• Title/Summary/Keyword: Intention to use technology

Search Result 1,151, Processing Time 0.03 seconds

An Empirical Study on the Factors Affecting RFID Adoption Stage with Organizational Resources (조직의 자원을 고려한 RFID 도입단계별 영향요인에 관한 실증연구)

  • Jang, Sung-Hee;Lee, Dong-Man
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.125-150
    • /
    • 2009
  • RFID(Radio Frequency IDentification) is a wireless frequency of recognition technology that can be used to recognize, trace, and identify people, things, and animals using radio frequency(RF). RFID will bring about many changes in manufacturing and distributions, among other areas. In accordance with the increasing importance of RFID techniques, great advancement has been made in RFID studies. Initially, the RFID research started as a research literature or case study. Recently, empirical research has floated on the surface for announcement. But most of the existing researches on RFID adoption have been restricted to a dichotomous measure of 'adoption vs. non-adoption' or adoption intention. In short, RFID research is still at an initial stage, mainly focusing on the research of the RFID performance, integration, and its usage has been considered dismissive. The purpose of this study is to investigate which factors are important for the RFID adoption and implementation with organizational resources. In this study, the organizational resources are classified into either finance resources or IT knowledge resources. A research model and four hypotheses are set up to identify the relationships among these variables based on the investigations of such theories as technological innovations, adoption stage, and organizational resources. In order to conduct this study, a survey was carried out from September 27, 2008 until October 23, 2008. The questionnaire was completed by 143 managers and workers from physical distribution and manufacturing companies related to the RFID in South Korea. 37 out of 180 surveys, which turned out unfit for the study, were discarded and the remaining 143(adoption stage 89, implementation stage 54) were used for the empirical study. The statistics were analyzed using Excel 2003 and SPSS 12.0. The results of the analysis are as follows. First, the adoption stage shows that perceived benefits, standardization, perceived cost savings, environmental uncertainty, and pressures from rival firms have significant effects on the intent of the RFID adoption. Further, the implementation stage shows that perceived benefits, standardization, environmental uncertainty, pressures from rival firms, inter-organizational cooperation, and inter-organizational trust have significant effects on the extent of the RFID use. In contrast, inter-organizational cooperation and inter-organizational trust did not show much impact on the intent of RFID adoption while perceived cost savings did not significantly affect the extent of RFID use. Second, in the adoption stage, financial issues had adverse effect on both inter-organizational cooperation and the intent against the RFID adoption. IT knowledge resources also had a deterring effect on both perceived cost savings and the extent of the RFID adoption. Third, in the implementation stage, finance resources had a moderate effect on environmental uncertainty and extent of RFID use while IT knowledge resources had also a moderate effect on perceived cost savings and the extent of the RFID use. Limitations and future research issues can be summarized as follows. First, it is difficult to say that the sample is large enough to be representative of the population. Second, because the sample of this study was conducted among manufacturers only, it may be limited in analyzing fully the effect on the industry as a whole. Third, in consideration of the fact that the organizational resources in the RFID study require a great deal of researches, this research may deem insufficient to fulfill the purpose that it initially set out to achieve. Future studies using performance research are, therefore, needed to help better understand the organizational level of the RFID adoption and implementation.

A Study on Job Stress of Dental Technician (치과기공사의 업무스트레스에 대한 연구)

