• Title/Summary/Keyword: Information use behavior

Search Result 1,630, Processing Time 0.031 seconds

Psychosocial interventions for patients with alcohol use disorder: A systematic review (알코올 사용 장애 환자를 위한 심리 사회적 중재 프로그램에 대한 체계적 문헌고찰)

  • Kim, Mi Hye;Hyun, Myung Sun
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.29 no.1
    • /
    • pp.72-85
    • /
    • 2023
  • Purpose: The aims of this study were to identify the psychosocial interventions for patients with alcohol use disorder and to assess the effects of those interventions. Methods: A systematic literature search was conducted using PubMed, the Cochrane Library, Embase, CINAHL, PsycINFO, KoreaMed, KMBASE, RISS, KISS, Science ON, and DBpia to identify studies reported in English or Korean from 2012 to 2021. Results: From the 4,051 studies extracted, 14 studies were selected for review. The majority of the psychosocial interventions were focused on cognitive therapy or cognitive-behavior therapy. Most of the studies reported that the interventions made positive effects on alcohol consumptions. In addition, the psychosocial interventions for patients with alcohol use disorder were effective on coping, support, alcohol avoidance behavior, and hostility bias. Most of the studies reporting positive effects of psychosocial intervention programs applied computers, mobile phones, or similar electronic devices. Conclusion: The findings of this systematic review suggest that the use of computers or mobile devices in psychosocial intervention programs will be effective. It can be said that this systematic review reflects the current trends involving the development of information and communication technology. This systematic review can provide basic data for establishing evidence and suggesting future directions for psychosocial interventions for patients with alcohol use disorder.

An Investigation of the Awareness and Use of Open Access Initiative at the Federal Polytechnic, Offa, Kwara State, Nigeria

  • Issa, A.O.;Igwe, K.N.;Akangbe, B.R.;Aliyu, M.B.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.3
    • /
    • pp.55-65
    • /
    • 2014
  • This study investigated the information environment of lecturers in Federal Polytechnic, Offa, Kwara State, Nigeria, in relation to their information seeking behavior, extent of use of the polytechnic library, perceptions of the resources and services of the library, level of awareness and extent of use of the open access model of scholarly communications, as well as the challenges of accessing and using information resources. It adopted the survey research method, using a questionnaire for data collection, while the descriptive statistics method was used to analyse the data, using tabular presentation and simple percentages. From a population of 280 lecturers for the study, a purposive sample of 164 was drawn. The findings showed that the lecturers' information needs are focused on online use; they hardly use the polytechnic library due to their perceptions of the resources and services of the library. They are, to a greater extent, aware of open access initiatives, but do not publish in open access outlets, while various challenges affect their access and use of information resources for teaching and research. A recommendation was made, among others, that the polytechnic management should pay more critical attention to the library especially in the areas of adequate, current and comprehensive collections on all the programmes of the institution, as well as the provision of wireless internet services on the campus through a public-private partnership arrangement.

User Behavior on Changing the Password from the Shadow Work View (그림자노동 차원에서 본 IT 사용자의 비밀번호 변경행동 연구)

  • Park, Sang Cheol
    • The Journal of Information Systems
    • /
    • v.28 no.2
    • /
    • pp.93-107
    • /
    • 2019
  • Purpose The purpose of this study is to explain the mechanism of user behaviors in password reset context based on descriptive data from conducting interviews. Specifically, this study attempted to describe the process of changing password from the shadow work perspective. Design/methodology/approach This study has interviewed 8 participants who can freely use numerous online web-sites. This study also employed the grounded theory methodology to analyze interview manuscripts. After conducting analyzing the manuscripts, this study has extracted 46 codes in the coding steps and ultimately presented 8 categories by combining similar concepts from those codes. Findings According to the results, this study provides new viewpoints to explain unique user behavior in the password reset context by capturing the shadow work based on the results. This study further offers practical implications to numerous practitioners by finding various codes, which related to users' reaction and behavior.

