• Title/Summary/Keyword: Intention to share knowledge

Search Result 36, Processing Time 0.022 seconds

Understanding User Motivations and Behavioral Process in Creating Video UGC: Focus on Theory of Implementation Intentions (Video UGC 제작 동기와 행위 과정에 관한 이해: 구현의도이론 (Theory of Implementation Intentions)의 적용을 중심으로)

  • Kim, Hyung-Jin;Song, Se-Min;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.125-148
    • /
    • 2009
  • UGC(User Generated Contents) is emerging as the center of e-business in the web 2.0 era. The trend reflects changing roles of users in production and consumption of contents on websites and helps us to understand new strategies of websites such as web portals and social network websites. Nowadays, we consume contents created by other non-professional users for both utilitarian (e.g., knowledge) and hedonic values (e.g., fun). Also, contents produced by ourselves (e.g., photo, video) are posted on websites so that our friends, family, and even the public can consume those contents. This means that non-professionals, who used to be passive audience in the past, are now creating contents and share their UGCs with others in the Web. Accessible media, tools, and applications have also reduced difficulty and complexity in the process of creating contents. Realizing that users create plenty of materials which are very interesting to other people, media companies (i.e., web portals and social networking websites) are adjusting their strategies and business models accordingly. Increased demand of UGC may lead to website visits which are the source of benefits from advertising. Therefore, they put more efforts into making their websites open platforms where UGCs can be created and shared among users without technical and methodological difficulties. Many websites have increasingly adopted new technologies such as RSS and openAPI. Some have even changed the structure of web pages so that UGC can be seen several times to more visitors. This mainstream of UGCs on websites indicates that acquiring more UGCs and supporting participating users have become important things to media companies. Although those companies need to understand why general users have shown increasing interest in creating and posting contents and what is important to them in the process of productions, few research results exist in this area to address these issues. Also, behavioral process in creating video UGCs has not been explored enough for the public to fully understand it. With a solid theoretical background (i.e., theory of implementation intentions), parts of our proposed research model mirror the process of user behaviors in creating video contents, which consist of intention to upload, intention to edit, edit, and upload. In addition, in order to explain how those behavioral intentions are developed, we investigated influences of antecedents from three motivational perspectives (i.e., intrinsic, editing software-oriented, and website's network effect-oriented). First, from the intrinsic motivation perspective, we studied the roles of self-expression, enjoyment, and social attention in forming intention to edit with preferred editing software or in forming intention to upload video contents to preferred websites. Second, we explored the roles of editing software for non-professionals to edit video contents, in terms of how it makes production process easier and how it is useful in the process. Finally, from the website characteristic-oriented perspective, we investigated the role of a website's network externality as an antecedent of users' intention to upload to preferred websites. The rationale is that posting UGCs on websites are basically social-oriented behaviors; thus, users prefer a website with the high level of network externality for contents uploading. This study adopted a longitudinal research design; we emailed recipients twice with different questionnaires. Guided by invitation email including a link to web survey page, respondents answered most of questions except edit and upload at the first survey. They were asked to provide information about UGC editing software they mainly used and preferred website to upload edited contents, and then asked to answer related questions. For example, before answering questions regarding network externality, they individually had to declare the name of the website to which they would be willing to upload. At the end of the first survey, we asked if they agreed to participate in the corresponding survey in a month. During twenty days, 333 complete responses were gathered in the first survey. One month later, we emailed those recipients to ask for participation in the second survey. 185 of the 333 recipients (about 56 percentages) answered in the second survey. Personalized questionnaires were provided for them to remind the names of editing software and website that they reported in the first survey. They answered the degree of editing with the software and the degree of uploading video contents to the website for the past one month. To all recipients of the two surveys, exchange tickets for books (about 5,000~10,000 Korean Won) were provided according to the frequency of participations. PLS analysis shows that user behaviors in creating video contents are well explained by the theory of implementation intentions. In fact, intention to upload significantly influences intention to edit in the process of accomplishing the goal behavior, upload. These relationships show the behavioral process that has been unclear in users' creating video contents for uploading and also highlight important roles of editing in the process. Regarding the intrinsic motivations, the results illustrated that users are likely to edit their own video contents in order to express their own intrinsic traits such as thoughts and feelings. Also, their intention to upload contents in preferred website is formed because they want to attract much attention from others through contents reflecting themselves. This result well corresponds to the roles of the website characteristic, namely, network externality. Based on the PLS results, the network effect of a website has significant influence on users' intention to upload to the preferred website. This indicates that users with social attention motivations are likely to upload their video UGCs to a website whose network size is big enough to realize their motivations easily. Finally, regarding editing software characteristic-oriented motivations, making exclusively-provided editing software more user-friendly (i.e., easy of use, usefulness) plays an important role in leading to users' intention to edit. Our research contributes to both academic scholars and professionals. For researchers, our results show that the theory of implementation intentions is well applied to the video UGC context and very useful to explain the relationship between implementation intentions and goal behaviors. With the theory, this study theoretically and empirically confirmed that editing is a different and important behavior from uploading behavior, and we tested the behavioral process of ordinary users in creating video UGCs, focusing on significant motivational factors in each step. In addition, parts of our research model are also rooted in the solid theoretical background such as the technology acceptance model and the theory of network externality to explain the effects of UGC-related motivations. For practitioners, our results suggest that media companies need to restructure their websites so that users' needs for social interaction through UGC (e.g., self-expression, social attention) are well met. Also, we emphasize strategic importance of the network size of websites in leading non-professionals to upload video contents to the websites. Those websites need to find a way to utilize the network effects for acquiring more UGCs. Finally, we suggest that some ways to improve editing software be considered as a way to increase edit behavior which is a very important process leading to UGC uploading.