  • Lee, Deok-Su;Kwak, Dong-Ju;Nam, Sang-Yong
    • Journal of Technologic Dentistry
    • /
    • v.24 no.1
    • /
    • pp.51-63
    • /
    • 2002
  • The purpose of this study was to be of use for getting rid of job stress from dental technicians, by examining how much they were stressed out at work place as one of the professional medical personnels. The subjects in this study were 255 selected dental technicians who were working in the region of Taegu. The one-on-one interview was conducted from March 1 to 30, 2001, with structured questionnaire. The questionnaire sued in this study included 19 question items about the general characteristics and 29 items regarding job stress. The job stress was categorized into seven subareas based on earlier studies and considering the job situations of dental technicians: heavy workload, job conflicts, improper treatment, role and job knowledge, human relations, physical environment and personal matters. The job stress extent was measured on five-point Likert scale that is widely used in social science: one point for no stress, two for little stress, three for so-so, four for a little stress, and five for severe stress. Therefore, a higher point means a severer job stress. The reliability of the questionnaire turned out very good with Cronbach a = 0.9272. The findings of this study were as follows: 1. The general characteristics of the dental technicians investigated could be described as below: (1) By gender, 80.4% of the dental technicians were male, and 50.2%, the largest percentage, were in their 20s, followed by those in their 30s, those in their 40s, and those in their 50s in the order named. (2) The most common work place was dental technician shop(92.5%), followed by dental technology room in dental hospital or clinic and in general hospital in the order named. The primary duties were coating materials work(30.6%), followed by sculpture, grinding, partial and full denture and orthodontics in the order named. 2. The most larges (1) The most largest motivation to be a dental technician was its being a professional(33.7%), followed by the advice from others, their own aptitude, and good economic treatment in the order named. 3. Their job stress could be explained as below: (1) Their collective job stress average was 3.96$^{\circ}{\ae}$0.50 on the basis of 5 point, which showed that they were exposed to a fairly severe job stress. (2) By area, they were most stressed out from heavy workload (4.12), and they also were severely stressed from role and job knowledge(4.02) and personal matters(4.00). (3) By situation, they were most stressed when the disagreement of prosthesis that results from a specific error is unconditionally attributed to them(4.43). And they were also stressed a lot when their workload increases due to the rework(4.38), when a dentist asks something difficult for them to resolve(4.20), when heavy workload makes their working hours irregular and it's impossible to lead a personal life or have leisure time(4.16), and when they are o work for an excessively short time(4.16). This fact indicated that most of the dental technicians were exposed to a lot of stress in conjunction with job performance. 4. The main duties they took charge of didn't make any significant difference to their job stress, but yielded a significant difference to the extent of job stress in individual areas and the order of the most stressful one. Those who were engaged in grinding were most stressed from their own matters, whereas heavy workload was most stressful for those who were engaged in the other types of works. 5. As a result of seeing if their personal characteristics yielded any differences to job stress, the personal characteristics that made their job stress vary significantly were working hours, motivation of being a dental technician, job satisfaction and willingness to continue doing dental technology works. There was a tendency that longer working hours led to severer job stress, and those who chose to be a dental technician according to their own aptitude were less stressed than the others who became a dental technician because of economic reason or advices from others. And the people who were satisfied with their job were exposed to less job stress than the others who weren't, and those who had an intention to keep that job as much as possible were less stressed, compared to the others who hadn't.

  • PDF

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

Current Status and Tasks of Using the School Affairs System in Elementary Schools (초등학교에서의 교무업무시스템 운영 현황과 과제 - 서울과 경기 지역을 중심으로 -)

  • Shin, Ji-Yean;Jo, Mi-Heon
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.1
    • /
    • pp.21-28
    • /
    • 2007
  • Along with the development of telecommunication technology, educational role has been considerably changed and NEIS is introduced and operated for the digital educational administration. However, the function of NEIS is so limited when operated in each school. As a result, Korean government prepares the plan to install and operate a new School Affairs System by separating 3 areas from 27 areas of NEIS. School Affairs System has been used in schools since March, 2006. In this regard, this study attempts to analyze the current status and tasks of using the system in elementary schools. The result of the study shows that about 67% teachers use the system once or twice a day. Most of teachers answer that they get help from other teachers if they have any problem in operating the system. Many teachers affirmatively answer to the design and function of the system, and they are satisfied with the convenience and efficiency of the system. However, they feel difficulty to be familiar with the system sue to the frequent change. The importance of electronic certificate and personal information is well recognized and managed in terms of the security of the system. Facilities need to be well equipped, and information exchange system need to be developed to accept each school's request to improve the function of the system. In addition, applicable laws need to be arranged, clear guideline of educational administration agency and principal's strong intention are required to relieve teachers' work load.