Online Marketing Attitude Analysis. (온라인 마케팅 태도분석)

  • Kim, Se-Hwan
    • Journal of Industrial Convergence
    • /
    • v.9 no.1
    • /
    • pp.33-66
    • /
    • 2011
  • As an information-oriented society is arrived. an internet market has been developed steadily. This advance of internet market made the augmentation of purchasing clothes, and thus the fashion trade has tried to use effectively the internet marketing as a new channel of profit increasement. However, the fashion trade did not utilize efficiently an internet as a marketing mediation so far. This results from the want of coping with consumer behavior on the internet community. To answer the necessity of analysis of consumer behavior, this thesis inquires the difference of buying clothes on the internet shopping mall according to the lifestyle of consumer. Then this thesis provides the strategy of internet marketing fitted to each lifestyle for making a good profit. The inquiry was conducted to university located on Seoul, and the lifestyle of undergraduate was categorized to five groups, that is, trendy, information-inclined, economical purchase, brand-inclined, and spirit-pursuit types. This thesis analyzed the difference of consumer behavior of each type according to various factor, and presented a marketing strategy fitted to each type from these analysis results.

  • PDF

Aiding the operator during novel fault diagnosis

  • Yoon, Wan-C.;Hammer, John-M.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.9-24
    • /
    • 1987
  • The design and philosophy are presented for an intelligent aid for a hyman operator who must diagnose a novel fault in a physical system. A novel fault is defined as one that the operator has not experienced in either real system operation or training. When the operator must diagnose a novel fault, deep reasoning about the behavior of the system components is required. To aid the human operator in this situation, four aiding approaches which provide useful information are proposed. The aiding information is generated by a qualitative, component-level model of the physical system. Both the aid and the human are able to reason causally about the system in a cooperative search for a diagnosis. The aiding features were designed to help the hyman's use of his/her mental model in predicting the normal system behavior, integrating the observations into the actual system behavior, or finding discrepancies between the two. The aid can also have direct access to the operator's hypotheses and run a hypothetical system model. The different aiding approaches will be evaluated by a series of experiments.

  • PDF

Participatory Web Users’ Information Activities and Credibility Assessment

  • Rieh, Soo-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.155-178
    • /
    • 2010
  • Assessment of information credibility is a ubiquitous human activity given that people constantly make decisions and selections based on the value of information in a variety of information seeking and use contexts. Today, people are increasingly engaging in diverse online activities beyond searching for and reading information, including activities such as creating, tagging and rating content, shopping, and listening to and watching multimedia content. The Web 2.0 environment presents new challenges for people because the burden of information evaluation is shifted from professional gatekeepers to individual information consumers. At the same time, however, it also provides unprecedented opportunities for people to use tools and features that help them to make informed credibility judgments by relying on other people's ratings and recommendations. This paper introduces fundamental notions and dimensions of credibility, and contends that credibility assessment can be best understood with respect to human information behavior because it encompasses both the level of effort people exert as well as the heuristics they employ to evaluate information. The paper reports on a survey study investigating people's credibility judgments with respect to online information, focusing on the constructs, heuristics, and interactions involved in people's credibility assessment processes within the context of their everyday life information activities. Using an online activity diary method, empirical data about people's online activities and their associated credibility assessments were collected at multiple points throughout the day for three days. The results indicate that distinct credibility assessment heuristics are emerging as people engage in diverse online activities involving more user-generated and multimedia content. A heuristic approach suggests that people apply mental shortcuts or rules of thumb in order to minimize the amount of cognitive effort and time required to make credibility judgments. The paper discusses why a heuristic approach is key to reaching a more comprehensive understanding of people's credibility assessments within the information-abundant online environment.

Seeking and Using Information Sources by College Students: Comparisons of Information Seeking in Everyday Life and during Elections (대학생의 일상생활 및 선거 시기 정보원 이용 행태 비교 분석)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.3
    • /
    • pp.117-135
    • /
    • 2010
  • This study investigated how college students seek and use information sources in their everyday lives. A total of 360 students from twelve colleges located in Seoul were randomly selected and participated in this study. The survey asked them what kind of information sources they use in their everyday life and what differences it has when they seek the information sources for their decision making time. Various criteria for evaluating information sources were reviewed to adopt in this study and collected data were analyzed using SPSS 17.0.