A Case Study on the Internal and External Use of Information Sharing Network: A Qualitative Approach (정보공유 네트워크의 조직 내외부 활용에 관한 사례 연구: 질적 연구를 바탕으로)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.205-226
    • /
    • 2016
  • As knowledge workers have increased and information interchanges become more diverse, only the resources of internal enterprise is not longer useful, and the practical use of external information through information public sharing network is even more crucial. But, few studies that use both internal and external information sharing systems together have been conducted. In this research, we carried on the depth interview to analyze the main factors that intend to utilize outside information as well as to share inside information voluntarily. In conclusion, sharing internal information is directly involved with the performance of their job exchanging simple data, past documents, and technical materials. On the other hand, using the external information belonged to several other organizations is mostly caused by the voluntary participants' satisfaction sharing their individual experience through the network systems. Based on the study, we propose the idea that can activate both internal and external information sharing network through the system with user feedback function regarding the customized information, and with the space expansion where people can freely raise their private opinion. We also introduce the plan of the construction of communication systems with various experts, and the development of compatible devices with diverse interfaces.

  • PDF

The Development of Lesson Reflection through the Lesson Reflection Sharing Case in the Secondary School Mathematics Class (중등 수학 수업에서의 나눔 사례를 통한 수업 성찰문 개발 연구)

  • Hwang, Hye Jeang;Moon, Du Yeol
    • Journal of the Korean School Mathematics Society
    • /
    • v.24 no.4
    • /
    • pp.369-390
    • /
    • 2021
  • It would be reasonable as a teacher to make efforts not only to reflect on the class on their own but also to improve the teacher' teaching e pertise by reflecting on the class with fellow teachers through lesson reflection sharing. This paper attempted to develop a lesson reflective framework that can provide standards and focus for lesson reflection and lesson sharing. First, based on the class evaluation criteria of previous studies, class reflection elements and a draft of lesson reflection were prepared. In a class conducted on 27 third graders at C High School where the co-researcher worked as a teacher, four peer teachers at the same high school were required to write personal opinions on the class based on the draft of lesson reflection. Based on this, lesson sharing was conducted, and modifications of the lesson reflection framework were developed by analyzing the case of class sharing. The implications of this paper indicate the need to clarify the perspective of viewing the lesson by sharing the intention of each question in advance. In addition to writing lesson reflections, it is necessary to share classes simultaneously.

The Effectiveness of Apps Recommending Best Restaurant through Location-based Knowledge Information: Privacy Calculus Perspective (위치기반 지식정보를 활용한 맛집 추천 앱의 효과: 프라이버시 계산을 중심으로)

  • Jiang, Taypun;Lim, Hyun A;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.89-106
    • /
    • 2017
  • In advanced mobile devices environment, the market share of mobile application has been increased. Among various mobile services, Location-based Service (LBS) is an important feature to increase user motivation related to purchase intention on mobile. However, individual privacy has also increased as an important problem for invasion of privacy and information leakage while too many LBS based applications (App) rapidly launched in the App market. In this study, we focused on perceived values of LBS App users who use Apps related to recommending best restaurants in China and South Korea. The purpose of this study is to identify important factors for perceived value when users provide personal information for LBS service provider. The result of this study is follows: perceived value can increase while LBS customers can more control self-information and information useability. Also information ability of users affected perceived values for LBS Apps. Also users' app user ability and perceived value were effects on privacy revenue. In addtion, perceived weakness of users and perceived value increased privacy threat.