  • PDF

UNSC Resolution against North Korea and ROKN's Reactions (유엔 안보리 대북제재 결의와 우리 해군의 대응)

  • Park, Chang Kwoun
    • Strategy21
    • /
    • s.39
    • /
    • pp.82-113
    • /
    • 2016
  • This paper analyzes the contents and the effects of the UNSC 2270, and its implications to South Korea's defense strategy and navy. The UN Security Council passed strong sanctions against North Korea which punish North Korea's 4th nuclear test. The sanctions compared to the previous ones require international society to take practical actions such as comprehensive trade bans as well as diplomatic isolation which will put significant pains on North Korea. Especially, these measures would greatly hamper economic development policy of Kim Joung-un regime. Because Kim Jung-un regime has inherent legitimacy problems which stems from the third family succession of the power, economic difficulties may play an important cause on the regime instability in the long term. In fact, the United States sees this possibility as an option to coerce North Korea in which North Korea choose denuclearization for its regime survival. Nevertheless, the prospects of the UN sanctions are not so optimistic. Considering North Korea's willingness for nuclear development and its level of nuclear technology, North Korea will try to play a gambit with the US and South Korea by exploiting its strategic advantages. North Korea's response will have three following strategies. First, it would actively pursue political and economic survival strategy by using China's support for the regime, strengthening its power grip in the name of countering US hostile policy, and enhancing peace propaganda. Second, North Korea will accelerate efforts to position its status as a nuclear de facto state. For this purpose, it could create nuclear crisis on the peninsula. Third, it would exploit local provocations as an exit strategy to get over the current situation. In order to counter North Korea's actions and punish North Korea's behavior strongly, South Korea needs following strategies and efforts. It should first make all the efforts to implement the UN sanctions. Strong and practical nuclear deterrence strategy and capability with the U.S. should be developed. Effective strategy and capabilities for the prevention and deterrence of North Korea's provocation should be prepared. For this purpose, North Korea's provocation strategy should be thoroughly reviewed. Active international cooperation is needed to punish and coerce North Korea's behavior. Finally, South Korea should prepare for the possible occurrence of North Korea's contingency and make use of the situation as an opportunity to achieve unification. All these strategies and efforts demand the more active roles and missions of South Korea's navy and thus, nullify North Korea's intention militarily.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.

A Study on Usage Behaviors and Place Attachment of Urban SSamji Park as a Neighborhood Space - Focused on Hanpyeong Park and Hanpyeom Park located in Capital Area- (근린공간으로서 도심지 쌈지공원의 이용행태와 장소애착에 관한 연구 - 수도권 지역의 한평공원 및 한뼘공원을 중심으로 -)

  • Park, Hoon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.7
    • /
    • pp.707-722
    • /
    • 2019
  • The concept of neighborhood parks has been used as the principle of forming a community in our society going through modern and contemporary times. The concept of neighborhood parks equipped with physical facilities has been discussed constantly regarding the roles and meanings of them. This study focuses on pocket parks which have been playing roles in improving environment through regeneration and forming regional communities based on that as neighborhood facilities. This author carried out field investigation on total 72 Hanpyeong Park and Hanpyeom Parks formed in the capital area and examined the significance of planning them and also their utility and residents and users' attachment to them through a survey. In this process, this researcher has been able to draw following conclusions. First, according to the demographic characteristics of users, there is significant difference found by groups in terms of their place attachment to the parks. This implies that difference in the major types of residences supplied these days influences their intention to experience ecological space. Second, according to their educational background, there is significant difference found by groups regarding their place attachment to the parks. Third, according to user behavior, there are differences found in their place attachment to the parks and also detailed differences found by groups in terms of the frequency of use and duration of stay.