A study of the relationship between oral health behaviors, use of dental clinics and periodontitis (구강건강행태 및 치과의료서비스 이용과 치주질환과의 관련성)

  • Choi, Hye-Jung;Lee, Myung-Sun
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.14 no.3
    • /
    • pp.89-99
    • /
    • 2013
  • Objectives: This study was designed to examine the effects of oral health behaviors and use of dental clinics on periodontal diseases in women, the purpose of this study is to provide basic information to develop program for dental health promotion in young women. Methods: We conducted a survey targeting 486 women that agreed with the survey and were going to dental clinic from October 1, 2013 to October 18, 2013. We surveyed them by self-administered questionnaire and analyzed it by SPSS Win 19.0 program. Results: 1. For differences in periodontitis according to general characteristics, if th age is high, ratio of periodontitis is high. Married woman is higher than single one in ratio of periodontitis. Also the more number of birth, the higher ratio of periodontitis is.(p<.05) 2. For differences of periodontitis by dental care behavior, ratio of periodontitis of non-smokers is significantly low. For one that brush one's teeth broadside, the ratio of periodontitis is high.(p<.05) 3. For differences of periodontitis by use of dental clinic service, ratio of periodontitis of one that have more times visit to a dental clinic, more annual average cost for dental care, and regular dental check-ups is relatively low.(p<.05). 4. For determinant factors influencing on periodontitis, ratio of periodontitis of one that is old, have more stress, have a low level of education, and have preventive dental care is high. Ratio of periodontitis of one that have less toothbrushing and brush one's teeth after having lunch or a snack and before sleeping is significantly low. Conclusions: From this study, dental health behavior as the factor influencing on periodontitis of young women is statistically meaningful. Because this dental health behavior has a lot of potential to be improved by government and local community efforts such as education and social support, we think that systematic and various educational program development is needed to strengthen self dental care ability effectively with policy support.

  • PDF

A Study on the effect of turnover intention by psychological commitment in Mandatory Environments - Focused on the Accounting Information Systems' Users - (비자발적 환경하에서 사용자의 심리적 몰입이 이직의도에 미치는 영향에 관한 연구 - 회계정보시스템 사용자를 중심으로 -)

  • Chang, Won-Kyun;Kim, Tae-Kyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.602-627
    • /
    • 2006
  • This paper presents and tests a conceptual model of Technology Acceptance Model(TAM) that explains perceived usefulness, perceived ease of use, organizational commitment and turnover intention in terms of psychological commitment in mandatory environments. The model focuses on psychological commitment(Kelman's internalization, identification, compliance) as the primal of predictor of perceived usefulness, perceived ease of use and organizational commitment we discuss our current understanding of technology acceptance, as well as the notion of mandated use. The results and implications of the research are as follows. First, organizational commitment negatively influence turnover intention in mandatory environment. Second, perceived usefulness positively influence organizational commitment in mandatory environments. Third, psychological commitment positively influence organizational commitment, perceived usefulness and perceived ease of use in mandatory environments. Fourth, perceived ease of use positively influence perceived usefulness in mandatory environments. Through this research, psychological commitment is a strong determinant of technology acceptance in mandatory environments. These findings advance theory and contribution to the foundation for future research aimed at improving our understanding of user adoption behavior in mandatory environments.

  • PDF

Detecting Android Malware Based on Analyzing Abnormal Behaviors of APK File

  • Xuan, Cho Do
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.17-22
    • /
    • 2021
  • The attack trend on end-users via mobile devices is increasing in both the danger level and the number of attacks. Especially, mobile devices using the Android operating system are being recognized as increasingly being exploited and attacked strongly. In addition, one of the recent attack methods on the Android operating system is to take advantage of Android Package Kit (APK) files. Therefore, the problem of early detecting and warning attacks on mobile devices using the Android operating system through the APK file is very necessary today. This paper proposes to use the method of analyzing abnormal behavior of APK files and use it as a basis to conclude about signs of malware attacking the Android operating system. In order to achieve this purpose, we propose 2 main tasks: i) analyzing and extracting abnormal behavior of APK files; ii) detecting malware in APK files based on behavior analysis techniques using machine learning or deep learning algorithms. The difference between our research and other related studies is that instead of focusing on analyzing and extracting typical features of APK files, we will try to analyze and enumerate all the features of the APK file as the basis for classifying malicious APK files and clean APK files.