk;Lee, Won-Jun
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.123-145
    • /
    • 2007
  • There are flourishing studies in the acceptance or usage of information systems literature. Most of them have taken the pro - acceptance view. Undesirably, information technologies often provoke users' reactance or resistance. This paper explores one of the negative reactions -psychological reactance. The present paper studies the effects of the users' perception of threatened freedom and personalization degree on intention to use recommendation services. High personalization can be a major motivation for users to accept recommendation systems. However recommendation services are a two-edged sword, which not only provides users the efficiency of decision making but also poses threats to free choice. When people consider that their freedom is reduced or threatened by others, they experience the motivational state to restore the freedom. This motivational state must be considered in understanding usage of information systems, especially personalized services which are designed for persuasion or compliance. This paper empirically investigates the effect of personalization and the psychological reactance on the intention to use information systems in the personalized recommendation context. Users' perception of personalization increases the usefulness of recommendation service while their perception of threat to freedom reduces the intention to use personalized recommendation service. Findings and implications are discussed.

The Influence of Sanctions and Protection Motivation on the Intention of Compliance with Information Security Policies: Based on Parameter of Subjective Norm (제재 및 보호동기와 정보보호정책 준수 의도에 관한 연구: 주관적 규범을 매개로)

  • Shin, Hyuk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.47-58
    • /
    • 2019
  • This study applied the Theory of Reasoned Action by Fishbein & Ajzen(1975) as the grounded theory and adopt sanctions of the General Deterrent Theory and protection motivation of the Protection Motivation Theory as the antecedents to discuss the theoretical factors and the cases of application in the field of information security. Then, it adopted subjective norm, a variable of the Theory of Reasoned Action, as a parameter to analyze the causality of sanctions, perceived vulnerability, response cost, and self-efficacy with the intention to follow the information security policies. As a result, all of the antecedents except for sanctions had causality with the intention and subjective norm proved its mediating effect as a parameter between the antecedents and the intention.