A Study on Influencing Factors of Elderly Consumers' Self-Efficacy in Internet Banking Usage: Exploring Moderating Effect of 60s and 70s (고령 소비자의 인터넷 뱅킹 사용 자기효능감의 영향요인에 관한 연구: 60대와 70대의 비교)

  • Ku, Yoonhye;Yang, Su Jin
    • Journal of Korean Home Economics Education Association
    • /
    • v.34 no.4
    • /
    • pp.77-92
    • /
    • 2022
  • Recently, digital transformation in the financial industry has been accelerated, and it has become an important task to improve the level of utilization of Internet banking by elderly consumers, who are vulnerable to Internet use. Accordingly, this study analyzed 3,101 respondents in their 60s or older from the 11th year of the Media Panel Survey to identify demographic, experiential, and psychological factors that affect the self-efficacy of elderly consumers' usage of Internet banking. The main research findings are as follows. First, gender, education, occupation, and income were identified as demographic variables. Second, the Internet shopping experience was identified as an experiential factor. Also, concerns about information security, digital literacy, and high will for problem-solving were identified as psychological factors. Third, as a result of the moderating effect analysis on whether the experiential and psychological factors have different influences according to the group divided into the 60s and 70s, the effect on self-efficacy in the usage of the Internet was classified by age. The results of this study will be able to enrich the discussions related to the intention to utilize technology among elderly consumers by empirically revealing that there are characteristics that cause differences in financial behavior even within one group called the elderly.

Comparison of the Survey of Teaching Demand for Distance Education Support for the 2021 and 2022 Academic Years : For D Community Colleges in Daegu (2021학년도와 2022학년도 원격교육지원에 대한 교수 수요도 조사 비교: 대구지역 D전문대학을 대상으로)

  • Park, Jeong-Kyu
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.4
    • /
    • pp.491-497
    • /
    • 2022
  • In this study, we tried to secure basic data to create an environment necessary for distance learning through a survey on professor demand. Among the 184 full-time faculty members of the university, 73 (39.89%) respondents in 2021 and 87 (47.28%) in 2022 were included. As a result of the research on professor demand, in the 2021 school year, 27 people (37%) were classified as LMS improvement items when checking attendance, 38 people (23.3%) were pin-mics as content development support items, and 26 people (35.6%), 33 people (45.2%) of GOM Mix and 25 people (34.2%) of the distance education support center wanted to learn video editing program as the item of video editing program they are currently using. In the 2022 school year, 27 people (31.03%) said mobile upgrade as an LMS improvement item, 52 people (59.8%) of pin-microphone as a content development support item, 33 people (37.9%), but currently using the content creation intention using a studio. As for the video editing program they are working on, 47 people (54%) of GOM Mix Pro and 23 people (26.4%) of the distance education support center want to learn content creation method. In addition, the intention to produce content using the studio for the 2021 and 2022 academic year and the desired educational topic of the distance education support center in the future appeared insignificant (p > 0.05). In this distance education support center, we are working to solve the class of LMS attendance, upgrade mobile, and plan to distribute pin microphones. We are planning to increase the usability of the studio and provide training on how to use video editing programs and how to create video content. In order for a smooth class to take place in a university distance class, the university authorities should seek ways to support the instructor so that he/she does not have difficulties in performing his/her role as a teaching designer, such as setting learning goals, organizing and organizing content, motivating learning, and establishing effective class participation plans. there is a need

The study of consumer types according to the level of digital divide (디지털 정보격차 수준에 따른 소비자유형 연구)

  • Baek, Ji-Yeon;Jang, Eun-Gyo;Lee, Jin-Myong
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.193-202
    • /
    • 2022
  • The purpose of this study is to propose an effective informatization policy by categorizing consumer groups according to the level of digital divide and identifying the characteristics of each type. For this end, a total of 402 data were collected through an online and on-site surveys targeting consumers with internet experience, and the data were analyzed using the SPSS 26.0 program. As a result of conducting a K-means cluster analysis based on access to, capability, and utilization of digital devices, four consumer groups were categorized: 'device lover', 'proficient user', 'general user', and 'digital alienated'. By consumer type, significant differences were found in demographic characteristics, social capital, perception of the future information society, attitude toward technology as innovativeness, discomfort and familiarity, which are the antecedent variables of the digital divide. Significant differences in digital device satisfaction and intention to use, which are outcome variables of the digital divide, were also confirmed by consumer type. This study is academically and practically valuable in that it proposes customized informatization policies for each consumer group according to the level of digitization.