Why Your Manuscripts Were Rejected or Required a Major Revision: An Analysis of Asia Pacific Journal if Information Systems (MIS 논문의 '게재 불가' 및 '수정 후 재심사' 사유: Asia Pacific Journal of Information Systems 심사소견서 분석)

  • Lee, Choong-C.;Yun, Hae-Jung;Hwang, Seong-Hoon
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.179-193
    • /
    • 2009
  • As the common saying attests, a publish-or-perish world, publishing is absolutely critical for academic researchers' successful careers. It is the most objectively-accepted academic performance criteria and the most viable way to attain public and academic recognition. Asia Pacific Journal of Information Systems(APJIS) has been recognized as the most influential domestic journal in Korean MIS field since July, 1991. Therefore, publishing in APJIS means your research is original, valid, and contributive. While most researchers learn how to publish an article in APJIS through a repetitive review process, thereby improving their chance of the' accepted' through their personal trial and error experiences, such valuable lessons and know-how tend to be kept personally and rarely shared. However, useful insights into research and publication skills could be also gained from sharing others' errors, neglect, and misjudgments which are equally critical in improving researchers' knowledge in the field (Murthy and Wiggins, 2002). For this reason, other academic disciplines make systematic efforts to examine the paper review process of major journals and share the findings from these studies with the rest of the research community members (Beyer et al., 1995; Cummings et al, 1985; Daft, 1995; Jauch and Wall, 1989; Murthy and Wiggins, 2002). Recognizing the urgent need to provide such type of information to MIS research community in Korea, we have chosen the most influential academic journal, APJIS with an intention to share the answer to the following research question: "What are the common problems found in the manuscripts either 'rejected' or 'required a major revision' by APJIS reviewers?" This study analyzes the review results of manuscripts submitted to APJIS (from January, 2006 to October, 2008), particularly those that were 'rejected' or required a 'major revision' at the first round. Based on Daft's(1995) study, twelve most-likelihood problems were defined and used to analyze the reviews. The twelve criteria for classification, or "twelve problems", are as follows: No theory, Concepts and operationalization not in alignment, Insufficient definition--theory, Insufficient rationale--design, Macrostructure--organization and flow, Amateur style and tone, Inadequate research design, Not relevant to the field, Overengineering, Conclusions not in alignment, Cutting up the data, and Poor editorial practice. Upon the approval of the editorial board of APJIS, the total 252 reviews, including 11 cases of 2005 and 241 cases from July, 2006 to October, 2008, were received without any information about manuscripts, authors, or reviewers. Eleven cases of 2005 were used in the pilot test because the data of 2005 were not in complete enumeration, and the 241 reviews (113 cases of 'rejection' and 128 ones of 'major revision') of 2006, 2007, and 2008 were examined in this study. Our findings show that insufficient rationale-design(20.25%), no theory(18.45%), and insufficient definition--theory(15.69%) were the three leading reasons of 'rejection' and 'major revision.' Between these two results, the former followed the same order of three major reasons as an overall analysis (insufficient rationale-design, no theory, and insufficient definition-theory), but the latter followed the order of insufficient rationale--design, insufficient definition--theory, and no theory. Using Daft's three major skills-- 'theory skills', 'design skills', and 'communication skills'-- twelve criteria were reclassified into 'theory problems', 'design problems', and 'communication problems' to derive more practical implications of our findings. Our findings show that 'theory problems' occupied 43.48%, 'design problems' were 30.86%, and 'communication problems' were 25.86%. In general, the APJIS reviewers weigh each of these three problem areas almost equally. Comparing to other disciplines like management field shown in Daft's study, the portion of 'design problems' and 'communication problems' are much higher in manuscripts submitted to the APJIS than in those of Administrative Science Quarterly and Academy of Management Journal even though 'theory problems' are the most predominant in both disciplines.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF